Search results for: secure data transmission
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 26071

Search results for: secure data transmission

25771 Characterization of Optical Communication Channels as Non-Deterministic Model

Authors: Valentina Alessandra Carvalho do Vale, Elmo Thiago Lins Cöuras Ford

Abstract:

Increasingly telecommunications sectors are adopting optical technologies, due to its ability to transmit large amounts of data over long distances. However, as in all systems of data transmission, optical communication channels suffer from undesirable and non-deterministic effects, being essential to know the same. Thus, this research allows the assessment of these effects, as well as their characterization and beneficial uses of these effects.

Keywords: optical communication, optical fiber, non-deterministic effects, telecommunication

Procedia PDF Downloads 766
25770 Association of Transmission Risk Factors Among HCV-infected Bangladeshi Patients With Different Genotypes

Authors: Nahida Sultana

Abstract:

Globally, an estimated 58 million people have chronic hepatitis C virus infection, with about 1.5 million new infections occurring per year. The hepatitis C virus is a blood-borne virus, and most infections occur through exposure to blood from unsafe injection practices, unsafe health care, unscreened blood transfusion, injection drug use, and sexual practices that lead to exposure to blood. Hepatitis C virus (HCV) causes chronic infections that mainly affect the liver leading to liver diseases. This study aimed to determine whether there is any significant association between HCV transmission risk factors in relation to genotypes in HCV-infected Bangladeshi patients. After quantification of HCV viral load, 36 samples were randomly selected for HCV genotyping and risk factor measurement. A greater proportion of genotype 1 (p > 0.05) patients (40%) underwent blood transfusion compared to patients (22.6%) with genotype 3 infections. More genotype 1 patient underwent surgery and invasive procedures (20%), and rather than those with genotype 3 patients (16.1%). The history of IDUs (25.8%) and sexual exposure (3.2%) are only prevalent in genotype 3 patients and absent in patients with genotype 1 (p >0.05). There was no significant statistical difference found in HCV transmission risk factors (blood transfusion, IDUs, Surgery& interventions, sexual transmission) between patients infected with genotypes 1 and 3. In HCV infection, genotype may have no relation to transmission risk factors among Bangladeshi patients.

Keywords: HCV genotype, alanine aminotransferase (ALT), HCV viral load, IDUs

Procedia PDF Downloads 61
25769 Minimization of Denial of Services Attacks in Vehicular Adhoc Networking by Applying Different Constraints

Authors: Amjad Khan

Abstract:

The security of Vehicular ad hoc networking is of great importance as it involves serious life threats. Thus to provide secure communication amongst Vehicles on road, the conventional security system is not enough. It is necessary to prevent the network resources from wastage and give them protection against malicious nodes so that to ensure the data bandwidth availability to the legitimate nodes of the network. This work is related to provide a non conventional security system by introducing some constraints to minimize the DoS (Denial of services) especially data and bandwidth. The data packets received by a node in the network will pass through a number of tests and if any of the test fails, the node will drop those data packets and will not forward it anymore. Also if a node claims to be the nearest node for forwarding emergency messages then the sender can effectively identify the true or false status of the claim by using these constraints. Consequently the DoS(Denial of Services) attack is minimized by the instant availability of data without wasting the network resources.

Keywords: black hole attack, grey hole attack, intransient traffic tempering, networking

Procedia PDF Downloads 261
25768 Secure Bio Semantic Computing Scheme

Authors: Hiroshi Yamaguchi, Phillip C. Y. Sheu, Ryo Fujita, Shigeo Tsujii

Abstract:

In this paper, the secure BioSemantic Scheme is presented to bridge biological/biomedical research problems and computational solutions via semantic computing. Due to the diversity of problems in various research fields, the semantic capability description language (SCDL) plays and important role as a common language and generic form for problem formalization. SCDL is expected the essential for future semantic and logical computing in Biosemantic field. We show several example to Biomedical problems in this paper. Moreover, in the coming age of cloud computing, the security problem is considered to be crucial issue and we presented a practical scheme to cope with this problem.

Keywords: biomedical applications, private information retrieval (PIR), semantic capability description language (SCDL), semantic computing

Procedia PDF Downloads 370
25767 Characterization of Thermal Images Due to Aging of H.V Glass Insulators Using Thermographic Scanning

Authors: Nasir A. Al-Geelani, Zulkurnain Abdul-Malek, M. Afendi M. Piah

Abstract:

This research paper investigation is carried out in the laboratory on single units of transmission line glass insulator characterized by different thermal images, which aimed to find out the age of the insulators. The tests were carried out on virgin and aged insulators using the thermography scan. Various samples having different periods of aging 20, 15, and 5 years from a 132 kV transmission line which have exhibited a different degree of corrosion. The second group of insulator samples was relatively mild aged insulators, while the third group was lightly aged; finally, the fourth group was the brand new insulators. The results revealed a strong correlation between the aging and the thermal images captured by the infrared camera. This technique can be used to monitor the aging of high voltage insulators as a precaution to avoid disaster.

