CINXE.COM
Search results for: side channel attack
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: side channel attack</title> <meta name="description" content="Search results for: side channel attack"> <meta name="keywords" content="side channel attack"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="side channel attack" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="side channel attack"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 3867</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: side channel attack</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3867</span> A Survey on Countermeasures of Cache-Timing Attack on AES Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Settana%20M.%20Abdulh">Settana M. Abdulh</a>, <a href="https://publications.waset.org/abstracts/search?q=Naila%20A.%20Sadalla"> Naila A. Sadalla</a>, <a href="https://publications.waset.org/abstracts/search?q=Yaseen%20H.%20Taha"> Yaseen H. Taha</a>, <a href="https://publications.waset.org/abstracts/search?q=Howaida%20Elshoush"> Howaida Elshoush</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Side channel attacks are based on side channel information, which is information that is leaked from encryption systems. This includes timing information, power consumption as well as electromagnetic or even sound leaking which can exploited by an attacker. Implementing side channel attacks are possible if and only if an attacker has access to a cryptosystem. In this case, the attacker can exploit bad implementation in software or hardware which is not controlled by encryption implementer. Thus, he/she will represent a real threat to the security system. Several countermeasures have been proposed to eliminate side channel information vulnerability.Cache timing attack is a special type of side channel attack. Here, timing information is collected and analyzed by an attacker to guess sensitive information such as encryption key or plaintext. This paper reviews the technique applied in this attack and surveys the countermeasures against it, evaluating the feasibility and usability of each. Based on this evaluation, finally we pose several recommendations about using these countermeasures. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=AES%20algorithm" title="AES algorithm">AES algorithm</a>, <a href="https://publications.waset.org/abstracts/search?q=side%20channel%20attack" title=" side channel attack"> side channel attack</a>, <a href="https://publications.waset.org/abstracts/search?q=cache%20timing%20attack" title=" cache timing attack"> cache timing attack</a>, <a href="https://publications.waset.org/abstracts/search?q=cache%20timing%20countermeasure" title=" cache timing countermeasure"> cache timing countermeasure</a> </p> <a href="https://publications.waset.org/abstracts/17652/a-survey-on-countermeasures-of-cache-timing-attack-on-aes-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17652.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">299</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3866</span> General Formula for Water Surface Profile over Side Weir in the Combined, Trapezoidal and Exponential, Channels</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abdulrahman%20Abdulrahman">Abdulrahman Abdulrahman</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A side weir is a hydraulic structure set into the side of a channel. This structure is used for water level control in channels, to divert flow from a main channel into a side channel when the water level in the main channel exceeds a specific limit and as storm overflows from urban sewerage system. Computation of water surface over the side weirs is essential to determine the flow rate of the side weir. Analytical solutions for water surface profile along rectangular side weir are available only for the special cases of rectangular and trapezoidal channels considering constant specific energy. In this paper, a rectangular side weir located in a combined (trapezoidal with exponential) channel was considered. Expanding binominal series of integer and fraction powers and the using of reduction formula of cosine function integrals, a general analytical formula was obtained for water surface profile along a side weir in a combined (trapezoidal with exponential) channel. Since triangular, rectangular, trapezoidal and parabolic cross-sections are special cases of the combined cross section, the derived formula, is applicable to triangular, rectangular, trapezoidal cross-sections as analytical solution and semi-analytical solution to parabolic cross-section with maximum relative error smaller than 0.76%. The proposed solution should be a useful engineering tool for the evaluation and design of side weirs in open channel. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=analytical%20solution" title="analytical solution">analytical solution</a>, <a href="https://publications.waset.org/abstracts/search?q=combined%20channel" title=" combined channel"> combined channel</a>, <a href="https://publications.waset.org/abstracts/search?q=exponential%20channel" title=" exponential channel"> exponential channel</a>, <a href="https://publications.waset.org/abstracts/search?q=side%20weirs" title=" side weirs"> side weirs</a>, <a href="https://publications.waset.org/abstracts/search?q=trapezoidal%20channel" title=" trapezoidal channel"> trapezoidal channel</a>, <a href="https://publications.waset.org/abstracts/search?q=water%20surface%20profile" title=" water surface profile"> water surface profile</a> </p> <a href="https://publications.waset.org/abstracts/59960/general-formula-for-water-surface-profile-over-side-weir-in-the-combined-trapezoidal-and-exponential-channels" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/59960.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">237</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3865</span> Longitudinal Vortices Mixing in Three-Stream Micromixers with Two Inlets</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yi-Tun%20Huang">Yi-Tun Huang</a>, <a href="https://publications.waset.org/abstracts/search?q=Chih-Yang%20Wu"> Chih-Yang Wu</a>, <a href="https://publications.waset.org/abstracts/search?q=Shu-Wei%20Huang"> Shu-Wei Huang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this work, we examine fluid mixing in a full three-stream mixing channel with longitudinal vortex generators (LVGs) built on the channel bottom by numerical simulation and experiment. The effects of the asymmetrical arrangement and the attack angle of the LVGs on fluid mixing are investigated. The results show that the micromixer with LVGs at a small asymmetry index (defined by the ratio of the distance from the center plane of the gap between the winglets to the center plane of the main channel to the width of the main channel) is superior to the micromixer with symmetric LVGs and that with LVGs at a large asymmetry index. The micromixer using five mixing modules of the LVGs with an attack angle between 16.5 degrees and 22.5 degrees can achieve excellent mixing over a wide range of Reynolds numbers. Here, we call a section of channel with two pairs of staggered asymmetrical LVGs a mixing module. Besides, the micromixer with LVGs at a small attack angle is more efficient than that with a larger attack angle when pressure losses are taken into account. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=microfluidics" title="microfluidics">microfluidics</a>, <a href="https://publications.waset.org/abstracts/search?q=mixing" title=" mixing"> mixing</a>, <a href="https://publications.waset.org/abstracts/search?q=longitudinal%20vortex%20generators" title=" longitudinal vortex generators"> longitudinal vortex generators</a>, <a href="https://publications.waset.org/abstracts/search?q=two%20stream%20interfaces" title=" two stream interfaces"> two stream interfaces</a> </p> <a href="https://publications.waset.org/abstracts/7216/longitudinal-vortices-mixing-in-three-stream-micromixers-with-two-inlets" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7216.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">521</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3864</span> Estimation of Coefficient of Discharge of Side Trapezoidal Labyrinth Weir Using Group Method of Data Handling Technique</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=M.%20A.