Search results for: communication with physical layer security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13840

Search results for: communication with physical layer security

13570 The Role of Sponsorship in Marketing Communication Tools

Authors: Mansur Ahmed Kazaure

Abstract:

The emergence of sponsorship as a new marketing communication tool and a source of competitive advantage in the marketplace has changed the entire marketing communication process. Sponsorship has overtaken other marketing communication tools in terms of growth and expenditure. This paper seeks to evaluate the role of sponsorship in marketing communication tools. The study recommends that proper measures be taken before the company embarks into sponsorship programs. This is necessary because investment in sponsorship does not always guarantee sustainable competitive advantage in the marketplace.

Keywords: sponsorship, marketing communication theories, marketing communication tools

Procedia PDF Downloads 401
13569 Improved Wi-Fi Backscatter System for Multi-to-Multi Communication

Authors: Chang-Bin Ha, Yong-Jun Kim, Dong-Hyun Ha, Hyoung-Kyu Song

Abstract:

The conventional Wi-Fi back scatter system can only process one-to-one communication between the Wi-Fi reader and the Wi-Fi tag. For improvement of throughput of the conventional system, this paper proposes the multi-to-multi communication system. In the proposed system, the interference by the multi-to-multi communication is effectively cancelled by the orthogonal multiple access based on the identification code of the tag. Although the overhead is generated by the procedure for the multi-to-multi communication, because the procedure is processed by the Wi-Fi protocol, the overhead is insignificant for the entire communication procedure. From the numerical results, it is confirmed that the proposed system has nearly proportional increased throughput in according to the number of the tag that simultaneously participates in communication.

Keywords: backscatter, multi-to-multi communication, orthogonality, Wi-Fi

Procedia PDF Downloads 485
13568 A Comparative Study on Electrical Characteristics of Au/n-SiC structure, with and Without Zn-Doped PVA Interfacial Layer at Room Temperature

Authors: M. H. Aldahrob, A. Kokce, S. Altindal, H. E. Lapa

Abstract:

In order to obtain the detailed information about the effect of (Zn-doped PVA) interfacial layer, surface states (Nss) and series resistance (Rs) on electrical characteristics, both Au/n- type 4H-SiC (MS) with and without (Zn doped PVA) interfacial layer were fabricated to compare. The main electrical parameters of them were investigated using forward and reverse bias current-voltage (I-V), capacitance-voltage (C-V) and conductance –voltage (G/W –V) measurements were performed at room temperature. Experimental results show that the value of ideality factor (n), zero –bias barrier height (ΦBo), Rs, rectifier rate (RR=IF/IR) and the density of Nss are strong functions interfacial layer and applied bias voltage. The energy distribution profile of Nss was obtained from forward bias I-V data by taking into account voltage dependent effective BH (ΦBo) and ideality factor (n(V)). Voltage dependent profile of Rs was also obtained both by using Ohm’s law and Nicollian and Brew methods. The other main diode parameters such as the concentration of doping donor atom (ND), Fermi energy level (EF).BH (ΦBo), depletion layer with (WD) were obtained by using the intercept and slope of the reverse bias C-2 vs V plots. It was found that (Zn-doped PVA) interfacial layer lead to a quite decrease in the values Nss, Rs and leakage current and increase in shunt resistance (Rsh) and RR. Therefore, we can say that the use of thin (Zn-doped PVA) interfacial layer can quite improved the performance of MS structure.

Keywords: interfacial polymer layer, thickness dependence, electric and dielectric properties, series resistance, interface state

Procedia PDF Downloads 223
13567 Implications of Private Military Security Companies on Stewardship of the Profession of Arms

Authors: Kevin Krupski

Abstract:

Private Military Security Companies have grown to become a major force contributor to nations in military operations. Scholars have debated the implications of this in relation to control and efficiency related to the privatization of violence, but there has been little discussion on how these companies affect the profession of arms. Specifically, this paper seeks to address how the privatization of violence influences the military’s stewardship, whether private military security companies are capable of stewardship of the military profession, and whether there are aspects of stewardship of the military profession that private military security companies are capable of emulating. This paper reviews literature on stewardship, the relationship of the military to the state, and private military security companies in order to identify overlap between uniformed military services and the private sector. Then, it offers a typology for determining under what conditions an organization would act as a steward. Ultimately, there are insufficient reasons for private military security companies to act as stewards of the profession of arms.

