Search results for: lightweight encryption
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 542

Search results for: lightweight encryption

272 NFC Communications with Mutual Authentication Based on Limited-Use Session Keys

Authors: Chalee Thammarat

Abstract:

Mobile phones are equipped with increased short-range communication functionality called Near Field Communication (or NFC for short). NFC needs no pairing between devices but suitable for little amounts of data in a very restricted area. A number of researchers presented authentication techniques for NFC communications, however, they still lack necessary authentication, particularly mutual authentication and security qualifications. This paper suggests a new authentication protocol for NFC communication that gives mutual authentication between devices. The mutual authentication is a one of property, of security that protects replay and man-in-the-middle (MitM) attack. The proposed protocols deploy a limited-use offline session key generation and use of distribution technique to increase security and make our protocol lightweight. There are four sub-protocols: NFCAuthv1 is suitable for identification and access control and NFCAuthv2 is suitable for the NFC-enhanced phone by a POS terminal for digital and physical goods and services.

Keywords: cryptographic protocols, NFC, near field communications, security protocols, mutual authentication, network security

Procedia PDF Downloads 430
271 A Review of Magnesium Air Battery Systems: From Design Aspects to Performance Characteristics

Authors: R. Sharma, J. K. Bhatnagar, Poonam, R. C. Sharma

Abstract:

Metal–air batteries have been designed and developed as an essential source of electric power to propel automobiles, make electronic equipment functional, and use them as the source of power in remote areas and space. High energy and power density, lightweight, easy recharge capabilities, and low cost are essential features of these batteries. Both primary and rechargeable magnesium air batteries are highly promising. Our focus will be on the basics of electrode reaction kinetics of Mg–air cell in this paper. Design and development of Mg or Mg alloys as anode materials, design and composition of air cathode, and promising electrolytes for Mg–air batteries have been reviewed. A brief note on the possible and proposed improvements in design and functionality is also incorporated. This article may serve as the primary and premier document in the critical research area of Mg-air battery systems.

Keywords: air cathode, battery design, magnesium air battery, magnesium anode, rechargeable magnesium air battery

Procedia PDF Downloads 243
270 Secure Authentication Scheme Based on Numerical Series Cryptography for Internet of Things

Authors: Maha Aladdin, Khaled Nagaty, Abeer Hamdy

Abstract:

The rapid advancement cellular networks and wireless networks have laid a solid basis for the Internet of Things. IoT has evolved into a unique standard that allows diverse physical devices to collaborate with one another. A service provider gives a variety of services that may be accessed via smart apps anywhere, at any time, and from any location over the Internet. Because of the public environment of mobile communication and the Internet, these services are highly vulnerable to a several malicious attacks, such as unauthorized disclosure by hostile attackers. As a result, the best option for overcoming these vulnerabilities is a strong authentication method. In this paper, a lightweight authentication scheme that is based on numerical series cryptography is proposed for the IoT environments. It allows mutual authentication between IoT devices Parametric study and formal proofs are utilized to illustrate that the pro-posed approach is resistant to a variety of security threats.

Keywords: internet of things, authentication, cryptography, security protocol

Procedia PDF Downloads 122
269 Detection the Ice Formation Processes Using Multiple High Order Ultrasonic Guided Wave Modes

Authors: Regina Rekuviene, Vykintas Samaitis, Liudas Mažeika, Audrius Jankauskas, Virginija Jankauskaitė, Laura Gegeckienė, Abdolali Sadaghiani, Shaghayegh Saeidiharzand

Abstract:

