Search results for: quantum secure direct communcation practicality
4267 SA-SPKC: Secure and Efficient Aggregation Scheme for Wireless Sensor Networks Using Stateful Public Key Cryptography
Authors: Merad Boudia Omar Rafik, Feham Mohammed
Abstract:
Data aggregation in wireless sensor networks (WSNs) provides a great reduction of energy consumption. The limited resources of sensor nodes make the choice of an encryption algorithm very important for providing security for data aggregation. Asymmetric cryptography involves large ciphertexts and heavy computations but solves, on the other hand, the problem of key distribution of symmetric one. The latter provides smaller ciphertexts and speed computations. Also, the recent researches have shown that achieving the end-to-end confidentiality and the end-to-end integrity at the same is a challenging task. In this paper, we propose (SA-SPKC), a novel security protocol which addresses both security services for WSNs, and where only the base station can verify the individual data and identify the malicious node. Our scheme is based on stateful public key encryption (StPKE). The latter combines the best features of both kinds of encryption along with state in order to reduce the computation overhead. Our analysisKeywords: secure data aggregation, wireless sensor networks, elliptic curve cryptography, homomorphic encryption
Procedia PDF Downloads 2974266 Study on the Thermal Mixing of Steam and Coolant in the Hybrid Safety Injection Tank
Authors: Sung Uk Ryu, Byoung Gook Jeon, Sung-Jae Yi, Dong-Jin Euh
Abstract:
In such passive safety injection systems in the nuclear power plant as Core Makeup Tank (CMT) and Hybrid Safety Injection Tank, various thermal-hydraulic phenomena including the direct contact condensation of steam and the thermal stratification of coolant occur. These phenomena are also closely related to the performance of the system. Depending on the condensation rate of the steam injected to the tank, the injection of the coolant and pressure equalizing timings of the tank are decided. The steam injected to the tank from the upper nozzle penetrates the coolant and induces a direct contact condensation. In the present study, the direct contact condensation of steam and the thermal mixing between the steam and coolant were examined by using the Particle Image Velocimetry (PIV) technique. Especially, by altering the size of the nozzle from which the steam is injected, the influence of steam injection velocity on the thermal mixing with coolant and condensation shall be comprehended, while also investigating the influence of condensation on the pressure variation inside the tank. Even though the amounts of steam inserted were the same in three different nozzle size conditions, it was found that the velocity of pressure rise becomes lower as the steam injection area decreases. Also, as the steam injection area increases, the thickness of the zone within which the coolant’s temperature decreases. Thereby, the amount of steam condensed by the direct contact condensation also decreases. The results derived from the present study can be utilized for the detailed design of a passive safety injection system, as well as for modeling the direct contact condensation triggered by the steam jet’s penetration into the coolant.Keywords: passive safety injection systems, steam penetration, direct contact condensation, particle image velocimetry
Procedia PDF Downloads 3954265 Stress Corrosion Crack Identification with Direct Assessment Method in Pipeline Downstream from a Compressor Station
Authors: H. Gholami, M. Jalali Azizpour
Abstract:
Stress Corrosion Crack (SCC) in pipeline is a type of environmentally assisted cracking (EAC), since its discovery in 1965 as a possible cause of failure in pipeline, SCC has caused, on average, one of two failures per year in the U.S, According to the NACE SCC DA a pipe line segment is considered susceptible to SCC if all of the following factors are met: The operating stress exceeds 60% of specified minimum yield strength (SMYS), the operating temperature exceeds 38°C, the segment is less than 32 km downstream from a compressor station, the age of the pipeline is greater than 10 years and the coating type is other than Fusion Bonded Epoxy(FBE). In this paper as a practical experience in NISOC, Direct Assessment (DA) Method is used for identification SCC defect in unpiggable pipeline located downstream of compressor station.Keywords: stress corrosion crack, direct assessment, disbondment, transgranular SCC, compressor station
Procedia PDF Downloads 3864264 Direct Drive Double Fed Wind Generator
Authors: Vlado Ostovic
Abstract:
An electric machine topology characterized by single tooth winding in both stator and rotor is presented. The proposed machine is capable of operating as a direct drive double fed wind generator (DDDF, D3F) because it requires no gearbox and only a reduced-size converter. A wind turbine drive built around a D3F generator is cheaper to manufacture, requires less maintenance, and has a higher energy yield than its conventional counterparts. The single tooth wound generator of a D3F turbine has superb volume utilization and lower stator I2R losses due to its extremely short-end windings. Both stator and rotor of a D3F generator can be manufactured in segments, which simplifies its assembly and transportation to the site, and makes production cheaper.Keywords: direct drive, double fed generator, gearbox, permanent magnet generators, single tooth winding, wind power
Procedia PDF Downloads 1904263 Sediment Patterns from Fluid-Bed Interactions: A Direct Numerical Simulations Study on Fluvial Turbulent Flows
Authors: Nadim Zgheib, Sivaramakrishnan Balachandar
Abstract:
We present results on the initial formation of ripples from an initially flattened erodible bed. We use direct numerical simulations (DNS) of turbulent open channel flow over a fixed sinusoidal bed coupled with hydrodynamic stability analysis. We use the direct forcing immersed boundary method to account for the presence of the sediment bed. The resolved flow provides the bed shear stress and consequently the sediment transport rate, which is needed in the stability analysis of the Exner equation. The approach is different from traditional linear stability analysis in the sense that the phase lag between the bed topology, and the sediment flux is obtained from the DNS. We ran 11 simulations at a fixed shear Reynolds number of 180, but for different sediment bed wavelengths. The analysis allows us to sweep a large range of physical and modelling parameters to predict their effects on linear growth. The Froude number appears to be the critical controlling parameter in the early linear development of ripples, in contrast with the dominant role of particle Reynolds number during the equilibrium stage.Keywords: direct numerical simulation, immersed boundary method, sediment-bed interactions, turbulent multiphase flow, linear stability analysis
Procedia PDF Downloads 1864262 Double Encrypted Data Communication Using Cryptography and Steganography
Authors: Adine Barett, Jermel Watson, Anteneh Girma, Kacem Thabet
Abstract:
In information security, secure communication of data across networks has always been a problem at the forefront. Transfer of information across networks is susceptible to being exploited by attackers engaging in malicious activity. In this paper, we leverage steganography and cryptography to create a layered security solution to protect the information being transmitted. The first layer of security leverages crypto- graphic techniques to scramble the information so that it cannot be deciphered even if the steganography-based layer is compromised. The second layer of security relies on steganography to disguise the encrypted in- formation so that it cannot be seen. We consider three cryptographic cipher methods in the cryptography layer, namely, Playfair cipher, Blowfish cipher, and Hills cipher. Then, the encrypted message is passed through the least significant bit (LSB) to the steganography algorithm for further encryption. Both encryption approaches are combined efficiently to help secure information in transit over a network. This multi-layered encryption is a solution that will benefit cloud platforms, social media platforms and networks that regularly transfer private information such as banks and insurance companies.Keywords: cryptography, steganography, layered security, Cipher, encryption
Procedia PDF Downloads 844261 Secure Network Coding against Content Pollution Attacks in Named Data Network
Authors: Tao Feng, Xiaomei Ma, Xian Guo, Jing Wang
Abstract:
Named Data Network (NDN) is one of the future Internet architecture, all nodes (i.e., hosts, routers) are allowed to have a local cache, used to satisfy incoming requests for content. However, depending on caching allows an adversary to perform attacks that are very effective and relatively easy to implement, such as content pollution attack. In this paper, we use a method of secure network coding based on homomorphic signature system to solve this problem. Firstly ,we use a dynamic public key technique, our scheme for each generation authentication without updating the initial secret key used. Secondly, employing the homomorphism of hash function, intermediate node and destination node verify the signature of the received message. In addition, when the network topology of NDN is simple and fixed, the code coefficients in our scheme are generated in a pseudorandom number generator in each node, so the distribution of the coefficients is also avoided. In short, our scheme not only can efficiently prevent against Intra/Inter-GPAs, but also can against the content poisoning attack in NDN.Keywords: named data networking, content polloution attack, network coding signature, internet architecture
Procedia PDF Downloads 3374260 1D Klein-Gordon Equation in an Infinite Square Well with PT Symmetry Boundary Conditions
Authors: Suleiman Bashir Adamu, Lawan Sani Taura
Abstract:
We study the role of boundary conditions via -symmetric quantum mechanics, where denotes parity operator and denotes time reversal operator. Using the one-dimensional Schrödinger Hamiltonian for a free particle in an infinite square well, we introduce symmetric boundary conditions. We find solutions of the 1D Klein-Gordon equation for a free particle in an infinite square well with Hermitian boundary and symmetry boundary conditions, where in both cases the energy eigenvalues and eigenfunction, respectively, are obtained.Keywords: Eigenvalues, Eigenfunction, Hamiltonian, Klein- Gordon equation, PT-symmetric quantum mechanics
Procedia PDF Downloads 3834259 Optimization of the Culture Medium, Incubation Period, pH and Temperatures for Maximal Dye Bioremoval Using A. Fumigates
Authors: Wafaa M. Abd El-Rahim, Magda A. El-Meleigy, Eman Refaat
Abstract:
This study dealing with optimization the conditions affecting the formation of extracellular lignin- degrading enzymes to achieve maximal decolorization activity of Direct Violet dye by one fungal strain. In this study Aspergillus fumigates fungal strain used for production extracellular ligninolytic enzymes for removing Direct Violet dye under different conditions: culture medium, incubation period, pH and temperatures. The results indicted that the removal efficiency of A. fumigatus was enhanced by addition glucose and peptone to the culture medium. The addition of peptone and glucose was found to increase the decolorization activity of the fungal isolate from 51.38% to 93.74% after 4 days of incubation. The highest production of extracellular lignin degrading enzymes also recorded in Direct Violet dye medium supplemented with peptone and glucose. It was also found the decolorization activity of A. fumigatus was decreased gradually by increasing the incubation period up to 4 days. Also it was found that the fungal strain can grow and produce extracellular ligninolytic enzymes which accompanied by efficient removal of Direct Violet dye in a wide pH range of 4-8. The results also found that the maximal biosynthesis of ligninolytic enzymes which accompanied with maximal removal of Direct Violet dye was obtained at a temperature of 28C. This indicates that the different conditions of culture medium, incubation period, pH and temperatures are effective on dye decolorization on the fungal biomass and played a role in Direct Violet dye removal along with enzymatic activity of A. fumigatus.Keywords: A. fumigates, extracellular lignin- degrading enzymes, textile dye, dye removing
