-
Mathematical modelling of flow and adsorption in a gas chromatograph
Authors:
A. Cabrera-Codony,
A. Valverde,
K. Born,
O. A. I. Noreldin,
T. G. Myers
Abstract:
In this paper, a mathematical model is developed to describe the evolution of the concentration of compounds through a gas chromatography column. The model couples mass balances and kinetic equations for all components. Both single and multiple-component cases are considered with constant or variable velocity. Non-dimensionalisation indicates the small effect of diffusion. The system where diffusi…
▽ More
In this paper, a mathematical model is developed to describe the evolution of the concentration of compounds through a gas chromatography column. The model couples mass balances and kinetic equations for all components. Both single and multiple-component cases are considered with constant or variable velocity. Non-dimensionalisation indicates the small effect of diffusion. The system where diffusion is neglected is analysed using Laplace transforms. In the multiple-component case, it is demonstrated that the competition between the compounds is negligible and the equations may be decoupled. This reduces the problem to solving a single integral equation to determine the concentration profile for all components (since they are scaled versions of each other). For a given analyte, we then only two parameters need to be fitted to the data. To verify this approach, the full governing equations are also solved numerically using the finite difference method and a global adaptive quadrature method to integrate the Laplace transformation. Comparison with the Laplace solution verifies the high degree of accuracy of the simpler Laplace form. The Laplace solution is then verified against experimental data from BTEX chromatography. This novel method, which involves solving a single equation and fitting parameters in pairs for individual components, is highly efficient. It is significantly faster and simpler than the full numerical solution and avoids the computationally expensive methods that would normally be used to fit all curves at the same time.
△ Less
Submitted 7 October, 2024;
originally announced January 2025.
-
Prandtl's extended mixing length model applied to the two-dimensional turbulent classical far wake
Authors:
AJ Hutchinson,
N Hale,
K Born,
DP Mason
Abstract:
Despite its limitations, Prandtl's mixing length model is widely applied in modelling turbulent free shear flows. Prandtl's extended model addresses many of the shortfalls of the original model, but is not so widely used, in part due to additional mathematical complexities that arise in its derivation and implementation. Furthermore, in both models Prandtl neglects the kinematic viscosity on the b…
▽ More
Despite its limitations, Prandtl's mixing length model is widely applied in modelling turbulent free shear flows. Prandtl's extended model addresses many of the shortfalls of the original model, but is not so widely used, in part due to additional mathematical complexities that arise in its derivation and implementation. Furthermore, in both models Prandtl neglects the kinematic viscosity on the basis that it is much smaller in magnitude than the turbulent viscosity. Recent work has shown that including the kinematic viscosity in the original model has both mathematical and physical advantages. In the present work, a novel derivation of the extended model is provided, and it is demonstrated that similar advantages are again obtained when the kinematic viscosity is included. Additionally, through the use of scaling techniques, similarity mean velocity profiles of the extended model are derived, resulting in a single nonlinear ordinary differential equation that is solved numerically with a Hermite spectral method. The computed profiles for the normalised similarity mean velocity and shear stress are compared to experimental observations and shown to be in excellent agreement.
△ Less
Submitted 21 January, 2021;
originally announced January 2021.
-
NgViz: Detecting DNS Tunnels through N-Gram Visualization and Quantitative Analysis
Authors:
Kenton Born,
David Gustafson
Abstract:
This paper introduced NgViz, a tool that examines DNS traffic and shows anomalies in n-gram frequencies. This is accomplished by comparing input files against a fingerprint of legitimate traffic. Both quantitative analysis and visual aids are provided that allow the user to make determinations about the legitimacy of the DNS traffic.
This paper introduced NgViz, a tool that examines DNS traffic and shows anomalies in n-gram frequencies. This is accomplished by comparing input files against a fingerprint of legitimate traffic. Both quantitative analysis and visual aids are provided that allow the user to make determinations about the legitimacy of the DNS traffic.
△ Less
Submitted 25 April, 2010;
originally announced April 2010.
-
Detecting DNS Tunnels Using Character Frequency Analysis
Authors:
Kenton Born,
David Gustafson
Abstract:
High-bandwidth covert channels pose significant risks to sensitive and proprietary information inside company networks. Domain Name System (DNS) tunnels provide a means to covertly infiltrate and exfiltrate large amounts of information passed network boundaries. This paper explores the possibility of detecting DNS tunnels by analyzing the unigram, bigram, and trigram character frequencies of domai…
▽ More
High-bandwidth covert channels pose significant risks to sensitive and proprietary information inside company networks. Domain Name System (DNS) tunnels provide a means to covertly infiltrate and exfiltrate large amounts of information passed network boundaries. This paper explores the possibility of detecting DNS tunnels by analyzing the unigram, bigram, and trigram character frequencies of domains in DNS queries and responses. It is empirically shown how domains follow Zipf's law in a similar pattern to natural languages, whereas tunneled traffic has more evenly distributed character frequencies. This approach allows tunnels to be detected across multiple domains, whereas previous methods typically concentrate on monitoring point to point systems. Anomalies are quickly discovered when tunneled traffic is compared to the character frequency fingerprint of legitimate domain traffic.
△ Less
Submitted 25 April, 2010;
originally announced April 2010.
-
Browser-Based Covert Data Exfiltration
Authors:
Kenton Born
Abstract:
Current best practices heavily control user permissions on network systems. This effectively mitigates many insider threats regarding the collection and exfiltration of data. Many methods of covert communication involve crafting custom packets, typically requiring both the necessary software and elevated privileges on the system. By exploiting the functionality of a browser, covert channels for da…
▽ More
Current best practices heavily control user permissions on network systems. This effectively mitigates many insider threats regarding the collection and exfiltration of data. Many methods of covert communication involve crafting custom packets, typically requiring both the necessary software and elevated privileges on the system. By exploiting the functionality of a browser, covert channels for data exfiltration may be created without additional software or user privileges. This paper explores novel methods of using a browser's JavaScript engine to exfiltrate documents over the Domain Name System (DNS) protocol without sending less covert Hypertext Transfer Protocol (HTTP) requests.
△ Less
Submitted 25 April, 2010;
originally announced April 2010.
-
Renormalisation of lattice currents and the calculation of decay constants for dynamical staggered fermions
Authors:
R. Altmeyer,
K. D. Born,
M. Goeckeler,
R. Horsley,
E. Laermann,
G. Schierholz
Abstract:
A numerical calculation of the lattice staggered renormalisation constants at $β= 5.35$, $m = 0.01$ is presented. It is seen that there are considerable non-perturbative effects present. As an application the vector decay constant $f_ρ$ is estimated. (LAT92 contribution, one LATEX file with 3 postscript figures appended.)
A numerical calculation of the lattice staggered renormalisation constants at $β= 5.35$, $m = 0.01$ is presented. It is seen that there are considerable non-perturbative effects present. As an application the vector decay constant $f_ρ$ is estimated. (LAT92 contribution, one LATEX file with 3 postscript figures appended.)
△ Less
Submitted 23 October, 1992;
originally announced October 1992.