Icing brings significant damage to aviation and renewable energy installations. Air-conditioning, refrigeration, wind turbine blades, airplane and helicopter blades often suffer from icing phenomena, which cause severe energy losses and impair aerodynamic performance. The icing process is a complex phenomenon with many different causes and types. Icing mechanisms, distributions, and patterns are still relevant to research topics. The adhesion strength between ice and surfaces differs in different icing environments. This makes the task of anti-icing very challenging. The techniques for various icing environments must satisfy different demands and requirements (e.g., efficient, lightweight, low power consumption, low maintenance and manufacturing costs, reliable operation). It is noticeable that most methods are oriented toward a particular sector and adapting them to or suggesting them for other areas is quite problematic. These methods often use various technologies and have different specifications, sometimes with no clear indication of their efficiency. There are two major groups of anti-icing methods: passive and active. Active techniques have high efficiency but, at the same time, quite high energy consumption and require intervention in the structure’s design. It’s noticeable that vast majority of these methods require specific knowledge and personnel skills. The main effect of passive methods (ice-phobic, superhydrophobic surfaces) is to delay ice formation and growth or reduce the adhesion strength between the ice and the surface. These methods are time-consuming and depend on forecasting. They can be applied on small surfaces only for specific targets, and most are non-biodegradable (except for anti-freezing proteins). There is some quite promising information on ultrasonic ice mitigation methods that employ UGW (Ultrasonic Guided Wave). These methods are have the characteristics of low energy consumption, low cost, lightweight, and easy replacement and maintenance. However, fundamental knowledge of ultrasonic de-icing methodology is still limited. The objective of this work was to identify the ice formation processes and its progress by employing ultrasonic guided wave technique. Throughout this research, the universal set-up for acoustic measurement of ice formation in a real condition (temperature range from +240 C to -230 C) was developed. Ultrasonic measurements were performed by using high frequency 5 MHz transducers in a pitch-catch configuration. The selection of wave modes suitable for detection of ice formation phenomenon on copper metal surface was performed. Interaction between the selected wave modes and ice formation processes was investigated. It was found that selected wave modes are sensitive to temperature changes. It was demonstrated that proposed ultrasonic technique could be successfully used for the detection of ice layer formation on a metal surface.

Keywords: ice formation processes, ultrasonic GW, detection of ice formation, ultrasonic testing

Procedia PDF Downloads 64
268 Design and Analysis of a Rear Bumper of an Automobile with a Hybrid Polymer Composite of Oil Palm Empty Fruit Bunch Fiber/Banana Fibres

Authors: S. O. Ologe, U. P. Anaidhuno, Duru C. A.

Abstract:

This research investigated the design and analysis of a rear bumper of an automobile with a hybrid polymer composite of OPEBF/Banana fibre. OPEBF/Banana fibre hybrid polymers composite is of low cost, lightweight, as well as possesses satisfactory mechanical properties. In this research work, hybrid composites have been developed using the hand layup technique based on the percentage combination of OPEBF/Banana fibre at 10:90, 20:80, 30:70, 40:60, 50:50. 60:40, 70:30. 20:80, 90:10, 95:5. The mechanical properties in the context of compressive strength of 65MPa, a flexural strength of 20MPa, and impact strength of 3.25Joule were observed, and the simulation analysis on the induction of 500N load at the factor of safety of 3 was observed to have displayed a good strength suitable for automobile bumper with the advantages of weight reduction.

Keywords: OPEBF, Banana, fibre, hybrid

Procedia PDF Downloads 114
267 A Hybrid Model for Secure Protocol Independent Multicast Sparse Mode and Dense Mode Protocols in a Group Network

Authors: M. S. Jimah, A. C. Achuenu, M. Momodu

Abstract:

Group communications over public infrastructure are prone to a lot of security issues. Existing network protocols like Protocol Independent Multicast Sparse Mode (PIM SM) and Protocol Independent Multicast Dense Mode (PIM DM) do not have inbuilt security features. Therefore, any user or node can easily access the group communication as long as the user can send join message to the source nodes, the source node then adds the user to the network group. In this research, a hybrid method of salting and hashing to encrypt information in the source and stub node was designed, and when stub nodes need to connect, they must have the appropriate key to join the group network. Object oriented analysis design (OOAD) was the methodology used, and the result shows that no extra controlled bandwidth overhead cost was added by encrypting and the hybrid model was more securing than the existing PIM SM, PIM DM and Zhang secure PIM SM.