Procedia PDF Downloads 2784258 The Relationship among Attachment Styles, Humor Styles and Communication Patterns in Female Married Students
Authors: Elham Fathi, Seyed Mohammad Kalantarkousheh, Abolfazl Hatami Varzane
Abstract:
The present study aimed to determine predict capacity of the relationship among attachment styles, humor styles and communication patterns in female married students. Statistical population consisted of female married students from Allameh Tabataba’i University. The research sample consisted of 104 married students selected through convenience sampling. They responded to study instruments that consisted of attachment styles, humor styles and Communication patterns questionnaires. Data was analyzed by means of correlation method. The results indicated significant positive relationship between secure attachment styles with adaptive humor styles, and anxious attachment styles with maladaptive humor styles. Also a negative relationship between avoidant attachment with affiliative humor, and anxious attachment with self-enhancing humor was found. Furthermore, a negative relationship between self- enhancing humor styles with demand – withdraw communication pattern, and between affiliative humor with mutual avoidant communication pattern and a positive relationship between affiliative humor with mutual constructive communication pattern was observed. The relationship between secure attachment with mutual constructive communication pattern was positive, while relationship between avoidant attachment to mutual constructive communication pattern was negative and significant and its relation with mutual avoidant communication pattern was significantly positive. The result of regression analysis indicated that affliative humor style and secure attachment style, positively predicted mutual constructive communication pattern. Avoidant attachment style positively and affliative humor style negatively predicted the mutual avoidant communication pattern. And self-enhancing humor style negatively predicted the demand – withdraw communication pattern style.Keywords: attachment styles, communication patterns, humor styles, female married students
Procedia PDF Downloads 3734257 Multimodal Direct Neural Network Positron Emission Tomography Reconstruction
Authors: William Whiteley, Jens Gregor
Abstract:
In recent developments of direct neural network based positron emission tomography (PET) reconstruction, two prominent architectures have emerged for converting measurement data into images: 1) networks that contain fully-connected layers; and 2) networks that primarily use a convolutional encoder-decoder architecture. In this paper, we present a multi-modal direct PET reconstruction method called MDPET, which is a hybrid approach that combines the advantages of both types of networks. MDPET processes raw data in the form of sinograms and histo-images in concert with attenuation maps to produce high quality multi-slice PET images (e.g., 8x440x440). MDPET is trained on a large whole-body patient data set and evaluated both quantitatively and qualitatively against target images reconstructed with the standard PET reconstruction benchmark of iterative ordered subsets expectation maximization. The results show that MDPET outperforms the best previously published direct neural network methods in measures of bias, signal-to-noise ratio, mean absolute error, and structural similarity.Keywords: deep learning, image reconstruction, machine learning, neural network, positron emission tomography
Procedia PDF Downloads 1104256 An Evolutionary Approach for QAOA for Max-Cut
Authors: Francesca Schiavello
Abstract:
This work aims to create a hybrid algorithm, combining Quantum Approximate Optimization Algorithm (QAOA) with an Evolutionary Algorithm (EA) in the place of traditional gradient based optimization processes. QAOA’s were first introduced in 2014, where, at the time, their algorithm performed better than the traditional best known classical algorithm for Max-cut graphs. Whilst classical algorithms have improved since then and have returned to being faster and more efficient, this was a huge milestone for quantum computing, and their work is often used as a benchmarking tool and a foundational tool to explore variants of QAOA’s. This, alongside with other famous algorithms like Grover’s or Shor’s, highlights to the world the potential that quantum computing holds. It also presents the reality of a real quantum advantage where, if the hardware continues to improve, this could constitute a revolutionary era. Given that the hardware is not there yet, many scientists are working on the software side of things in the hopes of future progress. Some of the major limitations holding back quantum computing are the quality of qubits and the noisy interference they generate in creating solutions, the barren plateaus that effectively hinder the optimization search in the latent space, and the availability of number of qubits limiting the scale of the problem that can be solved. These three issues are intertwined and are part of the