Search results for: quantum key encryption
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 727

Search results for: quantum key encryption

337 Quantum Chemical Prediction of Standard Formation Enthalpies of Uranyl Nitrates and Its Degradation Products

Authors: Mohamad Saab, Florent Real, Francois Virot, Laurent Cantrel, Valerie Vallet

Abstract:

All spent nuclear fuel reprocessing plants use the PUREX process (Plutonium Uranium Refining by Extraction), which is a liquid-liquid extraction method. The organic extracting solvent is a mixture of tri-n-butyl phosphate (TBP) and hydrocarbon solvent such as hydrogenated tetra-propylene (TPH). By chemical complexation, uranium and plutonium (from spent fuel dissolved in nitric acid solution), are separated from fission products and minor actinides. During a normal extraction operation, uranium is extracted in the organic phase as the UO₂(NO₃)₂(TBP)₂ complex. The TBP solvent can form an explosive mixture called red oil when it comes in contact with nitric acid. The formation of this unstable organic phase originates from the reaction between TBP and its degradation products on the one hand, and nitric acid, its derivatives and heavy metal nitrate complexes on the other hand. The decomposition of the red oil can lead to violent explosive thermal runaway. These hazards are at the origin of several accidents such as the two in the United States in 1953 and 1975 (Savannah River) and, more recently, the one in Russia in 1993 (Tomsk). This raises the question of the exothermicity of reactions that involve TBP and all other degradation products, and calls for a better knowledge of the underlying chemical phenomena. A simulation tool (Alambic) is currently being developed at IRSN that integrates thermal and kinetic functions related to the deterioration of uranyl nitrates in organic and aqueous phases, but not of the n-butyl phosphate. To include them in the modeling scheme, there is an urgent need to obtain the thermodynamic and kinetic functions governing the deterioration processes in liquid phase. However, little is known about the thermodynamic properties, like standard enthalpies of formation, of the n-butyl phosphate molecules and of the UO₂(NO₃)₂(TBP)₂ UO₂(NO₃)₂(HDBP)(TBP) and UO₂(NO₃)₂(HDBP)₂ complexes. In this work, we propose to estimate the thermodynamic properties with Quantum Methods (QM). Thus, in the first part of our project, we focused on the mono, di, and tri-butyl complexes. Quantum chemical calculations have been performed to study several reactions leading to the formation of mono-(H₂MBP), di-(HDBP), and TBP in gas and liquid phases. In the gas phase, the optimal structures of all species were optimized using the B3LYP density functional. Triple-ζ def2-TZVP basis sets were used for all atoms. All geometries were optimized in the gas-phase, and the corresponding harmonic frequencies were used without scaling to compute the vibrational partition functions at 298.15 K and 0.1 Mpa. Accurate single point energies were calculated using the efficient localized LCCSD(T) method to the complete basis set limit. Whenever species in the liquid phase are considered, solvent effects are included with the COSMO-RS continuum model. The standard enthalpies of formation of TBP, HDBP, and H2MBP are finally predicted with an uncertainty of about 15 kJ mol⁻¹. In the second part of this project, we have investigated the fundamental properties of three organic species that mostly contribute to the thermal runaway: UO₂(NO₃)₂(TBP)₂, UO₂(NO₃)₂(HDBP)(TBP), and UO₂(NO₃)₂(HDBP)₂ using the same quantum chemical methods that were used for TBP and its derivatives in both the gas and the liquid phase. We will discuss the structures and thermodynamic properties of all these species.

Keywords: PUREX process, red oils, quantum chemical methods, hydrolysis

Procedia PDF Downloads 173
336 Amino Acid Derivatives as Green Corrosion Inhibitors for Mild Steel in 1M HCl: Electrochemical, Surface and Density Functional Theory Studies

Authors: Jiyaul Haque, Vandana Srivastava, M. A. Quraishi

Abstract:

The amino acids based corrosion inhibitors 2-(3-(carboxymethyl)-1H-imidazol-3-ium-1-yl) acetate (Z-1),2-(3-(1-carboxyethyl)-1H-imidazol-3-ium-1-yl) propanoate (Z-2) and 2-(3-(1-carboxy-2-phenylethyl)-1H-imidazol-3-ium-1-yl)-3- phenylpropanoate (Z-3) were synthesized by the reaction of amino acids, glyoxal and formaldehyde, and characterized by the FTIR and NMR spectroscopy. The corrosion inhibition performance of synthesized inhibitors was studied by electrochemical (EIS and PDP), surface and DFT methods. The results show, the studied Z-1, Z-2 and Z-3 are effective inhibitors, showed the maximum inhibition efficiency of 88.52 %, 89.48 and 96.08% at concentration 200ppm, respectively. The results of potentiodynamic polarization (PDP) study showed that Z-1 act as a cathodic inhibitor, while Z-2 and Z-3 act as mixed type inhibitors. The results of electrochemical impedance spectroscopy (EIS) studies showed that zwitterions inhibit the corrosion through adsorption mechanism. The adsorption of synthesized zwitterions on the mild steel surface was followed the Langmuir adsorption isotherm. The formation of zwitterions film on mild steel surface was confirmed by the scanning electron microscope (SEM) and energy-dispersive X-ray spectroscopy (EDX). The quantum chemical parameters were used to study the reactivity of inhibitors and supported the experimental results. An inhibitor adsorption model is proposed.