Keywords: group communications, multicast, PIM SM, PIM DM, encryption

Procedia PDF Downloads 162
266 Development of Thermal Insulation Materials Based on Silicate Using Non-Traditional Binders and Fillers

Authors: J. Hroudova, J. Zach, L. Vodova

Abstract:

When insulation and rehabilitation of structures is important to use quality building materials with high utility value. One potentially interesting and promising groups of construction materials in this area are advanced, thermally insulating plaster silicate based. With the present trend reduction of energy consumption of building structures and reducing CO2 emissions to be developed capillary-active materials that are characterized by their low density, low thermal conductivity while maintaining good mechanical properties. The paper describes the results of research activities aimed at the development of thermal insulating and rehabilitation material ongoing at the Technical University in Brno, Faculty of Civil Engineering. The achieved results of this development will be the basis for subsequent experimental analysis of the influence of thermal and moisture loads developed on these materials.

Keywords: insulation materials, rehabilitation materials, lightweight aggregate, fly ash, slag, hemp fibers, glass fibers, metakaolin

Procedia PDF Downloads 235
265 Buckling Analysis of Composite Shells under Compression and Torsional Loads: Numerical and Analytical Study

Authors: Güneş Aydın, Razi Kalantari Osgouei, Murat Emre Öztürk, Ahmad Partovi Meran, Ekrem Tüfekçi

Abstract:

Advanced lightweight laminated composite shells are increasingly being used in all types of modern structures, for enhancing their structural efficiency and performance. Such thin-walled structures are susceptible to buckling when subjected to various loading. This paper focuses on the buckling of cylindrical shells under axial compression and torsional loads. Effects of fiber orientation on the maximum buckling load of carbon fiber reinforced polymer (CFRP) shells are optimized. Optimum fiber angles have been calculated analytically by using MATLAB program. Numerical models have been carried out by using Finite Element Method program ABAQUS. Results from analytical and numerical analyses are also compared.

Keywords: buckling, composite, cylindrical shell, finite element, compression, torsion, MATLAB, optimization

Procedia PDF Downloads 589
264 Secure Cryptographic Operations on SIM Card for Mobile Financial Services

Authors: Kerem Ok, Serafettin Senturk, Serdar Aktas, Cem Cevikbas

Abstract:

Mobile technology is very popular nowadays and it provides a digital world where users can experience many value-added services. Service Providers are also eager to offer diverse value-added services to users such as digital identity, mobile financial services and so on. In this context, the security of data storage in smartphones and the security of communication between the smartphone and service provider are critical for the success of these services. In order to provide the required security functions, the SIM card is one acceptable alternative. Since SIM cards include a Secure Element, they are able to store sensitive data, create cryptographically secure keys, encrypt and decrypt data. In this paper, we design and implement a SIM and a smartphone framework that uses a SIM card for secure key generation, key storage, data encryption, data decryption and digital signing for mobile financial services. Our frameworks show that the SIM card can be used as a controlled Secure Element to provide required security functions for popular e-services such as mobile financial services.

Keywords: SIM card, mobile financial services, cryptography, secure data storage

Procedia PDF Downloads 312
263 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches

Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar

Abstract:

Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.

Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework

Procedia PDF Downloads 121
262 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning

Authors: Kevin Fernagut, Olivier Flauzac, Erick M. G. Robledo, Florent Nolot

Abstract:

The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-Based Virtual Machine (KVM), Linux Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.

