Search results for: secure storage
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2735

Search results for: secure storage

2345 Application of UV-C Irradiation on Quality and Textural Properties of Button Mushrooms

Authors: M. Ghasemi-Varnamkhasti, S. H. Yoosefian. A. Mohammad- Razdari

Abstract:

The effect of 1.0 kJ/m2 Ultraviolet-C (UV-C) light on pH, weight loss, color, and firmness of button mushroom (Agaricus bisporus) tissues during 21-days storage at 4 ºC was studied. UV-C irradiation enhanced pH, weight, color parameters, and firmness of mushroom during storage compared to control treatment. However, application of 1.0 kJ/m2 UV-C treatment could effectively induce the increase of weight loss, firmness, and pH to 14.53%, 49.82%, and 10.39%, respectively. These results suggest that the application of UV-C irradiation could be an effective method to maintain the postharvest quality of mushrooms.

Keywords: mushroom, polyethylene film, quality, UV-c irradiation

Procedia PDF Downloads 294
2344 Double Encrypted Data Communication Using Cryptography and Steganography

Authors: Adine Barett, Jermel Watson, Anteneh Girma, Kacem Thabet

Abstract:

In information security, secure communication of data across networks has always been a problem at the forefront. Transfer of information across networks is susceptible to being exploited by attackers engaging in malicious activity. In this paper, we leverage steganography and cryptography to create a layered security solution to protect the information being transmitted. The first layer of security leverages crypto- graphic techniques to scramble the information so that it cannot be deciphered even if the steganography-based layer is compromised. The second layer of security relies on steganography to disguise the encrypted in- formation so that it cannot be seen. We consider three cryptographic cipher methods in the cryptography layer, namely, Playfair cipher, Blowfish cipher, and Hills cipher. Then, the encrypted message is passed through the least significant bit (LSB) to the steganography algorithm for further encryption. Both encryption approaches are combined efficiently to help secure information in transit over a network. This multi-layered encryption is a solution that will benefit cloud platforms, social media platforms and networks that regularly transfer private information such as banks and insurance companies.

Keywords: cryptography, steganography, layered security, Cipher, encryption

Procedia PDF Downloads 82
2343 Secure Network Coding against Content Pollution Attacks in Named Data Network

Authors: Tao Feng, Xiaomei Ma, Xian Guo, Jing Wang

Abstract:

Named Data Network (NDN) is one of the future Internet architecture, all nodes (i.e., hosts, routers) are allowed to have a local cache, used to satisfy incoming requests for content. However, depending on caching allows an adversary to perform attacks that are very effective and relatively easy to implement, such as content pollution attack. In this paper, we use a method of secure network coding based on homomorphic signature system to solve this problem. Firstly ,we use a dynamic public key technique, our scheme for each generation authentication without updating the initial secret key used. Secondly, employing the homomorphism of hash function, intermediate node and destination node verify the signature of the received message. In addition, when the network topology of NDN is simple and fixed, the code coefficients in our scheme are generated in a pseudorandom number generator in each node, so the distribution of the coefficients is also avoided. In short, our scheme not only can efficiently prevent against Intra/Inter-GPAs, but also can against the content poisoning attack in NDN.

Keywords: named data networking, content polloution attack, network coding signature, internet architecture

Procedia PDF Downloads 336
2342 Quantum Entangled States and Image Processing

Authors: Sanjay Singh, Sushil Kumar, Rashmi Jain

Abstract:

Quantum registering is another pattern in computational hypothesis and a quantum mechanical framework has a few helpful properties like Entanglement. We plan to store data concerning the structure and substance of a basic picture in a quantum framework. Consider a variety of n qubits which we propose to use as our memory stockpiling. In recent years classical processing is switched to quantum image processing. Quantum image processing is an elegant approach to overcome the problems of its classical counter parts. Image storage, retrieval and its processing on quantum machines is an emerging area. Although quantum machines do not exist in physical reality but theoretical algorithms developed based on quantum entangled states gives new insights to process the classical images in quantum domain. Here in the present work, we give the brief overview, such that how entangled states can be useful for quantum image storage and retrieval. We discuss the properties of tripartite Greenberger-Horne-Zeilinger and W states and their usefulness to store the shapes which may consist three vertices. We also propose the techniques to store shapes having more than three vertices.

