Search results for: bomb blast attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 814

Search results for: bomb blast attacks

424 Aerodynamic Effects of Ice and Its Influences on Flight Characteristics of Low Speed Unmanned Aerial Vehicles

Authors: I. McAndrew, K. L. Witcher, E. Navarro

Abstract:

This paper presents the theory and application of low-speed flight for unmanned aerial vehicles when subjected to surface environmental conditions such as ice on the leading edge and upper surface. A model was developed and tested in a wind tunnel to see how theory compares with practice at various speed including take-off, landing and operational applications where head winds substantially alter parameters. Furthermore, a comparison is drawn with maned operations and how that this subject is currently under-supported with accurate theory or knowledge for designers or operators to make informed decision or accommodate individual applications. The effects of ice formation for lift and drag are determined for a range of different angles of attacks.

Keywords: aerodynamics, environmental influences, glide path ratio, unmanned vehicles

Procedia PDF Downloads 318
423 Training as a Service for Electronic Warfare

Authors: Toan Vo

Abstract:

Electronic attacks, illegal drones, interference, and jamming are no longer capabilities reserved for a state-sponsored, near-peer adversary. The proliferation of jammers on auction websites has lowered the price of entry for electronics hobbyists and nefarious actors. To enable local authorities and enforcement bodies to keep up with these challenges, this paper proposes a training as a service model to quickly and economically train and equip police departments and local law enforcement agencies. Using the U.S Department of Defense’s investment in Electronic Warfare as a guideline, a large number of personnel can be trained on effective spectrum monitoring techniques using commercial equipment readily available on the market. Finally, this paper will examine the economic benefits to the test and measurement industry if the TaaS model is applied.

Keywords: training, electronic warfare, economics, law enforcement

Procedia PDF Downloads 89
422 Thermal Interruption Performance of High Voltage Gas Circuit Breaker Operating with CO₂ Mixtures

Authors: Yacine Babou, Nitesh Ranjan, Branimir Radisavljevic , Martin Seeger, Daniel Over, Torsten Votteler, Bernardo Galletti, Paulo Cristini

Abstract:

In the frame of replacement of Sulfur hexafluoride (SF6) gas as insulating and switching medium, diverse alternative gases, offering acceptable Global Warming Potential and fulfilling requirements in terms of heat dissipation, insulation and arc quenching performances are currently investigated for High Voltage Circuit Breaker applications. Among the potential gases, CO₂ seems a promising candidate for replacing SF6, because on one hand it is environmentally friendly, harmless, non-toxic, non-corrosive, non-flammable and on the other hand previous studies have demonstrated its fair interruption capabilities. The present study aims at investigating the performance of CO₂ for the thermal interruption in high voltage self-blast circuit breakers. In particular, the correlation between thermal interruption performance and arc voltage is considered and the effect of the arc-network interaction on the performance is rigorously analyzed. For the considered designs, the thermal interruption was evaluated by varying the slope at current zero (i.e., di/dt) for which the breaker could interrupt. Besides, the characteristics of the post-arc current are examined in detail for various rated voltages and currents. The outcome of these experimental investigations will be reported and analyzed.

Keywords: current zero measurement, high voltage circuit breaker, thermal arc discharge, thermal interruption

Procedia PDF Downloads 168
421 Recent Development on Application of Microwave Energy on Process Metallurgy

Authors: Mamdouh Omran, Timo Fabritius

Abstract:

A growing interest in microwave heating has emerged recently. Many researchers have begun to pay attention to microwave energy as an alternative technique for processing various primary and secondary raw materials. Compared to conventional methods, microwave processing offers several advantages, such as selective heating, rapid heating, and volumetric heating. The present study gives a summary on our recent works related to the use of microwave energy for the recovery of valuable metals from primary and secondary raw materials. The research is mainly focusing on: Application of microwave for the recovery and recycling of metals from different metallurgical industries wastes (i.e. electric arc furnace (EAF) dust, blast furnace (BF), basic oxygen furnace (BOF) sludge). Application of microwave for upgrading and recovery of valuable metals from primary raw materials (i.e. iron ore). The results indicated that microwave heating is a promising and effective technique for processing primary and secondary steelmaking wastes. After microwave treatment of iron ore for 60 s and 900 W, about a 28.30% increase in grindability.Wet high intensity magnetic separation (WHIMS) indicated that the magnetic separation increased from 34% to 98% after microwave treatment for 90 s and 900 W. In the case of EAF dust, after microwave processing at 1100 W for 20 min, Zinc removal from 64 % to ~ 97 %, depending on mixture ratio and treatment time.