Keywords: stewardship, military profession, civil-military, security

Procedia PDF Downloads 225
13566 Management Competency in Logistical Function: The Skills That Will Master a Logistical Manager

Authors: Fatima Ibnchahid

Abstract:

Competence approach is considered, since the early 80's as one of the major development of HR policies. Many approaches to manage the professional skills were declined. Some processes are mature whereas the others have been abandoned. Competence can be defined as the set of knowledge (theoretical and practical), know-how (experience) and life skills (personality traits) mobilized by a person in the company. The skills must master a logistics manager are divided into two main categories: depending on whether technical skills, or managerial skills and human. The firsts are broken down into skills on logistical techniques and on general skills in business, seconds in social skills (self with others) and personal (with oneself). Logisticians are faced with new challenges and new constraints that are revolutionizing the way to treat the physical movement of goods and operations related to information flows that trigger, they control and guide the physical movements of these major changes, we can mention the development of information technology and communication, the emergence of strong environmental and security constraints. These changes have important effects on the skills needs of the members of the logistical function and sensitive development for training requested by logistical managers to perform better in their job changes. In this article, we will address two main points, first, a brief overview of the management skills and secondly answer the question asked in the title of the article to know what are the skills that will master a logistical manager.

Keywords: skills, competence, management, logistical function

Procedia PDF Downloads 248
13565 PUF-Based Lightweight Iot Secure Authentication Chip Design

Authors: Wenxuan Li, Lei Li, Jin Li, Yuanhang He

Abstract:

This paper designed a secure chip for IoT communication security integrated with the PUF-based firmware protection scheme. Then, the Xilinx Kintex-7 and STM-32 were used for the prototype verification. Firmware protection worked well on FPGA and embedded platforms. For the ASIC implementation of the PUF module, contact PUF is chosen. The post-processing method and its improvement are analyzed with emphasis. This paper proposed a more efficient post-processing method for contact PUF named SXOR, which has practical value for realizing lightweight security modules in IoT devices. The analysis was carried out under the hypothesis that the contact holes are independent and combine the existing data in the open literature. The post-processing effects of SXOR and XOR are basically the same under the condition that the proposed post-processing circuit occupies only 50.6% of the area of XOR. The average Hamming weight of the PUF output bit sequence obtained by the proposed post-processing method is 0.499735, and the average Hamming weight obtained by the XOR-based post-processing method is 0.499999.

Keywords: PUF, IoT, authentication, secure communication, encryption, XOR

Procedia PDF Downloads 105
13564 Product Development of Standard Multi-Layer Sweet (Khanom- Chan) Recipe to Healthy for Thai Dessert

Authors: Tidarat Sanphom

Abstract:

Aim of this research is to development of Standard Layer pudding (Khanom-Chan) recipe to healthy Thai dessert. The objective are to study about standard recipe in multi-layer sweet. It was found that the appropriate recipe in multi-layer sweet, was consisted of rice starch 56 grams, tapioca starch 172 grams, arrowroot flour 98 grams, mung been-flour 16 grams, coconut milk 774 grams, fine sugar 374 grams, pandan leaf juice 47 grams and oil 5 grams.Then the researcher studied about the ratio of rice-berries flour to rice starch in multi-layer sweet at level of 30:70, 50:50, and only rice-berry flour 100 percentage. Result sensory evaluation, it was found the ratio of rice-berry flour to rice starch 30:70 had well score. The result of multi-layer sweet with rice-berry flour reduced sugar 20, 40 and 60 percentage found that 20 percentage had well score. Calculated total calories and calories from fat in Sweet layer cake with rice-berry flour reduced sugar 20 percentage had 250.04 kcal and 65.16 kcal.

Keywords: multi-layer sweet (Khanom-Chan), rice-berry flour, leaf juice, desert

Procedia PDF Downloads 405
13563 Effect of Interlayer Coupling in Co/Al2O3/Co

Authors: Niru Chowdhury, Subhankar Bedanta, Alexander Weber, Thomas Brueckel

Abstract:

We show the effect of interlayer coupling on magnetization reversal in purely dipolar coupled magnetic multilayers. Longitudinal magneto-optic Kerr microscopy (LMOKE) has been performed on [Co(10nm)/Al2O3(t)/Co(10nm)] for various thicknesses of Al2O3(t). We will show that inter-layer coupling interactions lead to layer-by-layer reversal in the magnetic multilayers. Also transverse component of magnetization was observed for higher thickness of the spacer layer.