motivation for using EAs in this work. Firstly, EAs are not based on gradient or linear optimization methods for the search in the latent space, and because of their freedom from gradients, they should suffer less from barren plateaus. Secondly, given that this algorithm performs a search in the solution space through a population of solutions, it can also be parallelized to speed up the search and optimization problem. The evaluation of the cost function, like in many other algorithms, is notoriously slow, and the ability to parallelize it can drastically improve the competitiveness of QAOA’s with respect to purely classical algorithms. Thirdly, because of the nature and structure of EA’s, solutions can be carried forward in time, making them more robust to noise and uncertainty. Preliminary results show that the EA algorithm attached to QAOA can perform on par with the traditional QAOA with a Cobyla optimizer, which is a linear based method, and in some instances, it can even create a better Max-Cut. Whilst the final objective of the work is to create an algorithm that can consistently beat the original QAOA, or its variants, due to either speedups or quality of the solution, this initial result is promising and show the potential of EAs in this field. Further tests need to be performed on an array of different graphs with the parallelization aspect of the work commencing in October 2023 and tests on real hardware scheduled for early 2024.Keywords: evolutionary algorithm, max cut, parallel simulation, quantum optimization
Procedia PDF Downloads 604255 D-Wave Quantum Computing Ising Model: A Case Study for Forecasting of Heat Waves
Authors: Dmytro Zubov, Francesco Volponi
Abstract:
In this paper, D-Wave quantum computing Ising model is used for the forecasting of positive extremes of daily mean air temperature. Forecast models are designed with two to five qubits, which represent 2-, 3-, 4-, and 5-day historical data respectively. Ising model’s real-valued weights and dimensionless coefficients are calculated using daily mean air temperatures from 119 places around the world, as well as sea level (Aburatsu, Japan). In comparison with current methods, this approach is better suited to predict heat wave values because it does not require the estimation of a probability distribution from scarce observations. Proposed forecast quantum computing algorithm is simulated based on traditional computer architecture and combinatorial optimization of Ising model parameters for the Ronald Reagan Washington National Airport dataset with 1-day lead-time on learning sample (1975-2010 yr). Analysis of the forecast accuracy (ratio of successful predictions to total number of predictions) on the validation sample (2011-2014 yr) shows that Ising model with three qubits has 100 % accuracy, which is quite significant as compared to other methods. However, number of identified heat waves is small (only one out of nineteen in this case). Other models with 2, 4, and 5 qubits have 20 %, 3.8 %, and 3.8 % accuracy respectively. Presented three-qubit forecast model is applied for prediction of heat waves at other five locations: Aurel Vlaicu, Romania – accuracy is 28.6 %; Bratislava, Slovakia – accuracy is 21.7 %; Brussels, Belgium – accuracy is 33.3 %; Sofia, Bulgaria – accuracy is 50 %; Akhisar, Turkey – accuracy is 21.4 %. These predictions are not ideal, but not zeros. They can be used independently or together with other predictions generated by different method(s). The loss of human life, as well as environmental, economic, and material damage, from extreme air temperatures could be reduced if some of heat waves are predicted. Even a small success rate implies a large socio-economic benefit.Keywords: heat wave, D-wave, forecast, Ising model, quantum computing
Procedia PDF Downloads 4974254 Meet Automotive Software Safety and Security Standards Expectations More Quickly
Authors: Jean-François Pouilly
Abstract:
This study addresses the growing complexity of embedded systems and the critical need for secure, reliable software. Traditional cybersecurity testing methods, often conducted late in the development cycle, struggle to keep pace. This talk explores how formal methods, integrated with advanced analysis tools, empower C/C++ developers to 1) Proactively address vulnerabilities and bugs, which includes formal methods and abstract interpretation techniques to identify potential weaknesses early in the development process, reducing the reliance on penetration and fuzz testing in later stages. 2) Streamline development by focusing on bugs that matter, with close to no false positives and catching flaws earlier, the need for rework and retesting is minimized, leading to faster development cycles, improved efficiency and cost savings. 3) Enhance software dependability which includes combining static analysis using abstract interpretation with full context sensitivity, with hardware memory awareness allows for a more comprehensive understanding of potential vulnerabilities, leading to more dependable and secure software. This approach aligns with industry best practices (ISO2626 or ISO 21434) and empowers C/C++ developers to deliver robust, secure embedded systems that meet the demands of today's and tomorrow's applications. We will illustrate this approach with the TrustInSoft analyzer to show how it accelerates verification for complex cases, reduces user fatigue, and improves developer efficiency, cost-effectiveness, and software cybersecurity. In summary, integrating formal methods and sound Analyzers enhances software reliability and cybersecurity, streamlining development in an increasingly complex environment.Keywords: safety, cybersecurity, ISO26262, ISO24434, formal methods
Procedia PDF Downloads 194253 The Relationship between Military Expenditure, Military Personnel, Economic Growth, and the Environment