Keywords: Greenberger-Horne-Zeilinger, image storage and retrieval, quantum entanglement, W states

Procedia PDF Downloads 304
2341 An Authentication Protocol for Quantum Enabled Mobile Devices

Authors: Natarajan Venkatachalam, Subrahmanya V. R. K. Rao, Vijay Karthikeyan Dhandapani, Swaminathan Saravanavel

Abstract:

The quantum communication technology is an evolving design which connects multiple quantum enabled devices to internet for secret communication or sensitive information exchange. In future, the number of these compact quantum enabled devices will increase immensely making them an integral part of present communication systems. Therefore, safety and security of such devices is also a major concern for us. To ensure the customer sensitive information will not be eavesdropped or deciphered, we need a strong authentications and encryption mechanism. In this paper, we propose a mutual authentication scheme between these smart quantum devices and server based on the secure exchange of information through quantum channel which gives better solutions for symmetric key exchange issues. An important part of this work is to propose a secure mutual authentication protocol over the quantum channel. We show that our approach offers robust authentication protocol and further our solution is lightweight, scalable, cost-effective with optimized computational processing overheads.

Keywords: quantum cryptography, quantum key distribution, wireless quantum communication, authentication protocol, quantum enabled device, trusted third party

Procedia PDF Downloads 170
2340 The Relationship among Attachment Styles, Humor Styles and Communication Patterns in Female Married Students

Authors: Elham Fathi, Seyed Mohammad Kalantarkousheh, Abolfazl Hatami Varzane

Abstract:

The present study aimed to determine predict capacity of the relationship among attachment styles, humor styles and communication patterns in female married students. Statistical population consisted of female married students from Allameh Tabataba’i University. The research sample consisted of 104 married students selected through convenience sampling. They responded to study instruments that consisted of attachment styles, humor styles and Communication patterns questionnaires. Data was analyzed by means of correlation method. The results indicated significant positive relationship between secure attachment styles with adaptive humor styles, and anxious attachment styles with maladaptive humor styles. Also a negative relationship between avoidant attachment with affiliative humor, and anxious attachment with self-enhancing humor was found. Furthermore, a negative relationship between self- enhancing humor styles with demand – withdraw communication pattern, and between affiliative humor with mutual avoidant communication pattern and a positive relationship between affiliative humor with mutual constructive communication pattern was observed. The relationship between secure attachment with mutual constructive communication pattern was positive, while relationship between avoidant attachment to mutual constructive communication pattern was negative and significant and its relation with mutual avoidant communication pattern was significantly positive. The result of regression analysis indicated that affliative humor style and secure attachment style, positively predicted mutual constructive communication pattern. Avoidant attachment style positively and affliative humor style negatively predicted the mutual avoidant communication pattern. And self-enhancing humor style negatively predicted the demand – withdraw communication pattern style.

Keywords: attachment styles, communication patterns, humor styles, female married students

Procedia PDF Downloads 371
2339 Freshwater Pinch Analysis for Optimal Design of the Photovoltaic Powered-Pumping System

Authors: Iman Janghorban Esfahani

Abstract:

Due to the increased use of irrigation in agriculture, the importance and need for highly reliable water pumping systems have significantly increased. The pumping of the groundwater is essential to provide water for both drip and furrow irrigation to increase the agricultural yield, especially in arid regions that suffer from scarcities of surface water. The most common irrigation pumping systems (IPS) consume conventional energies through the use of electric motors and generators or connecting to the electricity grid. Due to the shortage and transportation difficulties of fossil fuels, and unreliable access to the electricity grid, especially in the rural areas, and the adverse environmental impacts of fossil fuel usage, such as greenhouse gas (GHG) emissions, the need for renewable energy sources such as photovoltaic systems (PVS) as an alternative way of powering irrigation pumping systems is urgent. Integration of the photovoltaic systems with irrigation pumping systems as the Photovoltaic Powered-Irrigation Pumping System (PVP-IPS) can avoid fossil fuel dependency and the subsequent greenhouse gas emissions, as well as ultimately lower energy costs and improve efficiency, which made PVP-IPS systems as an environmentally and economically efficient solution for agriculture irrigation in every region. The greatest problem faced by integration of PVP with IPS systems is matching the intermittence of the energy supply with the dynamic water demand. The best solution to overcome the intermittence is to incorporate a storage system into the PVP-IPS to provide water-on-demand as a highly reliable stand-alone irrigation pumping system. The water storage tank (WST) is the most common storage device for PVP-IPS systems. In the integrated PVP-IPS with a water storage tank (PVP-IPS-WST), a water storage tank stores the water pumped by the IPS in excess of the water demand and then delivers it when demands are high. The Freshwater pinch analysis (FWaPA) as an alternative to mathematical modeling was used by other researchers for retrofitting the off-grid battery less photovoltaic-powered reverse osmosis system. However, the Freshwater pinch analysis has not been used to integrate the photovoltaic systems with irrigation pumping system with water storage tanks. In this study, FWaPA graphical and numerical tools were used for retrofitting an existing PVP-IPS system located in Salahadin, Republic of Iraq. The plant includes a 5 kW submersible water pump and 7.5 kW solar PV system. The Freshwater Composite Curve as the graphical tool and Freashwater Storage Cascade Table as the numerical tool were constructed to determine the minimum required outsourced water during operation, optimal amount of delivered electricity to the water pump, and optimal size of the water storage tank for one-year operation data. The results of implementing the FWaPA on the case study show that the PVP-IPS system with a WST as the reliable system can reduce outsourced water by 95.41% compare to the PVP-IPS system without storage tank.

Keywords: irrigation, photovoltaic, pinch analysis, pumping, solar energy

Procedia PDF Downloads 137
2338 Determination of Iodine and Heavy Metals in Two Brands of Iodised Salt

Authors: Z. O. Apotiola, J. F. Fashakin

Abstract:

A study was conducted to investigate the storage stability of Mr Chef and Annapurna salts. The salts were bought from Mile 12 market in Lagos State and were stored for a period of six months. The stability of the iodine content was then investigated by storing some at ambient temperature (24-30oC) and some at atmospheric temperature (21-35 oC), and from each storage condition, a sample each was taken every month to analyze for the iodine and moisture contents. The result shows that there was a significant difference between Mr Chef and the standard and Annapurna and the standard. The iodine content of Mr Chef stored at ambient and atmospheric temperature decreases progressively from 48.70±0.00-37.00±0.00 and 47.60±0.00-11.60±0.00 respectively. And that of Annapurna at both ambient and atmospheric temperature also decreases progressively from 47.60±0.00-36.60±0.00 and 47.60±0.00-10.60±0.00 respectively. Also, the moisture content of both salts at the zero month to the sixth month both at room temperature and atmospheric temperature increases from 1.11±0.00-1.70±0.00 and 1.11±0.00-2.40±0.00 respectively. The results of the heavy metals shows that only Copper, Zinc and Cobalt were detected at the first and the sixth month in both Mr Chef and Annapurna which ranges from 0.15±0.00-0.38±0.00 and 0.18±0.00 - 3.50±0.00 respectively. Hence, the stability of iodine in salt is influenced by the storage conditions it is subjected to and the length of time it is been stored.

Keywords: salt, iodine, stability, ambient, atmospheric temperature

Procedia PDF Downloads 576
2337 Evaluation of Antioxidant and Antimicrobial Potential of Rutin in Cheddar Cheese

Authors: Haroon Jamshaid Qazi, Namrah Wahid, Sanaullah Iqbal, Raheel Suleman

Abstract:

The aim of the current study was to evaluate the antioxidant and antimicrobial potential of Rutin in cheddar cheese. The study was conducted by adding the Rutin in the cheddar cheese in different concentrations according to experimental design, i.e., T1 (20 ppm Rutin), T2 (40 ppm Rutin), T3 (60 ppm Rutin), T4 (80 ppm Rutin). BHT was taken as a positive control at a concentration of 200 ppm, and negative control had neither Rutin nor BHT. The ripening time for cheeses was 90 days at a temperature of 8°C. The results of the various antioxidants assays (Total phenolic contents (TPC) and Antioxidant activity (AA), with storage stability tests (Anisidine value (AV) and Thiobarbituric acid value (TBARS)) performed during different storage intervals 0, 30, 60 and 90 days exhibited that AA in linoleic acid and TPC were significantly (p < 0.05) increased by the addition of rutin to cheese at all concentrations. Moreover, significant reduction in the TBARS values was also observed during the storage period. Rutin also showed a good potential to inhibit the microbial proliferation in the treated samples of cheese. There was a significant decreasing trend seen in total plate count and yeasts and molds count. The sensorial attributes i.e., color, flavor, odor and overall acceptability were increased after adding Rutin to cheddar cheese.