Keywords: Interlayer coupling, Magnetic domains, Magneto – Optic Kerr effect microscopy, Magnetization reversal, Magnetic thin film

Procedia PDF Downloads 373
13562 Unified Theory of the Security Dilemma: Geography, MAD and Democracy

Authors: Arash Heydarian Pashakhanlou

Abstract:

The security dilemma is one of the key concepts in International Relations (IR), and the numerous engagements with it have created a great deal of confusion regarding its essence. That is why this article seeks to dissect the security dilemma and rebuild it from its foundational core. In doing so, the present study highlights that the security dilemma requires interaction among actors that seek to protect themselves from other's capacity for harm under the condition of uncertainty to operate. In this constellation, actors are confronted with the dilemma of motives, power, and action, which they seek to resolve by acquiring information regarding their opponents. The relationship between the parties is shaped by the harm-uncertainty index (HUI) consisting of geographical distance, MAD, and joint democracy that determines the intensity of the security dilemma. These elements define the unified theory of the security dilemma (UTSD) developed here. UTSD challenges the prevailing view that the security dilemma is a unidimensional paradoxical concept, regulated by the offense-defense balance and differentiation that only occurs in anarchic settings with tragic outcomes and is equivalent to the spiral model.

Keywords: security dilemma, revisionism, status quo, anarchy, uncertainty, tragedy, spiral, deterrence

Procedia PDF Downloads 205
13561 Modeling and Stability Analysis of Viral Propagation in Wireless Mesh Networking

Authors: Haowei Chen, Kaiqi Xiong

Abstract:

This paper aims to answer how malware will propagate in Wireless Mesh Networks (WMNs) and how communication radius and distributed density of nodes affects the process of spreading. The above analysis is essential for devising network-wide strategies to counter malware. We answer these questions by developing an improved dynamical system that models malware propagation in the area where nodes were uniformly distributed. The proposed model captures both the spatial and temporal dynamics regarding the malware spreading process. Equilibrium and stability are also discussed based on the threshold of the system. If the threshold is less than one, the infected nodes disappear, and if the threshold is greater than one, the infected nodes asymptotically stabilize at the endemic equilibrium. Numerical simulations are investigated about communication radius and distributed density of nodes in WMNs, which allows us to draw various insights that can be used to guide security defense.

Keywords: Bluetooth security, malware propagation, wireless mesh networks, stability analysis

Procedia PDF Downloads 67
13560 Fire Safety Engineering of Wood Dust Layer or Cloud

Authors: Marzena Półka, Bożena Kukfisz

Abstract:

This paper presents an analysis of dust explosion hazards in the process industries. It includes selected testing method of dust explosibility and presentation two of them according to experimental standards used by Department of Combustion and Fire Theory in The Main School of Fire Service in Warsaw. In the article are presented values of maximum acceptable surface temperature (MAST) of machines operating in the presence of dust cloud and chosen dust layer with thickness of 5 and 12,5mm. The comparative analysis, points to the conclusion that the value of the minimum ignition temperature of the layer (MITL) and the minimum ignition temperature of dust cloud (MTCD) depends on the granularity of the substance. Increasing the thickness of the dust layer reduces minimum ignition temperature of dust layer. Increasing the thickness of dust at the same time extends the flameless combustion and delays the ignition.

Keywords: fire safety engineering, industrial hazards, minimum ignition temperature, wood dust

Procedia PDF Downloads 293
13559 The Communication Library DIALOG for iFDAQ of the COMPASS Experiment

Authors: Y. Bai, M. Bodlak, V. Frolov, S. Huber, V. Jary, I. Konorov, D. Levit, J. Novy, D. Steffen, O. Subrt, M. Virius

Abstract:

Modern experiments in high energy physics impose great demands on the reliability, the efficiency, and the data rate of Data Acquisition Systems (DAQ). This contribution focuses on the development and deployment of the new communication library DIALOG for the intelligent, FPGA-based Data Acquisition System (iFDAQ) of the COMPASS experiment at CERN. The iFDAQ utilizing a hardware event builder is designed to be able to readout data at the maximum rate of the experiment. The DIALOG library is a communication system both for distributed and mixed environments, it provides a network transparent inter-process communication layer. Using the high-performance and modern C++ framework Qt and its Qt Network API, the DIALOG library presents an alternative to the previously used DIM library. The DIALOG library was fully incorporated to all processes in the iFDAQ during the run 2016. From the software point of view, it might be considered as a significant improvement of iFDAQ in comparison with the previous run. To extend the possibilities of debugging, the online monitoring of communication among processes via DIALOG GUI is a desirable feature. In the paper, we present the DIALOG library from several insights and discuss it in a detailed way. Moreover, the efficiency measurement and comparison with the DIM library with respect to the iFDAQ requirements is provided.