Keywords: dielectric properties, microwave heating, raw materials, secondary raw materials

Procedia PDF Downloads 71
420 Prosperous Digital Image Watermarking Approach by Using DCT-DWT

Authors: Prabhakar C. Dhavale, Meenakshi M. Pawar

Abstract:

In this paper, everyday tons of data is embedded on digital media or distributed over the internet. The data is so distributed that it can easily be replicated without error, putting the rights of their owners at risk. Even when encrypted for distribution, data can easily be decrypted and copied. One way to discourage illegal duplication is to insert information known as watermark, into potentially valuable data in such a way that it is impossible to separate the watermark from the data. These challenges motivated researchers to carry out intense research in the field of watermarking. A watermark is a form, image or text that is impressed onto paper, which provides evidence of its authenticity. Digital watermarking is an extension of the same concept. There are two types of watermarks visible watermark and invisible watermark. In this project, we have concentrated on implementing watermark in image. The main consideration for any watermarking scheme is its robustness to various attacks

Keywords: watermarking, digital, DCT-DWT, security

Procedia PDF Downloads 410
419 [Keynote Talk]: Aerodynamic Effects of Ice and Its Influences on Flight Characteristics of Low Speed Unmanned Aerial Vehicles

Authors: I. McAndrew, K. L. Witcher, E. Navarro

Abstract:

This paper presents the theory and application of low speed flight for unmanned aerial vehicles when subjected to surface environmental conditions such as ice on the leading edge and upper surface. A model was developed and tested in a wind tunnel to see how theory compares with practice at various speed including take-off, landing and operational applications where head winds substantially alter parameters. Furthermore, a comparison is drawn with maned operations and how that this subject is currently under supported with accurate theory or knowledge for designers or operators to make informed decision or accommodate individual applications. The effects of ice formation for lift and drag are determined for a range of different angles of attacks.

Keywords: aerodynamics, low speed flight, unmanned vehicles, environmental influences

Procedia PDF Downloads 423
418 Influence of Superplasticizer and Alkali Activator Concentration on Slag-Fly Ash Based Geopolymer

Authors: Sulaem Musaddiq Laskar, Sudip Talukdar

Abstract:

Sustainable supplementary cementitious material is the prime need in the construction industry. Geopolymer has strong potential for replacing the conventional Portland cement used in mortar and concrete in the industry. This study deals with experimental investigations performed on geopolymer mixes prepared from both ultra-fine ground granulated blast furnace slag and fly ash in a certain proportion. Geopolymer mixes were prepared with alkali activator composed of sodium hydroxide solution and varying amount of superplasticizer. The mixes were tested to study fresh and hardened state properties such as setting time, workability and compressive strength. Influence of concentration of alkali activator on effectiveness of superplasticizer in modifying the properties of geopolymer mixes was also investigated. Results indicated that addition of superplasticizer to ultra-fine slag-fly ash based geopolymer is advantageous in terms of setting time, workability and strength performance but up to certain dosage level. Higher concentration of alkali activator renders ineffectiveness in superplasticizer in improving the fresh and hardened state properties of geopolymer mixes.

Keywords: ultra-fine slag, fly ash, superplasticizer, setting time, workability, compressive strength

Procedia PDF Downloads 172
417 Block Mining: Block Chain Enabled Process Mining Database

Authors: James Newman

Abstract:

Process mining is an emerging technology that looks to serialize enterprise data in time series data. It has been used by many companies and has been the subject of a variety of research papers. However, the majority of current efforts have looked at how to best create process mining from standard relational databases. This paper is the first pass at outlining a database custom-built for the minimal viable product of process mining. We present Block Miner, a blockchain protocol to store process mining data across a distributed network. We demonstrate the feasibility of storing process mining data on the blockchain. We present a proof of concept and show how the intersection of these two technologies helps to solve a variety of issues, including but not limited to ransomware attacks, tax documentation, and conflict resolution.

Keywords: blockchain, process mining, memory optimization, protocol

Procedia PDF Downloads 78
416 Smart Grids Cyber Security Issues and Challenges

Authors: Imen Aouini, Lamia Ben Azzouz

Abstract:

The energy need is growing rapidly due to the population growth and the large new usage of power. Several works put considerable efforts to make the electricity grid more intelligent to reduce essentially energy consumption and provide efficiency and reliability of power systems. The Smart Grid is a complex architecture that covers critical devices and systems vulnerable to significant attacks. Hence, security is a crucial factor for the success and the wide deployment of Smart Grids. In this paper, we present security issues of the Smart Grid architecture and we highlight open issues that will make the Smart Grid security a challenging research area in the future.

