Search results for: secure sockets layer/transport layer security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7341

Search results for: secure sockets layer/transport layer security

7341 Providing Reliability, Availability and Scalability Support for Quick Assist Technology Cryptography on the Cloud

Authors: Songwu Shen, Garrett Drysdale, Veerendranath Mannepalli, Qihua Dai, Yuan Wang, Yuli Chen, David Qian, Utkarsh Kakaiya

Abstract:

Hardware accelerator has been a promising solution to reduce the cost of cloud data centers. This paper investigates the QoS enhancement of the acceleration of an important datacenter workload: the webserver (or proxy) that faces high computational consumption originated from secure sockets layer (SSL) or transport layer security (TLS) procession in the cloud environment. Our study reveals that for the accelerator maintenance cases—need to upgrade driver/firmware or hardware reset due to hardware hang; we still can provide cryptography services by switching to software during maintenance phase and then switching back to accelerator after maintenance. The switching is seamless to server application such as Nginx that runs inside a VM on top of the server. To achieve this high availability goal, we propose a comprehensive fallback solution based on Intel® QuickAssist Technology (QAT). This approach introduces an architecture that involves the collaboration between physical function (PF) and virtual function (VF), and collaboration among VF, OpenSSL, and web application Nginx. The evaluation shows that our solution could provide high reliability, availability, and scalability (RAS) of hardware cryptography service in a 7x24x365 manner in the cloud environment.

Keywords: accelerator, cryptography service, RAS, secure sockets layer/transport layer security, SSL/TLS, virtualization fallback architecture

Procedia PDF Downloads 158
7340 Double Encrypted Data Communication Using Cryptography and Steganography

Authors: Adine Barett, Jermel Watson, Anteneh Girma, Kacem Thabet

Abstract:

In information security, secure communication of data across networks has always been a problem at the forefront. Transfer of information across networks is susceptible to being exploited by attackers engaging in malicious activity. In this paper, we leverage steganography and cryptography to create a layered security solution to protect the information being transmitted. The first layer of security leverages crypto- graphic techniques to scramble the information so that it cannot be deciphered even if the steganography-based layer is compromised. The second layer of security relies on steganography to disguise the encrypted in- formation so that it cannot be seen. We consider three cryptographic cipher methods in the cryptography layer, namely, Playfair cipher, Blowfish cipher, and Hills cipher. Then, the encrypted message is passed through the least significant bit (LSB) to the steganography algorithm for further encryption. Both encryption approaches are combined efficiently to help secure information in transit over a network. This multi-layered encryption is a solution that will benefit cloud platforms, social media platforms and networks that regularly transfer private information such as banks and insurance companies.

Keywords: cryptography, steganography, layered security, Cipher, encryption

Procedia PDF Downloads 84
7339 Enhancing the Network Security with Gray Code

Authors: Thomas Adi Purnomo Sidhi

Abstract:

Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter.

Keywords: network, network security, grey code, physical layer

Procedia PDF Downloads 503
7338 Improved Ohmic Contact by Li Doping in Electron Transport Layers

Authors: G. Sivakumar, T. Pratyusha, D. Gupta, W. Shen

Abstract:

To get ohmic contact between the cathode and organic semiconductor, transport layers are introduced between the active layer and the electrodes. Generally zinc oxide or titanium dioxide are used as electron transport layer. When electron transport layer is doped with lithium, the resultant film exhibited superior electronic properties, which enables faster electron transport. Doping is accomplished by heat treatment of films with Lithium salts. Li-doped films. We fabricated organic solar cell using PTB7(poly(3-hexylthiopene-2,5- diyl):PCBM(phenyl-C61-butyric acid methyl ester) and found that the solar cells prepared using Li doped films had better performance in terms of efficiency when compared to the undoped transport layers.