Keywords: glass insulator, infrared camera, corona diacharge, transmission lines, thermograpy, surface discharge

Procedia PDF Downloads 130
25766 Li-Fi Technology: Data Transmission through Visible Light

Authors: Shahzad Hassan, Kamran Saeed

Abstract:

People are always in search of Wi-Fi hotspots because Internet is a major demand nowadays. But like all other technologies, there is still room for improvement in the Wi-Fi technology with regards to the speed and quality of connectivity. In order to address these aspects, Harald Haas, a professor at the University of Edinburgh, proposed what we know as the Li-Fi (Light Fidelity). Li-Fi is a new technology in the field of wireless communication to provide connectivity within a network environment. It is a two-way mode of wireless communication using light. Basically, the data is transmitted through Light Emitting Diodes which can vary the intensity of light very fast, even faster than the blink of an eye. From the research and experiments conducted so far, it can be said that Li-Fi can increase the speed and reliability of the transfer of data. This paper pays particular attention on the assessment of the performance of this technology. In other words, it is a 5G technology which uses LED as the medium of data transfer. For coverage within the buildings, Wi-Fi is good but Li-Fi can be considered favorable in situations where large amounts of data are to be transferred in areas with electromagnetic interferences. It brings a lot of data related qualities such as efficiency, security as well as large throughputs to the table of wireless communication. All in all, it can be said that Li-Fi is going to be a future phenomenon where the presence of light will mean access to the Internet as well as speedy data transfer.

Keywords: communication, LED, Li-Fi, Wi-Fi

Procedia PDF Downloads 320
25765 Substation Automation, Digitization, Cyber Risk and Chain Risk Management Reliability

Authors: Serzhan Ashirov, Dana Nour, Rafat Rob, Khaled Alotaibi

Abstract:

There has been a fast growth in the introduction and use of communications, information, monitoring, and sensing technologies. The new technologies are making their way to the Industrial Control Systems as embedded in products, software applications, IT services, or commissioned to enable integration and automation of increasingly global supply chains. As a result, the lines that separated the physical, digital, and cyber world have diminished due to the vast implementation of the new, disruptive digital technologies. The variety and increased use of these technologies introduce many cybersecurity risks affecting cyber-resilience of the supply chain, both in terms of the product or service delivered to a customer and members of the supply chain operation. US department of energy considers supply chain in the IR4 space to be the weakest link in cybersecurity. The IR4 identified the digitization of the field devices, followed by digitalization that eventually moved through the digital transformation space with little care for the new introduced cybersecurity risks. This paper will examine the best methodologies for securing the electrical substations from cybersecurity attacks due to supply chain risks, and due to digitization effort. SCADA systems are the most vulnerable part of the power system infrastructure due to digitization and due to the weakness and vulnerabilities in the supply chain security. The paper will discuss in details how create a secure supply chain methodology, secure substations, and mitigate the risks due to digitization

Keywords: cybersecurity, supply chain methodology, secure substation, digitization

Procedia PDF Downloads 43
25764 Biometric Recognition Techniques: A Survey

Authors: Shabir Ahmad Sofi, Shubham Aggarwal, Sanyam Singhal, Roohie Naaz

Abstract:

Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. Biometric recognition systems should provide a reliable personal recognition schemes to either confirm or determine the identity of an individual. These features are used to provide an authentication for computer based security systems. Applications of such a system include computer systems security, secure electronic banking, mobile phones, credit cards, secure access to buildings, health and social services. By using biometrics a person could be identified based on 'who she/he is' rather than 'what she/he has' (card, token, key) or 'what she/he knows' (password, PIN). In this paper, a brief overview of biometric methods, both unimodal and multimodal and their advantages and disadvantages, will be presented.

Keywords: biometric, DNA, fingerprint, ear, face, retina scan, gait, iris, voice recognition, unimodal biometric, multimodal biometric

Procedia PDF Downloads 734
25763 Modelling the Effect of Distancing and Wearing of Face Masks on Transmission of COVID-19 Infection Dynamics

Authors: Nurudeen Oluwasola Lasisi

Abstract:

The COVID-19 is an infection caused by coronavirus, which has been designated as a pandemic in the world. In this paper, we proposed a model to study the effect of distancing and wearing masks on the transmission of COVID-19 infection dynamics. The invariant region of the model is established. The COVID-19 free equilibrium and the reproduction number of the model were obtained. The local and global stability of the model is determined using the linearization technique method and Lyapunov method. It was found that COVID-19 free equilibrium state is locally asymptotically stable in feasible region Ω if R₀ < 1 and globally asymptomatically stable if R₀ < 1, otherwise unstable if R₀ > 1. More so, numerical analysis and simulations of the dynamics of the COVID-19 infection are presented.