%20Ansari">M. A. Ansari</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Hussain"> A. Hussain</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Uddin"> A. Uddin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A side weir is a flow diversion structure provided in the side wall of a channel to divert water from the main channel to a branch channel. The trapezoidal labyrinth weir is a special type of weir in which crest length of the weir is increased to pass higher discharge. Experimental and numerical studies related to the coefficient of discharge of trapezoidal labyrinth weir in an open channel have been presented in the present study. Group Method of Data Handling (GMDH) with the transfer function of quadratic polynomial has been used to predict the coefficient of discharge for the side trapezoidal labyrinth weir. A new model is developed for coefficient of discharge of labyrinth weir by regression method. Generalized models for predicting the coefficient of discharge for labyrinth weir using Group Method of Data Handling (GMDH) network have also been developed. The prediction based on GMDH model is more satisfactory than those given by traditional regression equations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=discharge%20coefficient" title="discharge coefficient">discharge coefficient</a>, <a href="https://publications.waset.org/abstracts/search?q=group%20method%20of%20data%20handling" title=" group method of data handling"> group method of data handling</a>, <a href="https://publications.waset.org/abstracts/search?q=open%20channel" title=" open channel"> open channel</a>, <a href="https://publications.waset.org/abstracts/search?q=side%20labyrinth%20weir" title=" side labyrinth weir"> side labyrinth weir</a> </p> <a href="https://publications.waset.org/abstracts/115809/estimation-of-coefficient-of-discharge-of-side-trapezoidal-labyrinth-weir-using-group-method-of-data-handling-technique" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/115809.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">160</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3863</span> Channel That Can Be Used on Slope, Slide Prone and Seismic Areas, Swelling and Collapsing Soils</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sabir%20Tehrankhan%20Hasanov">Sabir Tehrankhan Hasanov</a>, <a href="https://publications.waset.org/abstracts/search?q=Mir%20Movsum%20Anar%20Dadashev"> Mir Movsum Anar Dadashev</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The article provides a brief overview of irrigation systems and canals applied to slopes, landslide-prone, seismic areas, and swelling and collapsing soils. The contemporary construction of the canal used for irrigation, energy, and water supply purposes is described. In order to ensure the durability, longevity, and reliability of the channel, a damping mat made of cast material is created under its cover, and the top is covered with a waterproof screen. Dowels are placed on the bottom and sides of the channel, and the bottom dowel is riveted to the solid bedrock and connected with piles placed at certain distances. Drainage was placed next to the bottom dowel, an operation road was created on one side of the channel, and a berm road was created on the other side. A bathtub was built on the side of the road, and a forest-bush strip was built on its bank. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=slope" title="slope">slope</a>, <a href="https://publications.waset.org/abstracts/search?q=channel" title=" channel"> channel</a>, <a href="https://publications.waset.org/abstracts/search?q=landslide" title=" landslide"> landslide</a>, <a href="https://publications.waset.org/abstracts/search?q=collapse" title=" collapse"> collapse</a>, <a href="https://publications.waset.org/abstracts/search?q=swell" title=" swell"> swell</a>, <a href="https://publications.waset.org/abstracts/search?q=soil" title=" soil"> soil</a>, <a href="https://publications.waset.org/abstracts/search?q=structure" title=" structure"> structure</a> </p> <a href="https://publications.waset.org/abstracts/159736/channel-that-can-be-used-on-slope-slide-prone-and-seismic-areas-swelling-and-collapsing-soils" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/159736.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">86</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3862</span> Accelerating Side Channel Analysis with Distributed and Parallelized Processing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kyunghee%20Oh">Kyunghee Oh</a>, <a href="https://publications.waset.org/abstracts/search?q=Dooho%20Choi"> Dooho Choi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Although there is no theoretical weakness in a cryptographic algorithm, Side Channel Analysis can find out some secret data from the physical implementation of a cryptosystem. The analysis is based on extra information such as timing information, power consumption, electromagnetic leaks or even sound which can be exploited to break the system. Differential Power Analysis is one of the most popular analyses, as computing the statistical correlations of the secret keys and power consumptions. It is usually necessary to calculate huge data and takes a long time. It may take several weeks for some devices with countermeasures. We suggest and evaluate the methods to shorten the time to analyze cryptosystems. Our methods include distributed computing and parallelized processing. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=DPA" title="DPA">DPA</a>, <a href="https://publications.waset.org/abstracts/search?q=distributed%20computing" title=" distributed computing"> distributed computing</a>, <a href="https://publications.waset.org/abstracts/search?q=parallelized%20processing" title=" parallelized processing"> parallelized processing</a>, <a href="https://publications.waset.org/abstracts/search?q=side%20channel%20analysis" title=" side channel analysis"> side channel analysis</a> </p> <a href="https://publications.waset.org/abstracts/9204/accelerating-side-channel-analysis-with-distributed-and-parallelized-processing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/9204.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">427</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3861</span> Investigating Message Timing Side Channel Attacks on Networks on Chip with Ring Topology</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mark%20Davey">Mark Davey</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Communications on a Network on Chip (NoC) produce timing information, i.e., network injection delays, packet traversal times, throughput metrics, and other attributes relating to the traffic being sent across the chip. The security requirements of a platform encompass each node to operate with confidentiality, integrity, and availability (ISO 27001). Inherently, a shared NoC interconnect is exposed to analysis of timing patterns created by contention for the network components, i.e., links and switches/routers. This phenomenon is defined as information leakage, which represents a ‘side channel’ of sensitive information that can be correlated to platform activity. The key algorithm presented in this paper evaluates how an adversary can control two platform neighbouring nodes of a target node to obtain sensitive information about communication with the target node. The actual information obtained is the period value of a periodic task communication. This enacts a breach of the expected confidentiality of a node operating in a multiprocessor platform. An experimental investigation of the side channel is undertaken to judge the level and significance of inferred information produced by access times to the NoC. Results are presented with a series of expanding task set scenarios to evaluate the efficacy of the side channel detection algorithm as the network load increases. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=embedded%20systems" title="embedded systems">embedded systems</a>, <a href="https://publications.waset.org/abstracts/search?q=multiprocessor" title=" multiprocessor"> multiprocessor</a>, <a href="https://publications.waset.org/abstracts/search?q=network%20on%20chip" title=" network on chip"> network on chip</a>, <a href="https://publications.waset.org/abstracts/search?q=side%20channel" title=" side channel"> side channel</a> </p> <a href="https://publications.waset.org/abstracts/171019/investigating-message-timing-side-channel-attacks-on-networks-on-chip-with-ring-topology" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/171019.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">71</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3860</span> Low Overhead Dynamic Channel Selection with Cluster-Based Spatial-Temporal Station Reporting in Wireless Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Zeyad%20Abdelmageid">Zeyad Abdelmageid</a>, <a href="https://publications.waset.org/abstracts/search?q=Xianbin%20Wang"> Xianbin Wang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Choosing the operational channel for a WLAN access point (AP) in WLAN networks has been a static channel assignment process initiated by the user during the deployment process of the AP, which fails to cope with the dynamic conditions of the assigned channel at the station side afterward. However, the dramatically growing number of Wi-Fi APs and stations operating in the unlicensed band has led to dynamic, distributed, and often severe interference. This highlights the urgent need for the AP to dynamically select the best overall channel of operation for the basic service set (BSS) by considering the distributed and changing channel conditions at all stations. Consequently, dynamic channel selection algorithms which consider feedback from the station side have been developed. Despite the significant performance improvement, existing channel selection algorithms suffer from very high feedback overhead. Feedback latency from the STAs, due to the high overhead, can cause the eventually selected channel to no longer be optimal for operation due to the dynamic sharing nature of the unlicensed band. This has inspired us to develop our own dynamic channel selection algorithm with reduced overhead through the proposed low-overhead, cluster-based station reporting mechanism. The main idea behind the cluster-based station reporting is the observation that STAs which are very close to each other tend to have very similar channel conditions. Instead of requesting each STA to report on every candidate channel while causing high overhead, the AP divides STAs into clusters then assigns each STA in each cluster one channel to report feedback on. With the proper design of the cluster based reporting, the AP does not lose any information about the channel conditions at the station side while reducing feedback overhead. The simulation results show equal performance and, at times, better performance with a fraction of the overhead. We believe that this algorithm has great potential in designing future dynamic channel selection algorithms with low overhead. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=channel%20assignment" title="channel assignment">channel assignment</a>, <a href="https://publications.waset.org/abstracts/search?q=Wi-Fi%20networks" title=" Wi-Fi networks"> Wi-Fi networks</a>, <a href="https://publications.waset.org/abstracts/search?q=clustering" title=" clustering"> clustering</a>, <a href="https://publications.waset.org/abstracts/search?q=DBSCAN" title=" DBSCAN"> DBSCAN</a>, <a href="https://publications.waset.org/abstracts/search?q=overhead" title=" overhead"> overhead</a> </p> <a href="https://publications.waset.org/abstracts/149614/low-overhead-dynamic-channel-selection-with-cluster-based-spatial-temporal-station-reporting-in-wireless-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/149614.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">118</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3859</span> Air Flow Characteristics and Pressure Distributions for Staggered Wing Shaped Tubes Bundle</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sayed%20A.%20Elsayed">Sayed A. Elsayed</a>, <a href="https://publications.waset.org/abstracts/search?q=Emad%20Z.%20Ibrahim"> Emad Z. Ibrahim</a>, <a href="https://publications.waset.org/abstracts/search?q=Osama%20M.%20Mesalhy"> Osama M. Mesalhy</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20A.%20Abdelatief"> Mohamed A. Abdelatief</a> </p> <p class="card-text"><strong>Abstract:</strong></p> An experimental and numerical study has been conducted to clarify fluid flow characteristics and pressure drop distributions of a cross-flow heat exchanger employing staggered wing-shaped tubes at different angels of attack. The water-side Rew and the air-side Rea were at 5 x 102 and at from 1.8 x 103 to 9.7 x 103, respectively. Three cases of the tubes arrangements with various angles of attack, row angles of attack and 90° cone angles were employed at the considered Rea range. Correlation of pressure drop coefficient Pdc in terms of Rea, design parameters for the studied cases were presented. The flow pattern around the staggered wing-shaped tubes bundle were predicted by using commercial CFD FLUENT 6.3.26 software package. Results indicated that the values of Pdc were increased by increasing the angle of attack from 0° to 45°, while the opposite was true for angles of attack from 135° to 180°. Comparisons between the experimental and numerical results of the present study and those, previously, obtained for similar available studies showed good agreements. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=wing-shaped%20tubes" title="wing-shaped tubes">wing-shaped tubes</a>, <a href="https://publications.waset.org/abstracts/search?q=cross-flow%20cooling" title=" cross-flow cooling"> cross-flow cooling</a>, <a href="https://publications.waset.org/abstracts/search?q=staggered%20arrangement" title=" staggered arrangement"> staggered arrangement</a>, <a href="https://publications.waset.org/abstracts/search?q=CFD" title=" CFD"> CFD</a> </p> <a href="https://publications.waset.org/abstracts/16278/air-flow-characteristics-and-pressure-distributions-for-staggered-wing-shaped-tubes-bundle" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/16278.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">376</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3858</span> The Droplet Generation and Flow in the T-Shape Microchannel with the Side Wall Fluctuation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yan%20Pang">Yan Pang</a>, <a href="https://publications.waset.org/abstracts/search?q=Xiang%20Wang"> Xiang Wang</a>, <a href="https://publications.waset.org/abstracts/search?q=Zhaomiao%20Liu"> Zhaomiao Liu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Droplet microfluidics, in which nanoliter to picoliter droplets acted as individual compartments, are common to a diverse array of applications such as analytical chemistry, tissue engineering, microbiology and drug discovery. The droplet generation in a simplified two dimension T-shape microchannel with the main channel width of 50 μm and the side channel width of 25 μm, is simulated to investigate effects of the forced fluctuation of the side wall on the droplet generation and flow. The periodic fluctuations are applied on a length of the side wall in the main channel of the T-junction with the deformation shape of the double-clamped beam acted by the uniform force, which varies with the flow time and fluctuation periods, forms and positions. The fluctuations under most of the conditions expand the distribution range of the droplet size but have a little effect on the average size, while the shape of the fixed side wall changes the average droplet size chiefly. Droplet sizes show a periodic pattern along the relative time when the fluctuation is forced on the side wall near the T-junction. The droplet emerging frequency is not varied by the fluctuation of the side wall under the same flow rate and geometry conditions. When the fluctuation period is similar with the droplet emerging period, the droplet size shows a nice stability as the no fluctuation case. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=droplet%20generation" title="droplet generation">droplet generation</a>, <a href="https://publications.waset.org/abstracts/search?q=droplet%20size" title=" droplet size"> droplet size</a>, <a href="https://publications.waset.org/abstracts/search?q=flow%20flied" title=" flow flied"> flow flied</a>, <a href="https://publications.waset.org/abstracts/search?q=forced%20fluctuation" title=" forced fluctuation"> forced fluctuation</a> </p> <a href="https://publications.waset.org/abstracts/65282/the-droplet-generation-and-flow-in-the-t-shape-microchannel-with-the-side-wall-fluctuation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/65282.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">282</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3857</span> Tamper Resistance Evaluation Tests with Noise Resources</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Masaya%20Yoshikawa">Masaya Yoshikawa</a>, <a href="https://publications.waset.org/abstracts/search?q=Toshiya%20Asai"> Toshiya Asai</a>, <a href="https://publications.waset.org/abstracts/search?q=Ryoma%20Matsuhisa"> Ryoma Matsuhisa</a>, <a href="https://publications.waset.org/abstracts/search?q=Yusuke%20Nozaki"> Yusuke Nozaki</a>, <a href="https://publications.waset.org/abstracts/search?q=Kensaku%20Asahi"> Kensaku Asahi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Recently, side-channel attacks, which estimate secret keys using side-channel information such as power consumption and compromising emanations of cryptography circuits embedded in hardware, have become a serious problem. In particular, electromagnetic analysis attacks against cryptographic circuits between information processing and electromagnetic fields, which are related to secret keys in cryptography circuits, are the most threatening side-channel attacks. Therefore, it is important to evaluate tamper resistance against electromagnetic analysis attacks for cryptography circuits. The present study performs basic examination of the tamper resistance of cryptography circuits using electromagnetic analysis attacks with noise resources. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=tamper%20resistance" title="tamper resistance">tamper resistance</a>, <a href="https://publications.waset.org/abstracts/search?q=cryptographic%20circuit" title=" cryptographic circuit"> cryptographic circuit</a>, <a href="https://publications.waset.org/abstracts/search?q=hardware%20security%20evaluation" title=" hardware security evaluation"> hardware security evaluation</a>, <a href="https://publications.waset.org/abstracts/search?q=noise%20resources" title=" noise resources "> noise resources </a> </p> <a href="https://publications.waset.org/abstracts/25852/tamper-resistance-evaluation-tests-with-noise-resources" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25852.