Keywords: electron transport layer, higher efficiency, lithium doping, ohmic contact

Procedia PDF Downloads 512
7337 Wireless Transmission of Big Data Using Novel Secure Algorithm

Authors: K. Thiagarajan, K. Saranya, A. Veeraiah, B. Sudha

Abstract:

This paper presents a novel algorithm for secure, reliable and flexible transmission of big data in two hop wireless networks using cooperative jamming scheme. Two hop wireless networks consist of source, relay and destination nodes. Big data has to transmit from source to relay and from relay to destination by deploying security in physical layer. Cooperative jamming scheme determines transmission of big data in more secure manner by protecting it from eavesdroppers and malicious nodes of unknown location. The novel algorithm that ensures secure and energy balance transmission of big data, includes selection of data transmitting region, segmenting the selected region, determining probability ratio for each node (capture node, non-capture and eavesdropper node) in every segment, evaluating the probability using binary based evaluation. If it is secure transmission resume with the two- hop transmission of big data, otherwise prevent the attackers by cooperative jamming scheme and transmit the data in two-hop transmission.

Keywords: big data, two-hop transmission, physical layer wireless security, cooperative jamming, energy balance

Procedia PDF Downloads 490
7336 Bypassing Docker Transport Layer Security Using Remote Code Execution

Authors: Michael J. Hahn

Abstract:

Docker is a powerful tool used by many companies such as PayPal, MetLife, Expedia, Visa, and many others. Docker works by bundling multiple applications, binaries, and libraries together on top of an operating system image called a container. The container runs on a Docker engine that in turn runs on top of a standard operating system. This centralization saves a lot of system resources. In this paper, we will be demonstrating how to bypass Transport Layer Security and execute remote code within Docker containers built on a base image of Alpine Linux version 3.7.0 through the use of .apk files due to flaws in the Alpine Linux package management program. This exploit renders any applications built using Docker with a base image of Alpine Linux vulnerable to unwanted outside forces.

Keywords: cloud, cryptography, Docker, Linux, security

Procedia PDF Downloads 198
7335 Double Layer Security Model for Identification Friend or Foe

Authors: Buse T. Aydın, Enver Ozdemir

Abstract:

In this study, a double layer authentication scheme between the aircraft and the Air Traffic Control (ATC) tower is designed to prevent any unauthorized aircraft from introducing themselves as friends. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or foe according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as a friend. In this method, even if embedded key is captured by the enemy aircraft, without the information of the second layer, the enemy can easily be determined. Overall, in this work, we present a more reliable system by adding a physical layer in the authentication process.

Keywords: ADS-B, communication with physical layer security, cryptography, identification friend or foe

Procedia PDF Downloads 161
7334 A Scheme Cooperating with Cryptography to Enhance Security in Satellite Communications

Authors: Chieh-Fu Chang, Wan-Hsin Hsieh

Abstract:

We have proposed a novel scheme— iterative word-extension (IWE) to enhance the cliff effect of Reed-Solomon codes regarding the error performance at a specific Eb/N0. The scheme can be readily extended to block codes and the important properties of IWE are further investigated here. In order to select proper block codes specifying the desired cliff Eb/N0, the associated features of IWE are explored. These properties and features grant IWE ability to enhance security regarding the received Eb/N0 in physical layer so that IWE scheme can cooperate with the traditional presentation layer approach — cryptography, to meet the secure requirements in diverse applications. The features and feasibility of IWE scheme in satellite communication are finally discussed.

Keywords: security, IWE, cliff effect, space communications

Procedia PDF Downloads 425
7333 Electrochemical Layer by Layer Assembly

Authors: Mao Li, Yuguang Ma, Katsuhiko Ariga

Abstract:

The performance of functional materials is governed by their ability to interact with surrounding environments in a well-defined and controlled manner. Layer-by-Layer (LbL) assembly is one of the most widely used technologies for coating both planar and particulate substrates in a diverse range of fields, including optics, energy, catalysis, separations, and biomedicine. Herein, we introduce electrochemical-coupling layer-by-layer assembly as a novel fabrication methodology for preparing layered thin films. This assembly method not only determines the process properties (such as the time, scalability, and manual intervention) but also directly control the physicochemical properties of the films (such as the thickness, homogeneity, and inter- and intra-layer film organization), with both sets of properties linked to application-specific performance.