Keywords: cheddar cheese, Rutin, antioxidant, antimicrobial

Procedia PDF Downloads 183
2336 Meet Automotive Software Safety and Security Standards Expectations More Quickly

Authors: Jean-François Pouilly

Abstract:

This study addresses the growing complexity of embedded systems and the critical need for secure, reliable software. Traditional cybersecurity testing methods, often conducted late in the development cycle, struggle to keep pace. This talk explores how formal methods, integrated with advanced analysis tools, empower C/C++ developers to 1) Proactively address vulnerabilities and bugs, which includes formal methods and abstract interpretation techniques to identify potential weaknesses early in the development process, reducing the reliance on penetration and fuzz testing in later stages. 2) Streamline development by focusing on bugs that matter, with close to no false positives and catching flaws earlier, the need for rework and retesting is minimized, leading to faster development cycles, improved efficiency and cost savings. 3) Enhance software dependability which includes combining static analysis using abstract interpretation with full context sensitivity, with hardware memory awareness allows for a more comprehensive understanding of potential vulnerabilities, leading to more dependable and secure software. This approach aligns with industry best practices (ISO2626 or ISO 21434) and empowers C/C++ developers to deliver robust, secure embedded systems that meet the demands of today's and tomorrow's applications. We will illustrate this approach with the TrustInSoft analyzer to show how it accelerates verification for complex cases, reduces user fatigue, and improves developer efficiency, cost-effectiveness, and software cybersecurity. In summary, integrating formal methods and sound Analyzers enhances software reliability and cybersecurity, streamlining development in an increasingly complex environment.

Keywords: safety, cybersecurity, ISO26262, ISO24434, formal methods

Procedia PDF Downloads 17
2335 Impact Evaluation of Discriminant Analysis on Epidemic Protocol in Warships’s Scenarios

Authors: Davi Marinho de Araujo Falcão, Ronaldo Moreira Salles, Paulo Henrique Maranhão

Abstract:

Disruption Tolerant Networks (DTN) are an evolution of Mobile Adhoc Networks (MANET) and work good in scenarioswhere nodes are sparsely distributed, with low density, intermittent connections and an end-to-end infrastructure is not possible to guarantee. Therefore, DTNs are recommended for high latency applications that can last from hours to days. The maritime scenario has mobility characteristics that contribute to a DTN network approach, but the concern with data security is also a relevant aspect in such scenarios. Continuing the previous work, which evaluated the performance of some DTN protocols (Epidemic, Spray and Wait, and Direct Delivery) in three warship scenarios and proposed the application of discriminant analysis, as a classification technique for secure connections, in the Epidemic protocol, thus, the current article proposes a new analysis of the directional discriminant function with opening angles smaller than 90 degrees, demonstrating that the increase in directivity influences the selection of a greater number of secure connections by the directional discriminant Epidemic protocol.

Keywords: DTN, discriminant function, epidemic protocol, security, tactical messages, warship scenario

Procedia PDF Downloads 191
2334 Examining the Extent and Magnitude of Food Security amongst Rural Farming Households in Nigeria

Authors: Ajibade T., Omotesho O. A., Ayinde O. E, Ajibade E. T., Muhammad-Lawal A.

Abstract:

This study was carried out to examine the extent and magnitude of food security amongst farming rural households in Nigeria. Data used for this study was collected from a total of two hundred and forty rural farming households using a two-stage random sampling technique. The main tools of analysis for this study include descriptive statistics and a constructed food security index using the identification and aggregation procedure. The headcount ratio in this study reveals that 71% of individuals in the study area were food secure with an average per capita calorie and protein availability of 4,213.92kcal and 99.98g respectively. The aggregated household daily calorie availability and daily protein availability per capita were 3,634.57kcal and 84.08g respectively which happens to be above the food security line of 2,470kcal and 65g used in this study. The food insecure households fell short of the minimum daily per capita calorie and protein requirement by 2.1% and 24.9%. The study revealed that the area is food insecure due to unequal distribution of the available food amongst the sampled population. The study recommends that the households should empower themselves financially in order to enhance their ability to afford the food during both on and off seasons. Also, processing and storage of farm produce should be enhanced in order to improve on availability throughout the year.