Authors: El Harbi Sana, Ben Afia Neila
Abstract:
In this paper, we study the relationship between the military effort and pollution. A distinction is drawn between the direct and indirect impact of the military effort (military expenditure and military personnel) on pollution, which operates through the impact of military effort on per capita income and the resultant impact of income on pollution. Using the data of 121 countries covering the period 1980–2011, both the direct and indirect impacts of military effort on air pollution emissions are estimated. Our results show that the military effort is estimated to have a positive direct impact on per capita emissions. Indirect effects are found to be positive, the total effect of military effort on emissions is positive for all countries.Keywords: military endeavor, income, emissions of CO2, panel data
Procedia PDF Downloads 3444252 An Efficient and Provably Secure Three-Factor Authentication Scheme with Key Agreement
Authors: Mohan Ramasundaram, Amutha Prabakar Muniyandi
Abstract:
Remote user authentication is one of the important tasks for any kind of remote server applications. Several remote authentication schemes are proposed by the researcher for Telecare Medicine Information System (TMIS). Most of the existing techniques have limitations, vulnerable to various kind attacks, lack of functionalities, information leakage, no perfect forward security and ineffectiveness. Authentication is a process of user verification mechanism for allows him to access the resources of a server. Nowadays, most of the remote authentication protocols are using two-factor authentications. We have made a survey of several remote authentication schemes using three factors and this survey shows that the most of the schemes are inefficient and subject to several attacks. We observed from the experimental evaluation; the proposed scheme is very secure against various known attacks that include replay attack, man-in-the-middle attack. Furthermore, the analysis based on the communication cost and computational cost estimation of the proposed scheme with related schemes shows that our proposed scheme is efficient.Keywords: Telecare Medicine Information System, elliptic curve cryptography, three-factor, biometric, random oracle
Procedia PDF Downloads 2194251 Thermal Assessment of Outer Rotor Direct Drive Gearless Small-Scale Wind Turbines
Authors: Yusuf Yasa, Erkan Mese
Abstract:
This paper investigates the thermal issue of permanent magnet synchronous generator which is frequently used in direct drive gearless small-scale wind turbine applications. Permanent magnet synchronous generator (PMSG) is designed with 2.5 kW continuous and 6 kW peak power. Then considering generator geometry, mechanical design of wind turbine is performed. Thermal analysis and optimization is carried out considering all wind turbine components to reach realistic results. These issue is extremely important in research and development(R&D) process for wind turbine applications.Keywords: direct drive, gearless wind turbine, permanent magnet synchronous generator (PMSG), small-scale wind turbine, thermal management
Procedia PDF Downloads 6964250 A User Interface for Easiest Way Image Encryption with Chaos
Authors: D. López-Mancilla, J. M. Roblero-Villa
Abstract:
Since 1990, the research on chaotic dynamics has received considerable attention, particularly in light of potential applications of this phenomenon in secure communications. Data encryption using chaotic systems was reported in the 90's as a new approach for signal encoding that differs from the conventional methods that use numerical algorithms as the encryption key. The algorithms for image encryption have received a lot of attention because of the need to find security on image transmission in real time over the internet and wireless networks. Known algorithms for image encryption, like the standard of data encryption (DES), have the drawback of low level of efficiency when the image is large. The encrypting based on chaos proposes a new and efficient way to get a fast and highly secure image encryption. In this work, a user interface for image encryption and a novel and easiest way to encrypt images using chaos are presented. The main idea is to reshape any image into a n-dimensional vector and combine it with vector extracted from a chaotic system, in such a way that the vector image can be hidden within the chaotic vector. Once this is done, an array is formed with the original dimensions of the image and turns again. An analysis of the security of encryption from the images using statistical analysis is made and is used a stage of optimization for image encryption security and, at the same time, the image can be accurately recovered. The user interface uses the algorithms designed for the encryption of images, allowing you to read an image from the hard drive or another external device. The user interface, encrypt the image allowing three modes of encryption. These modes are given by three different chaotic systems that the user can choose. Once encrypted image, is possible to observe the safety analysis and save it on the hard disk. The main results of this study show that this simple method of encryption, using the optimization stage, allows an encryption security, competitive with complicated encryption methods used in other works. In addition, the user interface allows encrypting image with chaos, and to submit it through any public communication channel, including internet.Keywords: image encryption, chaos, secure communications, user interface
Procedia PDF Downloads 4894249 Analysis the Different Types of Nano Sensors on Based of Structure and It’s Applications on Nano Electronics
Authors: Hefzollah Mohammadiyan, Mohammad Bagher Heidari, Ensiyeh Hajeb
Abstract:
In this paper investigates and analyses the structure of nano sensors will be discussed. The structure can be classified based of nano sensors: quantum points, carbon nanotubes and nano tools, which details into each other and in turn are analyzed. Then will be fully examined to the Carbon nanotubes as chemical and mechanical sensors. The following discussion, be examined compares the advantages and disadvantages as different types of sensors and also it has feature and a wide range of applications in various industries. Finally, the structure and application of Chemical sensor transistors and the sensors will be discussed in air pollution control.Keywords: carbon nanotubes, quantum points, chemical sensors, mechanical sensors, chemical sensor transistors, single walled nanotube (SWNT), atomic force microscope (AFM)
Procedia PDF Downloads 4504248 Linearly Polarized Single Photon Emission from Nonpolar, Semipolar and Polar Quantum Dots in GaN/InGaN Nanowires
Authors: Snezana Lazic, Zarko Gacevic, Mark Holmes, Ekaterina Chernysheva, Marcus Müller, Peter Veit, Frank Bertram, Juergen Christen, Yasuhiko Arakawa, Enrique Calleja
Abstract:
The study reports how the pencil-like morphology of a homoepitaxially grown GaN nanowire can be exploited for the fabrication of a thin conformal InGaN nanoshell, hosting nonpolar, semipolar and polar single photon sources (SPSs). All three SPS types exhibit narrow emission lines (FWHM~0.35 - 2 meV) and high degrees of linear optical polarization (P > 70%) in the low-temperature micro-photoluminescence (µ-PL) experiments and are characterized by a pronounced antibunching in the photon correlation measurements (gcorrected(2)(0) < 0.3). The quantum-dot-like exciton localization centers induced by compositional fluctuations within the InGaN nanoshell are identified as the driving mechanism for the single photon emission. As confirmed by the low-temperature transmission electron microscopy combined with cathodoluminescence (TEM-CL) study, the crystal region (i.e. non-polar m-, semi-polar r- and polar c-facets) hosting the single photon emitters strongly affects their emission wavelength, which ranges from ultra-violet for the non-polar to visible for the polar SPSs. The photon emission lifetime is also found to be facet-dependent and varies from sub-nanosecond time scales for the non- and semi-polar SPSs to a few nanoseconds for the polar ones. These differences are mainly attributed to facet-dependent indium content and electric field distribution across the hosting InGaN nanoshell. The hereby reported pencil-like InGaN nanoshell is the first single nanostructure able to host all three types of single photon emitters and is thus a promising building block for tunable quantum light devices integrated into future photonic and optoelectronic circuits.Keywords: GaN nanowire, InGaN nanoshell, linear polarization, nonpolar, semipolar, polar quantum dots, single-photon sources
Procedia PDF Downloads 3924247 Tunneling Current Switching in the Coupled Quantum Dots by Means of External Field
Authors: Vladimir Mantsevich, Natalya Maslova, Petr Arseyev
Abstract:
We investigated the tunneling current peculiarities in the system of two coupled by means of the external field quantum dots (QDs) weakly connected to the electrodes in the presence of Coulomb correlations between localized electrons by means of Heisenberg equations for pseudo operators with constraint. Special role of multi-electronic states was demonstrated. Various single-electron levels location relative to the sample Fermi level and to the applied bias value in symmetric tunneling contact were investigated. Rabi frequency tuning results in the single-electron energy levels spacing. We revealed the appearance of negative tunneling conductivity and demonstrated multiple switching "on" and "off" of the tunneling current depending on the Coulomb correlations value, Rabi frequency amplitude and energy levels spacing. We proved that Coulomb correlations strongly influence the system behavior. We demonstrated the presence of multi-stability in the coupled QDs with Coulomb correlations when single value of the tunneling current amplitude corresponds to the two values of Rabi frequency in the case when both single-electron energy levels are located slightly above eV and are close to each other. This effect disappears when the single-electron energy levels spacing increases.Keywords: Coulomb correlations, negative tunneling conductivity, quantum dots, rabi frequency
Procedia PDF Downloads 4514246 Coupled Exciton - Surface Plasmon Polariton Enhanced Photoresponse of Two-Dimensional Hydrogenated Honeycomb Silicon Boride
Authors: Farzaneh Shayeganfar, Ali Ramazani
Abstract:
Exciton (strong electronic interaction of electron-hole) and hot carriers created by surface plasmon polaritons has been demonstrated in nanoscale optoelectronic devices, enhancing the photoresponse of the system. Herein, we employ a quantum framework to consider coupled exciton- hot carriers effects on photovoltaiv energy distribution, scattering process, polarizability and light emission of 2D-semicnductor. We use density functional theory (DFT) to design computationally a semi-functionalized 2D honeycomb silicon boride (SiB) monolayer with H atoms, suitable for photovoltaics. The dynamical stability, electronic and optical properties of SiB and semi-hydrogenated SiB structures were investigated utilizing the Tran-Blaha modified Becke-Johnson (TB-mBJ) potential. The calculated phonon dispersion shows that while an unhydrogenated SiB monolayer is dynamically unstable, surface semi-hydrogenation improves the stability of the structure and leads to a transition from metallic to semiconducting conductivity with a direct band gap of about 1.57 eV, appropriate for photovoltaic applications. The optical conductivity of this H-SiB structure, determined using the random phase approximation (RPA), shows that light adsorption should begin at the boundary of the visible range of light. Additionally, due to hydrogenation, the reflectivity spectrum declines sharply with respect to the unhydrogenated reflectivity spectrum in the IR and visible ranges of light. The energy band gap remains direct, increasing from 0.9 to 1.8 eV, upon increasing the strain from -6% (compressive) to +6% (tensile). Additionally, compressive and tensile strains lead, respectively, to red and blue shifts of optical the conductivity threshold around the visible range of light. Overall, this study suggests that H-SiB monolayers are suitable as two-dimensional solar cell materials.Keywords: surface plasmon, hot carrier, strain engineering, valley polariton
