The adaptive feedback control of stability with circumferential inlet distortion has been experimentally investigated in a low-speed,axial compressor.The flat-baffles with different span heights are used to simulate d...The adaptive feedback control of stability with circumferential inlet distortion has been experimentally investigated in a low-speed,axial compressor.The flat-baffles with different span heights are used to simulate different distorted inflow cases.Compared with auto-correlation and root-mean-square analysis,cross-correlation analysis used to predict early stall warning does not depend on the distortion position.Hence,the cross-correlation coefficient was used to monitor the stable status of the compressor and provide the feedback signal in the active control strategy when suffering from different distortions.Based on the stall margin improvement of tip air injection obtained under different distorted inflow cases and the sensitivity analysis of cross-correlation coefficients to injected momentum ratios,tip air injection was adopted as the actuator for adaptive feedback control.The digital signal processing controller was designed and applied to achieve adaptive feedback control in distorted inflow conditions.The results show that the adaptive feedback control of air injection nearly achieves the same stall margin improvement as steady air injection under different distortion intensities with a reduced injection mass flow.Thus,the proposed adaptive feedback control method is ideal for the engine operation with circumferential distorted inflow,which frequently occurs in flight.展开更多
Web applications have become a widely accepted method to support the internet for the past decade.Since they have been successfully installed in the business activities and there is a requirement of advanced functiona...Web applications have become a widely accepted method to support the internet for the past decade.Since they have been successfully installed in the business activities and there is a requirement of advanced functionalities,the configuration is growing and becoming more complicated.The growing demand and complexity also make these web applications a preferred target for intruders on the internet.Even with the support of security specialists,they remain highly problematic for the complexity of penetration and code reviewing methods.It requires considering different testing patterns in both codes reviewing and penetration testing.As a result,the number of hacked websites is increasing day by day.Most of these vulnerabilities also occur due to incorrect input validation and lack of result validation for lousy programming practices or coding errors.Vulnerability scanners for web applications can detect a few vulnerabilities in a dynamic approach.These are quite easy to use;however,these often miss out on some of the unique critical vulnerabilities in a different and static approach.Although these are time-consuming,they can find complex vulnerabilities and improve developer knowledge in coding and best practices.Many scanners choose both dynamic and static approaches,and the developers can select them based on their requirements and conditions.This research explores and provides details of SQL injection,operating system command injection,path traversal,and cross-site scripting vulnerabilities through dynamic and static approaches.It also examines various security measures in web applications and selected five tools based on their features for scanning PHP,and JAVA code focuses on SQL injection,cross-site scripting,Path Traversal,operating system command.Moreover,this research discusses the approach of a cyber-security tester or a security developer finding out vulnerabilities through dynamic and static approaches using manual and automated web vulnerability scanners.展开更多
Considering the escalating frequency and sophistication of cyber threats targeting web applications, this paper proposes the development of an automated web security analysis tool to address the accessibility gap for ...Considering the escalating frequency and sophistication of cyber threats targeting web applications, this paper proposes the development of an automated web security analysis tool to address the accessibility gap for non-security professionals. This paper presents the design and implementation of an automated web security analysis tool, AWSAT, aimed at enabling individuals with limited security expertise to effectively assess and mitigate vulnerabilities in web applications. Leveraging advanced scanning techniques, the tool identifies common threats such as Cross-Site Scripting (XSS), SQL Injection, and Cross-Site Request Forgery (CSRF), providing detailed reports with actionable insights. By integrating sample payloads and reference study links, the tool facilitates informed decision-making in enhancing the security posture of web applications. Through its user-friendly interface and robust functionality, the tool aims to democratize web security practices, empowering a wider audience to proactively safeguard against cyber threats.展开更多
基金co-supported by the National Natural Science Foundation of China(No.51922098)the National Science and Technology Major Project of China(No.2017-Ⅱ-0004-0017)the Special Fund for the Member of Youth Innovation Promotion Association of CAS(No.2018173).
文摘The adaptive feedback control of stability with circumferential inlet distortion has been experimentally investigated in a low-speed,axial compressor.The flat-baffles with different span heights are used to simulate different distorted inflow cases.Compared with auto-correlation and root-mean-square analysis,cross-correlation analysis used to predict early stall warning does not depend on the distortion position.Hence,the cross-correlation coefficient was used to monitor the stable status of the compressor and provide the feedback signal in the active control strategy when suffering from different distortions.Based on the stall margin improvement of tip air injection obtained under different distorted inflow cases and the sensitivity analysis of cross-correlation coefficients to injected momentum ratios,tip air injection was adopted as the actuator for adaptive feedback control.The digital signal processing controller was designed and applied to achieve adaptive feedback control in distorted inflow conditions.The results show that the adaptive feedback control of air injection nearly achieves the same stall margin improvement as steady air injection under different distortion intensities with a reduced injection mass flow.Thus,the proposed adaptive feedback control method is ideal for the engine operation with circumferential distorted inflow,which frequently occurs in flight.
基金The author swould like to thank the Deanship of Scientific Research at Majmaah University for supporting this work under Project Number No-R-14xx-4x.
文摘Web applications have become a widely accepted method to support the internet for the past decade.Since they have been successfully installed in the business activities and there is a requirement of advanced functionalities,the configuration is growing and becoming more complicated.The growing demand and complexity also make these web applications a preferred target for intruders on the internet.Even with the support of security specialists,they remain highly problematic for the complexity of penetration and code reviewing methods.It requires considering different testing patterns in both codes reviewing and penetration testing.As a result,the number of hacked websites is increasing day by day.Most of these vulnerabilities also occur due to incorrect input validation and lack of result validation for lousy programming practices or coding errors.Vulnerability scanners for web applications can detect a few vulnerabilities in a dynamic approach.These are quite easy to use;however,these often miss out on some of the unique critical vulnerabilities in a different and static approach.Although these are time-consuming,they can find complex vulnerabilities and improve developer knowledge in coding and best practices.Many scanners choose both dynamic and static approaches,and the developers can select them based on their requirements and conditions.This research explores and provides details of SQL injection,operating system command injection,path traversal,and cross-site scripting vulnerabilities through dynamic and static approaches.It also examines various security measures in web applications and selected five tools based on their features for scanning PHP,and JAVA code focuses on SQL injection,cross-site scripting,Path Traversal,operating system command.Moreover,this research discusses the approach of a cyber-security tester or a security developer finding out vulnerabilities through dynamic and static approaches using manual and automated web vulnerability scanners.
文摘Considering the escalating frequency and sophistication of cyber threats targeting web applications, this paper proposes the development of an automated web security analysis tool to address the accessibility gap for non-security professionals. This paper presents the design and implementation of an automated web security analysis tool, AWSAT, aimed at enabling individuals with limited security expertise to effectively assess and mitigate vulnerabilities in web applications. Leveraging advanced scanning techniques, the tool identifies common threats such as Cross-Site Scripting (XSS), SQL Injection, and Cross-Site Request Forgery (CSRF), providing detailed reports with actionable insights. By integrating sample payloads and reference study links, the tool facilitates informed decision-making in enhancing the security posture of web applications. Through its user-friendly interface and robust functionality, the tool aims to democratize web security practices, empowering a wider audience to proactively safeguard against cyber threats.