Keywords: data acquisition system, DIALOG library, DIM library, FPGA, Qt framework, TCP/IP

Procedia PDF Downloads 294
13558 Active Control of Multiferroic Composite Shells Using 1-3 Piezoelectric Composites

Authors: S. C. Kattimani

Abstract:

This article deals with the analysis of active constrained layer damping (ACLD) of smart multiferroic or magneto-electro-elastic doubly curved shells. The kinematics of deformations of the multiferroic doubly curved shell is described by a layer-wise shear deformation theory. A three-dimensional finite element model of multiferroic shells has been developed taking into account the electro-elastic and magneto-elastic couplings. A simple velocity feedback control law is employed to incorporate the active damping. Influence of layer stacking sequence and boundary conditions on the response of the multiferroic doubly curved shell has been studied. In addition, for the different orientation of the fibers of the constraining layer, the performance of the ACLD treatment has been studied.

Keywords: active constrained layer damping (ACLD), doubly curved shells, magneto-electro-elastic, multiferroic composite, smart structures

Procedia PDF Downloads 289
13557 X-Ray Photoelectron Spectroscopy Characterization of the Surface Layer on Inconel 625 after Exposition in Molten Salt

Authors: Marie Kudrnova, Jana Petru

Abstract:

This study is part of the international research - Materials for Molten Salt Reactors (MSR) and addresses the part of the project dealing with the corrosion behavior of candidate construction materials. Inconel 625 was characterized by x-ray photoelectron spectroscopy (XPS) before and after high–temperature experiment in molten salt. The experiment was performed in a horizontal tube furnace molten salt reactor, at 450 °C in argon, at atmospheric pressure, for 150 hours. Industrially produced HITEC salt was used (NaNO3, KNO3, NaNO2). The XPS study was carried out using the ESCAProbe P apparatus (Omicron Nanotechnology Ltd.) equipped with a monochromatic Al Kα (1486.6 eV) X-ray source. The surface layer on alloy 625 after exposure contains only Na, C, O, and Ni (as NiOx) and Nb (as NbOx BE 206.8 eV). Ni was detected in the metallic state (Ni0 – Ni 2p BE-852.7 eV, NiOx - Ni 2p BE-854.7 eV) after a short Ar sputtering because the oxide layer on the surface was very thin. Nickel oxides can form a protective layer in the molten salt, but only future long-term exposures can determine the suitability of Inconel 625 for MSR.

Keywords: Inconel 625, molten salt, oxide layer, XPS

Procedia PDF Downloads 122
13556 The Effect of Subsurface Dam on Saltwater Intrusion in Heterogeneous Coastal Aquifers

Authors: Antoifi Abdoulhalik, Ashraf Ahmed

Abstract:

Saltwater intrusion (SWI) in coastal aquifers has become a growing threat for many countries around the world. While various control measures have been suggested to mitigate SWI, the construction of subsurface physical barriers remains one of the most effective solutions for this problem. In this work, we used laboratory experiments and numerical simulations to investigate the effectiveness of subsurface dams in heterogeneous layered coastal aquifer with different layering patterns. Four different cases were investigated, including a homogeneous (case H), and three heterogeneous cases in which a low permeability (K) layer was set in the top part of the system (case LH), in the middle part of the system (case HLH) and the bottom part of the system (case HL). Automated image analysis technique was implemented to quantify the main SWI parameters under high spatial and temporal resolution. The method also provides transient salt concentration maps, allowing for the first time clear visualization of the spillage of saline water over the dam (advancing wedge condition) as well as the flushing of residual saline water from the freshwater area (receding wedge condition). The SEAWAT code was adopted for the numerical simulations. The results show that the presence of an overlying layer of low permeability enhanced the ability of the dam to retain the saline water. In such conditions, the rate of saline water spillage and inland extension may considerably be reduced. Conversely, the presence of an underlying low K layer led to a faster increase of saltwater volume on the seaward side of the wall, therefore considerably facilitating the spillage. The results showed that a complete removal of the residual saline water eventually occurred in all the investigated scenarios, with a rate of removal strongly affected by the hydraulic conductivity of the lower part of the aquifer. The data showed that the addition of the underlying low K layer in case HL caused the complete flushing to be almost twice longer than in the homogeneous scenario.

Keywords: heterogeneous coastal aquifers, laboratory experiments, physical barriers, seawater intrusion control

Procedia PDF Downloads 214
13555 Particleboard Production from Atmospheric Plasma Treated Wheat Straw Particles

Authors: Štěpán Hýsek, Milan Podlena, Miloš Pavelek, Matěj Hodoušek, Martin Böhm, Petra Gajdačová

Abstract:

Particle boards have being used in the civil engineering as a decking for load bearing and non-load bearing vertical walls and horizontal panels (e. g. floors, ceiling, roofs) in a large scale. When the straw is used as non-wood material for manufacturing of lignocellulosic panels, problems with wax layer on the surface of the material can occur. Higher percentage of silica and wax cause the problems with the adhesion of the adhesive and this is the reason why it is necessary to break the surface layer for the better bonding effect. Surface treatment of the particles cause better mechanical properties, physical properties and the overall better results of the composite material are reached. Plasma application is one possibility how to modify the surface layer. The aim of this research is to modify the surface of straw particles by using cold plasma treatment. Surface properties of lignocellulosic materials were observed before and after cold plasma treatment. Cold plasma does not cause any structural changes deeply in the material. There are only changes in surface layers, which are required. Results proved that the plasma application influenced the properties of surface layers and the properties of composite material.