Keywords: smart grids, smart meters, home area network, neighbor area network

Procedia PDF Downloads 405
415 Evaluation of Corrosion Caused by Biogenic Sulfuric Acid (BSA) on the Concrete Structures of Sewerage Systems: Chemical Tests

Authors: M. Cortés, E. Vera, O. Rojas

Abstract:

The research studies of the kinetics of the corrosion process that attacks concrete and occurs within sewerage systems agree on the amount of variables that interfere in the process. This study aims to check the impact of the pH levels of the corrosive environment and the concrete surface, the concentrations of chemical sulfuric acid, and in turn, measure the resistance of concrete to this attack under controlled laboratory conditions; it also aims to contribute to the development of further research related to the topic, in order to compare the impact of biogenic sulfuric acid and chemical sulfuric acid involvement on concrete structures, especially in scenarios such as sewerage systems.

Keywords: acid sulfuric, concrete, corrosion, biogenic

Procedia PDF Downloads 367
414 Challenges in Anti-Counterfeiting of Cyber-Physical Systems

Authors: Daniel Kliewe, Arno Kühn, Roman Dumitrescu, Jürgen Gausemeier

Abstract:

This paper examines the system protection for cyber-physical systems (CPS). CPS are particularly characterized by their networking system components. This means they are able to adapt to the needs of their users and its environment. With this ability, CPS have new, specific requirements on the protection against anti-counterfeiting, know-how loss and manipulation. They increase the requirements on system protection because piracy attacks can be more diverse, for example because of an increasing number of interfaces or through the networking abilities. The new requirements were identified and in a next step matched with existing protective measures. Due to the found gap the development of new protection measures has to be forced to close this gap. Moreover a comparison of the effectiveness between selected measures was realized and the first results are presented in the paper.

Keywords: anti-counterfeiting, cyber physical systems, intellectual property (IP), knowledge management, system protection

Procedia PDF Downloads 478
413 Towards a Conscious Design in AI by Overcoming Dark Patterns

Authors: Ayse Arslan

Abstract:

One of the important elements underpinning a conscious design is the degree of toxicity in communication. This study explores the mechanisms and strategies for identifying toxic content by avoiding dark patterns. Given the breadth of hate and harassment attacks, this study explores a threat model and taxonomy to assist in reasoning about strategies for detection, prevention, mitigation, and recovery. In addition to identifying some relevant techniques such as nudges, automatic detection, or human-ranking, the study suggests the use of major metrics such as the overhead and friction of solutions on platforms and users or balancing false positives (e.g., incorrectly penalizing legitimate users) against false negatives (e.g., users exposed to hate and harassment) to maintain a conscious design towards fairness.

Keywords: AI, ML, algorithms, policy, system design

Procedia PDF Downloads 107
412 Implementation of Achterbahn-128 for Images Encryption and Decryption

Authors: Aissa Belmeguenai, Khaled Mansouri

Abstract:

In this work, an efficient implementation of Achterbahn-128 for images encryption and decryption was introduced. The implementation for this simulated project is written by MATLAB.7.5. At first two different original images are used for validate the proposed design. Then our developed program was used to transform the original images data into image digits file. Finally, we used our implemented program to encrypt and decrypt images data. Several tests are done for proving the design performance including visual tests and security analysis; we discuss the security analysis of the proposed image encryption scheme including some important ones like key sensitivity analysis, key space analysis, and statistical attacks.

Keywords: Achterbahn-128, stream cipher, image encryption, security analysis

Procedia PDF Downloads 516
411 Variation of Litter Chemistry under Intensified Drought: Consequences on Flammability

Authors: E. Ormeno, C. Gutigny, J. Ruffault, J. Madrigal, M. Guijarro, C. Lecareux, C. Ballini

Abstract:

Mediterranean plant species feature numerous metabolic and morpho-physiological responses crucial to survive under both, typical Mediterranean drought conditions and future aggravated drought expected by climate change. Whether these adaptive responses will, in turn, increase the ecosystem perturbation in terms of fire hazard, is an issue that needs to be addressed. The aim of this study was to test whether recurrent and aggravated drought in the Mediterranean area favors the accumulation of waxes in leaf litter, with an eventual increase of litter flammability. The study was conducted in 2017 in a garrigue in Southern France dominated by Quercus coccifera, where two drought treatments were used: a treatment with recurrent aggravated drought consisting of ten rain exclusion structures which withdraw part of the annual precipitation since January 2012, and a natural drought treatment where Q. coccifera stands are free of such structures and thus grow under natural precipitation. Waxes were extracted with organic solvent and analyzed by GC-MS and litter flammability was assessed through measurements of the ignition delay, flame residence time and flame intensity (flame height) using an epiradiator as well as the heat of combustion using an oxygen bomb calorimeter. Results show that after 5 years of rain restriction, wax content in the cuticle of leaf litter increases significantly compared to shrubs growing under natural precipitation, in accordance with the theoretical knowledge which expects increases of cuticle waxes in green leaves in order to limit water evapotranspiration. Wax concentrations were also linearly and positively correlated to litter flammability, a correlation that lies on the high flammability own to the long-chain alkanes (C25-C31) found in leaf litter waxes. This innovative investigation shows that climate change is likely to favor ecosystem fire hazard through accumulation of highly flammable waxes in litter. It also adds valuable information about the types of metabolites that are associated with increasing litter flammability, since so far, within the leaf metabolic profile, only terpene-like compounds had been related to plant flammability.

Keywords: cuticular waxes, drought, flammability, litter

Procedia PDF Downloads 156
410 Insider Theft Detection in Organizations Using Keylogger and Machine Learning

Authors: Shamatha Shetty, Sakshi Dhabadi, Prerana M., Indushree B.

Abstract:

About 66% of firms claim that insider attacks are more likely to happen. The frequency of insider incidents has increased by 47% in the last two years. The goal of this work is to prevent dangerous employee behavior by using keyloggers and the Machine Learning (ML) model. Every keystroke that the user enters is recorded by the keylogging program, also known as keystroke logging. Keyloggers are used to stop improper use of the system. This enables us to collect all textual data, save it in a CSV file, and analyze it using an ML algorithm and the VirusTotal API. Many large companies use it to methodically monitor how their employees use computers, the internet, and email. We are utilizing the SVM algorithm and the VirusTotal API to improve overall efficiency and accuracy in identifying specific patterns and words to automate and offer the report for improved monitoring.

Keywords: cyber security, machine learning, cyclic process, email notification

Procedia PDF Downloads 40
409 An Analytical Metric and Process for Critical Infrastructure Architecture System Availability Determination in Distributed Computing Environments under Infrastructure Attack

Authors: Vincent Andrew Cappellano

Abstract:

In the early phases of critical infrastructure system design, translating distributed computing requirements to an architecture has risk given the multitude of approaches (e.g., cloud, edge, fog). In many systems, a single requirement for system uptime / availability is used to encompass the system’s intended operations. However, when architected systems may perform to those availability requirements only during normal operations and not during component failure, or during outages caused by adversary attacks on critical infrastructure (e.g., physical, cyber). System designers lack a structured method to evaluate availability requirements against candidate system architectures through deep degradation scenarios (i.e., normal ops all the way down to significant damage of communications or physical nodes). This increases risk of poor selection of a candidate architecture due to the absence of insight into true performance for systems that must operate as a piece of critical infrastructure. This research effort proposes a process to analyze critical infrastructure system availability requirements and a candidate set of systems architectures, producing a metric assessing these architectures over a spectrum of degradations to aid in selecting appropriate resilient architectures. To accomplish this effort, a set of simulation and evaluation efforts are undertaken that will process, in an automated way, a set of sample requirements into a set of potential architectures where system functions and capabilities are distributed across nodes. Nodes and links will have specific characteristics and based on sampled requirements, contribute to the overall system functionality, such that as they are impacted/degraded, the impacted functional availability of a system can be determined. A machine learning reinforcement-based agent will structurally impact the nodes, links, and characteristics (e.g., bandwidth, latency) of a given architecture to provide an assessment of system functional uptime/availability under these scenarios. By varying the intensity of the attack and related aspects, we can create a structured method of evaluating the performance of candidate architectures against each other to create a metric rating its resilience to these attack types/strategies. Through multiple simulation iterations, sufficient data will exist to compare this availability metric, and an architectural recommendation against the baseline requirements, in comparison to existing multi-factor computing architectural selection processes. It is intended that this additional data will create an improvement in the matching of resilient critical infrastructure system requirements to the correct architectures and implementations that will support improved operation during times of system degradation due to failures and infrastructure attacks.