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">504</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3856</span> Magnetohydrodynamic Flows in a Conduit with Multiple Channels under a Magnetic Field Applied Perpendicular to the Plane of Flow</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yang%20Luo">Yang Luo</a>, <a href="https://publications.waset.org/abstracts/search?q=Chang%20Nyung%20Kim"> Chang Nyung Kim</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study numerically analyzes a steady-state, three-dimensional liquid-metal magnetohydrodynamic flows in a conduit with multiple channels under a uniform magnetic field. The geometry of the conduit is of a four-parallel-channels system including one inflow channel and three outflow channels. The liquid-metal flows in the inflow channel, then turns 1800 in the transition segment, finally flows into three different outflow channels simultaneously. This kind of channel system can induce counter flow and co-flow, which is rarely investigated before. The axial velocity in the side layer near the first partitioning wall, which is located between the inflow channel and the first outflow channel, is the highest. ‘M-shaped’ velocity profiles are obtained in the side layers of the inflow and outflow channels. The interdependency of the current, fluid velocity, pressure, electric potential is examined in order to describe the electromagnetic characteristics of the liquid-metal flows. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=liquid-metal" title="liquid-metal">liquid-metal</a>, <a href="https://publications.waset.org/abstracts/search?q=multiple%20channels" title=" multiple channels"> multiple channels</a>, <a href="https://publications.waset.org/abstracts/search?q=magnetic%20field" title=" magnetic field"> magnetic field</a>, <a href="https://publications.waset.org/abstracts/search?q=magnetohydrodynamic" title=" magnetohydrodynamic"> magnetohydrodynamic</a> </p> <a href="https://publications.waset.org/abstracts/25440/magnetohydrodynamic-flows-in-a-conduit-with-multiple-channels-under-a-magnetic-field-applied-perpendicular-to-the-plane-of-flow" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/25440.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">281</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3855</span> Numerical Investigations of Unstable Pressure Fluctuations Behavior in a Side Channel Pump</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Desmond%20Appiah">Desmond Appiah</a>, <a href="https://publications.waset.org/abstracts/search?q=Fan%20Zhang"> Fan Zhang</a>, <a href="https://publications.waset.org/abstracts/search?q=Shouqi%20Yuan"> Shouqi Yuan</a>, <a href="https://publications.waset.org/abstracts/search?q=Wei%20Xueyuan"> Wei Xueyuan</a>, <a href="https://publications.waset.org/abstracts/search?q=Stephen%20N.%20Asomani"> Stephen N. Asomani</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The side channel pump has distinctive hydraulic performance characteristics over other vane pumps because of its generation of high pressure heads in only one impeller revolution. Hence, there is soaring utilization and application in the fields of petrochemical, food processing fields, automotive and aerospace fuel pumping where high heads are required at low flows. The side channel pump is characterized by unstable flow because after fluid flows into the impeller passage, it moves into the side channel and comes back to the impeller again and then moves to the next circulation. Consequently, the flow leaves the side channel pump following a helical path. However, the pressure fluctuation exhibited in the flow greatly contributes to the unwanted noise and vibration which is associated with the flow. In this paper, a side channel pump prototype was examined thoroughly through numerical calculations based on SST k-ω turbulence model to ascertain the pressure fluctuation behavior. The pressure fluctuation intensity of the 3D unstable flow dynamics were carefully investigated under different working conditions 0.8QBEP, 1.0 QBEP and 1.2QBEP. The results showed that the pressure fluctuation distribution around the pressure side of the blade is greater than the suction side at the impeller and side channel interface (z=0) for all three operating conditions. Part-load condition 0.8QBEP recorded the highest pressure fluctuation distribution because of the high circulation velocity thus causing an intense exchanged flow between the impeller and side channel. Time and frequency domains spectra of the pressure fluctuation patterns in the impeller and the side channel were also analyzed under the best efficiency point value, QBEP using the solution from the numerical calculations. It was observed from the time-domain analysis that the pressure fluctuation characteristics in the impeller flow passage increased steadily until the flow reached the interrupter which separates low-pressure at the inflow from high pressure at the outflow. The pressure fluctuation amplitudes in the frequency domain spectrum at the different monitoring points depicted a gentle decreasing trend of the pressure amplitudes which was common among the operating conditions. The frequency domain also revealed that the main excitation frequencies occurred at 600Hz, 1200Hz, and 1800Hz and continued in the integers of the rotating shaft frequency. Also, the mass flow exchange plots indicated that the side channel pump is characterized with many vortex flows. Operating conditions 0.8QBEP, 1.0 QBEP depicted less and similar vortex flow while 1.2Q recorded many vortex flows around the inflow, middle and outflow regions. The results of the numerical calculations were finally verified experimentally. The performance characteristics curves from the simulated results showed that 0.8QBEP working condition recorded a head increase of 43.03% and efficiency decrease of 6.73% compared to 1.0QBEP. It can be concluded that for industrial applications where the high heads are mostly required, the side channel pump can be designed to operate at part-load conditions. This paper can serve as a source of information in order to optimize a reliable performance and widen the applications of the side channel pumps. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=exchanged%20flow" title="exchanged flow">exchanged flow</a>, <a href="https://publications.waset.org/abstracts/search?q=pressure%20fluctuation" title=" pressure fluctuation"> pressure fluctuation</a>, <a href="https://publications.waset.org/abstracts/search?q=numerical%20simulation" title=" numerical simulation"> numerical simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=side%20channel%20pump" title=" side channel pump"> side channel pump</a> </p> <a href="https://publications.waset.org/abstracts/91948/numerical-investigations-of-unstable-pressure-fluctuations-behavior-in-a-side-channel-pump" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/91948.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">136</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3854</span> Modeling Intelligent Threats: Case of Continuous Attacks on a Specific Target</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Asma%20Ben%20Yaghlane">Asma Ben Yaghlane</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20Naceur%20Azaiez"> Mohamed Naceur Azaiez</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we treat a model that falls in the area of protecting targeted systems from intelligent threats including terrorism. We introduce the concept of system survivability, in the context of continuous attacks, as the probability that a system under attack will continue operation up to some fixed time t. We define a constant attack rate (CAR) process as an attack on a targeted system that follows an exponential distribution. We consider the superposition of several CAR processes. From the attacker side, we determine the optimal attack strategy that minimizes the system survivability. We also determine the optimal strengthening strategy that maximizes the system survivability under limited defensive resources. We use operations research techniques to identify optimal strategies of each antagonist. Our results may be used as interesting starting points to develop realistic protection strategies against intentional attacks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=CAR%20processes" title="CAR processes">CAR processes</a>, <a href="https://publications.waset.org/abstracts/search?q=defense%2Fattack%20strategies" title=" defense/attack strategies"> defense/attack strategies</a>, <a href="https://publications.waset.org/abstracts/search?q=exponential%20failure" title=" exponential failure"> exponential failure</a>, <a href="https://publications.waset.org/abstracts/search?q=survivability" title=" survivability"> survivability</a> </p> <a href="https://publications.waset.org/abstracts/83569/modeling-intelligent-threats-case-of-continuous-attacks-on-a-specific-target" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/83569.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">395</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3853</span> Investigation of Flow Characteristics of Trapezoidal Side Weir in Rectangular Channel for Subcritical Flow</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Malkhan%20Thakur">Malkhan Thakur</a>, <a href="https://publications.waset.org/abstracts/search?q=P.