Keywords: containerization, containers, cybersecurity, cyberattacks, isolation, performance, virtualization, virtual machines

Procedia PDF Downloads 150
261 Development and Sound Absorption and Insulation Performance Evaluation of Nonwoven Fabric Material including Paper Honeycomb Structure for Insulator Covering Shelf Trim

Authors: In-Sung Lee, Un-Hwan Park, Jun-Hyeok Heo, Dae-Gyu Park

Abstract:

Insulator Covering Shelf Trim is one of the automotive interior parts located in the rear seat of a car, and it is a component that is the most strongly demanded for impact resistance, strength, and heat resistance. Such an Insulator Covering Shelf Trim is composed of a polyethylene terephthalate (PET) nonwoven fabric which is a surface material appearing externally and a substrate layer which exerts shape and mechanical strength. In this paper, we develop a lightweight Insulator Covering Shelf Trim using the nonwoven fabric material with a high strength honeycomb structure and evaluate sound absorption and insulation performance by using acoustic impedance tubes.

Keywords: sound absorption and insulation, insulator covering shelf trim, nonwoven fabric, honeycomb

Procedia PDF Downloads 732
260 Inoculation of Aerospace Grade Mg-Al-Zn-Mn Cast Magnesium Alloy with Carbon Nanopowder

Authors: Spartak Makovskyi, Volodymir Klochykhin, Valery Zakharchenko, Konstantyn Balushok, Eduard Tsyvirko, Anatoly Shalomeyev

Abstract:

A highly efficient, cost-effective grain refinement technique for ML5 magnesium alloy with a commercially pure carbon nanopowder has been proposed. An experimental casting of testing specimens with incremental additions of a carbon nanopowder (0.001 - 0.1 wt.% ) was performed. It has been found that the carbon nanoparticle inoculation of the alloy structure is efficient in a narrow concentration range. The additions of 0.005-0.01 wt. % the grain refiner in the alloy resulted in a maximum increase of ductility properties (appr. Twofold) and improved tensile strength. However, further expansion of the grain refiner content led to the deterioration of the alloy's mechanical properties. In particular, the introduction of 0.1 wt.% of the nanocarbon and more caused internal defects in the metal. The carbon nanoparticle inoculation is a promising way of improving the properties of the Mg-Al-Zn alloys for critical lightweight aerospace applications on an industrial scale.

Keywords: carbon nanopowder, inoculation, melt, tensile strength

Procedia PDF Downloads 208
259 An Overview of Sludge Utilization into Fired Clay Brick

Authors: Aeslina Binti Abdul Kadir, Ahmad Shayuti Bin Abdul Rahim

Abstract:

Brick is one of the most common masonry units used as building material. Due to the demand, different types of waste have been investigated to be incorporated into the bricks. Many types of sludge have been incorporated in fired clay brick for example marble sludge, stone sludge, water sludge, sewage sludge, and ceramic sludge. The utilization of these waste materials in fired clay bricks usually has positive effects on the properties such as lightweight bricks with improved shrinkage, porosity, and strength. This paper reviews on utilization of different types of sludge wastes into fired clay bricks. Previous investigations have demonstrated positive effects on the physical and mechanical properties as well as less impact towards the environment. Thus, the utilizations of sludge waste could produce a good quality of brick and could be one of alternative disposal methods for the sludge wastes.

Keywords: fired clay brick, sludge waste, compressive strength, shrinkage, water absorption

Procedia PDF Downloads 447
258 Securing Healthcare IoT Devices and Enabling SIEM Integration: Addressing

Authors: Mubarak Saadu Nabunkari, Abdullahi Abdu Ibrahim, Muhammad Ilyas

Abstract:

This study looks at how Internet of Things (IoT) devices are used in healthcare to monitor and treat patients better. However, using these devices in healthcare comes with security problems. The research explores using Security Information and Event Management (SIEM) systems with healthcare IoT devices to solve these security challenges. Reviewing existing literature shows the current state of IoT security and emphasizes the need for better protection. The main worry is that healthcare IoT devices can be easily hacked, putting patient data and device functionality at risk. To address this, the research suggests a detailed security framework designed for these devices. This framework, based on literature and best practices, includes important security measures like authentication, data encryption, access controls, and anomaly detection. Adding SIEM systems to this framework helps detect threats in real time and respond quickly to incidents, making healthcare IoT devices more secure. The study highlights the importance of this integration and offers guidance for implementing healthcare IoT securely, efficiently, and effectively.