Keywords: architecture, resiliency, availability, cyber-attack

Procedia PDF Downloads 84
408 Analysis of Cannabinol and Cannabidiol affinity with GBRA1

Authors: Hamid Hossein Khezri, Afsaneh Javdani-Mallak

Abstract:

Fast inhibitory neurotransmission in the mammalian nervous system is largely mediated by GABAA receptors, chloride-selective members of the superfamily of pentameric Cys-loop receptors. Cannabidiol (CBD) is one of the members of cannabinoid compounds found in cannabis. CBD and Cannabinol (CBN), as the other extract of plant Cannabis were able to reduce myofascial pain in rats with immunosuppressive and anti-inflammatory activities. In this study, we accomplished protein-protein BLAST, and the sequence was found to be for Gamma-aminobutyric acid receptor subunit alpha-1 (GBRA1) chain A and its 3D structure was subsequently downloaded from Protein Data Bank. The structures of the ligands, cannabinol, and cannabidiol, were obtained from PubChem. After the necessary process of the obtained files, AutoDock Vina was used to perform molecular docking. Docking between the ligands and GBRA1 chain A revealed that cannabinol has a higher affinity to GBRA1 (binding energy = -7.5 kcal/mol) compared to cannabidiol (binding energy = -6.5 kcal/mol). Furthermore, cannabinol seems to be able to interact with 10 residues of the protein, out of which 3 are in the neurotransmitter-gated ion-channel transmembrane domain of GBRA1, whereas cannabidiol interacts with two other residues. Although the results of this project do not indicate the activating /or inhibitory capability of the studied compounds, it suggests that cannabinol can act as a relatively strong ligand for GBRA1.

Keywords: protein-ligand docking, cannabinol, cannabidiol, GBRA1

Procedia PDF Downloads 95
407 Iron Extraction from Bog Iron Ore in Early French Colonial America

Authors: Yves Monette, Brad Loewen, Louise Pothier

Abstract:

This study explores the first bog iron ore extraction activities which took place in colonial New France. Archaeological excavations carried on the founding site of Montreal in the last ten years have revealed the remains of Fort Ville-Marie erected in 1642. In a level related to the fort occupation between 1660 and 1680, kilos of scories, a dozen of half-finished iron artefacts and a light yellow clayey ore material have recovered that point to extractive metallurgy activities at the fort. Examples of scories, artefacts and of a possible bog iron ore were submitted to SEM-EDS analysis. The results clearly indicate that iron was extracted from local limonite ores in a bloomery. We discovered that the gangue material could be traced from the ore to the scories. However, some lime silicates and some accessory minerals found in the scories, like barite and celestine for example, were absent from the ore but present in dolomite fragments found in the same archaeological context. The tracing of accessory minerals suggests that the ironmaster introduced a lime flux in the bloomery charge to maximize the separation of the iron ore. Before the introduction of the blast furnace in Western Europe during the first half of the 18th Century, the use of fluxes in iron bloomery was not a common practice.

Keywords: bog iron ore, extractive metallurgy, French colonial America, Montreal, scanning electron microscopy (SEM)

Procedia PDF Downloads 337
406 Evaluation of Zr/NH₄ClO₄ and Zr/KClO₄ Compositions for Development of Igniter for Ammonium Perchlorate and Hydroxyl-Terminated Polybutadiene Based Base Bleed System

Authors: Amir Mukhtar, Habib Nasir

Abstract:

To achieve an enhanced range of large calibre artillery a base bleed unit equipped with ammonium perchlorate and hydroxyl-terminated polybutadiene (AP/HTPB) based composite propellant grain is installed at the bottom of a projectile which produces jet of hot gasses and reduces base drag during flight of the projectile. Upon leaving the muzzle at very high muzzle velocity, due to sudden pressure drop, the propellant grain gets quenched. Therefore, base-bleed unit is equipped with an igniter to ensure ignition as well as reignition of the propellant grain. Pyrotechnic compositions based on Zr/NH₄ClO₄ and Zr/KClO₄ mixtures have been studied for the effect of fuel/oxidizer ratio and oxidizer type on ballistic properties. Calorific values of mixtures were investigated by bomb calorimeter, the average burning rate was measured by fuse wire technique at ambient conditions, and high-pressure closed vessel was used to record pressure-time profile, maximum pressure achieved (Pmax), time to achieve Pmax and differential pressure (dP/dt). It was observed that the 30, 40, 50 and 60 wt.% of Zr has a very significant effect on ballistic properties of mixtures. Compositions with NH₄ClO₄ produced higher values of Pmax, dP/dt and Calorific value as compared to Zr/KClO₄ based mixtures. Composition containing KClO₄ comparatively produced higher burning rate and maximum burning rate was recorded at 8.30 mm/s with 60 wt.% Zr in Zr/KClO₄ pyrotechnic mixture. Zr/KClO₄ with 50 wt. % of Zr was tests fired in igniter assembly by electric initiation method. Igniter assembly was test fired several times and average burning time of 3.5 sec with igniter mass burning rate of 6.85 g/sec was recorded. Igniter was finally fired on static and dynamic level with base bleed unit which gave successful ignition to the base bleed grain and extended range was achieved with 155 mm artillery projectile.