%20Deepak%20Kumar"> P. Deepak Kumar</a>, <a href="https://publications.waset.org/abstracts/search?q=P.%20K.%20S.%20Dikshit"> P. K. S. Dikshit</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In recent years, the hydraulic behavior of side weirs has been the subject of many investigations. Most of the studies have been in connection with specific problems and have involved models. This is perhaps understandable, since a generalized treatment is made difficult by the large number of possible variables to be used to define the problem. A variety of empirical head discharge relationships have been suggested for side weirs. These empirical approaches failed to adequately consider the actual situation, and produced equations applicable only in circumstances virtually identical to those of the experiment. The present investigation is targeted to study to a greater depth the effect of different trapezium angles of a trapezoidal side weir and study of water surface profile in spatially varied flow with decreasing discharge maintaining the main channel flow subcritical. On the basis of experiment, the relationship between upstream Froude number and coefficient of discharge has been established. All the characteristics of spatially varied flow with decreasing discharge have been studied and subsequently formulated. The scope of the present investigation has been basically limited to a one-dimensional model of flow for the purpose of analysis. A formulation has been derived using the theoretical concept of constant specific energy. Coefficient of discharge has been calculated and experimental results were presented. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=weirs" title="weirs">weirs</a>, <a href="https://publications.waset.org/abstracts/search?q=subcritical%20flow" title=" subcritical flow"> subcritical flow</a>, <a href="https://publications.waset.org/abstracts/search?q=rectangular%20channel" title=" rectangular channel"> rectangular channel</a>, <a href="https://publications.waset.org/abstracts/search?q=trapezoidal%20side%20weir" title=" trapezoidal side weir"> trapezoidal side weir</a> </p> <a href="https://publications.waset.org/abstracts/47362/investigation-of-flow-characteristics-of-trapezoidal-side-weir-in-rectangular-channel-for-subcritical-flow" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/47362.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">269</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3852</span> Morphological Characteristics and Development of the Estuary Area of Lam River, Vietnam</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Hai%20Nguyen%20Tien">Hai Nguyen Tien</a> </p> <p class="card-text"><strong>Abstract:</strong></p> On the basis of the structure of alluvial sediments explained by echo sounding data and remote sensing images, the following results can be given: The estuary of Lam river (from Ben Thuy bridge to Cua Hoi) is divided into 3 channel (location is calculated according to the river bank on the Nghe An province) : i) channel I (from Ben Thuy bridge to Hung Hoa) is the branching river; ii) channel II (from Hung Hoa to Nghi Thai is a channel develops in a meandering direction with a concave side toward Ha Tinh province; iii) channel III, from Nghi Thai to Cua Hoi is a channel develops in a meandering direction with a concave side toward Nghe An province. This estuary area is formed in the period from after the sea level dropped below 0m (current water level) to the present: i) Chanel II developed moving towards Ha Tinh provnce; ii) Chanel III developed moving towards Nghe An province; iii) In chanel I, a second river branch is formed because the flow of river cuts through the Hong Lam- Hong Nhat mudflat, at the same time creating an island. Morphological characteristics of the estuary area of Lam River are the main result of erosion and deposition activities corresponding to two water levels: low water level below 0 m and water level 0 m (current water level). Characteristics of the sediment layers on the riverbed in the estuary can be used to determine the sea levels in Late Holocene–Present. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lam%20River" title="Lam River">Lam River</a>, <a href="https://publications.waset.org/abstracts/search?q=development" title=" development"> development</a>, <a href="https://publications.waset.org/abstracts/search?q=Cua%20Hoi" title=" Cua Hoi"> Cua Hoi</a>, <a href="https://publications.waset.org/abstracts/search?q=river%20morphology" title=" river morphology"> river morphology</a> </p> <a href="https://publications.waset.org/abstracts/130853/morphological-characteristics-and-development-of-the-estuary-area-of-lam-river-vietnam" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/130853.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">126</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3851</span> Particle Gradient Generation in a Microchannel Using a Single IDT</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Florian%20Kiebert">Florian Kiebert</a>, <a href="https://publications.waset.org/abstracts/search?q=Hagen%20Schmidt"> Hagen Schmidt</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Standing surface acoustic waves (sSAWs) have already been used to manipulate particles in a microfluidic channel made of polydimethylsiloxan (PDMS). Usually two identical facing interdigital transducers (IDTs) are exploited to form an sSAW. Further, it has been reported that an sSAW can be generated by a single IDT using a superstrate resonating cavity or a PDMS post. Nevertheless, both setups utilising a traveling surface acoustic wave (tSAW) to create an sSAW for particle manipulation are costly. We present a simplified setup with a tSAW and a PDMS channel to form an sSAW. The incident tSAW is reflected at the rear PDMS channel wall and superimposed with the reflected tSAW. This superpositioned waves generates an sSAW but only at regions where the distance to the rear channel wall is smaller as the attenuation length of the tSAW minus the channel width. Therefore in a channel of 500µm width a tSAW with a wavelength λ = 120 µm causes a sSAW over the whole channel, whereas a tSAW with λ = 60 µm only forms an sSAW next to the rear wall of the channel, taken into account the attenuation length of a tSAW in water. Hence, it is possible to concentrate and trap particles in a defined region of the channel by adjusting the relation between the channel width and tSAW wavelength. Moreover, it is possible to generate a particle gradient over the channel width by picking the right ratio between channel wall and wavelength. The particles are moved towards the rear wall by the acoustic streaming force (ASF) and the acoustic radiation force (ARF) caused by the tSAW generated bulk acoustic wave (BAW). At regions in the channel were the sSAW is dominating the ARF focuses the particles in the pressure nodes formed by the sSAW caused BAW. On the one side the ARF generated by the sSAW traps the particle at the center of the tSAW beam, i. e. of the IDT aperture. On the other side, the ASF leads to two vortices, one on the left and on the right side of the focus region, deflecting the particles out of it. Through variation of the applied power it is possible to vary the number of particles trapped in the focus points, because near to the rear wall the amplitude of the reflected tSAW is higher and, therefore, the ARF of the sSAW is stronger. So in the vicinity of the rear wall the concentration of particles is higher but decreases with increasing distance to the wall, forming a gradient of particles. The particle gradient depends on the applied power as well as on the flow rate. Thus by variation of these two parameters it is possible to change the particle gradient. Furthermore, we show that the particle gradient can be modified by changing the relation between the channel width and tSAW wavelength. Concluding a single IDT generates an sSAW in a PDMS microchannel enables particle gradient generation in a well-defined microfluidic flow system utilising the ARF and ASF of a tSAW and an sSAW. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ARF" title="ARF">ARF</a>, <a href="https://publications.waset.org/abstracts/search?q=ASF" title=" ASF"> ASF</a>, <a href="https://publications.waset.org/abstracts/search?q=particle%20manipulation" title=" particle manipulation"> particle manipulation</a>, <a href="https://publications.waset.org/abstracts/search?q=sSAW" title=" sSAW"> sSAW</a>, <a href="https://publications.waset.org/abstracts/search?q=tSAW" title=" tSAW "> tSAW </a> </p> <a href="https://publications.waset.org/abstracts/37810/particle-gradient-generation-in-a-microchannel-using-a-single-idt" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/37810.