Keywords: farming household, food security, identification and aggregation, food security index

Procedia PDF Downloads 289
2333 Modelling of Solidification in a Latent Thermal Energy Storage with a Finned Tube Bundle Heat Exchanger Unit

Authors: Remo Waser, Simon Maranda, Anastasia Stamatiou, Ludger J. Fischer, Joerg Worlitschek

Abstract:

In latent heat storage, a phase change material (PCM) is used to store thermal energy. The heat transfer rate during solidification is limited and considered as a key challenge in the development of latent heat storages. Thus, finned heat exchangers (HEX) are often utilized to increase the heat transfer rate of the storage system. In this study, a new modeling approach to calculating the heat transfer rate in latent thermal energy storages with complex HEX geometries is presented. This model allows for an optimization of the HEX design in terms of costs and thermal performance of the system. Modeling solidification processes requires the calculation of time-dependent heat conduction with moving boundaries. Commonly used computational fluid dynamic (CFD) methods enable the analysis of the heat transfer in complex HEX geometries. If applied to the entire storage, the drawback of this approach is the high computational effort due to small time steps and fine computational grids required for accurate solutions. An alternative to describe the process of solidification is the so-called temperature-based approach. In order to minimize the computational effort, a quasi-stationary assumption can be applied. This approach provides highly accurate predictions for tube heat exchangers. However, it shows unsatisfactory results for more complex geometries such as finned tube heat exchangers. The presented simulation model uses a temporal and spatial discretization of heat exchanger tube. The spatial discretization is based on the smallest possible symmetric segment of the HEX. The heat flow in each segment is calculated using finite volume method. Since the heat transfer fluid temperature can be derived using energy conservation equations, the boundary conditions at the inner tube wall is dynamically updated for each time step and segment. The model allows a prediction of the thermal performance of latent thermal energy storage systems using complex HEX geometries with considerably low computational effort.

Keywords: modelling of solidification, finned tube heat exchanger, latent thermal energy storage

Procedia PDF Downloads 265
2332 An Efficient and Provably Secure Three-Factor Authentication Scheme with Key Agreement

Authors: Mohan Ramasundaram, Amutha Prabakar Muniyandi

Abstract:

Remote user authentication is one of the important tasks for any kind of remote server applications. Several remote authentication schemes are proposed by the researcher for Telecare Medicine Information System (TMIS). Most of the existing techniques have limitations, vulnerable to various kind attacks, lack of functionalities, information leakage, no perfect forward security and ineffectiveness. Authentication is a process of user verification mechanism for allows him to access the resources of a server. Nowadays, most of the remote authentication protocols are using two-factor authentications. We have made a survey of several remote authentication schemes using three factors and this survey shows that the most of the schemes are inefficient and subject to several attacks. We observed from the experimental evaluation; the proposed scheme is very secure against various known attacks that include replay attack, man-in-the-middle attack. Furthermore, the analysis based on the communication cost and computational cost estimation of the proposed scheme with related schemes shows that our proposed scheme is efficient.

Keywords: Telecare Medicine Information System, elliptic curve cryptography, three-factor, biometric, random oracle

Procedia PDF Downloads 217
2331 Evaluating the Total Costs of a Ransomware-Resilient Architecture for Healthcare Systems

Authors: Sreejith Gopinath, Aspen Olmsted

Abstract:

This paper is based on our previous work that proposed a risk-transference-based architecture for healthcare systems to store sensitive data outside the system boundary, rendering the system unattractive to would-be bad actors. This architecture also allows a compromised system to be abandoned and a new system instance spun up in place to ensure business continuity without paying a ransom or engaging with a bad actor. This paper delves into the details of various attacks we simulated against the prototype system. In the paper, we discuss at length the time and computational costs associated with storing and retrieving data in the prototype system, abandoning a compromised system, and setting up a new instance with existing data. Lastly, we simulate some analytical workloads over the data stored in our specialized data storage system and discuss the time and computational costs associated with running analytics over data in a specialized storage system outside the system boundary. In summary, this paper discusses the total costs of data storage, access, and analytics incurred with the proposed architecture.