Keywords: electrochemical impedance spectroscopy, green corrosion inhibitors, mild steel, SEM, quantum chemical calculation, zwitterions

Procedia PDF Downloads 170
335 High Photosensitivity and Broad Spectral Response of Multi-Layered Germanium Sulfide Transistors

Authors: Rajesh Kumar Ulaganathan, Yi-Ying Lu, Chia-Jung Kuo, Srinivasa Reddy Tamalampudi, Raman Sankar, Fang Cheng Chou, Yit-Tsong Chen

Abstract:

In this paper, we report the optoelectronic properties of multi-layered GeS nanosheets (~28 nm thick)-based field-effect transistors (called GeS-FETs). The multi-layered GeS-FETs exhibit remarkably high photoresponsivity of Rλ ~ 206 AW-1 under illumination of 1.5 µW/cm2 at  = 633 nm, Vg = 0 V, and Vds = 10 V. The obtained Rλ ~ 206 AW-1 is excellent as compared with a GeS nanoribbon-based and the other family members of group IV-VI-based photodetectors in the two-dimensional (2D) realm, such as GeSe and SnS2. The gate-dependent photoresponsivity of GeS-FETs was further measured to be able to reach Rλ ~ 655 AW-1 operated at Vg = -80 V. Moreover, the multi-layered GeS photodetector holds high external quantum efficiency (EQE ~ 4.0 × 104 %) and specific detectivity (D* ~ 2.35 × 1013 Jones). The measured D* is comparable to those of the advanced commercial Si- and InGaAs-based photodiodes. The GeS photodetector also shows an excellent long-term photoswitching stability with a response time of ~7 ms over a long period of operation (>1 h). These extraordinary properties of high photocurrent generation, broad spectral range, fast response, and long-term stability make the GeS-FET photodetector a highly qualified candidate for future optoelectronic applications.

Keywords: germanium sulfide, photodetector, photoresponsivity, external quantum efficiency, specific detectivity

Procedia PDF Downloads 520
334 Temperature-Stable High-Speed Vertical-Cavity Surface-Emitting Lasers with Strong Carrier Confinement

Authors: Yun Sun, Meng Xun, Jingtao Zhou, Ming Li, Qiang Kan, Zhi Jin, Xinyu Liu, Dexin Wu

Abstract:

Higher speed short-wavelength vertical-cavity surface-emitting lasers (VCSELs) working at high temperature are required for future optical interconnects. In this work, the high-speed 850 nm VCSELs are designed, fabricated and characterized. The temperature dependent static and dynamic performance of devices are investigated by using current-power-voltage and small signal modulation measurements. Temperature-stable high-speed properties are obtained by employing highly strained multiple quantum wells and short cavity length of half wavelength. The temperature dependent photon lifetimes and carrier radiative times are determined from damping factor and resonance frequency obtained by fitting the intrinsic optical bandwidth with the two-pole transfer function. In addition, an analytical theoretical model including the strain effect is development based on model-solid theory. The calculation results indicate that the better high temperature performance of VCSELs can be attributed to the strong confinement of holes in the quantum wells leading to enhancement of the carrier transit time.

Keywords: vertical cavity surface emitting lasers, high speed modulation, optical interconnects, semiconductor lasers

Procedia PDF Downloads 103
333 Management and Agreement Protocol in Computer Security

Authors: Abdulameer K. Hussain

Abstract:

When dealing with a cryptographic system we note that there are many activities performed by parties of this cryptographic system and the most prominent of these activities is the process of agreement between the parties involved in the cryptographic system on how to deal and perform the cryptographic system tasks to be more secure, more confident and reliable. The most common agreement among parties is a key agreement and other types of agreements. Despite the fact that there is an attempt from some quarters to find other effective agreement methods but these methods are limited to the traditional agreements. This paper presents different parameters to perform more effectively the task of the agreement, including the key alternative, the agreement on the encryption method used and the agreement to prevent the denial of the services. To manage and achieve these goals, this method proposes the existence of an control and monitoring entity to manage these agreements by collecting different statistical information of the opinions of the authorized parties in the cryptographic system. These statistics help this entity to take the proper decision about the agreement factors. This entity is called Agreement Manager (AM).

Keywords: agreement parameters, key agreement, key exchange, security management

Procedia PDF Downloads 406
332 Using the Cluster Computing to Improve the Computational Speed of the Modular Exponentiation in RSA Cryptography System

Authors: Te-Jen Chang, Ping-Sheng Huang, Shan-Ten Cheng, Chih-Lin Lin, I-Hui Pan, Tsung- Hsien Lin

Abstract:

RSA system is a great contribution for the encryption and the decryption. It is based on the modular exponentiation. We call this system as “a large of numbers for calculation”. The operation of a large of numbers is a very heavy burden for CPU. For increasing the computational speed, in addition to improve these algorithms, such as the binary method, the sliding window method, the addition chain method, and so on, the cluster computer can be used to advance computational speed. The cluster system is composed of the computers which are installed the MPICH2 in laboratory. The parallel procedures of the modular exponentiation can be processed by combining the sliding window method with the addition chain method. It will significantly reduce the computational time of the modular exponentiation whose digits are more than 512 bits and even more than 1024 bits.