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">335</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3850</span> A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Li%20Qiang">Li Qiang</a>, <a href="https://publications.waset.org/abstracts/search?q=Yang%20Ze-Ming"> Yang Ze-Ming</a>, <a href="https://publications.waset.org/abstracts/search?q=Liu%20Bao-Xu"> Liu Bao-Xu</a>, <a href="https://publications.waset.org/abstracts/search?q=Jiang%20Zheng-Wei"> Jiang Zheng-Wei</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=reasoning" title="reasoning">reasoning</a>, <a href="https://publications.waset.org/abstracts/search?q=Bayesian%20networks" title=" Bayesian networks"> Bayesian networks</a>, <a href="https://publications.waset.org/abstracts/search?q=cyber-attack%20attribution" title=" cyber-attack attribution"> cyber-attack attribution</a>, <a href="https://publications.waset.org/abstracts/search?q=Kill%20Chain" title=" Kill Chain"> Kill Chain</a>, <a href="https://publications.waset.org/abstracts/search?q=threat%20intelligence" title=" threat intelligence"> threat intelligence</a> </p> <a href="https://publications.waset.org/abstracts/50175/a-reasoning-method-of-cyber-attack-attribution-based-on-threat-intelligence" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/50175.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">450</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3849</span> Opportunities and Challenges of Omni Channel Retailing in the Emerging Market</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Salma%20Ahmed">Salma Ahmed</a>, <a href="https://publications.waset.org/abstracts/search?q=Anil%20Kumar"> Anil Kumar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper develops and estimates a model for understanding the drivers and barriers for Omni-Channel retail. This study serves as one of the first attempt to empirically test the effect of various factors on Omni-channel retail. Omni-channel is relative new and evolving, we hypothesize three drivers: (1) Innovative sales and marketing opportunities, (2) channel migration, (3) Cross channel synergies; and three barriers: (1) Integrated sales and marketing operations, (2) Visibility and synchronization (3) Integration and Technology challenges. The findings from the study strongly support that Omni-channel effects exist between cross channel synergy and channel migration. However, it partially supports innovative sales and marketing operations. We also found the variables which we identified as barriers to Omni-channel retail have a strong impact on Omni-channel retail. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=retailing" title="retailing">retailing</a>, <a href="https://publications.waset.org/abstracts/search?q=multichannel" title=" multichannel"> multichannel</a>, <a href="https://publications.waset.org/abstracts/search?q=Omni-channel" title=" Omni-channel"> Omni-channel</a>, <a href="https://publications.waset.org/abstracts/search?q=emerging%20market" title=" emerging market "> emerging market </a> </p> <a href="https://publications.waset.org/abstracts/24135/opportunities-and-challenges-of-omni-channel-retailing-in-the-emerging-market" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24135.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">549</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3848</span> Microfluidic Method for Measuring Blood Viscosity</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Eunseop%20Yeom">Eunseop Yeom</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Many cardiovascular diseases, such as thrombosis and atherosclerosis, can change biochemical molecules in plasma and red blood cell. These alterations lead to excessive increase of blood viscosity contributing to peripheral vascular diseases. In this study, a simple microfluidic-based method is used to measure blood viscosity. Microfluidic device is composed of two parallel side channels and a bridge channel. To estimate blood viscosity, blood samples and reference fluid are separately delivered into each inlet of two parallel side channels using pumps. An interfacial line between blood samples and reference fluid occurs by blocking the outlet of one side-channel. Since width for this interfacial line is determined by pressure ratio between blood and reference flows, blood viscosity can be estimated by measuring width for this interfacial line. This microfluidic-based method can be used for evaluating variations in the viscosity of animal models with cardiovascular diseases under flow conditions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=blood%20viscosity" title="blood viscosity">blood viscosity</a>, <a href="https://publications.waset.org/abstracts/search?q=microfluidic%20chip" title=" microfluidic chip"> microfluidic chip</a>, <a href="https://publications.waset.org/abstracts/search?q=pressure" title=" pressure"> pressure</a>, <a href="https://publications.waset.org/abstracts/search?q=shear%20rate" title=" shear rate"> shear rate</a> </p> <a href="https://publications.waset.org/abstracts/61260/microfluidic-method-for-measuring-blood-viscosity" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/61260.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">371</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3847</span> Mathematical Based Forecasting of Heart Attack</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Razieh%20Khalafi">Razieh Khalafi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Myocardial infarction (MI) or acute myocardial infarction (AMI), commonly known as a heart attack, occurs when blood flow stops to part of the heart causing damage to the heart muscle. An ECG can often show evidence of a previous heart attack or one that's in progress. The patterns on the ECG may indicate which part of your heart has been damaged, as well as the extent of the damage. In chaos theory, the correlation dimension is a measure of the dimensionality of the space occupied by a set of random points, often referred to as a type of fractal dimension. In this research by considering ECG signal as a random walk we work on forecasting the oncoming heart attack by analyzing the ECG signals using the correlation dimension. In order to test the model a set of ECG signals for patients before and after heart attack was used and the strength of model for forecasting the behavior of these signals were checked. Results shows this methodology can forecast the ECG and accordingly heart attack with high accuracy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=heart%20attack" title="heart attack">heart attack</a>, <a href="https://publications.waset.org/abstracts/search?q=ECG" title=" ECG"> ECG</a>, <a href="https://publications.waset.org/abstracts/search?q=random%20walk" title=" random walk"> random walk</a>, <a href="https://publications.waset.org/abstracts/search?q=correlation%20dimension" title=" correlation dimension"> correlation dimension</a>, <a href="https://publications.waset.org/abstracts/search?q=forecasting" title=" forecasting"> forecasting</a> </p> <a href="https://publications.waset.org/abstracts/29782/mathematical-based-forecasting-of-heart-attack" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/29782.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">541</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3846</span> Signal On-Off Ratio and Output Frequency Analysis of Semiconductor Electron-Interference Device</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Tomotaka%20Aoki">Tomotaka Aoki</a>, <a href="https://publications.waset.org/abstracts/search?q=Isao%20Tomita"> Isao Tomita</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We examined the on-off ratio and frequency components of output signals from an electron-interference device made of GaAs/AlₓGa₁₋ₓAs by solving the time-dependent Schrödinger's equation on conducting electrons in the channel waveguide of the device. For electron-wave modulation, a periodic voltage of frequency f was applied to the channel. Furthermore, we examined the voltage-amplitude dependence of the signals in time and frequency domains and found that large applied voltage deformed the output-signal waveform and created additional side modes (frequencies) near the modulation frequency f and that there was a trade-off between on-off ratio and side-mode creation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=electrical%20conduction" title="electrical conduction">electrical conduction</a>, <a href="https://publications.waset.org/abstracts/search?q=electron%20interference" title=" electron interference"> electron interference</a>, <a href="https://publications.waset.org/abstracts/search?q=frequency%20spectrum" title=" frequency spectrum"> frequency spectrum</a>, <a href="https://publications.waset.org/abstracts/search?q=on-off%20ratio" title=" on-off ratio"> on-off ratio</a> </p> <a href="https://publications.waset.org/abstracts/145444/signal-on-off-ratio-and-output-frequency-analysis-of-semiconductor-electron-interference-device" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/145444.