997 resultados para Leakage detection


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The MID-K, a new kind of multi-pipe string detection tool is introduced. This tool provides a means of evaluating the condition of in-place pipe string, such as tubing and casino. It is capable of discriminating the defects of the inside and outside, and estimating the thickness of tubing and casing. It is accomplished by means of a low frequency eddy current to detect flaws on the inner surface and a magnetic flux leakage to inspect the full thickness. The measurement principle, the technology and applications are presented in this paper.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Carbon Capture and Storage may use deep saline aquifers for CO(2) sequestration, but small CO(2) leakage could pose a risk to overlying fresh groundwater. We performed laboratory incubations of CO(2) infiltration under oxidizing conditions for >300 days on samples from four freshwater aquifers to 1) understand how CO(2) leakage affects freshwater quality; 2) develop selection criteria for deep sequestration sites based on inorganic metal contamination caused by CO(2) leaks to shallow aquifers; and 3) identify geochemical signatures for early detection criteria. After exposure to CO(2), water pH declines of 1-2 units were apparent in all aquifer samples. CO(2) caused concentrations of the alkali and alkaline earths and manganese, cobalt, nickel, and iron to increase by more than 2 orders of magnitude. Potentially dangerous uranium and barium increased throughout the entire experiment in some samples. Solid-phase metal mobility, carbonate buffering capacity, and redox state in the shallow overlying aquifers influence the impact of CO(2) leakage and should be considered when selecting deep geosequestration sites. Manganese, iron, calcium, and pH could be used as geochemical markers of a CO(2) leak, as their concentrations increase within 2 weeks of exposure to CO(2).

Relevância:

30.00% 30.00%

Publicador:

Resumo:

To evaluate the checkerboard DNA-DNA hybridization method for detection and quantitation of bacteria from the internal parts of dental implants and to compare bacterial leakage from implants connected either to cast or to pre-machined abutments. Nine plastic abutments cast in a Ni-Cr alloy and nine pre-machined Co-Cr alloy abutments with plastic sleeves cast in Ni-Cr were connected to Branemark-compatible implants. A group of nine implants was used as control. The implants were inoculated with 3 mu l of a solution containing 10(8) cells/ml of Streptococcus sobrinus. Bacterial samples were immediately collected from the control implants while assemblies were completely immersed in 5 ml of sterile Tripty Soy Broth (TSB) medium. After 14 days of anaerobic incubation, occurrence of leakage at the implant-abutment interface was evaluated by assessing contamination of the TSB medium. Internal contamination of the implants was evaluated with the checkerboard DNA-DNA hybridization method. DNA-DNA hybridization was sensitive enough to detect and quantify the microorganism from the internal parts of the implants. No differences in leakage and in internal contamination were found between cast and pre-machined abutments. Bacterial scores in the control group were significantly higher than in the other groups (P < 0.05). Bacterial leakage through the implant-abutment interface does not significantly differ when cast or pre-machined abutments are used. The checkerboard DNA-DNA hybridization technique is suitable for the evaluation of the internal contamination of dental implants although further studies are necessary to validate the use of computational methods for the improvement of the test accuracy. To cite this article:do Nascimento C, Barbosa RES, Issa JPM, Watanabe E, Ito IY, Albuquerque Junior RF. Use of checkerboard DNA-DNA hybridization to evaluate the internal contamination of dental implants and comparison of bacterial leakage with cast or pre-machined abutments.Clin. Oral Impl. Res. 20, 2009; 571-577.doi: 10.1111/j.1600-0501.2008.01663.x.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The article reviews the modelling of District Metered Areas (DMAs) with relatively high leakage rate. As a generally recognised approach in modelling of leakage does not exist, modelling of leakage by enginners and other researchers usually takes place by dividing the whole leakage rate evenly to all available nodes of the model. In this article, a new methodology is proposed to determine the nodal leakage by using a hydraulic model. The proposed methodology takes into consideration the IWA water balance methodology, the Minimum Night Flow (MNF) analysis, the number of connections related to each node and the marerial of pipes. In addition, the model is illustrated by a real case study, as it was applied in Kalipoli’s DMA. Results show that the proposed model gives reliable results.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Procion red HE-3B (RR120) is an example of dye currently used in affinity purification. A method is described for determining trace amounts of RR120 dye contaminant in human serum albumin by cathodic stripping voltammetry. The method is based on a measure of a well-defined peak at -0.58 V, obtained when samples of HSA protein (0.01-2% w/v) containing dye concentrations are submitted to a heating time of 330 min at 80degreesC in NaOH, pH 12.0 and the samples are removed to a solution containing Britton-Robinson buffer, pH 4.0. Using an optimum accumulation potential and tune of 0 V and 240 s, respectively, linear calibration curves were obtained from 1.0 X 10(-9) to 1.0 X 10(-8) mol 1(-1) for RR120 dye. Leakage/hydrolysis of reactive red 120 from an agarose support (e.g. at pH 2 or 12) can also be conveniently determined at very low levels (sub-mug ml(-1)) by means of cathodic stripping voltammetry, which involves adsorptive accumulation of the dye onto the hanging mercury-drop electrode. (C) 2002 Elsevier B.V. B.V. All rights reserved.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Objective Bacterial species have been found harboring the internal surface of dental implants as consequence of their failed connections. The aim of the present study was to compare the detection frequency of bacterial leakage from human saliva through the implantabutment interface, under non-loading conditions, using either DNA Checkerboard or culture method. Materials and methods Thirty dental implants with hexagonal platforms were connected to pre-machined abutments according to the manufacturers specifications. The assemblies were individually incubated in human saliva under anaerobic conditions for 7 similar to days at 37 degrees C. Afterward, contents from the inner parts of the implants were collected and evaluated with either DNA Checkerboard (s similar to=similar to 15) or culture (n similar to=similar to 15). Subsequently, identification and quantitation of bacterial species from saliva and implants were carried out for the group evaluated with the DNA Checkerboard method. Results Both DNA Checkerboard and culture showed positive signals of bacterial leakage in 6 of the 15 evaluated samples. Capnocytophaga gingivalis and Streptococcus mutans were the most frequently detected species harboring the internal surface of the implants followed by Veillonella parvula. Conclusion Occurrence of bacterial leakage along the implantabutment interface is comparably detected with both DNA Checkerboard hybridization and conventional culture methods.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents the results of research aiming to develop partial discharge detection techniques in high voltage equipment, at substation environment. Measurements of high frequency components of leakage current, at equipments' grounding conductor, were performed. This procedure was performed with the equipment energized and without disconnecting it from the system. The partial discharge generated current pulse is picked up by a high frequency CT, and is detected by an oscilloscope. The partial discharge identification was made considering previously obtained laboratory results, where partial discharges were characterized by means of its time domain signatures. This paper focuses measurements in SF6 circuit breakers. Encouraging results were obtained, showing the feasibility of detecting partial discharges in energized equipment in the laboratory and in the field, in a substation environment, using this method.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Leakage power consumption is a com- ponent of the total power consumption in data cen- ters that is not traditionally considered in the set- point temperature of the room. However, the effect of this power component, increased with temperature, can determine the savings associated with the careful management of the cooling system, as well as the re- liability of the system. The work presented in this paper detects the need of addressing leakage power in order to achieve substantial savings in the energy consumption of servers. In particular, our work shows that, by a careful detection and management of two working regions (low and high impact of thermal- dependent leakage), energy consumption of the data- center can be optimized by a reduction of the cooling budget.