Keywords: cluster system, modular exponentiation, sliding window, addition chain

Procedia PDF Downloads 506
331 Double Negative Differential Resistance Features in Series AIN/GaN Double-Barrier Resonant Tunneling Diodes Vertically Integrated by Plasma-Assisted Molecular Beam Epitaxy

Authors: Jiajia Yao, Guanlin Wu, Fang Liu, Junshuai Xue, Yue Hao

Abstract:

This study reports on the epitaxial growth of a GaN-based resonant tunneling diode (RTD) structure with stable and repeatable double negative differential resistance (NDR) characteristics at room temperature on a c-plane GaN-on-sapphire template using plasma-assisted molecular beam epitaxy (PA-MBE) technology. In this structure, two independent AlN/GaN RTDs are epitaxially connected in series in the vertical growth direction through a silicon-doped GaN layer. As the collector electrode bias voltage increases, the two RTDs respectively align the ground state energy level in the quantum well with the 2DEG energy level in the emitter accumulation well to achieve quantum resonant tunneling and then reach the negative differential resistance (NDR) region. The two NDR regions exhibit similar peak current densities and peak-to-valley current ratios, which are 230 kA/cm² and 249 kA/cm², 1.33 and 1.38, respectively, for a device with a collector electrode mesa diameter of 1 µm. The consistency of the NDR is much higher than the results of on-chip discrete RTD device interconnection, resulting from the smaller chip area, fewer interconnect parasitic parameters, and less process complexity. The methods and results presented in this paper show the brilliant prospects of GaN RTDs in the development of multi-value logic digital circuits.

Keywords: MBE, AlN/GaN, RTDs, double NDR

Procedia PDF Downloads 44
330 Review Paper on an Algorithm Enhancing Privacy and Security in Online Meeting Platforms Using a Secured Encryption

Authors: Tonderai Muchenje, Mkhatshwa Phethile

Abstract:

Humans living in this current situation know that communication with one another is necessary for themselves. There are many ways to communicate with each other; during unexpected natural disasters and outbreak of epidemics and pandemics, the need for online meeting platforms are considered most important. Apparently, the development in the telecommunication sector also played an important role. Therefore, the epidemic of the Covid-19 Pandemic and the new normal situation resulted in the overwhelming production of online meeting platforms to prevent the situation. This software is commonly used in business communications in the beginning. Rapidly the COVID-19 pandemic changed the situation. At present-day, these virtual meeting applications are not only used to have informal meetings with friends and relatives but also to be used to have formal meetings in the business and education (universities) sector. In this article, an attempt has been made to list out the useful secured ways for using online meeting platforms.

Keywords: virtual background, zoom, secure online algorithm, RingCentral, Pexip Pexip, TeamViewer, microsoft teams

Procedia PDF Downloads 95
329 Optical Design and Modeling of Micro Light-Emitting Diodes for Display Applications

Authors: Chaya B. M., C. Dhanush, Inti Sai Srikar, Akula Pavan Parvatalu, Chirag Gowda R

Abstract:

Recently, there has been a lot of interest in µ-LED technology because of its exceptional qualities, including auto emission, high visibility, low consumption of power, rapid response and longevity. Light-emitting diodes (LED) using III-nitride, such as lighting sources, visible light communication (VLC) devices, and high-power devices, are finding increasing use as miniaturization technology advances. The use of micro-LED displays in place of traditional display technologies like liquid crystal displays (LCDs) and organic light-emitting diodes (OLEDs) is one of the most prominent recent advances, which may even represent the next generation of displays. The development of fully integrated, multifunctional devices and the incorporation of extra capabilities into micro-LED displays, such as sensing, light detection, and solar cells, are the pillars of advanced technology. Due to the wide range of applications for micro-LED technology, the effectiveness and dependability of these devices in numerous harsh conditions are becoming increasingly important. Enough research has been conducted to overcome the under-effectiveness of micro-LED devices. In this paper, different Micro LED design structures are proposed in order to achieve optimized optical properties. In order to attain improved external quantum efficiency (EQE), devices' light extraction efficiency (LEE) has also been boosted.

Keywords: finite difference time domain, light out coupling efficiency, far field intensity, power density, quantum efficiency, flat panel displays

Procedia PDF Downloads 62
328 Waveguiding in an InAs Quantum Dots Nanomaterial for Scintillation Applications

Authors: Katherine Dropiewski, Michael Yakimov, Vadim Tokranov, Allan Minns, Pavel Murat, Serge Oktyabrsky

Abstract:

InAs Quantum Dots (QDs) in a GaAs matrix is a well-documented luminescent material with high light yield, as well as thermal and ionizing radiation tolerance due to quantum confinement. These benefits can be leveraged for high-efficiency, room temperature scintillation detectors. The proposed scintillator is composed of InAs QDs acting as luminescence centers in a GaAs stopping medium, which also acts as a waveguide. This system has appealing potential properties, including high light yield (~240,000 photons/MeV) and fast capture of photoelectrons (2-5ps), orders of magnitude better than currently used inorganic scintillators, such as LYSO or BaF2. The high refractive index of the GaAs matrix (n=3.4) ensures light emitted by the QDs is waveguided, which can be collected by an integrated photodiode (PD). Scintillation structures were grown using Molecular Beam Epitaxy (MBE) and consist of thick GaAs waveguiding layers with embedded sheets of modulation p-type doped InAs QDs. An AlAs sacrificial layer is grown between the waveguide and the GaAs substrate for epitaxial lift-off to separate the scintillator film and transfer it to a low-index substrate for waveguiding measurements. One consideration when using a low-density material like GaAs (~5.32 g/cm³) as a stopping medium is the matrix thickness in the dimension of radiation collection. Therefore, luminescence properties of very thick (4-20 microns) waveguides with up to 100 QD layers were studied. The optimization of the medium included QD shape, density, doping, and AlGaAs barriers at the waveguide surfaces to prevent non-radiative recombination. To characterize the efficiency of QD luminescence, low temperature photoluminescence (PL) (77-450 K) was measured and fitted using a kinetic model. The PL intensity degrades by only 40% at RT, with an activation energy for electron escape from QDs to the barrier of ~60 meV. Attenuation within the waveguide (WG) is a limiting factor for the lateral size of a scintillation detector, so PL spectroscopy in the waveguiding configuration was studied. Spectra were measured while the laser (630 nm) excitation point was scanned away from the collecting fiber coupled to the edge of the WG. The QD ground state PL peak at 1.04 eV (1190 nm) was inhomogeneously broadened with FWHM of 28 meV (33 nm) and showed a distinct red-shift due to self-absorption in the QDs. Attenuation stabilized after traveling over 1 mm through the WG, at about 3 cm⁻¹. Finally, a scintillator sample was used to test detection and evaluate timing characteristics using 5.5 MeV alpha particles. With a 2D waveguide and a small area of integrated PD, the collected charge averaged 8.4 x10⁴ electrons, corresponding to a collection efficiency of about 7%. The scintillation response had 80 ps noise-limited time resolution and a QD decay time of 0.6 ns. The data confirms unique properties of this scintillation detector which can be potentially much faster than any currently used inorganic scintillator.

Keywords: GaAs, InAs, molecular beam epitaxy, quantum dots, III-V semiconductor

Procedia PDF Downloads 240
327 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 330
326 Main Chaos-Based Image Encryption Algorithm

Authors: Ibtissem Talbi

Abstract:

During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.

Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich

Procedia PDF Downloads 670
325 A Blockchain-Based Privacy-Preserving Physical Delivery System

Authors: Shahin Zanbaghi, Saeed Samet

Abstract:

The internet has transformed the way we shop. Previously, most of our purchases came in the form of shopping trips to a nearby store. Now, it’s as easy as clicking a mouse. But with great convenience comes great responsibility. We have to be constantly vigilant about our personal information. In this work, our proposed approach is to encrypt the information printed on the physical packages, which include personal information in plain text, using a symmetric encryption algorithm; then, we store that encrypted information into a Blockchain network rather than storing them in companies or corporations centralized databases. We present, implement and assess a blockchain-based system using Ethereum smart contracts. We present detailed algorithms that explain the details of our smart contract. We present the security, cost, and performance analysis of the proposed method. Our work indicates that the proposed solution is economically attainable and provides data integrity, security, transparency, and data traceability.

Keywords: blockchain, Ethereum, smart contract, commit-reveal scheme

Procedia PDF Downloads 135
324 Quantum Graph Approach for Energy and Information Transfer through Networks of Cables

Authors: Mubarack Ahmed, Gabriele Gradoni, Stephen C. Creagh, Gregor Tanner

Abstract:

High-frequency cables commonly connect modern devices and sensors. Interestingly, the proportion of electric components is rising fast in an attempt to achieve lighter and greener devices. Modelling the propagation of signals through these cable networks in the presence of parameter uncertainty is a daunting task. In this work, we study the response of high-frequency cable networks using both Transmission Line and Quantum Graph (QG) theories. We have successfully compared the two theories in terms of reflection spectra using measurements on real, lossy cables. We have derived a generalisation of the vertex scattering matrix to include non-uniform networks – networks of cables with different characteristic impedances and propagation constants. The QG model implicitly takes into account the pseudo-chaotic behavior, at the vertices, of the propagating electric signal. We have successfully compared the asymptotic growth of eigenvalues of the Laplacian with the predictions of Weyl law. We investigate the nearest-neighbour level-spacing distribution of the resonances and compare our results with the predictions of Random Matrix Theory (RMT). To achieve this, we will compare our graphs with the generalisation of Wigner distribution for open systems. The problem of scattering from networks of cables can also provide an analogue model for wireless communication in highly reverberant environments. In this context, we provide a preliminary analysis of the statistics of communication capacity for communication across cable networks, whose eventual aim is to enable detailed laboratory testing of information transfer rates using software defined radio. We specialise this analysis in particular for the case of MIMO (Multiple-Input Multiple-Output) protocols. We have successfully validated our QG model with both TL model and laboratory measurements. The growth of Eigenvalues compares well with Weyl’s law and the level-spacing distribution agrees so well RMT predictions. The results we achieved in the MIMO application compares favourably with the prediction of a parallel on-going research (sponsored by NEMF21.)