Keywords: layer by layer assembly, electropolymerization, carbazole, optical thin film, electronics

Procedia PDF Downloads 382
7332 Security Architecture for Cloud Networking: A Survey

Authors: Vishnu Pratap Singh Kirar

Abstract:

In the cloud computing hierarchy IaaS is the lowest layer, all other layers are built over it. Thus it is the most important layer of cloud and requisite more importance. Along with advantages IaaS faces some serious security related issue. Mainly Security focuses on Integrity, confidentiality and availability. Cloud computing facilitate to share the resources inside as well as outside of the cloud. On the other hand, cloud still not in the state to provide surety to 100% data security. Cloud provider must ensure that end user/client get a Quality of Service. In this report we describe possible aspects of cloud related security.

Keywords: cloud computing, cloud networking, IaaS, PaaS, SaaS, cloud security

Procedia PDF Downloads 530
7331 Numerical Simulation of Convective and Transport Processes in the Nocturnal Atmospheric Surface Layer

Authors: K. R. Sreenivas, Shaurya Kaushal

Abstract:

After sunset, under calm & clear-sky nocturnal conditions, the air layer near the surface containing aerosols cools through radiative processes to the upper atmosphere. Due to this cooling, surface air-layer temperature can fall 2-6 degrees C lower than the ground-surface temperature. This unstable convection layer, on the top, is capped by a stable inversion-boundary layer. Radiative divergence, along with the convection within the surface layer, governs the vertical transport of heat and moisture. Micro-physics in this layer have implications for the occurrence and growth of the fog layer. This particular configuration, featuring a convective mixed layer beneath a stably stratified inversion layer, exemplifies a classic case of penetrative convection. In this study, we conduct numerical simulations of the penetrative convection phenomenon within the nocturnal atmospheric surface layer and elucidate its relevance to the dynamics of fog layers. We employ field and laboratory measurements of aerosol number density to model the strength of the radiative cooling. Our analysis encompasses horizontally averaged, vertical profiles of temperature, density, and heat flux. The energetic incursion of the air from the mixed layer into the stable inversion layer across the interface results in entrainment and the growth of the mixed layer, modeling of which is the key focus of our investigation. In our research, we ascertain the appropriate length scale to employ in the Richardson number correlation, which allows us to estimate the entrainment rate and model the growth of the mixed layer. Our analysis of the mixed layer and the entrainment zone reveals a close alignment with previously reported laboratory experiments on penetrative convection. Additionally, we demonstrate how aerosol number density influences the growth or decay of the mixed layer. Furthermore, our study suggests that the presence of fog near the ground surface can induce extensive vertical mixing, a phenomenon observed in field experiments.

Keywords: inversion layer, penetrative convection, radiative cooling, fog occurrence

Procedia PDF Downloads 72
7330 Hysteresis Effect in Organometallic Perovskite Solar Cells with Mesoscopic NiO as a Hole Transport Layer

Authors: D. C. Asebiah, D. Saranin, S. Karazhanov, A. R. Tameev, M. Kah

Abstract:

In this paper, the mesoscopic NiO was used as a hole transport layer in the inverted planar organometallic hybrid perovskite solar cell to study the effect of hysteresis. The devices we fabricated have the structures Fluorine Tin Oxide (FTO)/mesoscopic NiO/perovskite/[6,6]-phenyl C₆₁-butyric acid methyl ester (PC₆₁BM) photovoltaic device. The perovskite solar cell was done by toluene air (TLA) method and horn sonication for the dispersion of the NiO nanoparticles in deionized water. The power conversion efficiency was 12.07% under 1.5 AM illumination. We report hysteresis in the in current-voltage dependence of the solar cells with mesoscopic NiO as a hole transport layer.