Keywords: cybersecurity, healthcare, ransomware, resilience, risk transference

Procedia PDF Downloads 130
2330 Nanohybrids for Energy Storage Devices

Authors: O. Guellati, A. Harat, F. Djefaflia, N. Habib, A. Nait-Merzoug, J. El Haskouri, D. Momodu, N. Manyala, D. Bégin, M. Guerioune

Abstract:

We report a facile and low-cost free-template synthesis method was used to synthesize mesoporous smart multifunctional nanohybrids based on Graphene/PANI nanofibers micro/nanostructures with very interesting physic-chemical properties and faradic electrochemical behavior of these products was investigated. These nanohybrid products have been characterized quantitatively and qualitatively using different techniques, such as XRD / FTIR, Raman, XPS spectroscopy, Field Emission SEM and High-Resolution TEM microscopy, BET textural analysis, electrochemical measurements (CV, CD, EIS). Moreover, the electrochemical measurements performed in a 6 M KOH aqueous electrolyte depicted excellent electrochemical performance ascribed to the optimized composition of hydroxides et PANI nanofibers. An exceptionally notable specific capacitance between 800  and 2000 F. g-1 was obtained at 5  mV. s-1 scan rate for these synthesized products depends on the optimized growth conditions. We found much better nanohybrids by reinforcing hydroxides or conduction polymer nanofibers with carbonaceous nanomaterials depicting their potential as suitable materials for energy storage devices.

Keywords: nanohybrid materials, conducting polymers, carbonaceous nanomaterials, supercapacitors, energy storage

Procedia PDF Downloads 70
2329 Kaolinite-Assisted Microencapsulation of Octodecane for Thermal Energy Storage

Authors: Ting Pan, Jiacheng Wang, Pengcheng Lin, Ying Chen, Songping Mo

Abstract:

Phase change materials (PCMs) are widely used in latent heat thermal energy storage because of their good properties such as high energy storage density and constant heat-storage/release temperature. Microencapsulation techniques can prevent PCMs from leaking during the liquid-solid phase transition and enhance thermal properties. This technique has been widely applied in architectural materials, thermo-regulated textiles, aerospace fields, etc. One of the most important processes during the synthesis of microcapsules is to form a stable emulsion of the PCM core and reactant solution for the formation of the shell of the microcapsules. The use of surfactants is usually necessary for the formation of a stable emulsion system because of the difference in hydrophilia/lipophilicity of the PCM and the solvent. Unfortunately, the use of surfactants may cause pollution to the environment. In this study, modified kaolinite was used as an emulsion stabilizer for the microencapsulation of octodecane as PCM. Microcapsules were synthesized by phase inversion emulsification method, and the shell of polymethyl methacrylate (PMMA) was formed through free radical polymerization. The morphologies, crystalloid phase, and crystallization properties of microcapsules were investigated using scanning electron microscopy (SEM), X-ray diffractometer (XRD), and Fourier transforms infrared spectrometer (FTIR). The thermal properties and thermal stability were investigated by a differential scanning calorimeter (DSC) and a thermogravimetric analyzer (TG). The FT-IR, XRD results showed that the octodecane was well encapsulated in the PMMA shell. The SEM results showed that the microcapsules were spheres with an average size of about 50-100nm. The DSC results indicated that the latent heat of the microcapsules was 152.64kJ/kg and 164.23kJ/kg. The TG results confirmed that the microcapsules had good thermal stability due to the PMMA shell. Based on the results, it can be concluded that the modified kaolinite can be used as an emulsifier for the synthesis of PCM microcapsules, which is valid for reducing part of the possible pollution caused by the utilization of surfactants.