Keywords: distancing, reproduction number, wearing of mask, local and global stability, modelling, transmission

Procedia PDF Downloads 115
25762 A Slip Transmission through Alpha/Beta Boundaries in a Titanium Alloy (Ti-6Al-4V)

Authors: Rayan B. M. Ameen, Ian P. Jones, Yu Lung Chiu

Abstract:

Single alpha-beta colony micro-pillars have been manufactured from a polycrystalline commercial Ti-6Al-4V sample using Focused Ion Beam (FIB). Each pillar contained two alpha lamellae separated by a thin fillet of beta phase. A nano-indenter was then used to conduct uniaxial micro-compression tests on Ti alloy single crystals, using a diamond flat tip as a compression platen. By controlling the crystal orientation along the micro-pillar using Electron back scattering diffraction (EBSD) different slip systems have been selectively activated. The advantage of the micro-compression method over conventional mechanical testing techniques is the ability to localize a single crystal volume which is characterizable after deformation. By matching the stress-strain relations resulting from micro-compression experiments to TEM (Transmission Electron Microscopy) studies of slip transmission mechanisms through the α-β interfaces, some proper constitutive material parameters such as the role of these interfaces in determining yield, strain-hardening behaviour, initial dislocation density and the critical resolved shear stress are suggested.

Keywords: α/β-Ti alloy, focused ion beam, micro-mechanical test, nano-indentation, transmission electron diffraction, plastic flow

Procedia PDF Downloads 361
25761 Awareness about HIV-Infection among HIV-Infected Individuals Attending Medical Moscow Center, Russia

Authors: Marina Nosik, Irina Rymanova, Sergei Sevostyanihin, Natalya Sergeeva, Alexander Sobkin

Abstract:

This paper presents results of the survey regarding the awareness about HIV/AIDS among HIV-infected individuals. A questionnaire covering various aspects of HIV-infection was conducted among 110 HIV-infected individuals who attended the G.A. Zaharyan Moscow Tuberculosis Clinic, Department for the treatment of TB patients with HIV. The questionnaire included questions about modes of HIV transmission and preventive measures against HIV/AIDS, as well as questions about age, gender, education, and employment status. The survey revealed that the respondents in the whole had a good knowledge regarding modes of HIV transmission and preventive measures against HIV/AIDS: about 83,6% male respondents and 85,7% female respondents gave accurate answers regarding the HIV-infection. However, the overwhelming majority of the study participants, that is, 88,5% men and 98% women, was quite ignorant about the risk of acquiring HIV through saliva and toothbrush of HIV-infected individual. Though that risk is rather insignificant, it is still biologically possible. And this gap in knowledge needs to be filled. As the study showed another point of concern was the fact, that despite the knowledge of HIV transmission risk through unprotected sex about 40% percent of HIV-positive men and 25% of HIV-positive women did not insist on using condoms with their sexual partners. These findings indicate that there are still some aspects about HIV-infection which needed to be clarified and explained through more detailed and specific educational programmes.

Keywords: AIDS, HIV transmission risks, HIV misconceptions, risk behavior

Procedia PDF Downloads 312
25760 Securing Land Rights for Food Security in Africa: An Appraisal of Links Between Smallholders’ Land Rights and the Right to Adequate Food in Ethiopia

Authors: Husen Ahmed Tura

Abstract:

There are strong links between secure land rights and food security in Africa. However, as land is owned by governments, land users do not have adequate legislative protection. This article explores normative and implementation gaps in relation to small-scale farmers’ land rights under the Ethiopia’s law. It finds that the law facilitates eviction of small-scale farmers and indigenous peoples from their land without adequate alternative means of livelihood. It argues that as access to land and other natural resources is strongly linked to the right to adequate food, Ethiopia should reform its land laws in the light of its legal obligations under international human rights law to respect, protect and fulfill the right to adequate food and ensure freedom from hunger.

Keywords: smallholder, secure land rights , food security, right to food, land grabbing, forced evictions

Procedia PDF Downloads 281
25759 Transient and Persistent Efficiency Estimation for Electric Grid Utilities Based on Meta-Frontier: Comparative Analysis of China and Japan

Authors: Bai-Chen Xie, Biao Li

Abstract:

With the deepening of international exchanges and investment, the international comparison of power grid firms has become the focus of regulatory authorities. Ignoring the differences in the economic environment, resource endowment, technology, and other aspects of different countries or regions may lead to efficiency bias. Based on the Meta-frontier model, this paper divides China and Japan into two groups by using the data of China and Japan from 2006 to 2020. While preserving the differences between the two countries, it analyzes and compares the efficiency of the transmission and distribution industries of the two countries. Combined with the four-component stochastic frontier model, the efficiency is divided into transient and persistent efficiency. We found that there are obvious differences between the transmission and distribution sectors in China and Japan. On the one hand, the inefficiency of the two countries is mostly caused by long-term and structural problems. The key to improve the efficiency of the two countries is to focus more on solving long-term and structural problems. On the other hand, the long-term and structural problems that cause the inefficiency of the two countries are not the same. Quality factors have different effects on the efficiency of the two countries, and this different effect is captured by the common frontier model but is offset in the overall model. Based on these findings, this paper proposes some targeted policy recommendations.