Keywords: perovskite, mesoscopic, hysteresis, toluene air

Procedia PDF Downloads 170
7329 Polyethylenimine-Ethoxylated Dual Interfacial Layers for High-Efficient Quantum Dot Light-Emitting Diodes

Authors: Woosuk Lee

Abstract:

We controlled the electron injection rate in inverted quantum dot light-emitting diode (QLED) by inserting PEIE layer between ZnO electron transport layer(ETL) and quantum dots(QDs) layer and successfully demonstrated high efficiency of QLEDs. The inverted QLED has the layer structure of ITO(cathode)/ ZnO NPs/PEIE/QDs/PEIE/P-TPD/MoO3/Al(anode). The PEIE between poly-TPD hole transport layer (HTL) and quantum dot emitting layer protects QD EML during HTL coating process and improves the surface morphology. In addition, the hole injection barrier is reduced by upshifting the valence band maximum (VBM) of QDs. An additional layer of PEIE was introduced between ZnO and QD to balance charge within QD emissive layer in device, which serves as an effective electron blocking layer without changing device operating condition such as turn-on voltage and emissive spectra. As a result, the optimized QLED with 5nm PEIE shows a ~36% improved current efficiency and external quantum efficiency (EQE) compared to the QLED without PEIE.(maximum current efficiency, and EQE are achieved 70cd/A and 17.3%, respectively). In particular, the maximum brightness of the optimized QLED dramatically improved by a factor of 2.3 relative to the QLED without PEIE. The main reasons for these QLED performance improvement are due to the suppressing the leakage current across the device and well confined exciton by inserting PEIE layers.

Keywords: quantum dot light-emitting diodes, interfacial layer, charge-injection balance, suppressing QD charging

Procedia PDF Downloads 183
7328 Alternative Key Exchange Algorithm Based on Elliptic Curve Digital Signature Algorithm Certificate and Usage in Applications

Authors: A. Andreasyan, C. Connors

Abstract:

The Elliptic Curve Digital Signature algorithm-based X509v3 certificates are becoming more popular due to their short public and private key sizes. Moreover, these certificates can be stored in Internet of Things (IoT) devices, with limited resources, using less memory and transmitted in network security protocols, such as Internet Key Exchange (IKE), Transport Layer Security (TLS) and Secure Shell (SSH) with less bandwidth. The proposed method gives another advantage, in that it increases the performance of the above-mentioned protocols in terms of key exchange by saving one scalar multiplication operation.

Keywords: cryptography, elliptic curve digital signature algorithm, key exchange, network security protocol

Procedia PDF Downloads 146
7327 A Secure Survey against Black Hole Attack in MANET

Authors: G. Usha, S. Kannimuthu, K. Mahalakshmi

Abstract:

Mobile Adhoc Network (MANET) is one of the most promising technologies that have applications ranging from various portable devices to military networks. MANET has no fixed infrastructure and the security of such network is a big concern. Therefore, in order to operate MANET’s securely, the misbehavior and intrusions should be detected before the attackers affect the network communication. In this article, we make a comprehensive survey against black hole attack that is a serious threat against MANET that exploits the routing behavior of the MANET. We have given broad survey solutions that detect black hole attacks in MANET. This is achieved by analyzing the techniques involved in detecting the attacks in each scheme. Furthermore, we examine about the challenges to the researchers for constructing an in-depth solution against black hole attack.

Keywords: AODV, cross layer security, mobile Adhoc network (MANET), packet delivery ratio, single layer security

Procedia PDF Downloads 406
7326 Polymer Advancement with Poly(High Internal Phase Emulsion) Poly(S/DVB) Modified via Layer-by-Layer for CO2 Adsorption

Authors: Saifon Chongthub

Abstract:

The purpose of this research is to synthesize adsorbent foam for CO2 adsorption. The polymer was prepared from poly High Internal Phase Emulsion (PolyHIPE) using styrene as monomer and divinylbenzene as comonomer. Its morphology was determined by Scanning Electron Microscopy (SEM). To further increased CO2 adsorption of the prepared polyHIPE, the layer by layer (LbL) technique was applied, which alternated polyelectrolyte injection between layers of Poly(styrenesulfonate) (PSS) and Poly(diallyldimetyl-ammonium chloride)(PDADMAC) as primary layer, and layers of PSS and polyetyleneimine (PEI) as secondary layer.