Keywords: composite, lignocellulosic materials, straw, cold plasma, surface treatment

Procedia PDF Downloads 306
13554 Long-Term Tillage, Lime Matter and Cover Crop Effects under Heavy Soil Conditions in Northern Lithuania

Authors: Aleksandras Velykis, Antanas Satkus

Abstract:

Clay loam and clay soils are typical for northern Lithuania. These soils are susceptible to physical degradation in the case of intensive use of heavy machinery for field operations. However, clayey soils having poor physical properties by origin require more intensive tillage to maintain proper physical condition for grown crops. Therefore not only choice of suitable tillage system is very important for these soils in the region, but also additional search of other measures is essential for good soil physical state maintenance. Research objective: To evaluate the long-term effects of different intensity tillage as well as its combinations with supplementary agronomic practices on improvement of soil physical conditions and environmental sustainability. The experiment examined the influence of deep and shallow ploughing, ploughless tillage, combinations of ploughless tillage with incorporation of lime sludge and cover crop for green manure and application of the same cover crop for mulch without autumn tillage under spring and winter crop growing conditions on clay loam (27% clay, 50% silt, 23% sand) Endocalcaric Endogleyic Cambisol. Methods: The indicators characterizing the impact of investigated measures were determined using the following methods and devices: Soil dry bulk density – by Eijkelkamp cylinder (100 cm3), soil water content – by weighing, soil structure – by Retsch sieve shaker, aggregate stability – by Eijkelkamp wet sieving apparatus, soil mineral nitrogen – in 1 N KCL extract using colorimetric method. Results: Clay loam soil physical state (dry bulk density, structure, aggregate stability, water content) depends on tillage system and its combination with additional practices used. Application of cover crop winter mulch without tillage in autumn, ploughless tillage and shallow ploughing causes the compaction of bottom (15-25 cm) topsoil layer. However, due to ploughless tillage the soil dry bulk density in subsoil (25-35 cm) layer is less compared to deep ploughing. Soil structure in the upper (0-15 cm) topsoil layer and in the seedbed (0-5 cm), prepared for spring crops is usually worse when applying the ploughless tillage or cover crop mulch without autumn tillage. Application of lime sludge under ploughless tillage conditions helped to avoid the compaction and structure worsening in upper topsoil layer, as well as increase aggregate stability. Application of reduced tillage increased soil water content at upper topsoil layer directly after spring crop sowing. However, due to reduced tillage the water content in all topsoil markedly decreased when droughty periods lasted for a long time. Combination of reduced tillage with cover crop for green manure and winter mulch is significant for preserving the environment. Such application of cover crops reduces the leaching of mineral nitrogen into the deeper soil layers and environmental pollution. This work was supported by the National Science Program ‘The effect of long-term, different-intensity management of resources on the soils of different genesis and on other components of the agro-ecosystems’ [grant number SIT-9/2015] funded by the Research Council of Lithuania.

Keywords: clay loam, endocalcaric endogleyic cambisol, mineral nitrogen, physical state

Procedia PDF Downloads 201
13553 Influence Zone of Strip Footing on Untreated and Cement Treated Sand Mat Underlain by Soft Clay (2nd reviewed)

Authors: Sharifullah Ahmed

Abstract:

Shallow foundation on soft soils without ground improvement can represent a high level of settlement. In such a case, an alternative to pile foundations may be shallow strip footings placed on a soil system in which the upper layer is untreated or cement-treated compacted sand to limit the settlement within a permissible level. This research work deals with a rigid plane-strain strip footing of 2.5m width placed on a soil consisting of untreated or cement treated sand layer underlain by homogeneous soft clay. Both the thin and thick compared the footing width was considered. The soft inorganic cohesive NC clay layer is considered undrained for plastic loading stages and drained in consolidation stages, and the sand layer is drained in all loading stages. FEM analysis was done using PLAXIS 2D Version 8.0 with a model consisting of clay deposits of 15m thickness and 18m width. The soft clay layer was modeled using the Hardening Soil Model, Soft Soil Model, Soft Soil Creep model, and the upper improvement layer was modeled using only the Hardening Soil Model. The system is considered fully saturated. The value of natural void ratio 1.2 is used. Total displacement fields of strip footing and subsoil layers in the case of Untreated and Cement treated Sand as Upper layer are presented. For Hi/B =0.6 or above, the distribution of major deformation within an upper layer and the influence zone of footing is limited in an upper layer which indicates the complete effectiveness of the upper layer in bearing the foundation effectively in case of the untreated upper layer. For Hi/B =0.3 or above, the distribution of major deformation occurred within an upper layer, and the function of footing is limited in the upper layer. This indicates the complete effectiveness of the cement-treated upper layer. Brittle behavior of cemented sand and fracture or cracks is not considered in this analysis.