Keywords: transmission and distribution industries, transient efficiency, persistent efficiency, meta-frontier, international comparison

Procedia PDF Downloads 73
25758 Decode and Forward Cooperative Protocol Enhancement Using Interference Cancellation

Authors: Siddeeq Y. Ameen, Mohammed K. Yousif

Abstract:

Cooperative communication systems are considered to be a promising technology to improve the system capacity, reliability and performances over fading wireless channels. Cooperative relaying system with a single antenna will be able to reach the advantages of multiple antenna communication systems. It is ideally suitable for the distributed communication systems; the relays can cooperate and form virtual MIMO systems. Thus the paper will aim to investigate the possible enhancement of cooperated system using decode and forward protocol. On decode and forward an attempt to cancel or at least reduce the interference instead of increasing the SNR values is achieved. The latter can be achieved via the use group of relays depending on the channel status from source to relay and relay to destination respectively. In the proposed system, the transmission time has been divided into two phases to be used by decode and forward protocol. The first phase has been allocated for the source to transmit its data whereas the relays and destination nodes are in receiving mode. On the other hand, the second phase is allocated for the first and second groups of relay nodes to relay the data to the destination node. Simulations results have shown an improvement in performance is achieved compared to the conventional decode and forward in terms of BER and transmission rate.

Keywords: cooperative systems, decode and forward, interference cancellation, virtual MIMO

Procedia PDF Downloads 301
25757 The Effect of Green Power Trading Mechanism on Interregional Power Generation and Transmission in China

Authors: Yan-Shen Yang, Bai-Chen Xie

Abstract:

Background and significance of the study: Both green power trading schemes and interregional power transmission are effective ways to increase green power absorption and achieve renewable power development goals. China accelerates the construction of interregional power transmission lines and the green power market. A critical issue focusing on the close interaction between these two approaches arises, which can heavily affect the green power quota allocation and renewable power development. Existing studies have not discussed this issue adequately, so it is urgent to figure out their relationship to achieve a suitable power market design and a more reasonable power grid construction.Basic methodologies: We develop an equilibrium model of the power market in China to analyze the coupling effect of these two approaches as well as their influence on power generation and interregional transmission in China. Our model considers both the Tradable green certificate (TGC) and green power market, which consists of producers, consumers in the market, and an independent system operator (ISO) minimizing the total system cost. Our equilibrium model includes the decision optimization process of each participant. To reformulate the models presented as a single-level one, we replace the producer, consumer, ISO, and market equilibrium problems with their Karush-Kuhn-Tucker (KKT) conditions, which is further reformulated as a mixed-integer linear programming (MILP) and solved in Gurobi solver. Major findings: The result shows that: (1) the green power market can significantly promote renewable power absorption while the TGC market provides a more flexible way for green power trading. (2) The phenomena of inefficient occupation and no available transmission lines appear simultaneously. The existing interregional transmission lines cannot fully meet the demand for wind and solar PV power trading in some areas while the situation is vice versa in other areas. (3) Synchronous implementation of green power and TGC trading mechanism can benefit the development of green power as well as interregional power transmission. (4) The green power transaction exacerbates the unfair distribution of carbon emissions. The Carbon Gini Coefficient is up to 0.323 under the green power market which shows a high Carbon inequality. The eastern coastal region will benefit the most due to its huge demand for external power.

Keywords: green power market, tradable green certificate, interregional power transmission, power market equilibrium model

Procedia PDF Downloads 104
25756 Vectorial Capacity and Age Determination of Anopheles Maculipinnis S. L. (Diptera: Culicidae), in Esfahan and Chahar Mahal and Bakhtiari Provinces, Central Iran

Authors: Fariba Sepahvand, Seyed Hassan Moosa-kazemi

Abstract:

The objective was to determine the population dynamics of Anopheles maculipinnis s.l. in relation to probable malaria transmission. The study was carried out in three villages in Isfahan and charmahal bakhteari provinces of Iran, from April to March 2014. Mosquitoes were collected by Total catch, Human and Animal bait collection. An. maculipinnis play as a dominant vector with exophagic and endophilic behavior. Ovary dissection revealed four dilatations indicate at least 9% of the population can reach to the dangerous age to potentially malaria transmission. Two peaks of blood feeding were observed, 9.00-10.00 P.M, and the 12.00-00.01 A.M. The gonotrophic cycle, survival rate, life expectancy of the species was 4, 0.82 and five days, respectively. Vectorial capacity was measured as 0.028. In conclusion, moderate climatic conditions support the persistence, density and longevity of An maculipinnis s.l. could result in more significant malaria transmission.