Keywords: high internal phase emulsion, polyHIPE, surface modification, layer by layer technique, CO2 adsorption

Procedia PDF Downloads 289
7325 Secure Distance Bounding Protocol on Ultra-WideBand Based Mapping Code

Authors: Jamel Miri, Bechir Nsiri, Ridha Bouallegue

Abstract:

Ultra WidBand-IR physical layer technology has seen a great development during the last decade which makes it a promising candidate for short range wireless communications, as they bring considerable benefits in terms of connectivity and mobility. However, like all wireless communication they suffer from vulnerabilities in terms of security because of the open nature of the radio channel. To face these attacks, distance bounding protocols are the most popular counter measures. In this paper, we presented a protocol based on distance bounding to thread the most popular attacks: Distance Fraud, Mafia Fraud and Terrorist fraud. In our work, we study the way to adapt the best secure distance bounding protocols to mapping code of ultra-wideband (TH-UWB) radios. Indeed, to ameliorate the performances of the protocol in terms of security communication in TH-UWB, we combine the modified protocol to ultra-wideband impulse radio technology (IR-UWB). The security and the different merits of the protocols are analyzed.

Keywords: distance bounding, mapping code ultrawideband, terrorist fraud, physical layer technology

Procedia PDF Downloads 299
7324 Hysteresis in Sustainable Two-layer Circular Tube under a Lateral Compression Load

Authors: Ami Nomura, Ken Imanishi, Etsuko Ueda, Tadahiro Wada, Shinichi Enoki

Abstract:

Recently, there have been a lot of earthquakes in Japan. It is necessary to promote seismic isolation devices for buildings. The devices have been hardly diffused in attached houses, because the devices are very expensive. We should develop a low-cost seismic isolation device for detached houses. We suggested a new seismic isolation device which uses a two-layer circular tube as a unit. If hysteresis is produced in the two-layer circular tube under lateral compression load, we think that the two-layer circular tube can have energy absorbing capacity. It is necessary to contact the outer layer and the inner layer to produce hysteresis. We have previously reported how the inner layer comes in contact with the outer layer from a perspective of analysis used mechanics of materials. We have clarified that the inner layer comes in contact with the outer layer under a lateral compression load. In this paper, we explored contact area between the outer layer and the inner layer under a lateral compression load by using FEA. We think that changing the inner layer’s thickness is effective in increase the contact area. In order to change the inner layer’s thickness, we changed the shape of the inner layer. As a result, the contact area changes depending on the inner layer’s thickness. Additionally, we experimented to check whether hysteresis occurs in fact. As a consequence, we can reveal hysteresis in the two-layer circular tube under the condition.

Keywords: contact area, energy absorbing capacity, hysteresis, seismic isolation device

Procedia PDF Downloads 295
7323 Study on Hysteresis in Sustainable Two-Layer Circular Tube under a Lateral Compression Load

Authors: Ami Nomura, Ken Imanishi, Yukinori Taniguchi, Etsuko Ueda, Tadahiro Wada, Shinichi Enoki

Abstract:

Recently, there have been a lot of earthquakes in Japan. It is necessary to promote seismic isolation devices for buildings. The devices have been hardly diffused in attached houses, because the devices are very expensive. We should develop a low-cost seismic isolation device for detached houses. We suggested a new seismic isolation device which uses a two-layer circular tube as a unit. If hysteresis is produced in the two-layer circular tube under lateral compression load, we think that the two-layer circular tube can have energy absorbing capacity. It is necessary to contact the outer layer and the inner layer to produce hysteresis. We have previously reported how the inner layer comes in contact with the outer layer from a perspective of analysis used mechanics of materials. We have clarified that the inner layer comes in contact with the outer layer under a lateral compression load. In this paper, we explored contact area between the outer layer and the inner layer under a lateral compression load by using FEA. We think that changing the inner layer’s thickness is effective in increase the contact area. In order to change the inner layer’s thickness, we changed the shape of the inner layer. As a result, the contact area changes depending on the inner layer’s thickness. Additionally, we experimented to check whether hysteresis occurs in fact. As a consequence, we can reveal hysteresis in the two-layer circular tube under the condition.