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">121</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3845</span> A New Mathematical Method for Heart Attack Forecasting</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Razi%20Khalafi">Razi Khalafi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Myocardial Infarction (MI) or acute Myocardial Infarction (AMI), commonly known as a heart attack, occurs when blood flow stops to part of the heart causing damage to the heart muscle. An ECG can often show evidence of a previous heart attack or one that's in progress. The patterns on the ECG may indicate which part of your heart has been damaged, as well as the extent of the damage. In chaos theory, the correlation dimension is a measure of the dimensionality of the space occupied by a set of random points, often referred to as a type of fractal dimension. In this research by considering ECG signal as a random walk we work on forecasting the oncoming heart attack by analysing the ECG signals using the correlation dimension. In order to test the model a set of ECG signals for patients before and after heart attack was used and the strength of model for forecasting the behaviour of these signals were checked. Results show this methodology can forecast the ECG and accordingly heart attack with high accuracy. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=heart%20attack" title="heart attack">heart attack</a>, <a href="https://publications.waset.org/abstracts/search?q=ECG" title=" ECG"> ECG</a>, <a href="https://publications.waset.org/abstracts/search?q=random%20walk" title=" random walk"> random walk</a>, <a href="https://publications.waset.org/abstracts/search?q=correlation%20dimension" title=" correlation dimension"> correlation dimension</a>, <a href="https://publications.waset.org/abstracts/search?q=forecasting" title=" forecasting"> forecasting</a> </p> <a href="https://publications.waset.org/abstracts/30802/a-new-mathematical-method-for-heart-attack-forecasting" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/30802.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">506</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3844</span> Intelligent System for Diagnosis Heart Attack Using Neural Network</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Oluwaponmile%20David%20Alao">Oluwaponmile David Alao</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Misdiagnosis has been the major problem in health sector. Heart attack has been one of diseases that have high level of misdiagnosis recorded on the part of physicians. In this paper, an intelligent system has been developed for diagnosis of heart attack in the health sector. Dataset of heart attack obtained from UCI repository has been used. This dataset is made up of thirteen attributes which are very vital in diagnosis of heart disease. The system is developed on the multilayer perceptron trained with back propagation neural network then simulated with feed forward neural network and a recognition rate of 87% was obtained which is a good result for diagnosis of heart attack in medical field. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=heart%20attack" title="heart attack">heart attack</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20neural%20network" title=" artificial neural network"> artificial neural network</a>, <a href="https://publications.waset.org/abstracts/search?q=diagnosis" title=" diagnosis"> diagnosis</a>, <a href="https://publications.waset.org/abstracts/search?q=intelligent%20system" title=" intelligent system"> intelligent system</a> </p> <a href="https://publications.waset.org/abstracts/33844/intelligent-system-for-diagnosis-heart-attack-using-neural-network" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/33844.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">655</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3843</span> Thermal Analysis of a Channel Partially Filled with Porous Media Using Asymmetric Boundary Conditions and LTNE Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mohsen%20Torabi">Mohsen Torabi</a>, <a href="https://publications.waset.org/abstracts/search?q=Kaili%20Zhang"> Kaili Zhang</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This work considers forced convection in a channel partially filled with porous media from local thermal non-equilibrium (LTNE) point of view. The channel is heated with constant heat flux from the lower side and is isolated on the top side. The wall heat flux is considered to be divided between the solid and fluid phases based on their temperature gradients and effective thermal conductivities. The general forms of the velocity and temperature fields are analytically obtained. To obtain the constant parameters for temperature equations, a numerical solution is considered. Using different thermophysical parameters, both velocity and temperature fields are comprehensively illustrated. Discussions regarding bifurcation phenomenon are provided. Since this geometry has not been considered yet, the present analysis is a useful addition to the literature on thermal performance of porous systems from LTNE perspective. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=local%20thermal%20non-equilibrium" title="local thermal non-equilibrium">local thermal non-equilibrium</a>, <a href="https://publications.waset.org/abstracts/search?q=forced%20convection" title=" forced convection"> forced convection</a>, <a href="https://publications.waset.org/abstracts/search?q=thermal%20bifurcation" title=" thermal bifurcation"> thermal bifurcation</a>, <a href="https://publications.waset.org/abstracts/search?q=porous-fluid%20interface" title=" porous-fluid interface"> porous-fluid interface</a>, <a href="https://publications.waset.org/abstracts/search?q=combined%20analytical-numerical%20solution" title=" combined analytical-numerical solution"> combined analytical-numerical solution</a> </p> <a href="https://publications.waset.org/abstracts/18415/thermal-analysis-of-a-channel-partially-filled-with-porous-media-using-asymmetric-boundary-conditions-and-ltne-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/18415.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">365</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3842</span> Analysis of Joint Source Channel LDPC Coding for Correlated Sources Transmission over Noisy Channels</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Marwa%20Ben%20Abdessalem">Marwa Ben Abdessalem</a>, <a href="https://publications.waset.org/abstracts/search?q=Amin%20Zribi"> Amin Zribi</a>, <a href="https://publications.waset.org/abstracts/search?q=Ammar%20Bouall%C3%A8gue"> Ammar Bouallègue</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, a Joint Source Channel coding scheme based on LDPC codes is investigated. We consider two concatenated LDPC codes, one allows to compress a correlated source and the second to protect it against channel degradations. The original information can be reconstructed at the receiver by a joint decoder, where the source decoder and the channel decoder run in parallel by transferring extrinsic information. We investigate the performance of the JSC LDPC code in terms of Bit-Error Rate (BER) in the case of transmission over an Additive White Gaussian Noise (AWGN) channel, and for different source and channel rate parameters. We emphasize how JSC LDPC presents a performance tradeoff depending on the channel state and on the source correlation. We show that, the JSC LDPC is an efficient solution for a relatively low Signal-to-Noise Ratio (SNR) channel, especially with highly correlated sources. Finally, a source-channel rate optimization has to be applied to guarantee the best JSC LDPC system performance for a given channel. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=AWGN%20channel" title="AWGN channel">AWGN channel</a>, <a href="https://publications.waset.org/abstracts/search?q=belief%20propagation" title=" belief propagation"> belief propagation</a>, <a href="https://publications.waset.org/abstracts/search?q=joint%20source%20channel%20coding" title=" joint source channel coding"> joint source channel coding</a>, <a href="https://publications.waset.org/abstracts/search?q=LDPC%20codes" title=" LDPC codes"> LDPC codes</a> </p> <a href="https://publications.waset.org/abstracts/62721/analysis-of-joint-source-channel-ldpc-coding-for-correlated-sources-transmission-over-noisy-channels" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/62721.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">357</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3841</span> Reliable and Energy-Aware Data Forwarding under Sink-Hole Attack in Wireless Sensor Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ebrahim%20Alrashed">Ebrahim Alrashed</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Wireless sensor networks are vulnerable to attacks from adversaries attempting to disrupt their operations. Sink-hole attacks are a type of attack where an adversary node drops data forwarded through it and hence affecting the reliability and accuracy of the network. Since sensor nodes have limited battery power, it is essential that any solution to the sinkhole attack problem be very energy-aware. In this paper, we present a reliable and energy efficient scheme to forward data from source nodes to the base station while under sink-hole attack. The scheme also detects sink-hole attack nodes and avoid paths that includes them. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=energy-aware%20routing" title="energy-aware routing">energy-aware routing</a>, <a href="https://publications.waset.org/abstracts/search?q=reliability" title=" reliability"> reliability</a>, <a href="https://publications.waset.org/abstracts/search?q=sink-hole%20attack" title=" sink-hole attack"> sink-hole attack</a>, <a href="https://publications.waset.org/abstracts/search?q=WSN" title=" WSN"> WSN</a> </p> <a href="https://publications.waset.org/abstracts/71964/reliable-and-energy-aware-data-forwarding-under-sink-hole-attack-in-wireless-sensor-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71964.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">396</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3840</span> The Effect of the Side-Weir Crest Height to Scour in Clay-Sand Mixed Sediments </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=F.%20A.%20Saracoglu%20Varol">F. A. Saracoglu Varol</a>, <a href="https://publications.waset.org/abstracts/search?q=H.%20Agacc%C4%B1oglu"> H. Agaccıoglu </a> </p> <p class="card-text"><strong>Abstract:</strong></p> Experimental studies to investigate the depth of the scour conducted at a side-weir intersection located at the 1800 curved flume which located Hydraulic Laboratory of Yıldız Technical University, Istanbul, Turkey. Side weirs were located at the middle of the straight part of the main channel. Three different lengths (25, 40 and 50 cm) and three different weir crest height (7, 10 and 12 cm) of the side weir placed on the side weir station. There is no scour when the material is only kaolin. Therefore, the cohesive bed was prepared by properly mixing clay material (kaolin) with 31% sand in all experiments. Following 24h consolidation time, in order to observe the effect of flow intensity on the scour depth, experiments were carried out for five different upstream Froude numbers in the range of 0.33-0.81. As a result of this study the relation between scour depth and upstream flow intensity as a function of time have been established. The longitudinal velocities decreased along the side weir; towards the downstream due to overflow over the side-weirs. At the beginning, the scour depth increases rapidly with time and then asymptotically approached constant values in all experiments for all side weir dimensions as in non-cohesive sediment. Thus, the scour depth reached equilibrium conditions. Time to equilibrium depends on the approach flow intensity and the dimensions of side weirs. For different heights of the weir crest, dimensionless scour depths increased with increasing upstream Froude number. Equilibrium scour depths which formed 7 cm side-weir crest height were obtained higher than that of the 12 cm side-weir crest height. This means when side-weir crest height increased equilibrium scour depths decreased. Although the upstream side of the scour hole is almost vertical, the downstream side of the hole is inclined. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=clay-sand%20mixed%20sediments" title="clay-sand mixed sediments">clay-sand mixed sediments</a>, <a href="https://publications.waset.org/abstracts/search?q=scour" title=" scour"> scour</a>, <a href="https://publications.waset.org/abstracts/search?q=side%20weir" title=" side weir"> side weir</a>, <a href="https://publications.waset.org/abstracts/search?q=hydraulic%20structures" title=" hydraulic structures"> hydraulic structures</a> </p> <a href="https://publications.waset.org/abstracts/27481/the-effect-of-the-side-weir-crest-height-to-scour-in-clay-sand-mixed-sediments" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/27481.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">308</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3839</span> Unequal Error Protection of VQ Image Transmission System </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Khelifi%20Mustapha">Khelifi Mustapha</a>, <a href="https://publications.waset.org/abstracts/search?q=A.%20Moulay%20lakhdar"> A. Moulay lakhdar</a>, <a href="https://publications.waset.org/abstracts/search?q=I.%20Elawady"> I. Elawady </a> </p> <p class="card-text"><strong>Abstract:</strong></p> We will study the unequal error protection for VQ image. We have used the Reed Solomon (RS) Codes as Channel coding because they offer better performance in terms of channel error correction over a binary output channel. One such channel (binary input and output) should be considered if it is the case of the application layer, because it includes all the features of the layers located below and on the what it is usually not feasible to make changes. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=vector%20quantization" title="vector quantization">vector quantization</a>, <a href="https://publications.waset.org/abstracts/search?q=channel%20error%20correction" title=" channel error correction"> channel error correction</a>, <a href="https://publications.waset.org/abstracts/search?q=Reed-Solomon%20channel%20coding" title=" Reed-Solomon channel coding"> Reed-Solomon channel coding</a>, <a href="https://publications.waset.org/abstracts/search?q=application" title=" application"> application</a> </p> <a href="https://publications.waset.org/abstracts/21372/unequal-error-protection-of-vq-image-transmission-system" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/21372.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">365</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">3838</span> Numerical Simulation of Effect of Various Rib Configurations on Enhancing Heat Transfer of Matrix Cooling Channel</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Seok%20Min%20Choi">Seok Min Choi</a>, <a href="https://publications.waset.org/abstracts/search?q=Minho%20Bang"> Minho Bang</a>, <a href="https://publications.waset.org/abstracts/search?q=Seuong%20Yun%20Kim"> Seuong Yun Kim</a>, <a href="https://publications.waset.org/abstracts/search?q=Hyungmin%20Lee"> Hyungmin Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=Won-Gu%20Joo"> Won-Gu Joo</a>, <a href="https://publications.waset.org/abstracts/search?q=Hyung%20Hee%20Cho"> Hyung Hee Cho</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The matrix cooling channel was used for gas turbine blade cooling passage. The matrix cooling structure is useful for the structure stability however the cooling performance of internal cooling channel was not enough for cooling. Therefore, we designed the rib configurations in the matrix cooling channel to enhance the cooling performance. The numerical simulation was conducted to analyze cooling performance of rib configured matrix cooling channel. Three different rib configurations were used which are vertical rib, angled rib and c-type rib. Three configurations were adopted in two positions of matrix cooling channel which is one fourth and three fourth of channel. The result shows that downstream rib has much higher cooling performance than upstream rib. Furthermore, the angled rib in the channel has much higher cooling performance than vertical rib. This is because; the angled rib improves the swirl effect of matrix cooling channel more effectively. The friction factor was increased with the installation of rib. However, the thermal performance was increased with the installation of rib in the matrix cooling channel. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=matrix%20cooling" title="matrix cooling">matrix cooling</a>, <a href="https://publications.waset.org/abstracts/search?q=rib" title=" rib"> rib</a>, <a href="https://publications.waset.org/abstracts/search?q=heat%20transfer" title=" heat transfer"> heat transfer</a>, <a href="https://publications.waset.org/abstracts/search?q=gas%20turbine" title=" gas turbine"> gas turbine</a> </p> <a href="https://publications.waset.org/abstracts/80524/numerical-simulation-of-effect-of-various-rib-configurations-on-enhancing-heat-transfer-of-matrix-cooling-channel" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/80524.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">460</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=side%20channel%20attack&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=side%20channel%20attack&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=side%20channel%20attack&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=side%20channel%20attack&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=side%20channel%20attack&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=side%20channel%20attack&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=side%20channel%20attack&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=side%20channel%20attack&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=side%20channel%20attack&page=10">10</a></li> <li class="page-item disabled"><span class="page-link">...</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=side%20channel%20attack&page=128">128</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=side%20channel%20attack&page=129">129</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=side%20channel%20attack&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>