Keywords: age determination, Anopheles maculipinnis, center of Iran, Malaria

Procedia PDF Downloads 215
25755 Elimination of Mother to Child Transmission of HIV/AIDS: A Study of the Knowledge, Attitudes and Perceptions of Healthcare Workers in Abuja Nigeria

Authors: Ezinne K. Okoro, Takahiko Katoh, Yoko Kawamura, Stanley C. Meribe

Abstract:

HIV infection in children is largely as a result of vertical transmission (mother to child transmission [MTCT]). Thus, elimination of mother to child transmission of HIV/AIDS is critical in eliminating HIV infection in children. In Nigeria, drawbacks such as; limited pediatric screening, limited human capital, insufficient advocacy and poor understanding of ART guidelines, have impacted efforts at combating the disease, even as treatment services are free. Prevention of Mother to Child Transmission (PMTCT) program relies on health workers who not only counsel pregnant women on first contact but can competently provide HIV-positive pregnant women with accurate information about the PMTCT program such as feeding techniques and drug adherence. In developing regions like Nigeria where health care delivery faces a lot of drawbacks, it becomes paramount to address these issues of poor PMTCT coverage by conducting a baseline assessment of the knowledge, practices and perceptions related to HIV prevention amongst healthcare workers in Nigeria. A descriptive cross-sectional study was conducted amongst 250 health workers currently employed in health facilities in Abuja, Nigeria where PMTCT services were offered with the capacity to carry out early infant diagnosis testing (EID). Data was collected using a self-administered, pretested, structured questionnaire. This study showed that the knowledge of PMTCT of HIV was poor (30%) among healthcare workers who offer this service day-to-day to pregnant women. When PMTCT practices were analyzed in keeping with National PMTCT guidelines, over 61% of the respondents reported observing standard practices and the majority (58%) had good attitudes towards caring for patients with HIV/AIDS. Although 61% of the respondents reported being satisfied with the quality of service being rendered, 63% reported not being satisfied with their level of knowledge. Predictors of good knowledge were job designation and level of educational attainment. Health workers who were more satisfied with their working conditions and those who had worked for a longer time in the PMTCT service were more likely to observe standard PMTCT practices. With over 62% of the healthcare workers suggesting that more training would improve the quality of service being rendered, this is a strong pointer to stakeholders to consider a ‘healthcare worker-oriented approach’ when planning and conducting PMTCT training for healthcare workers. This in turn will increase pediatric ARV coverage, the knowledge and effectiveness of the healthcare workers in carrying out appropriate PMTCT interventions and culminating in the reduction/elimination of HIV transmission to newborns.

Keywords: attitudes, HIV/AIDS, healthcare workers, knowledge, mother to child transmission, Nigeria, perceptions

Procedia PDF Downloads 180
25754 Ethically Integrating Robots to Assist Elders and Patients with Dementia

Authors: Suresh Lokiah

Abstract:

The emerging trend of integrating robots into elderly care, particularly for assisting patients with dementia, holds the potential to greatly transform the sector. Assisted living facilities, which house a significant number of elderly individuals and dementia patients, constantly strive to engage their residents in stimulating activities. However, due to staffing shortages, they often rely on volunteers to introduce new activities. Despite the availability of social interaction, these residents, frequently overlooked in society, are in desperate need of additional support. Robots designed for elder care are categorized based on their design and functionality. These categories include companion robots, telepresence robots, health monitoring robots, and rehab robots. However, the integration of such robots raises significant ethical concerns, notably regarding privacy, autonomy, and the risk of dehumanization. Privacy issues arise as these robots may need to continually monitor patient activities. There is also a risk of patients becoming overly dependent on these robots, potentially undermining their autonomy. Furthermore, the replacement of human touch with robotic interaction may lead to the dehumanization of care. This paper delves into the ethical considerations of incorporating robotic assistance in eldercare. It proposes a series of guidelines and strategies to ensure the ethical deployment of these robots. These guidelines suggest involving patients in the design and development process of the robots and emphasize the critical need for human oversight to respect the dignity and rights of the elderly and dementia patients. The paper also recommends implementing robust privacy measures, including secure data transmission and data anonymization. In conclusion, this paper offers a thorough examination of the ethical implications of using robotic assistance in elder care. It provides a strategic roadmap to ensure this technology is utilized ethically, thereby maximizing its potential benefits and minimizing any potential harm.

Keywords: human-robot interaction, robots for eldercare, ethics, health, dementia

Procedia PDF Downloads 52
25753 Application of Electro-Optical Hybrid Cables in Horizontal Well Production Logging

Authors: Daofan Guo, Dong Yang

Abstract:

For decades, well logging with coiled tubing has relied solely on surface data such as pump pressure, wellhead pressure, depth counter, and weight indicator readings. While this data serves the oil industry well, modern smart logging utilizes real-time downhole information, which automatically increases operational efficiency and optimizes intervention qualities. For example, downhole pressure, temperature, and depth measurement data can be transmitted through the electro-optical hybrid cable in the coiled tubing to surface operators on a real-time base. This paper mainly introduces the unique structural features and various applications of the electro-optical hybrid cables which were deployed into downhole with the help of coiled tubing technology. Fiber optic elements in the cable enable optical communications and distributed measurements, such as distributed temperature and acoustic sensing. The electrical elements provide continuous surface power for downhole tools, eliminating the limitations of traditional batteries, such as temperature, operating time, and safety concerns. The electrical elements also enable cable telemetry operation of cable tools. Both power supply and signal transmission were integrated into an electro-optical hybrid cable, and the downhole information can be captured by downhole electrical sensors and distributed optical sensing technologies, then travels up through an optical fiber to the surface, which greatly improves the accuracy of measurement data transmission.