Keywords: contact area, energy absorbing capacity, hysteresis, seismic isolation device

Procedia PDF Downloads 361
7322 Double Layer Security Authentication Model for Automatic Dependent Surveillance-Broadcast

Authors: Buse T. Aydin, Enver Ozdemir

Abstract:

An automatic dependent surveillance-broadcast (ADS-B) system has serious security problems. In this study, a double layer authentication scheme between the aircraft and ground station, aircraft to aircraft, ground station to ATC tower is designed to prevent any unauthorized aircrafts from introducing themselves as friends. This method can be used as a solution to the problem of authentication. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or unknown according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as friend. As a result, the ADS-B messages coming from this authenticated friendly aircraft will be processed. In this method, even if the embedded key is captured by the unknown aircraft, without the information of the second layer, the unknown aircraft can easily be determined. Overall, in this work, we present a reliable system by adding physical layer in the authentication process.

Keywords: ADS-B, authentication, communication with physical layer security, cryptography, identification friend or foe

Procedia PDF Downloads 179
7321 Improving Security by Using Secure Servers Communicating via Internet with Standalone Secure Software

Authors: Carlos Gonzalez

Abstract:

This paper describes the use of the Internet as a feature to enhance the security of our software that is going to be distributed/sold to users potentially all over the world. By placing in a secure server some of the features of the secure software, we increase the security of such software. The communication between the protected software and the secure server is done by a double lock algorithm. This paper also includes an analysis of intruders and describes possible responses to detect threats.

Keywords: internet, secure software, threats, cryptography process

Procedia PDF Downloads 333
7320 Development of Single Layer of WO3 on Large Spatial Resolution by Atomic Layer Deposition Technique

Authors: S. Zhuiykov, Zh. Hai, H. Xu, C. Xue

Abstract:

Unique and distinctive properties could be obtained on such two-dimensional (2D) semiconductor as tungsten trioxide (WO3) when the reduction from multi-layer to one fundamental layer thickness takes place. This transition without damaging single-layer on a large spatial resolution remained elusive until the atomic layer deposition (ALD) technique was utilized. Here we report the ALD-enabled atomic-layer-precision development of a single layer WO3 with thickness of 0.77±0.07 nm on a large spatial resolution by using (tBuN)2W(NMe2)2 as tungsten precursor and H2O as oxygen precursor, without affecting the underlying SiO2/Si substrate. Versatility of ALD is in tuning recipe in order to achieve the complete WO3 with desired number of WO3 layers including monolayer. Governed by self-limiting surface reactions, the ALD-enabled approach is versatile, scalable and applicable for a broader range of 2D semiconductors and various device applications.

Keywords: Atomic Layer Deposition (ALD), tungsten oxide, WO₃, two-dimensional semiconductors, single fundamental layer

Procedia PDF Downloads 242
7319 Integration Multi-Layer Security Modeling with Fuzzy Logic in Service-Oriented Architectures

Authors: Zeinab Ranjbar

Abstract:

Service-oriented architecture in the world today, it is proposed to exchange information and services of interest to those such as IT managers, business managers, designers and system builders scene. The basic architecture of the software used to provide service to all users.the worries of all people (managers, business managers, designers, and system builders scene) effectiveness of this model, how reliable it is in security transactions.To increase the reliability of multi-layer fuzzy logic Architectures used.

Keywords: SOA, service oriented architecture, fuzzy logic, multi layer, SOA security

Procedia PDF Downloads 386
7318 Non-Linear Velocity Fields in Turbulent Wave Boundary Layer

Authors: Shamsul Chowdhury

Abstract:

The objective of this paper is to present the detailed analysis of the turbulent wave boundary layer produced by progressive finite-amplitude waves theory. Most of the works have done for the mass transport in the turbulent boundary layer assuming the eddy viscosity is not time varying, where the sediment movement is induced by the mean velocity. Near the ocean bottom, the waves produce a thin turbulent boundary layer, where the flow is highly rotational, and shear stress associated with the fluid motion cannot be neglected. The magnitude and the predominant direction of the sediment transport near the bottom are known to be closely related to the flow in the wave induced boundary layer. The magnitude of water particle velocity at the Crest phase differs from the one of the Trough phases due to the non-linearity of the waves, which plays an important role to determine the sediment movement. The non-linearity of the waves become predominant in the surf zone area, where the sediment movement occurs vigorously. Therefore, in order to describe the flow near the bottom and relationship between the flow and the movement of the sediment, the analysis was done using the non-linear boundary layer equation and the finite amplitude wave theory was applied to represent the velocity fields in the turbulent wave boundary layer. At first, the calculation was done for turbulent wave boundary layer by two-dimensional model where throughout the calculation is non-linear. But Stokes second order wave profile is adopted at the upper boundary. The calculated profile was compared with the experimental data. Finally, the calculation is done based on various modes of the velocity and turbulent energy. The mean velocity is found to differ from condition of the relative depth and the roughness. It is also found that due to non-linearity, the absolute value for velocity and turbulent energy as well as Reynolds stress are asymmetric. The mean velocity of the laminar boundary layer is always positive but in the turbulent boundary layer plays a very complicated role.

Keywords: wave boundary, mass transport, mean velocity, shear stress

Procedia PDF Downloads 259
7317 Design of Ternary Coatings System to Minimize the Residual Solvent in Polymeric Coatings

Authors: Jyoti Sharma, Raj Kumar Arya

Abstract:

The coatings of homogeneous ternary solution of Poly(styrene)(PS)-Poly(ethyleneglycol)-6000(PEG) Chlorobenzene (CLB) of two different concentrations (5.05%-4.98%-89.97% and 10.05%-5.12%-84.82%) were studied and dried under quiescent conditions. Residual solvent percentage and coatings thickness were calculated by gravimetric weight loss data. Residual solvent remained lower in case of the single thick layer as compared to layer-by-layer assembly technique. The Results suggests the effectiveness of the single thick layer for minimizing the residual solvent. A single thick layer had an initial coating thickness of 1098 µm and the final thickness of 106 µm which is lower as compared to the dried coatings of nearly the same final thickness by layer-by-layer assembly technique.

Keywords: films, layer-by-layer assembly, polymeric coatings, ternary system

Procedia PDF Downloads 182
7316 A Study on the Iterative Scheme for Stratified Shields Gamma Ray Buildup Factor Using Layer-Splitting Technique in Double-Layer Shield

Authors: Sari F. Alkhatib, Chang Je Park, Gyuhong Roh, Daeseong Jo

Abstract:

The iterative scheme which is used to treat buildup factors for stratified shields of three-layers or more is being investigated here using the layer-splitting technique. The second layer in a double-layer shield was split into two equivalent layers and the scheme was implemented on the new 'three-layer' shield configuration. The results of such manipulation for water-lead and water-iron shields combinations are presented here for 1 MeV photons. It was found that splitting the second layer introduces some deviation on the overall buildup factor. This expected deviation appeared to be higher in the case of low Z layer followed by high Z. However, the iterative scheme showed a great consistency and strong coherence with the introduced changes.

Keywords: build-up factor, iterative scheme, stratified shields, radiation protection

Procedia PDF Downloads 576
7315 Mechanism of Charge Transport in the Interface of CsSnI₃-FASnI₃ Perovskite Based Solar Cell

Authors: Seyedeh Mozhgan Seyed-Talebi, Weng-Kent Chan, Hsin-Yi Tiffany Chen

Abstract:

Lead-free perovskite photovoltaic (PV) technology employing non-toxic tin halide perovskite absorbers is pivotal for advancing perovskite solar cell (PSC) commercialization. Despite challenges posed by perovskite sensitivity to oxygen and humidity, our study utilizes DFT calculations using VASP and NanoDCAL software and SCAPS-1D simulations to elucidate the charge transport mechanism at the interface of CsSnI₃-FASnI₃ heterojunction. Results reveal how inherent electric fields facilitate efficient carrier transport, reducing recombination losses. We predict optimized power conversion efficiencies (PCEs) and highlight the potential of CsSnI3-FASnI3 heterojunctions for cost-effective and efficient charge transport layer-free (CTLF) photovoltaic devices. Our study provides insights into the future direction of recognizing more efficient, nontoxic heterojunction perovskite devices.