Keywords: base bleed, closed vessel, igniter, zirconium

Procedia PDF Downloads 140
405 Air-Blast Ultrafast Disconnectors and Solid-State Medium Voltage DC Breaker: A Modified Version to Lower Losses and Higher Speed

Authors: Ali Kadivar, Kaveh Niayesh

Abstract:

MVDC markets for green power generations, Navy, subsea oil and gas electrification, and transportation electrification are extending rapidly. The lack of fast and powerful DC circuit breakers (CB) is the most significant barrier to realizing the medium voltage DC (MVDC) networks. A concept of hybrid circuit breakers (HCBs) benefiting from ultrafast disconnectors (UFD) is proposed. A set of mechanical switches substitute the power electronic commutation switches to reduce the losses during normal operation in HCB. The success of current commutation in such breakers relies on the behaviour of elongated, wall constricted arcs during the opening across the contacts inside the UFD. The arc voltage dependencies on the contact speed of UFDs is discussed through multiphysics simulations contact opening speeds of 10, 20 and 40 m/s. The arc voltage at a given current increases exponentially with the contact opening velocity. An empirical equation for the dynamic arc characteristics is presented for the tested UFD, and the experimentally verfied characteristics for voltage-current are utilized for the current commutation simulation prior to apply on a 14 kV experimental setup. Different failures scenarios due to the current commutation are investigated

Keywords: MVDC breakers, DC circuit breaker, fast operating breaker, ultra-fast elongated arc

Procedia PDF Downloads 68
404 A Security Study for Smart Metering Systems

Authors: Musaab Hasan, Farkhund Iqbal, Patrick C. K. Hung, Benjamin C. M. Fung, Laura Rafferty

Abstract:

In modern societies, the smart cities concept raised simultaneously with the projection towards adopting smart devices. A smart grid is an essential part of any smart city as both consumers and power utility companies benefit from the features provided by the power grid. In addition to advanced features presented by smart grids, there may also be a risk when the grids are exposed to malicious acts such as security attacks performed by terrorists. Considering advanced security measures in the design of smart meters could reduce these risks. This paper presents a security study for smart metering systems with a prototype implementation of the user interfaces for future works.

Keywords: security design, smart city, smart meter, smart grid, smart metering system

Procedia PDF Downloads 312
403 TRNG Based Key Generation for Certificateless Signcryption

Authors: S.Balaji, R.Sujatha, M. Ramakrishnan

Abstract:

Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously in low cost when compared with the traditional signature-then-encryption approach. In this paper, we propose a novel mouse movement based key generation technique to generate secret keys which is secure against the outer and insider attacks. Tag Key Encapsulation Mechanism (KEM) process is implemented using True Random Number Generator (TRNG) method. This TRNG based key is used for data encryption in the Data Encapsulation Mechanism (DEM). We compare the statistical reports of the proposed system with the previous methods which implements TKEM based on pseudo random number generator

Keywords: pseudo random umber generator, signcryption, true random number generator, node deployment

Procedia PDF Downloads 325
402 An Enhanced Digital Forensic Model for Internet of Things Forensic

Authors: Tina Wu, Andrew Martin

Abstract:

The expansion of the Internet of Things (IoT) brings a new level of threat. Attacks on IoT are already being used by criminals to form botnets, launch Distributed Denial of Service (DDoS) and distribute malware. This opens a whole new digital forensic arena to develop forensic methodologies in order to have the capability to investigate IoT related crimes. However, existing proposed IoT forensic models are still premature requiring further improvement and validation, many lack details on the acquisition and analysis phase. This paper proposes an enhanced theoretical IoT digital forensic model focused on identifying and acquiring the main sources of evidence in a methodical way. In addition, this paper presents a theoretical acquisition framework of the different stages required in order to be capable of acquiring evidence from IoT devices.