Keywords: displacement, ground improvement, influence depth, PLAXIS 2D, primary and secondary settlement, sand mat, soft clay

Procedia PDF Downloads 70
13552 Cybersecurity and Governance for Humanitarian Work: An Approach for Addressing Security Risks

Authors: Rossouw De Bruin, Sebastiaan H. Von Solms

Abstract:

The state of national security is an evolving concern. Companies, organizations, governments, states and individuals are aware of the security of their information and their assets however, they may not always be aware of the risks present. These risks are not only limited to non-existence of security procedures. Existing security can be severely flawed, especially if there is non-conformance towards policies, practices and procedures. When looking at humanitarian actions, we can easily identify these flaws. Unfortunately, humanitarian aid has to compete with factors from within the states, countries and continents they are working in. Furthermore, as technology improves, so does our connectivity to the internet and the way in which we use the internet. However, there are times when security is overlooked and humanitarian agencies are some of the agencies that do not always take security into consideration. The purpose of this paper will be to introduce the importance of cybersecurity and cybersecurity governance with respect to humanitarian work. We will also introduce and briefly discuss a model that can be used by humanitarian agencies to assess, manage and maintain their cybersecurity efforts.

Keywords: humanities, cybersecurity, cybersecurity governance, maturity, cybersecurity maturity, maturity model

Procedia PDF Downloads 238
13551 A Survey on the Blockchain Smart Contract System: Security Strengths and Weaknesses

Authors: Malaw Ndiaye, Karim Konate

Abstract:

Smart contracts are computer protocols that facilitate, verify, and execute the negotiation or execution of a contract, or that render a contractual term unnecessary. Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. Smart contracts have become lucrative and profitable targets for attackers because they can hold a great amount of money. Smart contracts, although widely used in blockchain technology, are far from perfect due to security concerns. Since there are recent studies on smart contract security, none of them systematically study the strengths and weaknesses of smart contract security. Some have focused on an analysis of program-related vulnerabilities by providing a taxonomy of vulnerabilities. Other studies are responsible for listing the series of attacks linked to smart contracts. Although a series of attacks are listed, there is a lack of discussions and proposals on improving security. This survey takes stock of smart contract security from a more comprehensive perspective by correlating the level of vulnerability and systematic review of security levels in smart contracts.

Keywords: blockchain, Bitcoin, smart contract, criminal smart contract, security

Procedia PDF Downloads 139
13550 Mobile WiMAX Network based Wireless Communication on Rail: An Analysis

Authors: Vinod Kumar Jatav, Dr. Vrijendra Singh

Abstract:

WiMAX is an emerging wireless technology designed by WiMAX forum. WiMAX technology delivers broadband internet access with QoS, mobility and robust security. WiMAX is among the prominent mobile broadband wireless technology which laid the foundation for the next generation networks (NGN). The next-generation communication system for railway should facilitate high level network availability, fast mobility for high speed trains with reliability, high handover rate, the firmness of train operations, and high QoS. The system should also be capable to provide various railway services by transmitting big data efficiently. One of the most promising technologies for the next generation railway wireless communication is Mobile WiMAX. This paper analyses some of the network architectures for railway wireless communication and considers the elementary concepts to facilitate the users with broadband internet access on trains. The paper aims to recognize the suitability of Mobile WiMAX technology for the special requirements of broadband internet facilities and wireless telecommunication services of Railways.

Keywords: Broadband internet, IEEE 802.16e, mobile WiMAX, Railway wireless communication

Procedia PDF Downloads 497
13549 Optimal Design of Polymer Based Piezoelectric Actuator with Varying Thickness and Length Ratios

Authors: Vineet Tiwari, R. K. Dwivedi, Geetika Srivastava

Abstract:

Piezoelectric cantilevers are exploited for their use in sensors and actuators. In this study, a unimorph cantilever beam is considered as a study element with a piezoelectric polymer Polyvinylidene fluoride (PVDF) layer bonded to a substrate layer. The different substrates like polysilicon, stainless steel and silicon nitride are tried for the study. An effort has been made to optimize and study the effect of the various parameters of the device in order to achieve maximum tip deflection. The variation of the tip displacement of the cantilever with respect to the length ratio of the nonpiezoelectric layer to the piezoelectric layer has been studied. The electric response of this unimorph cantilever beam is simulated with the help of finite element analysis software COMSOL Multiphysics.