Keywords: eigenvalues, multiple-input multiple-output, quantum graph, random matrix theory, transmission line

Procedia PDF Downloads 152
323 Effect of Rapid Thermal Annealing on the Optical Properties of InAs Quantum Dots Grown on (100) and (311)B GaAs Substrates by Molecular Beam Epitaxy

Authors: Amjad Almunyif, Amra Alhassni, Sultan Alhassan, Maryam Al Huwayz, Saud Alotaibi, Abdulaziz Almalki, Mohamed Henini

Abstract:

The effect of rapid thermal annealing (RTA) on the optical properties of InAs quantum dots (QDs) grown at an As overpressure of 2x 10⁻⁶ Torr by molecular beam epitaxy (MBE) on (100) and (311)B GaAs substrates was investigated using photoluminescence (PL) technique. PL results showed that for the as-grown samples, the QDs grown on the high index plane (311)B have lower PL intensity and lower full width at half maximum (FWHM) than those grown on the conventional (100) plane. The latter demonstrates that the (311)B QDs have better size uniformity than (100) QDs. Compared with as-grown samples, a blue-shift was observed for all samples with increasing annealing temperature from 600°C to 700°C. For (100) samples, a narrowing of the FWHM was observed with increasing annealing temperature from 600°C to 700°C. However, in (311)B samples, the FWHM showed a different behaviour; it slightly increased when the samples were annealed at 600°C and then decreased when the annealing temperature increased to 700°C. As expected, the PL peak intensity for all samples increased when the laser excitation power increased. The PL peak energy temperature dependence showed a strong redshift when the temperature was increased from 10 K to 120 K. The PL peak energy exhibited an abnormal S-shape behaviour as a function of temperature for all samples. Most samples exhibited a significant enhancement in their activation energies when annealed at 600°C and 700°C, suggesting that annealing annihilated defects created during sample growth.

Keywords: RTA, QDs, InAs, MBE

Procedia PDF Downloads 158
322 Ab Initio Calculations of Structure and Elastic Properties of BexZn1−xO Alloys

Authors: S. Lakel, F. Elhamra, M. Ibrir, K. Almi

Abstract:

There is a growing interest in Zn1-xBexO (ZBO)/ZnO hetero structures and quantum wells since the band gap energy of Zn1-xBexO solid solutions can be turned over a very large range (3.37–10.6 eV) as a function of the Be composition. ZBO/ZnO has been utilized in ultraviolet light emission diodes and lasers, and may find applications as active elements of various other electronic and optoelectronic devices. Band gap engineering by Be substitution enables the facile preparation of barrier layers and quantum wells in device structures. In addition, ZnO and its ternary alloys, as piezoelectric semiconductors, have been used for high-frequency surface acoustic wave devices in wireless communication systems due to their high acoustic velocities and large electromechanical coupling. However, many important parameters such as elastic constants, bulk modulus, Young’s modulus and band-gap bowing. First-principles calculations of the structural, electrical and elastic properties of Zn1-xBexO as a function of the Be concentration x have been performed within density functional theory using norm-conserving pseudopotentials and local density approximation (LDA) for the exchange and correlation energy. The alloys’ lattice constants may deviate from the Vegard law. As Be concentration increases, the elastic constants, the bulk modulus and Young’s modulus of the alloys increase, the band gap increases with increasing Be concentration and Zn1-xBexO alloys have direct band. Our calculated results are in good agreement with experimental data and other theoretical calculations.

Keywords: DFT calculation, norm-conserving pseudopotentials, ZnBeO alloys, ZnO

Procedia PDF Downloads 503
321 Facial Biometric Privacy Using Visual Cryptography: A Fundamental Approach to Enhance the Security of Facial Biometric Data

Authors: Devika Tanna

Abstract:

'Biometrics' means 'life measurement' but the term is usually associated with the use of unique physiological characteristics to identify an individual. It is important to secure the privacy of digital face image that is stored in central database. To impart privacy to such biometric face images, first, the digital face image is split into two host face images such that, each of it gives no idea of existence of the original face image and, then each cover image is stored in two different databases geographically apart. When both the cover images are simultaneously available then only we can access that original image. This can be achieved by using the XM2VTS and IMM face database, an adaptive algorithm for spatial greyscale. The algorithm helps to select the appropriate host images which are most likely to be compatible with the secret image stored in the central database based on its geometry and appearance. The encryption is done using GEVCS which results in a reconstructed image identical to the original private image.

Keywords: adaptive algorithm, database, host images, privacy, visual cryptography

Procedia PDF Downloads 110
320 Solid-State Synthesis Approach and Optical study of Red Emitting Phosphors Li₃BaSrxCa₁₋ₓEu₂.₇Gd₀.₃(MoO₄)₈ for White LEDs

Authors: Priyansha Sharma, Sibani Mund, Sivakumar Vaidyanathan

Abstract:

Solid-state synthesis methods were used for the synthesis of pure red emissive Li¬3BaSrxCa(1-x)Eu2.7Gd0.3(MoO4)8 (x = 0.0 to 1.0) phosphors, XRD, SEM, and FTIR spectra were used to characterize the materials, and their optical properties were thoroughly investigated. PL studies were examined at different excitations 230 nm, 275nm, 465nm, and 395 nm. All the spectra show similar emissions with the highest transition at 616 nm due to ED transition. The given phosphor Li¬3BaSr0.25Ca0.75Eu2.7Gd0.3(MoO4)8 shows the highest intensity and is thus chosen for the temperature-dependent and Quantum yield study. According to the PL investigation, the phosphor-containing Eu3+ emits red light due to the (5D0 7F2) transition. The excitation analysis shows that all of the Eu3+ activated phosphors exhibited broad absorption due to the charge transfer band, O2-Mo6+, O2-Eu3+ transition, as well as narrow absorption bands related to the Eu3+ ion's 4f-4f electronic transition. Excitation spectra show Charge transfer band at 275 nm shows the highest intensity. The primary band in the spectra refers to Eu3+ ions occupying the lattice's non-centrosymmetric location. All of the compositions are monoclinic crystal structures with space group C2/c and match with reference powder patterns. The thermal stability of the 3BaSr0.25Ca0.75Eu2.7Gd0.3(MoO4)8 phosphor was investigated at (300 k- 500 K) as well as at low temperature from (20 K to 275 K) to be utilized for red and white LED fabrication. The Decay Lifetime of all the phosphor was measured. The best phosphor was used for White and Red LED fabrication.

Keywords: PL, phosphor, quantum yield, white LED

Procedia PDF Downloads 49
319 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble

Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi

Abstract:

Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.

Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble

Procedia PDF Downloads 203
318 An Attack on the Lucas Based El-Gamal Cryptosystem in the Elliptic Curve Group Over Finite Field Using Greater Common Divisor

Authors: Lee Feng Koo, Tze Jin Wong, Pang Hung Yiu, Nik Mohd Asri Nik Long

Abstract:

Greater common divisor (GCD) attack is an attack that relies on the polynomial structure of the cryptosystem. This attack required two plaintexts differ from a fixed number and encrypted under same modulus. This paper reports a security reaction of Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field under GCD attack. Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field was exposed mathematically to the GCD attack using GCD and Dickson polynomial. The result shows that the cryptanalyst is able to get the plaintext without decryption by using GCD attack. Thus, the study concluded that it is highly perilous when two plaintexts have a slight difference from a fixed number in the same Elliptic curve group over finite field.

Keywords: decryption, encryption, elliptic curve, greater common divisor

Procedia PDF Downloads 233
317 Development of a Data Security Model Using Steganography

Authors: Terungwa Simon Yange, Agana Moses A.

Abstract:

This paper studied steganography and designed a simplistic approach to a steganographic tool for hiding information in image files with the view of addressing the security challenges with data by hiding data from unauthorized users to improve its security. The Structured Systems Analysis and Design Method (SSADM) was used in this work. The system was developed using Java Development Kit (JDK) 1.7.0_10 and MySQL Server as its backend. The system was tested with some hypothetical health records which proved the possibility of protecting data from unauthorized users by making it secret so that its existence cannot be easily recognized by fraudulent users. It further strengthens the confidentiality of patient records kept by medical practitioners in the health setting. In conclusion, this work was able to produce a user friendly steganography software that is very fast to install and easy to operate to ensure privacy and secrecy of sensitive data. It also produced an exact copy of the original image and the one carrying the secret message when compared with each.

Keywords: steganography, cryptography, encryption, decryption, secrecy

Procedia PDF Downloads 247
316 Utilization of Secure Wireless Networks as Environment for Learning and Teaching in Higher Education

Authors: Mohammed A. M. Ibrahim

Abstract:

This paper investigate the utilization of wire and wireless networks to be platform for distributed educational monitoring system. Universities in developing countries suffer from a lot of shortages(staff, equipment, and finical budget) and optimal utilization of the wire and wireless network, so universities can mitigate some of the mentioned problems and avoid the problems that maybe humble the education processes in many universities by using our implementation of the examinations system as a test-bed to utilize the network as a solution to the shortages for academic staff in Taiz University. This paper selects a two areas first one quizzes activities is only a test bed application for wireless network learning environment system to be distributed among students. Second area is the features and the security of wireless, our tested application implemented in a promising area which is the use of WLAN in higher education for leering environment.

Keywords: networking wire and wireless technology, wireless network security, distributed computing, algorithm, encryption and decryption

Procedia PDF Downloads 320
315 Photoluminescence and Spectroscopic Studies of Tm3+ Ions Doped Lead Tungsten Tellurite Glasses for Visible Red and Near-Ir Laser Applications

Authors: M. Venkateswarlu, Srinivasa Rao Allam, S. K. Mahamuda, K. Swapna, G. Vijaya Prakash

Abstract:

Lead Tungsten Tellurite (LTT) glasses doped with different concentrations of Tm3+ ions were prepared by using melt quenching technique and characterized through optical absorption, photoluminescence and decay spectral studies to know the feasibility of using these glasses as luminescent devices in visible Red and NIR regions. By using optical absorption spectral data, the energy band gaps for all the glasses were evaluated and were found to be in the range of 2.34-2.59 eV; which is very useful for the construction of optical devices. Judd-Ofelt (J-O)theory has been applied to the optical absorption spectral profiles to calculate the J-O intensity parameters Ωλ (λ=2, 4 and 6) and consecutively used to evaluate various radiative properties such as radiative transition probability (AR), radiative lifetimes (τ_R) and branching ratios (β_R) for the prominent luminescent levels. The luminescence spectra for all the LTT glass samples have shown two intense peaks in bright red and Near Infrared regions at 650 nm (1G4→3F4) and 800 nm (3H4→3H6) respectively for which effective bandwidths (〖Δλ〗_P), experimental branching ratios (β_exp) and stimulated emission cross-sections (σ_se) are evaluated. The decay profiles for all the glasses were also recorded to measure the quantum efficiency of the prepared LTT glasses by coupling the radiative and experimental lifetimes. From the measured emission cross-sections, quantum efficiency and CIE chromaticity coordinates, it was found that 0.5 mol% of Tm3+ ions doped LTT glass is most suitable for generating bright visible red and NIR lasers to operate at 650 and 800 nm respectively.