Procedia PDF Downloads 1094245 Image Encryption Using Eureqa to Generate an Automated Mathematical Key
Authors: Halima Adel Halim Shnishah, David Mulvaney
Abstract:
Applying traditional symmetric cryptography algorithms while computing encryption and decryption provides immunity to secret keys against different attacks. One of the popular techniques generating automated secret keys is evolutionary computing by using Eureqa API tool, which got attention in 2013. In this paper, we are generating automated secret keys for image encryption and decryption using Eureqa API (tool which is used in evolutionary computing technique). Eureqa API models pseudo-random input data obtained from a suitable source to generate secret keys. The validation of generated secret keys is investigated by performing various statistical tests (histogram, chi-square, correlation of two adjacent pixels, correlation between original and encrypted images, entropy and key sensitivity). Experimental results obtained from methods including histogram analysis, correlation coefficient, entropy and key sensitivity, show that the proposed image encryption algorithms are secure and reliable, with the potential to be adapted for secure image communication applications.Keywords: image encryption algorithms, Eureqa, statistical measurements, automated key generation
Procedia PDF Downloads 4824244 Determination of Direct Solar Radiation Using Atmospheric Physics Models
Authors: Pattra Pukdeekiat, Siriluk Ruangrungrote
Abstract:
This work was originated to precisely determine direct solar radiation by using atmospheric physics models since the accurate prediction of solar radiation is necessary and useful for solar energy applications including atmospheric research. The possible models and techniques for a calculation of regional direct solar radiation were challenging and compulsory for the case of unavailable instrumental measurement. The investigation was mathematically governed by six astronomical parameters i.e. declination (δ), hour angle (ω), solar time, solar zenith angle (θz), extraterrestrial radiation (Iso) and eccentricity (E0) along with two atmospheric parameters i.e. air mass (mr) and dew point temperature at Bangna meteorological station (13.67° N, 100.61° E) in Bangkok, Thailand. Analyses of five models of solar radiation determination with the assumption of clear sky were applied accompanied by three statistical tests: Mean Bias Difference (MBD), Root Mean Square Difference (RMSD) and Coefficient of determination (R2) in order to validate the accuracy of obtainable results. The calculated direct solar radiation was in a range of 491-505 Watt/m2 with relative percentage error 8.41% for winter and 532-540 Watt/m2 with relative percentage error 4.89% for summer 2014. Additionally, dataset of seven continuous days, representing both seasons were considered with the MBD, RMSD and R2 of -0.08, 0.25, 0.86 and -0.14, 0.35, 3.29, respectively, which belong to Kumar model for winter and CSR model for summer. In summary, the determination of direct solar radiation based on atmospheric models and empirical equations could advantageously provide immediate and reliable values of the solar components for any site in the region without a constraint of actual measurement.Keywords: atmospheric physics models, astronomical parameters, atmospheric parameters, clear sky condition
Procedia PDF Downloads 4094243 English Learning Strategy and Proficiency Level of the First Year Students, International College, Suan Sunandha Rajabhat University
Authors: Kanokrat Kunasaraphan
Abstract:
The purpose of the study was to identify whether English language learning strategies commonly used by the first year students at International College, Suan Sunandha Rajabhat University include six direct and indirect strategies. The study served to explore whether there was a difference in these students’ use of six direct and indirect English learning strategies between the different levels of their English proficiency. The questionnaire used as a research instrument was comprised of two parts: General information of participants and the Strategy Inventory for Language Learning (SILL). The researcher employed descriptive statistics and one-way ANOVA (F-test) to analyze the data. The results of the analysis revealed that English learning strategies commonly used by the first year students include six direct and indirect strategies, including differences in strategy use of the students with different levels of English proficiency. Recommendations for future research include the study of language learning strategy use with other research methods focusing on other languages, specific language skills, and/or the relationship of language learning strategy use and other factors in other programs and/or institutions.Keywords: English learning strategies, direct strategies, indirect strategies, proficiency level
Procedia PDF Downloads 3034242 Impact of Health Indicators on Economic Growth: Application of Ardl Model on Pakistan’s Data Set
Authors: Sheraz Ahmad Choudhary
Abstract:
Health plays a vital role in the growth. The study examined the effect of health indicator on the growth of Pakistan. ARDL model is used to check the growth rate which is affected by the health by using the time series date of Pakistan from 1990 to 2017. Health indicator, fertility rate, life expectancy, foreign direct investment, and infant mortality rate are variables Where the unit root is applied to check the stationarity of the model. consequences find a significant relationship between GDP, foreign direct investment, fertility rate, and life expectancy in the short run, whereas mortality rate effected negatively to economic growth but have significant values. In the long run, foreign direct investment (FDI) and fertility rate(FR) have significantly influenced the GDP. The results show thateconomic growth is positively stimulated by most of the health indicators. The study accomplishes that nations can achieve a high level of economic growth by increasing wellbeing human capital.Keywords: economic growth, health expenditures, fertility rate, human capital, life expectancy, foreign direct investment, and infant mortality rate
Procedia PDF Downloads 1294241 A Framework for Blockchain Vulnerability Detection and Cybersecurity Education
Authors: Hongmei Chi
Abstract:
The Blockchain has become a necessity for many different societal industries and ordinary lives including cryptocurrency technology, supply chain, health care, public safety, education, etc. Therefore, training our future blockchain developers to know blockchain programming vulnerability and I.T. students' cyber security is in high demand. In this work, we propose a framework including learning modules and hands-on labs to guide future I.T. professionals towards developing secure blockchain programming habits and mitigating source code vulnerabilities at the early stages of the software development lifecycle following the concept of Secure Software Development Life Cycle (SSDLC). In this research, our goal is to make blockchain programmers and I.T. students aware of the vulnerabilities of blockchains. In summary, we develop a framework that will (1) improve students' skills and awareness of blockchain source code vulnerabilities, detection tools, and mitigation techniques (2) integrate concepts of blockchain vulnerabilities for IT students, (3) improve future IT workers’ ability to master the concepts of blockchain attacks.Keywords: software vulnerability detection, hands-on lab, static analysis tools, vulnerabilities, blockchain, active learning
Procedia PDF Downloads 994240 The Differences between Direct Examination and ELISA Test during the Diagnosis of Fasciolosis in Jaundiced Slaughtered Sheep in Iraq
Authors: Azad A. Meerkhan, Alaa Hani Razak, Bayan M. S. Younis
Abstract:
The efficiency of enzyme-linked immunosorbent assay (ELISA) in sheep infected with Fasciola hepatica was studied. 232 jaundiced sheep among 5208 sheep slaughter in the Duhok abattoir (regardless of the age and gender) between the period of May. 2012 to Oct. 2012 were examined by direct examination (Searching of adult flukes in the bile duct) and by Enzyme-linked immunosorbent assay (ELISA) to detect the prevalence of fascioliasis in the studied population which showed a high observed infection ratio in Sep. 2012 (12.2%) with the high (ELISA) result of infection in May. 2012 (25.36%). Significant differences were found between the two ways in all of the months with the highest difference in May. 2012 and the net deference between the both ways was 6.91%.Keywords: fascioliasis, Fasciola hepatica, layers, liver fluk, ELISA, direct examination
Procedia PDF Downloads 3224239 Secure Distance Bounding Protocol on Ultra-WideBand Based Mapping Code
Authors: Jamel Miri, Bechir Nsiri, Ridha Bouallegue
Abstract:
Ultra WidBand-IR physical layer technology has seen a great development during the last decade which makes it a promising candidate for short range wireless communications, as they bring considerable benefits in terms of connectivity and mobility. However, like all wireless communication they suffer from vulnerabilities in terms of security because of the open nature of the radio channel. To face these attacks, distance bounding protocols are the most popular counter measures. In this paper, we presented a protocol based on distance bounding to thread the most popular attacks: Distance Fraud, Mafia Fraud and Terrorist fraud. In our work, we study the way to adapt the best secure distance bounding protocols to mapping code of ultra-wideband (TH-UWB) radios. Indeed, to ameliorate the performances of the protocol in terms of security communication in TH-UWB, we combine the modified protocol to ultra-wideband impulse radio technology (IR-UWB). The security and the different merits of the protocols are analyzed.Keywords: distance bounding, mapping code ultrawideband, terrorist fraud, physical layer technology
Procedia PDF Downloads 2994238 Creating a New Agenda for Foreign Direct Investment: Intersectoral Competition and Knowledge Management Issues in Trinidad and Tobago's Construction Industry
Authors: Shelly-Ann Gajadhar
Abstract:
Over the last twenty years, the traditional economic motivations of foreign direct investment have been amalgamated with geopolitical motivations. This is evidenced by the extensive ratification of bilateral investment treaties (BIT) globally and the emergence of state-owned multinational companies (SOMNCs) that directly compete with local domestic enterprises (LDE). This paper investigates the impact that Chinese SOMNCs have on LDEs within Trinidad and Tobago’s construction sector and, determines whether knowledge transfer occurs. The paper employed semi-structured interviews of industry experts and concluded that LDEs predominantly experience adverse spillovers, inclusive of a long-term competition effect, with no technology transfer occurring.Keywords: foreign direct investment, bilateral investment treaties, knowledge transfer, international business, Caribbean
Procedia PDF Downloads 252