Keywords: actuators, cantilever, piezoelectric, sensors, PVDF

Procedia PDF Downloads 407
13548 Multi-Level Security Measures in Cloud Computing

Authors: Shobha G. Ranjan

Abstract:

Cloud computing is an emerging, on-demand and internet- based technology. Varieties of services like, software, hardware, data storage and infrastructure can be shared though the cloud computing. This technology is highly reliable, cost effective and scalable in nature. It is a must only the authorized users should access these services. Further the time granted to access these services should be taken into account for proper accounting purpose. Currently many organizations do the security measures in many different ways to provide the best cloud infrastructure to their clients, but that’s not the limitation. This paper presents the multi-level security measure technique which is in accordance with the OSI model. In this paper, details of proposed multilevel security measures technique are presented along with the architecture, activities, algorithms and probability of success in breaking authentication.

Keywords: cloud computing, cloud security, integrity, multi-tenancy, security

Procedia PDF Downloads 478
13547 On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions

Authors: Behnam Zahednejad, Saeed Kosari

Abstract:

Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment.

Keywords: IoT, two-factor security, cancelable biometric, key compromise impersonation resilience, perfect forward secrecy, database attack, real-or-random model, ProVerif

Procedia PDF Downloads 75
13546 Improving Digital Data Security Awareness among Teacher Candidates with Digital Storytelling Technique

Authors: Veysel Çelik, Aynur Aker, Ebru Güç

Abstract:

Developments in information and communication technologies have increased both the speed of producing information and the speed of accessing new information. Accordingly, the daily lives of individuals have started to change. New concepts such as e-mail, e-government, e-school, e-signature have emerged. For this reason, prospective teachers who will be future teachers or school administrators are expected to have a high awareness of digital data security. The aim of this study is to reveal the effect of the digital storytelling technique on the data security awareness of pre-service teachers of computer and instructional technology education departments. For this purpose, participants were selected based on the principle of volunteering among third-grade students studying at the Computer and Instructional Technologies Department of the Faculty of Education at Siirt University. In the research, the pretest/posttest half experimental research model, one of the experimental research models, was used. In this framework, a 6-week lesson plan on digital data security awareness was prepared in accordance with the digital narration technique. Students in the experimental group formed groups of 3-6 people among themselves. The groups were asked to prepare short videos or animations for digital data security awareness. The completed videos were watched and evaluated together with prospective teachers during the evaluation process, which lasted approximately 2 hours. In the research, both quantitative and qualitative data collection tools were used by using the digital data security awareness scale and the semi-structured interview form consisting of open-ended questions developed by the researchers. According to the data obtained, it was seen that the digital storytelling technique was effective in creating data security awareness and creating permanent behavior changes for computer and instructional technology students.

Keywords: digital storytelling, self-regulation, digital data security, teacher candidates, self-efficacy

Procedia PDF Downloads 99
13545 Formation of Protective Aluminum-Oxide Layer on the Surface of Fe-Cr-Al Sintered-Metal-Fibers via Multi-Stage Thermal Oxidation

Authors: Loai Ben Naji, Osama M. Ibrahim, Khaled J. Al-Fadhalah

Abstract:

The objective of this paper is to investigate the formation and adhesion of a protective aluminum-oxide (Al2O3, alumina) layer on the surface of Iron-Chromium-Aluminum Alloy (Fe-Cr-Al) sintered-metal-fibers. The oxide-scale layer was developed via multi-stage thermal oxidation at 930 oC for 1 hour, followed by 1 hour at 960 oC, and finally at 990 oC for 2 hours. Scanning Electron Microscope (SEM) images show that the multi-stage thermal oxidation resulted in the formation of predominantly Al2O3 platelets-like and whiskers. SEM images also reveal non-uniform oxide-scale growth on the surface of the fibers. Furthermore, peeling/spalling of the alumina protective layer occurred after minimum handling, which indicates weak adhesion forces between the protective layer and the base metal alloy.  Energy Dispersive Spectroscopy (EDS) analysis of the heat-treated Fe-Cr-Al sintered-metal-fibers confirmed the high aluminum content on the surface of the protective layer, and the low aluminum content on the exposed base metal alloy surface. In conclusion, the failure of the oxide-scale protective layer exposes the base metal alloy to further oxidation, and the fragile non-uniform oxide-scale is not suitable as a support for catalysts.