Keywords: acquisition, Internet of Things, model, zoning

Procedia PDF Downloads 249
401 Analysis of Cannabinoid and Cannabidiol Affinity with GABRA1

Authors: Hamid Hossein Khezri, Afsaneh Javdani-Mallak

Abstract:

Fast inhibitory neurotransmission in the mammalian nervous system is largely mediated by GABAA receptors, chloride-selective members of the superfamily of pentameric Cys-loop receptors. Cannabidiol (CBD) is one of the members of cannabinoid compounds found in cannabis. CBD and Cannabinol (CBN), as the other extract of plant Cannabis, were able to reduce myofascial pain in rats with immunosuppressive and anti-inflammatory activities. In this study, we accomplished protein-protein BLAST and the sequence was found to be for Gamma-aminobutyric acid receptor subunit alpha-1 (GBRA1) chain A and its 3D structure was subsequently downloaded from Protein Data Bank. The structures of the ligands cannabinol and cannabidiol were obtained from PubChem. After a necessary process of the obtained files, AutoDock Vina was used to performing molecular docking. Docking between the ligands and GBRA1 chain A revealed that cannabinol has a higher affinity to GBRA1 (binding energy = -7.5 kcal/mol) compared to cannabidiol (binding energy = -6.5 kcal/mol). Furthermore, cannabinol seems to be able to interact with 10 residues of the protein, out of which 3 are in the neurotransmitter-gated ion-channel transmembrane domain of GBRA1, whereas cannabidiol interacts with two other residues. Although the results of this project do not indicate the activating /or inhibitory capability of the studied compounds, it suggests that cannabinol can act as a relatively strong ligand for GBRA1.

Keywords: protein-ligand docking, cannabinol, cannabidiol, GBRA1

Procedia PDF Downloads 103
400 UV Resistibility of a Carbon Nanofiber Reinforced Polymer Composite

Authors: A. Evcin, N. Çiçek Bezir, R. Duman, N. Duman

Abstract:

Nowadays, a great concern is placed on the harmfulness of ultraviolet radiation (UVR) which attacks human bodies. Nanocarbon materials, such as carbon nanotubes (CNTs), carbon nanofibers (CNFs) and graphene, have been considered promising alternatives to shielding materials because of their excellent electrical conductivities, very high surface areas and low densities. In the present work, carbon nanofibers have been synthesized from solutions of Polyacrylonitrile (PAN)/ N,N-dimethylformamide (DMF) by electrospinning method. The carbon nanofibers have been stabilized by oxidation at 250 °C for 2 h in air and carbonized at 750 °C for 1 h in H2/N2. We present the fabrication and characterization of transparent and ultraviolet (UV) shielding CNF/polymer composites. The content of CNF filler has been varied from 0.2% to 0.6 % by weight. UV Spectroscopy has been performed to study the effect of composition on the transmittance of polymer composites.

Keywords: electrospinning, carbon nanofiber, characterization, composites, nanofiber, ultraviolet radiation

Procedia PDF Downloads 210
399 Cryptographic Protocol for Secure Cloud Storage

Authors: Luvisa Kusuma, Panji Yudha Prakasa

Abstract:

Cloud storage, as a subservice of infrastructure as a service (IaaS) in Cloud Computing, is the model of nerworked storage where data can be stored in server. In this paper, we propose a secure cloud storage system consisting of two main components; client as a user who uses the cloud storage service and server who provides the cloud storage service. In this system, we propose the protocol schemes to guarantee against security attacks in the data transmission. The protocols are login protocol, upload data protocol, download protocol, and push data protocol, which implement hybrid cryptographic mechanism based on data encryption before it is sent to the cloud, so cloud storage provider does not know the user's data and cannot analysis user’s data, because there is no correspondence between data and user.