Keywords: glasses, JO parameters, optical materials, thullium

Procedia PDF Downloads 229
314 Generalized π-Armendariz Authentication Cryptosystem

Authors: Areej M. Abduldaim, Nadia M. G. Al-Saidi

Abstract:

Algebra is one of the important fields of mathematics. It concerns with the study and manipulation of mathematical symbols. It also concerns with the study of abstractions such as groups, rings, and fields. Due to the development of these abstractions, it is extended to consider other structures, such as vectors, matrices, and polynomials, which are non-numerical objects. Computer algebra is the implementation of algebraic methods as algorithms and computer programs. Recently, many algebraic cryptosystem protocols are based on non-commutative algebraic structures, such as authentication, key exchange, and encryption-decryption processes are adopted. Cryptography is the science that aimed at sending the information through public channels in such a way that only an authorized recipient can read it. Ring theory is the most attractive category of algebra in the area of cryptography. In this paper, we employ the algebraic structure called skew -Armendariz rings to design a neoteric algorithm for zero knowledge proof. The proposed protocol is established and illustrated through numerical example, and its soundness and completeness are proved.

Keywords: cryptosystem, identification, skew π-Armendariz rings, skew polynomial rings, zero knowledge protocol

Procedia PDF Downloads 194
313 Analysis of Lightweight Register Hardware Threat

Authors: Yang Luo, Beibei Wang

Abstract:

In this paper, we present a design methodology of lightweight register transfer level (RTL) hardware threat implemented based on a MAX II FPGA platform. The dynamic power consumed by the toggling of the various bit of registers as well as the dynamic power consumed per unit of logic circuits were analyzed. The hardware threat was designed taking advantage of the differences in dynamic power consumed per unit of logic circuits to hide the transfer information. The experiment result shows that the register hardware threat was successfully implemented by using different dynamic power consumed per unit of logic circuits to hide the key information of DES encryption module. It needs more than 100000 sample curves to reduce the background noise by comparing the sample space when it completely meets the time alignment requirement. In additional, an external trigger signal is playing a very important role to detect the hardware threat in this experiment.

Keywords: side-channel analysis, hardware Trojan, register transfer level, dynamic power

Procedia PDF Downloads 263
312 PUF-Based Lightweight Iot Secure Authentication Chip Design

Authors: Wenxuan Li, Lei Li, Jin Li, Yuanhang He

Abstract:

This paper designed a secure chip for IoT communication security integrated with the PUF-based firmware protection scheme. Then, the Xilinx Kintex-7 and STM-32 were used for the prototype verification. Firmware protection worked well on FPGA and embedded platforms. For the ASIC implementation of the PUF module, contact PUF is chosen. The post-processing method and its improvement are analyzed with emphasis. This paper proposed a more efficient post-processing method for contact PUF named SXOR, which has practical value for realizing lightweight security modules in IoT devices. The analysis was carried out under the hypothesis that the contact holes are independent and combine the existing data in the open literature. The post-processing effects of SXOR and XOR are basically the same under the condition that the proposed post-processing circuit occupies only 50.6% of the area of XOR. The average Hamming weight of the PUF output bit sequence obtained by the proposed post-processing method is 0.499735, and the average Hamming weight obtained by the XOR-based post-processing method is 0.499999.

Keywords: PUF, IoT, authentication, secure communication, encryption, XOR

Procedia PDF Downloads 117
311 Tuning the Emission Colour of Phenothiazine by Introduction of Withdrawing Electron Groups

Authors: Andrei Bejan, Luminita Marin, Dalila Belei

Abstract:

Phenothiazine with electron-rich nitrogen and sulfur heteroatoms has a high electron-donating ability which promotes a good conjugation and therefore low band-gap with consequences upon charge carrier mobility improving and shifting of light emission in visible domain. Moreover, its non-planar butterfly conformation inhibits molecular aggregation and thus preserves quite well the fluorescence quantum yield in solid state compared to solution. Therefore phenothiazine and its derivatives are promising hole transport materials for use in organic electronic and optoelectronic devices as light emitting diodes, photovoltaic cells, integrated circuit sensors or driving circuits for large area display devices. The objective of this paper was to obtain a series of new phenothiazine derivatives by introduction of different electron withdrawing substituents as formyl, carboxyl and cyanoacryl units in order to create a push pull system which has potential to improve the electronic and optical properties. Bromine atom was used as electrono-donor moiety to extend furthermore the existing conjugation. The understudy compounds were structural characterized by FTIR and 1H-NMR spectroscopy and single crystal X-ray diffraction. Besides, the single crystal X-ray diffraction brought information regarding the supramolecular architecture of the compounds. Photophysical properties were monitored by UV-vis and photoluminescence spectroscopy, while the electrochemical behavior was established by cyclic voltammetry. The absorption maxima of the studied compounds vary in a large range (322-455 nm), reflecting the different electronic delocalization degree, depending by the substituent nature. In a similar manner, the emission spectra reveal different color of emitted light, a red shift being evident for the groups with higher electron withdrawing ability. The emitted light is pure and saturated for the compounds containing strong withdrawing formyl or cyanoacryl units and reach the highest quantum yield of 71% for the compound containing bromine and cyanoacrilic units. Electrochemical study show reversible oxidative and reduction processes for all the compounds and a close correlation of the HOMO-LUMO band gap with substituent nature. All these findings suggest the obtained compounds as promising materials for optoelectronic devices.