Keywords: high-temperature oxidation, iron-chromium-aluminum alloy, alumina protective layer, sintered-metal-fibers

Procedia PDF Downloads 174
13544 Analysis of Contact Width and Contact Stress of Three-Layer Corrugated Metal Gasket

Authors: I. Made Gatot Karohika, Shigeyuki Haruyama, Ken Kaminishi, Oke Oktavianty, Didik Nurhadiyanto

Abstract:

Contact width and contact stress are important parameters related to the leakage behavior of corrugated metal gasket. In this study, contact width and contact stress of three-layer corrugated metal gasket are investigated due to the modulus of elasticity and thickness of surface layer for 2 type gasket (0-MPa and 400-MPa mode). A finite element method was employed to develop simulation solution to analysis the effect of each parameter. The result indicated that lowering the modulus of elasticity ratio of surface layer will result in better contact width but the average contact stresses are smaller. When the modulus of elasticity ratio is held constant with thickness ratio increase, its contact width has an increscent trend otherwise the average contact stress has decreased trend.

Keywords: contact width, contact stress, layer, metal gasket, corrugated, simulation

Procedia PDF Downloads 294
13543 A Novel Approach of Secret Communication Using Douglas-Peucker Algorithm

Authors: R. Kiruthika, A. Kannan

Abstract:

Steganography is the problem of hiding secret messages in 'innocent – looking' public communication so that the presence of the secret message cannot be detected. This paper introduces a steganographic security in terms of computational in-distinguishability from a channel of probability distributions on cover messages. This method first splits the cover image into two separate blocks using Douglas – Peucker algorithm. The text message and the image will be hided in the Least Significant Bit (LSB) of the cover image.

Keywords: steganography, lsb, embedding, Douglas-Peucker algorithm

Procedia PDF Downloads 330
13542 Corrosion of Fe-(9~37) Wt%Cr Alloys at 700-800 °C in N₂-H₂O-H₂S Mixed Gas

Authors: Min Jung Kim

Abstract:

Fe-(9, 19, 28, 37) wt%Cr alloys were corroded at 700 and 800 °C for 70 h under 1 atm of N₂, 1 atm of N₂/3.2%H₂O-mixed gas, and 1 atm of N₂/3.1%H₂O/2.42%H₂S-mixed gas. The corrosion rate of Fe-9Cr alloy increased with the addition of H₂O and increased further with the addition of H₂S in N₂/H₂O gas. Fe-9Cr alloy was non-protective in all gas types. In contrast, Fe-(19, 28, 37) wt%Cr alloys were protective in N₂ and N₂/H₂O-mixed gas because of the formation of the Cr₂O₃ layer. They were, however, non-protective in N₂/H₂O/H₂S-mixed gas because sulfidation dominated, forming the outer FeS layer and the inner Cr₂S₃ layer containing some FeCr₂S₄.

Keywords: Fe-(9, 19, 28, 37) wt%Cr alloys, corrosion, sulfidation, FeS

Procedia PDF Downloads 404
13541 Security Issues on Smart Grid and Blockchain-Based Secure Smart Energy Management Systems

Authors: Surah Aldakhl, Dafer Alali, Mohamed Zohdy

Abstract:

The next generation of electricity grid infrastructure, known as the "smart grid," integrates smart ICT (information and communication technology) into existing grids in order to alleviate the drawbacks of existing one-way grid systems. Future power systems' efficiency and dependability are anticipated to significantly increase thanks to the Smart Grid, especially given the desire for renewable energy sources. The security of the Smart Grid's cyber infrastructure is a growing concern, though, as a result of the interconnection of significant power plants through communication networks. Since cyber-attacks can destroy energy data, beginning with personal information leaking from grid members, they can result in serious incidents like huge outages and the destruction of power network infrastructure. We shall thus propose a secure smart energy management system based on the Blockchain as a remedy for this problem. The power transmission and distribution system may undergo a transformation as a result of the inclusion of optical fiber sensors and blockchain technology in smart grids. While optical fiber sensors allow real-time monitoring and management of electrical energy flow, Blockchain offers a secure platform to safeguard the smart grid against cyberattacks and unauthorized access. Additionally, this integration makes it possible to see how energy is produced, distributed, and used in real time, increasing transparency. This strategy has advantages in terms of improved security, efficiency, dependability, and flexibility in energy management. An in-depth analysis of the advantages and drawbacks of combining blockchain technology with optical fiber is provided in this paper.

Keywords: smart grids, blockchain, fiber optic sensor, security

Procedia PDF Downloads 78