Keywords: cyber security, threat intelligence, forensics, heath care

Procedia PDF Downloads 66
257 The Influence of Fiber Fillers on the Bonding Safety of Structural Adhesives: A Fracture Analytical Evaluation

Authors: Brandtner-Hafner Martin

Abstract:

Adhesives have established themselves as an innovative joining technology in the industry. Their strengths lie in joining different materials, avoiding structural weakening as in welding or screwing, and enabling lightweight construction methods. Now there are a variety of ways to improve the efficiency and effectiveness of bonded joints. One way is to add fiber fillers. This leads to an improvement in adhesion and cohesion (structural integrity). In this study, the effectiveness of fiber-modified adhesives for bonding different construction materials is reviewed. A series of experimental tests were performed using the fracture analytical GF principle to study the adhesive bonding safety and performance of the joint. Three different structural adhesive systems based on epoxy, CA/A hybrid, and PUR were modified with different fiber materials on different substrates. The results show that significant performance improvements can be achieved and that bonding reliability can be sustainably increased.

Keywords: fiber-modified adhesives, bonding safety, GF-principle, fracture analysis

Procedia PDF Downloads 173
256 Design and Optimization of a 6 Degrees of Freedom Co-Manipulated Parallel Robot for Prostate Brachytherapy

Authors: Aziza Ben Halima, Julien Bert, Dimitris Visvikis

Abstract:

In this paper, we propose designing and evaluating a parallel co-manipulated robot dedicated to low-dose-rate prostate brachytherapy. We developed 6 degrees of freedom compact and lightweight robot easy to install in the operating room thanks to its parallel design. This robotic system provides a co-manipulation allowing the surgeon to keep control of the needle’s insertion and consequently to improve the acceptability of the plan for the clinic. The best dimension’s configuration was solved by calculating the geometric model and using an optimization approach. The aim was to ensure the whole coverage of the prostate volume and consider the allowed free space around the patient that includes the ultrasound probe. The final robot dimensions fit in a cube of 300 300 300 mm³. A prototype was 3D printed, and the robot workspace was measured experimentally. The results show that the proposed robotic system satisfies the medical application requirements and permits the needle to reach any point within the prostate.

Keywords: medical robotics, co-manipulation, prostate brachytherapy, optimization

Procedia PDF Downloads 207
255 Development and Analysis of Waste Human Hair Fiber Reinforced Composite

Authors: Tesfaye Worku

Abstract:

Human hair, chicken feathers, and hairs of other birds and animals are commonly described as waste products, and the currently available disposal methods, such as burying and burning these waste products, are contributing to environmental pollution. However, those waste products are used to develop fiber-reinforced textile composite material. In this research work, the composite was developed using human hair fiber and analysis of the mechanical and physical properties of the developed composite sample. A composite sample was made with different ratios of human hair and unsaturated polyester resin, and an analysis of the mechanical and physical properties of the developed composite sample was tested according to standards. The fabricated human hair fibers reinforced polymer matrix composite sample has given encouraging results in terms of high strength and rigidity for lightweight house ceiling board material.

Keywords: composite, human hair fiber, matrix, unsaturated polyester

Procedia PDF Downloads 69
254 Superhydrophobic, Heteroporous Flexible Ceramic for Micro-Emulsion Separation, Oil Sorption, and Recovery of Fats, Oils, and Grease from Restaurant Wastewater

Authors: Jhoanne Pedres Boñgol, Zhang Liu, Yuyin Qiu, King Lun Yeung

Abstract:

Flexible ceramic sorbent material can be a viable technology to capture and recover emulsified fats, oils, and grease (FOG) that often cause sanitary sewer overflows. This study investigates the sorption capacity and recovery rate of ceramic material in surfactant-stabilized oil-water emulsion by synthesizing silica aerogel: SiO₂–X via acid-base sol-gel method followed by ambient pressure drying. The SiO₂–X is amorphous, microstructured, lightweight, flexible, and highly oleophilic. It displays spring-back behavior apparent at 80% compression with compressive strength of 0.20 MPa and can stand a weight of 1000 times its own. The contact angles measured at 0° and 177° in oil and water, respectively, confirm its oleophilicity and hydrophobicity while its thermal stability even at 450 °C is confirmed via TGA. In pure oil phase, the qe,AV. of 1x1 mm SiO₂–X is 7.5 g g⁻¹ at tqe= 10 min, and a qe,AV. of 6.05 to 6.76 g g⁻¹ at tqe= 24 hrs in O/W emulsion. The filter ceramic can be reused 50 x with 75-80 % FOG recovery by manual compression.

Keywords: adsorption, aerogel, emulsion, FOG

Procedia PDF Downloads 157
253 Design and Modeling of Amphibious Houses for Flood Prone Areas: The Case of Nigeria

Authors: Onyebuchi Mogbo, Abdulsalam Mohammed, Salsabila Wali

Abstract:

This research discusses the design and modeling of an amphibious building. The amphibious building is a house with the function of floating during a flood event. Over the years, houses have been built to resist flood events some of which have failed. The floating house is designed to work with nature and not against it. In the event of a flood, the house will rise with the increasing water level and protect the house from sinking. For the design and modeling of this house an estimated cost of N250, 000, approximately $700, will be needed. It is expected that the house will rise when lightweight materials are incorporated in the design, and the concrete dock (in form of a hollow box) carrying the entire house in its hollow space is well designed. When there is flooding the water will fill up the concrete dock, and the house will rise upwards with vertical guides preventing it from moving side to side or out of its boundary. Architectural and Structural designs will be used in this project.

Keywords: amphibious building, flood, housing, design and modelling

Procedia PDF Downloads 182
252 VANETs: Security Challenges and Future Directions

Authors: Jared Oluoch

Abstract:

Connected vehicles are equipped with wireless sensors that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication. These vehicles will in the near future provide road safety, improve transport efficiency, and reduce traffic congestion. One of the challenges for connected vehicles is how to ensure that information sent across the network is secure. If security of the network is not guaranteed, several attacks can occur, thereby compromising the robustness, reliability, and efficiency of the network. This paper discusses existing security mechanisms and unique properties of connected vehicles. The methodology employed in this work is exploratory. The paper reviews existing security solutions for connected vehicles. More concretely, it discusses various cryptographic mechanisms available, and suggests areas of improvement. The study proposes a combination of symmetric key encryption and public key cryptography to improve security. The study further proposes message aggregation as a technique to overcome message redundancy. This paper offers a comprehensive overview of connected vehicles technology, its applications, its security mechanisms, open challenges, and potential areas of future research.

Keywords: VANET, connected vehicles, 802.11p, WAVE, DSRC, trust, security, cryptography

Procedia PDF Downloads 313
251 Deterministic Random Number Generator Algorithm for Cryptosystem Keys

Authors: Adi A. Maaita, Hamza A. A. Al Sewadi

Abstract:

One of the crucial parameters of digital cryptographic systems is the selection of the keys used and their distribution. The randomness of the keys has a strong impact on the system’s security strength being difficult to be predicted, guessed, reproduced or discovered by a cryptanalyst. Therefore, adequate key randomness generation is still sought for the benefit of stronger cryptosystems. This paper suggests an algorithm designed to generate and test pseudo random number sequences intended for cryptographic applications. This algorithm is based on mathematically manipulating a publically agreed upon information between sender and receiver over a public channel. This information is used as a seed for performing some mathematical functions in order to generate a sequence of pseudorandom numbers that will be used for encryption/decryption purposes. This manipulation involves permutations and substitutions that fulfills Shannon’s principle of “confusion and diffusion”. ASCII code characters wereutilized in the generation process instead of using bit strings initially, which adds more flexibility in testing different seed values. Finally, the obtained results would indicate sound difficulty of guessing keys by attackers.