Keywords: electrochemical properties, phenothiazine derivatives, photoluminescence, quantum yield

Procedia PDF Downloads 313
310 Mitigating the Aggregation of Human Islet Amyloid Polypeptide with Nanomaterials

Authors: Ava Faridi, Pouya Faridi, Aleksandr Kakinen, Ibrahim Javed, Thomas P. Davis, Pu Chun Ke

Abstract:

Human islet amyloid polypeptide (IAPP) is a hormone associated with glycemic control and type 2 diabetes. Biophysically, the chirality of IAPP fibrils has been little explored with respect to the aggregation and toxicity of the peptide. Biochemically, it remains unclear as for how protein expression in pancreatic beta cells may be altered by cell exposure to the peptide, and how such changes may be mitigated by nanoparticle inhibitors for IAPP aggregation. In this study, we first demonstrated the elimination of the IAPP nucleation phase and shortening of its elongation phase by silica nanoribbons. This accelerated IAPP fibrillization translated to reduced toxicity, especially for the right-handed silica nanoribbons, as revealed by cell viability, helium ion microscopy, as well as zebrafish embryo survival, developmental and behavioral assays. We then examined the proteomes of βTC6 pancreatic beta cells exposed to the three main aggregation states of monomeric, oligomeric and amyloid fibrillar IAPP, and compared that with cellular protein expression modulated by graphene quantum dots (GQDs). A total of 29 proteins were significantly regulated by different forms of IAPP, and the majority of these proteins were nucleotide-binding proteins. A regulatory capacity of GQDs against aberrant protein expression was confirmed. These studies have demonstrated the great potential of employing nanomaterials targeting the mesoscopic enantioselectivity and protein expression dysregulation in pancreatic beta cells.

Keywords: graphene quantum dots, IAPP, silica nanoribbons, protein expression, toxicity

Procedia PDF Downloads 127
309 Photoluminescence and Energy Transfer Studies of Dy3+ Ions Doped Lithium Lead Alumino Borate Glasses for W-LED and Laser Applications

Authors: Nisha Deopa, A. S. Rao

Abstract:

Lithium Lead Alumino Borate (LiPbAlB) glasses doped with different Dy3+ ions concentration were synthesized to investigate their viability in solid state lighting (SSL) technology by melt quenching techniques. From the absorption spectra, bonding parameters (ð) were investigated to study the nature of bonding between Dy3+ ions and its surrounding ligands. Judd-Ofelt (J-O) intensity parameters (Ω = 2, 4, 6), estimated from the experimental oscillator strengths (fex) of the absorption spectral features were used to evaluate the radiative parameters of different transition levels. From the decay curves, experimental lifetime (τex) were measured and coupled with the radiative lifetime to evaluate the quantum efficiency of the as-prepared glasses. As Dy3+ ions concentration increases, decay profile changes from exponential to non-exponential through energy transfer mechanism (ETM) in turn decreasing experimental lifetime. In order to investigate the nature of ETM, non-exponential decay curves were fitted to Inkuti–Hirayama (I-H) model which further confirms dipole-dipole interaction. Among all the emission transition, 4F9/2  6H15/2 transition (483 nm) is best suitable for lasing potentialities. By exciting titled glasses in n-UV to blue regions, CIE chromaticity coordinates and Correlated Color Temperature (CCT) were calculated to understand their capability in cool white light generation. From the evaluated radiative parameters, CIE co-ordinates, quantum efficiency and confocal images it was observed that glass B (0.5 mol%) is a potential candidate for developing w-LEDs and lasers.

Keywords: energy transfer, glasses, J-O parameters, photoluminescence

Procedia PDF Downloads 196
308 A Hybrid Model for Secure Protocol Independent Multicast Sparse Mode and Dense Mode Protocols in a Group Network

Authors: M. S. Jimah, A. C. Achuenu, M. Momodu

Abstract:

Group communications over public infrastructure are prone to a lot of security issues. Existing network protocols like Protocol Independent Multicast Sparse Mode (PIM SM) and Protocol Independent Multicast Dense Mode (PIM DM) do not have inbuilt security features. Therefore, any user or node can easily access the group communication as long as the user can send join message to the source nodes, the source node then adds the user to the network group. In this research, a hybrid method of salting and hashing to encrypt information in the source and stub node was designed, and when stub nodes need to connect, they must have the appropriate key to join the group network. Object oriented analysis design (OOAD) was the methodology used, and the result shows that no extra controlled bandwidth overhead cost was added by encrypting and the hybrid model was more securing than the existing PIM SM, PIM DM and Zhang secure PIM SM.

Keywords: group communications, multicast, PIM SM, PIM DM, encryption

Procedia PDF Downloads 144