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Esta tesis se centra en el análisis de dos aspectos complementarios de la ciberdelincuencia (es decir, el crimen perpetrado a través de la red para ganar dinero). Estos dos aspectos son las máquinas infectadas utilizadas para obtener beneficios económicos de la delincuencia a través de diferentes acciones (como por ejemplo, clickfraud, DDoS, correo no deseado) y la infraestructura de servidores utilizados para gestionar estas máquinas (por ejemplo, C & C, servidores explotadores, servidores de monetización, redirectores). En la primera parte se investiga la exposición a las amenazas de los ordenadores victimas. Para realizar este análisis hemos utilizado los metadatos contenidos en WINE-BR conjunto de datos de Symantec. Este conjunto de datos contiene metadatos de instalación de ficheros ejecutables (por ejemplo, hash del fichero, su editor, fecha de instalación, nombre del fichero, la versión del fichero) proveniente de 8,4 millones de usuarios de Windows. Hemos asociado estos metadatos con las vulnerabilidades en el National Vulnerability Database (NVD) y en el Opens Sourced Vulnerability Database (OSVDB) con el fin de realizar un seguimiento de la decadencia de la vulnerabilidad en el tiempo y observar la rapidez de los usuarios a remiendar sus sistemas y, por tanto, su exposición a posibles ataques. Hemos identificado 3 factores que pueden influir en la actividad de parches de ordenadores victimas: código compartido, el tipo de usuario, exploits. Presentamos 2 nuevos ataques contra el código compartido y un análisis de cómo el conocimiento usuarios y la disponibilidad de exploit influyen en la actividad de aplicación de parches. Para las 80 vulnerabilidades en nuestra base de datos que afectan código compartido entre dos aplicaciones, el tiempo entre el parche libera en las diferentes aplicaciones es hasta 118 das (con una mediana de 11 das) En la segunda parte se proponen nuevas técnicas de sondeo activos para detectar y analizar las infraestructuras de servidores maliciosos. Aprovechamos técnicas de sondaje activo, para detectar servidores maliciosos en el internet. Empezamos con el análisis y la detección de operaciones de servidores explotadores. Como una operación identificamos los servidores que son controlados por las mismas personas y, posiblemente, participan en la misma campaña de infección. Hemos analizado un total de 500 servidores explotadores durante un período de 1 año, donde 2/3 de las operaciones tenían un único servidor y 1/2 por varios servidores. Hemos desarrollado la técnica para detectar servidores explotadores a diferentes tipologías de servidores, (por ejemplo, C & C, servidores de monetización, redirectores) y hemos logrado escala de Internet de sondeo para las distintas categorías de servidores maliciosos. Estas nuevas técnicas se han incorporado en una nueva herramienta llamada CyberProbe. Para detectar estos servidores hemos desarrollado una novedosa técnica llamada Adversarial Fingerprint Generation, que es una metodología para generar un modelo único de solicitud-respuesta para identificar la familia de servidores (es decir, el tipo y la operación que el servidor apartenece). A partir de una fichero de malware y un servidor activo de una determinada familia, CyberProbe puede generar un fingerprint válido para detectar todos los servidores vivos de esa familia. Hemos realizado 11 exploraciones en todo el Internet detectando 151 servidores maliciosos, de estos 151 servidores 75% son desconocidos a bases de datos publicas de servidores maliciosos. Otra cuestión que se plantea mientras se hace la detección de servidores maliciosos es que algunos de estos servidores podrán estar ocultos detrás de un proxy inverso silente. Para identificar la prevalencia de esta configuración de red y mejorar el capacidades de CyberProbe hemos desarrollado RevProbe una nueva herramienta a través del aprovechamiento de leakages en la configuración de la Web proxies inversa puede detectar proxies inversos. RevProbe identifica que el 16% de direcciones IP maliciosas activas analizadas corresponden a proxies inversos, que el 92% de ellos son silenciosos en comparación con 55% para los proxies inversos benignos, y que son utilizado principalmente para equilibrio de carga a través de múltiples servidores. ABSTRACT In this dissertation we investigate two fundamental aspects of cybercrime: the infection of machines used to monetize the crime and the malicious server infrastructures that are used to manage the infected machines. In the first part of this dissertation, we analyze how fast software vendors apply patches to secure client applications, identifying shared code as an important factor in patch deployment. Shared code is code present in multiple programs. When a vulnerability affects shared code the usual linear vulnerability life cycle is not anymore effective to describe how the patch deployment takes place. In this work we show which are the consequences of shared code vulnerabilities and we demonstrate two novel attacks that can be used to exploit this condition. In the second part of this dissertation we analyze malicious server infrastructures, our contributions are: a technique to cluster exploit server operations, a tool named CyberProbe to perform large scale detection of different malicious servers categories, and RevProbe a tool that detects silent reverse proxies. We start by identifying exploit server operations, that are, exploit servers managed by the same people. We investigate a total of 500 exploit servers over a period of more 13 months. We have collected malware from these servers and all the metadata related to the communication with the servers. Thanks to this metadata we have extracted different features to group together servers managed by the same entity (i.e., exploit server operation), we have discovered that 2/3 of the operations have a single server while 1/3 have multiple servers. Next, we present CyberProbe a tool that detects different malicious server types through a novel technique called adversarial fingerprint generation (AFG). The idea behind CyberProbe’s AFG is to run some piece of malware and observe its network communication towards malicious servers. Then it replays this communication to the malicious server and outputs a fingerprint (i.e. a port selection function, a probe generation function and a signature generation function). Once the fingerprint is generated CyberProbe scans the Internet with the fingerprint and finds all the servers of a given family. We have performed a total of 11 Internet wide scans finding 151 new servers starting with 15 seed servers. This gives to CyberProbe a 10 times amplification factor. Moreover we have compared CyberProbe with existing blacklists on the internet finding that only 40% of the server detected by CyberProbe were listed. To enhance the capabilities of CyberProbe we have developed RevProbe, a reverse proxy detection tool that can be integrated with CyberProbe to allow precise detection of silent reverse proxies used to hide malicious servers. RevProbe leverages leakage based detection techniques to detect if a malicious server is hidden behind a silent reverse proxy and the infrastructure of servers behind it. At the core of RevProbe is the analysis of differences in the traffic by interacting with a remote server.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This paper presents an effective decision making system for leak detection based on multiple generalized linear models and clustering techniques. The training data for the proposed decision system is obtained by setting up an experimental pipeline fully operational distribution system. The system is also equipped with data logging for three variables; namely, inlet pressure, outlet pressure, and outlet flow. The experimental setup is designed such that multi-operational conditions of the distribution system, including multi pressure and multi flow can be obtained. We then statistically tested and showed that pressure and flow variables can be used as signature of leak under the designed multi-operational conditions. It is then shown that the detection of leakages based on the training and testing of the proposed multi model decision system with pre data clustering, under multi operational conditions produces better recognition rates in comparison to the training based on the single model approach. This decision system is then equipped with the estimation of confidence limits and a method is proposed for using these confidence limits for obtaining more robust leakage recognition results.