Keywords: charge transport layer free, CsSnI₃-FASnI₃ heterojunction, lead-free perovskite solar cell, tin halide perovskite., Charge transport layer free

Procedia PDF Downloads 45
7314 Investigation of the Effect of Nickel Electrodes as a Stainless Steel Buffer Layer on the Shielded Metal Arc Welding

Authors: Meisam Akbari, Seyed Hossein Elahi, Mohammad Mashadgarmeh

Abstract:

In this study, the effect of nickel-electrode as a stainless steel buffer layer is considered. Then, the effect of dilution of the last layer of welding on two samples of steel plate A516 Gr70 (C-Mn-Si) with SMAW welding process was investigated. Then, in a sample, the ENI-cl nickel electrode was welded as the buffer layer and the E316L-16 electrode as the last layer of welding and another sample with an E316L-16 electrode in two layers. The chemical composition of the latter layer was determined by spectrophotometry method. The results indicate that the chemical composition of the latter layer is different and the lowest dilution rate is obtained using the nickel electrode.

Keywords: degree of dilution, C-Mn-Si, spectrometry, nickel electrode, stainless steel

Procedia PDF Downloads 220
7313 A Numerical Study on Electrophoresis of a Soft Particle with Charged Core Coated with Polyelectrolyte Layer

Authors: Partha Sarathi Majee, S. Bhattacharyya

Abstract:

Migration of a core-shell soft particle under the influence of an external electric field in an electrolyte solution is studied numerically. The soft particle is coated with a positively charged polyelectrolyte layer (PEL) and the rigid core is having a uniform surface charge density. The Darcy-Brinkman extended Navier-Stokes equations are solved for the motion of the ionized fluid, the non-linear Nernst-Planck equations for the ion transport and the Poisson equation for the electric potential. A pressure correction based iterative algorithm is adopted for numerical computations. The effects of convection on double layer polarization (DLP) and diffusion dominated counter ions penetration are investigated for a wide range of Debye layer thickness, PEL fixed surface charge density, and permeability of the PEL. Our results show that when the Debye layer is in order of the particle size, the DLP effect is significant and produces a reduction in electrophoretic mobility. However, the double layer polarization effect is negligible for a thin Debye layer or low permeable cases. The point of zero mobility and the existence of mobility reversal depending on the electrolyte concentration are also presented.

Keywords: debye length, double layer polarization, electrophoresis, mobility reversal, soft particle

Procedia PDF Downloads 345
7312 Inter-Filling of CaO and MgO Mixed Layer in Surface Behavior of Al-Mg Alloys Containing Al2Ca

Authors: Seong-Ho Ha, Young-Ok Yoon, Shae K. Kim

Abstract:

Oxide layer of normal Al-Mg alloy can be characterized by upper MgO and lower MgAl2O4 spinel. The formation of the MgO outmost layer occurs by the surface segregation of Mg in the initial oxidation. After then, the oxidation is proceeded with the formation of MgA12O4 spinel beneath the MgO. Growth of the oxide layer is accelerated by constant formation of MgA12O4 spinel. On the other hand, the oxidation resistance of Al-Mg alloys can be significantly improved simply by Mg+Al2Ca master alloy use as the Mg alloying element and such an improvement is attributed to the CaO/MgO mixed layer. Al-Mg alloy containing Al2Ca shows CaO as the upper layer and MgO as the lower one without MgA12O4 spinel. Such a dense oxide film acts as a protective layer. However, the CaO/MgO scale has the outmost MgO, partly, after a long time exposure to a harsh oxidation condition. The aim of this study is to investigate the inter-filling behaviour of CaO and MgO mixed layer in oxidation resistance mechanism of Al-Mg alloys containing Al2Ca. The process of outmost MgO layer formation will be clarified.

Keywords: Al-Mg alloy, Al2Ca, oxidation, MgO

Procedia PDF Downloads 283