Keywords: electro-optical hybrid cable, underground photoelectric composite cable, seismic cable, coiled tubing, real-time monitoring

Procedia PDF Downloads 111
25752 Nonreciprocal Optical Effects in Plasmonic Nanoparticle Aggregates

Authors: Ward Brullot, Thierry Verbiest

Abstract:

Nonreciprocal optical effects, such as Faraday rotation or magnetic circular dichroism, are very useful both for fundamental studies as for applications such as magnetic field sensors or optical isolators. In this study, we developed layer-by-layer deposited 20nm thick plasmonic nanoparticle aggregates consisting of gold, silver and magnetite nanoparticles that show broadband nonreciprocal asymmetric transmission. As such, the optical transmittance, or absorbance, depends on the direction of light propagation in the material, which means that looking from one direction or the other, more or less light passes through the sample. Theoretical analysis showed that strong electric quadrupole fields, which are electric field gradients, occur in the aggregates and that these quadrupole fields are responsible for the observed asymmetric transmission and the nonreciprocity of the effect. Apart from nonreciprocal asymmetric transmission, also other effects such as, but not limited to, optical rotation, circular dichroism or nonlinear optical responses were measured in the plasmonic nanoparticle aggregates and the influences of the intense electric quadrupole fields determined. In conclusion, the presence of strong electric quadrupole fields make the developed plasmonic nanoparticle aggregates ideal candidates for the study and application of various nonreciprocal optical effects.

Keywords: asymmetric transmission, electric quadrupoles, nanoparticle aggregates, nonreciprocity

Procedia PDF Downloads 404
25751 Potyviruses Genomic Analysis and Complete Evaluation

Authors: Narin Salehiyan, Ramin Ghasemi Shayan

Abstract:

The largest genus of plant viruses, the potyvirus, is responsible for significant crop losses. Potyviruses are aphid sent in a nonpersistent way, and some of them are likewise seed communicated. As significant microorganisms, potyviruses are substantially more examined than other plant infections having a place with different genera, and their review covers numerous parts of plant virology, like utilitarian portrayal of viral proteins, sub-atomic communication with hosts and vectors, structure, scientific classification, development, the study of disease transmission, and determination. Biotechnological utilizations of potyviruses are likewise being investigated. During this last ten years, significant advances have been made in the comprehension of the sub-atomic science of these infections and the elements of their different proteins. Potyvirus multiplication, movement, and transmission, as well as potyvirus/plant compatible interactions, including pathogenicity and symptom determinants, are updated following a general overview of the family Potyviridae and the potyviral proteins. it end the survey giving data on biotechnological uses of potyviruses.

Keywords: virology, poty, virus, genome, genetic

Procedia PDF Downloads 48
25750 Vibration Transmission across Junctions of Walls and Floors in an Apartment Building: An Experimental Investigation

Authors: Hugo Sampaio Libero, Max de Castro Magalhaes

Abstract:

The perception of sound radiated from a building floor is greatly influenced by the rooms in which it is immersed and by the position of both listener and source. The main question that remains unanswered is related to the influence of the source position on the sound power radiated by a complex wall-floor system in buildings. This research is concerned with the investigation of vibration transmission across walls and floors in buildings. It is primarily based on the determination of vibration reduction index via experimental tests. Knowledge of this parameter may help in predicting noise and vibration propagation in building components. First, the physical mechanisms involving vibration transmission across structural junctions are described. An experimental setup is performed to aid this investigation. The experimental tests have shown that the vibration generation in the walls and floors is directed related to their size and boundary conditions. It is also shown that the vibration source position can affect the overall vibration spectrum significantly. Second, the characteristics of the noise spectra inside the rooms due to an impact source (tapping machine) are also presented. Conclusions are drawn for the general trend of vibration and noise spectrum of the structural components and rooms, respectively. In summary, the aim of this paper is to investigate the vibro-acoustical behavior of building floors and walls under floor impact excitation. The impact excitation was at distinct positions on the slab. The analysis has highlighted the main physical characteristics of the vibration transmission mechanism.

Keywords: vibration transmission, vibration reduction index, impact excitation, experimental tests

Procedia PDF Downloads 72
25749 Influence of Nano-ATH on Electrical Performance of LSR for HVDC Insulation

Authors: Ju-Na Hwang, Min-Hae Park, Kee-Joe Lim

Abstract:

Many studies have been conducted on DC transmission. Of power apparatus for DC transmission, High Voltage Direct Current (HVDC) cable systems are being evaluated because of the increase in power demand and transmission distance. Therefore, dc insulation characteristics of Liquid Silicone Rubber (LSR), which has various advantages such as short curing time and the ease of maintenance, were investigated to assess its performance as a HVDC insulation material for cable joints. The electrical performance of LSR added to Nano-Aluminum Trihydrate (ATH) was confirmed by measurements of the breakdown strength and electrical conductivity. In addition, field emission scanning electron microscope (FE-SEM) was used as a means of confirmation of nano-filler dispersion state. The LSR nano-composite was prepared by compounding LSR filled nano-sized ATH filler. The DC insulation properties of LSR added to nano-sized ATH fillers were found to be superior to those of the LSR without filler.