Keywords: cryptosystems, information security agreement, key distribution, random numbers

Procedia PDF Downloads 268
250 Autonomous Position Control of an Unmanned Aerial Vehicle Based on Accelerometer Response for Indoor Navigation Using Kalman Filtering

Authors: Syed Misbahuddin, Sagufta Kapadia

Abstract:

Autonomous indoor drone navigation has been posed with various challenges, including the inability to use a Global Positioning System (GPS). As of now, Unmanned Aerial Vehicles (UAVs) either rely on 3D mapping systems or utilize external camera arrays to track the UAV in an enclosed environment. The objective of this paper is to develop an algorithm that utilizes Kalman Filtering to reduce noise, allowing the UAV to be navigated indoors using only the flight controller and an onboard companion computer. In this paper, open-source libraries are used to control the UAV, which will only use the onboard accelerometer on the flight controller to estimate the position through double integration. One of the advantages of such a system is that it allows for low-cost and lightweight UAVs to autonomously navigate indoors without advanced mapping of the environment or the use of expensive high-precision-localization sensors.

Keywords: accelerometer, indoor-navigation, Kalman-filtering, position-control

Procedia PDF Downloads 350
249 Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing

Authors: H. Parveen Begam, M. A. Maluk Mohamed

Abstract:

Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC.

Keywords: grid computing, privacy, anonymity, onion routing, ECC, RSA

Procedia PDF Downloads 398
248 Digital Image Steganography with Multilayer Security

Authors: Amar Partap Singh Pharwaha, Balkrishan Jindal

Abstract:

In this paper, a new method is developed for hiding image in a digital image with multilayer security. In the proposed method, the secret image is encrypted in the first instance using a flexible matrix based symmetric key to add first layer of security. Then another layer of security is added to the secret data by encrypting the ciphered data using Pythagorean Theorem method. The ciphered data bits (4 bits) produced after double encryption are then embedded within digital image in the spatial domain using Least Significant Bits (LSBs) substitution. To improve the image quality of the stego-image, an improved form of pixel adjustment process is proposed. To evaluate the effectiveness of the proposed method, image quality metrics including Peak Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE), entropy, correlation, mean value and Universal Image Quality Index (UIQI) are measured. It has been found experimentally that the proposed method provides higher security as well as robustness. In fact, the results of this study are quite promising.

Keywords: Pythagorean theorem, pixel adjustment, ciphered data, image hiding, least significant bit, flexible matrix

Procedia PDF Downloads 337
247 Development of Non-Structural Crushed Palm Kernel Shell Fine Aggregate Concrete

Authors: Kazeem K. Adewole, Ismail A. Yahya

Abstract:

In the published literature, Palm Kernel Shell (PKS), an agricultural waste has largely been used as a large aggregate in PKS concrete production. In this paper, the development of Crushed Palm Kernel Shell Fine Aggregate Concrete (CPKSFAC) with crushed PKS (CPKS) as the fine aggregate and granite as the coarse aggregate is presented. 100mm x 100mm x 100mm 1:11/2:3 and 1:2:4 CPKSFAC and River Sand Fine Aggregate Concrete (RSFAC) cubes were molded, cured for 28 days and subjected to a compressive strength test. The average wet densities of the 1:11/2:3 and 1:2:4 CPKSFAC cubes are 2240kg/m3 and 2335kg/m3 respectively. The average wet densities of the 1:11/2:3 and 1:2:4 RSFAC cubes are 2606kg/m3 and 2553kg/m3 respectively. The average compressive strengths of the 1:11/2:3 and 1:2:4 CPKSFAC cubes are 15.40MPa and 14.30MPa respectively. This study demonstrates that CPKSFA is suitable for the production of non-structural C8/10 and C12/15 concrete specified in BS EN 206-1:2000.