Keywords: cloud storage, security, cryptographic protocol, artificial intelligence

Procedia PDF Downloads 341
398 Dynamic Shear Energy Absorption of Ultra-High Performance Concrete

Authors: Robert J. Thomas, Colton Bedke, Andrew Sorensen

Abstract:

The exemplary mechanical performance and durability of ultra-high performance concrete (UHPC) has led to its rapid emergence as an advanced cementitious material. The uncharacteristically high mechanical strength and ductility of UHPC makes it a promising potential material for defense structures which may be subject to highly dynamic loads like impact or blast. However, the mechanical response of UHPC under dynamic loading has not been fully characterized. In particular, there is a need to characterize the energy absorption of UHPC under high-frequency shear loading. This paper presents preliminary results from a parametric study of the dynamic shear energy absorption of UHPC using the Charpy impact test. UHPC mixtures with compressive strengths in the range of 100-150 MPa exhibited dynamic shear energy absorption in the range of 0.9-1.5 kJ/m. Energy absorption is shown to be sensitive to the water/cement ratio, silica fume content, and aggregate gradation. Energy absorption was weakly correlated to compressive strength. Results are highly sensitive to specimen preparation methods, and there is a demonstrated need for a standardized test method for high frequency shear in cementitious composites.

Keywords: Charpy impact test, dynamic shear, impact loading, ultra-high performance concrete

Procedia PDF Downloads 279
397 Hyperchaos-Based Video Encryption for Device-To-Device Communications

Authors: Samir Benzegane, Said Sadoudi, Mustapha Djeddou

Abstract:

In this paper, we present a software development of video streaming encryption for Device-to-Device (D2D) communications by using Hyperchaos-based Random Number Generator (HRNG) implemented in C#. The software implements and uses the proposed HRNG to generate key stream for encrypting and decrypting real-time video data. The used HRNG consists of Hyperchaos Lorenz system which produces four signal outputs taken as encryption keys. The generated keys are characterized by high quality randomness which is confirmed by passing standard NIST statistical tests. Security analysis of the proposed encryption scheme confirms its robustness against different attacks.

Keywords: hyperchaos Lorenz system, hyperchaos-based random number generator, D2D communications, C#

Procedia PDF Downloads 349
396 Evaluation of Eco Cement as a Stabilizer of Clayey Sand

Authors: Jeeja Menon, M. S. Ravikumar

Abstract:

With the advent of green technology and the concept of zero energy buildings, there is an emerging trend in the utilization of indigenous materials like soil as a construction material. However, fine soils like clays and sand have undesirable properties and stabilization of these soils is essential before it is used to develop a building unit. Eco cement or Ground Granulated Blast Furnace Slag (GGBS), a waste byproduct formed during the manufacture of iron has cementitious properties and has the potential of replacing cement which is the most common stabilizer used for improving the geotechnical properties of soil. This paper highlights the salient observations obtained by the investigations into the effect of GGBS as a stabilizer for clayey sand. The index and engineering properties of the soil on the addition of different percentages (0%, 2%, 4%, 5% & 6% of the dry weight of the soil) of GGBS are tested to arrive at the optimum binder content. The criteria chosen for evaluation are the unconfined compressive strength values of different soil- binder composition. The test results indicate that there are significant strength improvements by the addition of GGBS in the soil, and the optimum GGBS content was determined as 5%. Moreover, utilizing waste binders for developing an ecofriendly, less energy induced building units as well as for stabilizing soil will also contribute to the solid waste management, which is the current environmental crisis of the world.

Keywords: eco cement, GGBS, index properties, stabilization, unconfined compressive strength

Procedia PDF Downloads 119
395 Quality Evaluation of Backfill Grout in Tunnel Boring Machine Tail Void Using Impact-Echo (IE): Short-Time Fourier Transform (STFT) Numerical Analysis

Authors: Ju-Young Choi, Ki-Il Song, Kyoung-Yul Kim

Abstract:

During Tunnel Boring Machine (TBM) tunnel excavation, backfill grout should be injected after the installation of segment lining to ensure the stability of the tunnel and to minimize ground deformation. If grouting is not sufficient to fill the gap between the segments and rock mass, hydraulic pressures occur in the void, which can negatively influence the stability of the tunnel. Recently the tendency to use TBM tunnelling method to replace the drill and blast(NATM) method is increasing. However, there are only a few studies of evaluation of backfill grout. This study evaluates the TBM tunnel backfill state using Impact-Echo(IE). 3-layers, segment-grout-rock mass, are simulated by FLAC 2D, FDM-based software. The signals obtained from numerical analysis and IE test are analyzed by Short-Time Fourier Transform(STFT) in time domain, frequency domain, and time-frequency domain. The result of this study can be used to evaluate the quality of backfill grouting in tail void.

Keywords: tunnel boring machine, backfill grout, impact-echo method, time-frequency domain analysis, finite difference method

Procedia PDF Downloads 251