Keywords: liquid silicone rubber, nano-composite, HVDC insulation, cable joints

Procedia PDF Downloads 438
25748 Influence of the Line Parameters in Transmission Line Fault Location

Authors: Marian Dragomir, Alin Dragomir

Abstract:

In the paper, two fault location algorithms are presented for transmission lines which use the line parameters to estimate the distance to the fault. The first algorithm uses only the measurements from one end of the line and the positive and zero sequence parameters of the line, while the second one uses the measurements from both ends of the line and only the positive sequence parameters of the line. The algorithms were tested using a transmission grid transposed in MATLAB. In a first stage it was established a fault location base line, where the algorithms mentioned above estimate the fault locations using the exact line parameters. After that, the positive and zero sequence resistance and reactance of the line were calculated again for different ground resistivity values and then the fault locations were estimated again in order to compare the results with the base line results. The results show that the algorithm which uses the zero sequence impedance of the line is the most sensitive to the line parameters modifications. The other algorithm is less sensitive to the line parameters modification.

Keywords: estimation algorithms, fault location, line parameters, simulation tool

Procedia PDF Downloads 331
25747 Various Advanced Statistical Analyses of Index Values Extracted from Outdoor Agricultural Workers Motion Data

Authors: Shinji Kawakura, Ryosuke Shibasaki

Abstract:

We have been grouping and developing various kinds of practical, promising sensing applied systems concerning agricultural advancement and technical tradition (guidance). These include advanced devices to secure real-time data related to worker motion, and we analyze by methods of various advanced statistics and human dynamics (e.g. primary component analysis, Ward system based cluster analysis, and mapping). What is more, we have been considering worker daily health and safety issues. Targeted fields are mainly common farms, meadows, and gardens. After then, we observed and discussed time-line style, changing data. And, we made some suggestions. The entire plan makes it possible to improve both the aforementioned applied systems and farms.

Keywords: advanced statistical analysis, wearable sensing system, tradition of skill, supporting for workers, detecting crisis

Procedia PDF Downloads 373
25746 Speed Ratio Control of Pulley Based V-Belt Type Continuously Variable Transmission (CVT) using Fuzzy Logic Controller

Authors: Ikbal Eski, Turan Gürgenç

Abstract:

After nearly more than a century of research and development, internal combustion engines have become almost perfect. Along with such improvement in internal combustion engines, automotive manufacturers are conducting research on design of alternative fuel vehicles. Nevertheless an ideal interim solution is to increase overall efficiency of internal combustion vehicles. A potential solution to achieve that is using continuously variable transmission system which, despite being an old idea, has recently become a hope for automotive manufacturers. CVT system, by continuously varying speed ratio, raises vehicle efficiency. In this study, fuzzy logic controller is used in speed ratio control of pulley based CVT system.

Keywords: continuously variable transmission system, variator, speed ratio, fuzzy logic

Procedia PDF Downloads 260
25745 Robust Data Image Watermarking for Data Security

Authors: Harsh Vikram Singh, Ankur Rai, Anand Mohan

Abstract:

In this paper, we propose secure and robust data hiding algorithm based on DCT by Arnold transform and chaotic sequence. The watermark image is scrambled by Arnold cat map to increases its security and then the chaotic map is used for watermark signal spread in middle band of DCT coefficients of the cover image The chaotic map can be used as pseudo-random generator for digital data hiding, to increase security and robustness .Performance evaluation for robustness and imperceptibility of proposed algorithm has been made using bit error rate (BER), normalized correlation (NC), and peak signal to noise ratio (PSNR) value for different watermark and cover images such as Lena, Girl, Tank images and gain factor .We use a binary logo image and text image as watermark. The experimental results demonstrate that the proposed algorithm achieves higher security and robustness against JPEG compression as well as other attacks such as addition of noise, low pass filtering and cropping attacks compared to other existing algorithm using DCT coefficients. Moreover, to recover watermarks in proposed algorithm, there is no need to original cover image.

Keywords: data hiding, watermarking, DCT, chaotic sequence, arnold transforms

Procedia PDF Downloads 489
25744 Household Food Insecurity, Maternal Mental Health and Self-Efficacy

Authors: Nahid Salarkia, Nasrin Omidvar, Erfan Ghassemi, Vahideh Arab-Salari, Tirang Reza Neyestani

Abstract:

Background: Household food insecurity has an adverse impact on the maternal mental health. This study was carried out to assess the relationship between household food insecurity, maternal depression and mother’s self-efficacy in Varamin, Iran, in 2014. Methods: In this cross-sectional study 423 mothers with children under 2 years old, with mean age 28.1±5.2 year; weight 66.3±13.4 kg; height 160.3± 5.7 cm and BMI 25.7±4.8 kg/m2 were selected by a multistage random sampling scheme. The instruments were: Beck Depression Inventory (BDI-III) and mother’s self-efficacy questionnaire. Data was analyzed using χ2 test, ANOVA and Pearson correlation. Results: Mildly, moderately and severely food insecure households were 39.5, 9.7 and 3.1%, respectively. Mild, moderate and sever depression was: 18.7, 13.9 and 5.7%. Mean score of depression in moderate and severe food insecure (8.6±5.3) was more than mild food insecure (4.8±4.7) and food secure (3.1±3.6) mothers. Frequency of very good, good and low mother’s self-efficacy were 62.8, 36.5, and 0.7%, respectively. Very good mother’s self-efficacy in food secure mothers (33.4%) was more than mild (25.4%) and moderate-sever food insecure groups (4%). There was a negative significant association between household food insecurity and mother’s self-efficacy (r= -0.297, p<0.01), and between mother’s depression and self-efficacy (r= -0.309, p=0.001). Conclusion: Empowerment of mothers with educational programs and social support can decrease mothers’ depression and increase self-efficacy that lead to improve maternal practices in food insecure households.

Keywords: Household food insecurity, Iran, mothers, physiological characteristics, self-efficacy

Procedia PDF Downloads 490
25743 Risks beyond Cyber in IoT Infrastructure and Services

Authors: Mattias Bergstrom

Abstract:

Significance of the Study: This research will provide new insights into the risks with digital embedded infrastructure. Through this research, we will analyze each risk and its potential negation strategies, especially for AI and autonomous automation. Moreover, the analysis that is presented in this paper will convey valuable information for future research that can create more stable, secure, and efficient autonomous systems. To learn and understand the risks, a large IoT system was envisioned, and risks with hardware, tampering, and cyberattacks were collected, researched, and evaluated to create a comprehensive understanding of the potential risks. Potential solutions have then been evaluated on an open source IoT hardware setup. This list shows the identified passive and active risks evaluated in the research. Passive Risks: (1) Hardware failures- Critical Systems relying on high rate data and data quality are growing; SCADA systems for infrastructure are good examples of such systems. (2) Hardware delivers erroneous data- Sensors break, and when they do so, they don’t always go silent; they can keep going, just that the data they deliver is garbage, and if that data is not filtered out, it becomes disruptive noise in the system. (3) Bad Hardware injection- Erroneous generated sensor data can be pumped into a system by malicious actors with the intent to create disruptive noise in critical systems. (4) Data gravity- The weight of the data collected will affect Data-Mobility. (5) Cost inhibitors- Running services that need huge centralized computing is cost inhibiting. Large complex AI can be extremely expensive to run. Active Risks: Denial of Service- It is one of the most simple attacks, where an attacker just overloads the system with bogus requests so that valid requests disappear in the noise. Malware- Malware can be anything from simple viruses to complex botnets created with specific goals, where the creator is stealing computer power and bandwidth from you to attack someone else. Ransomware- It is a kind of malware, but it is so different in its implementation that it is worth its own mention. The goal with these pieces of software is to encrypt your system so that it can only be unlocked with a key that is held for ransom. DNS spoofing- By spoofing DNS calls, valid requests and data dumps can be sent to bad destinations, where the data can be extracted for extortion or to corrupt and re-inject into a running system creating a data echo noise loop. After testing multiple potential solutions. We found that the most prominent solution to these risks was to use a Peer 2 Peer consensus algorithm over a blockchain to validate the data and behavior of the devices (sensors, storage, and computing) in the system. By the devices autonomously policing themselves for deviant behavior, all risks listed above can be negated. In conclusion, an Internet middleware that provides these features would be an easy and secure solution to any future autonomous IoT deployments. As it provides separation from the open Internet, at the same time, it is accessible over the blockchain keys.

Keywords: IoT, security, infrastructure, SCADA, blockchain, AI

Procedia PDF Downloads 78
25742 Blockchain Technology Security Evaluation: Voting System Based on Blockchain

Authors: Omid Amini

Abstract:

Nowadays, technology plays the most important role in the life of human beings because people use technology to share data and to communicate with each other, but the challenge is the security of this data. For instance, as more people turn to technology in the world, more data is generated, and more hackers try to steal or infiltrate data. In addition, the data is under the control of the central authority, which can trigger the challenge of losing information and changing information; this can create widespread anxiety for different people in different communities. In this paper, we sought to investigate Blockchain technology that can guarantee information security and eliminate the challenge of central authority access to information. Now a day, people are suffering from the current voting system. This means that the lack of transparency in the voting system is a big problem for society and the government in most countries, but blockchain technology can be the best alternative to the previous voting system methods because it removes the most important challenge for voting. According to the results, this research can be a good start to getting acquainted with this new technology, especially on the security part and familiarity with how to use a voting system based on blockchain in the world. At the end of this research, it is concluded that the use of blockchain technology can solve the major security problem and lead to a secure and transparent election.

Keywords: blockchain, technology, security, information, voting system, transparency

Procedia PDF Downloads 99