Keywords: crushed palm kernel shell, fine aggregate, lightweight concrete, non-structural concrete

Procedia PDF Downloads 426
246 Effect of Concrete Strength on the Bond Between Carbon Fiber Reinforced Polymer and Concrete in Hot Weather

Authors: Usama Mohamed Ahamed

Abstract:

This research deals with the bond behavior of carbon FRP composite wraps adhered/bonded to the surface of the concrete. Four concrete mixes were designed to achieve a concrete compressive strength of 18, 22.5,25 and 30 MP after 28 days of curing. The focus of the study is on bond degradation when the hybrid structure is exposed to hot weather conditions. Specimens were exposed to 50 0C temperature duration 6 months and other specimens were sustained in laboratory temperature ( 20-24) 0C. Upon removing the specimens from their conditioning environment, tension tests were performed in the machine using a specially manufactured concrete cube holder. A lightweight mortar layer is used to protect the bonded carbon FRP layer on the concrete surface. The results show that the higher the concrete's compressive, the higher the bond strength. The high temperature decreases the bond strength between concrete and carbon fiber-reinforced polymer. The use of a protection layer is essential for concrete exposed to hot weather.

Keywords: concrete, bond, hot weather and carbon fiber, carbon fiber reinforced polymers

Procedia PDF Downloads 108
245 Design and Optimization of a Customized External Fixation Device for Lower Limb Injuries

Authors: Mohammed S. Alqahtani, Paulo J. Bartolo

Abstract:

External fixation is a common technique for the treatment and stabilization of bone fractures. Different designs have been proposed by companies and research groups, but all of them present limitations such as high weight, not comfortable to use, and not customized to individual patients. This paper proposes a lightweight customized external fixator, overcoming some of these limitations. External fixators are designed using a set of techniques such as medical imaging, CAD modelling, finite element analysis, and full factorial design of experiments. Key design parameters are discussed, and the optimal set of parameters is used to design the final external fixator. Numerical simulations are used to validate design concepts. Results present an optimal external fixation design with weight reduction of 13% without compromising its stiffness and structural integrity. External fixators are also designed to be additively manufactured, allowing to develop a strategy for personalization.

Keywords: computer-aided design modelling, external fixation, finite element analysis, full factorial, personalization

Procedia PDF Downloads 160
244 Development of Underactuated Robot Hand Using Cross Section Deformation Spring

Authors: Naoki Saito, Daisuke Kon, Toshiyuki Sato

Abstract:

This paper describes an underactuated robot hand operated by low-power actuators. It can grasp objects of various shapes using easy operations. This hand is suitable for use as a lightweight prosthetic hand that can grasp various objects using few input channels. To realize operations using a low-power actuator, a cross section deformation spring is proposed. The design procedure of the underactuated robot finger is proposed to realize an adaptive grasping movement. The validity of this mechanism and design procedure are confirmed through an object grasping experiment. Results demonstrate the effectiveness of a cross section deformation spring in reducing the actuator power. Moreover, adaptive grasping movement is realized by an easy operation.

Keywords: robot hand, underactuated mechanism, cross-section deformation spring, prosthetic hand

Procedia PDF Downloads 372
243 Design of Reconfigurable Supernumerary Robotic Limb Based on Differential Actuated Joints

Authors: Qinghua Zhang, Yanhe Zhu, Xiang Zhao, Yeqin Yang, Hongwei Jing, Guoan Zhang, Jie Zhao

Abstract:

This paper presents a wearable reconfigurable supernumerary robotic limb with differential actuated joints, which is lightweight, compact and comfortable for the wearers. Compared to the existing supernumerary robotic limbs which mostly adopted series structure with large movement space but poor carrying capacity, a prototype with the series-parallel configuration to better adapt to different task requirements has been developed in this design. To achieve a compact structure, two kinds of cable-driven mechanical structures based on guide pulleys and differential actuated joints were designed. Moreover, two different tension devices were also designed to ensure the reliability and accuracy of the cable-driven transmission. The proposed device also employed self-designed bearings which greatly simplified the structure and reduced the cost.

Keywords: cable-driven, differential actuated joints, reconfigurable, supernumerary robotic limb

Procedia PDF Downloads 222