Keywords: kaolinite, microencapsulation, PCM, thermal energy storage

Procedia PDF Downloads 129
2328 A User Interface for Easiest Way Image Encryption with Chaos

Authors: D. López-Mancilla, J. M. Roblero-Villa

Abstract:

Since 1990, the research on chaotic dynamics has received considerable attention, particularly in light of potential applications of this phenomenon in secure communications. Data encryption using chaotic systems was reported in the 90's as a new approach for signal encoding that differs from the conventional methods that use numerical algorithms as the encryption key. The algorithms for image encryption have received a lot of attention because of the need to find security on image transmission in real time over the internet and wireless networks. Known algorithms for image encryption, like the standard of data encryption (DES), have the drawback of low level of efficiency when the image is large. The encrypting based on chaos proposes a new and efficient way to get a fast and highly secure image encryption. In this work, a user interface for image encryption and a novel and easiest way to encrypt images using chaos are presented. The main idea is to reshape any image into a n-dimensional vector and combine it with vector extracted from a chaotic system, in such a way that the vector image can be hidden within the chaotic vector. Once this is done, an array is formed with the original dimensions of the image and turns again. An analysis of the security of encryption from the images using statistical analysis is made and is used a stage of optimization for image encryption security and, at the same time, the image can be accurately recovered. The user interface uses the algorithms designed for the encryption of images, allowing you to read an image from the hard drive or another external device. The user interface, encrypt the image allowing three modes of encryption. These modes are given by three different chaotic systems that the user can choose. Once encrypted image, is possible to observe the safety analysis and save it on the hard disk. The main results of this study show that this simple method of encryption, using the optimization stage, allows an encryption security, competitive with complicated encryption methods used in other works. In addition, the user interface allows encrypting image with chaos, and to submit it through any public communication channel, including internet.

Keywords: image encryption, chaos, secure communications, user interface

Procedia PDF Downloads 489
2327 Fortification of Concentrated Milk Protein Beverages with Soy Proteins: Impact of Divalent Cations and Heating Treatment on the Physical Stability

Authors: Yichao Liang, Biye Chen, Xiang Li, Steven R. Dimler

Abstract:

This study investigated the effects of adding calcium and magnesium chloride on heat and storage stability of milk protein concentrate-soy protein isolate (8:2 respectively) mixtures containing 10% w/w total protein subjected to the in-container sterilization (115 °C x 15 min). The particle size does not change when emulsions are heated at pH between 6.7 and 7.3 irrespective of the mixed protein ratio. Increasing concentration of divalent cation salts resulted in an increase in protein particle size, dry sediment formation and sediment height and a decrease in pH, heat stability and hydration in milk protein concentrate-soy protein isolate mixtures solutions on sterilization at 115°C. Fortification of divalent cation salts in milk protein concentrate-soy protein isolate mixture solutions resulted in an accelerated protein sedimentation and two unique sediment regions during accelerated storage stability testing. Moreover, the heat stability decreased upon sterilization at 115°C, with addition of MgCl₂ causing a greater increase in sedimentation velocity and compressibility than CaCl₂. Increasing pH value of protein milk concentrate-soy protein isolate mixtures solutions from 6.7 to 7.2 resulted in an increase in viscosity following the heat treatment. The study demonstrated that the type and concentration of divalent cation salts used strongly impact heat and storage stability of milk protein concentrate-soy protein isolate mixture nutritional beverages.

Keywords: divalent cation salts, heat stability, milk protein concentrate, soy protein isolate, storage stability

Procedia PDF Downloads 329
2326 Dynamic Simulation of a Hybrid Wind Farm with Wind Turbines and Distributed Compressed Air Energy Storage System

Authors: Eronini Iheanyi Umez-Eronini

Abstract:

Most studies and existing implementations of compressed air energy storage (CAES) coupled with a wind farm to overcome intermittency and variability of wind power are based on bulk or centralized CAES plants. A dynamic model of a hybrid wind farm with wind turbines and distributed CAES, consisting of air storage tanks and compressor and expander trains at each wind turbine station, is developed and simulated in MATLAB. An ad hoc supervisory controller, in which the wind turbines are simply operated under classical power optimizing region control while scheduling power production by the expanders and air storage by the compressors, including modulation of the compressor power levels within a control range, is used to regulate overall farm power production to track minute-scale (3-minutes sampling period) TSO absolute power reference signal, over an eight-hour period. Simulation results for real wind data input with a simple wake field model applied to a hybrid plant composed of ten 5-MW wind turbines in a row and ten compatibly sized and configured Diabatic CAES stations show the plant controller is able to track the power demand signal within an error band size on the order of the electrical power rating of a single expander. This performance suggests that much improved results should be anticipated when the global D-CAES control is combined with power regulation for the individual wind turbines using available approaches for wind farm active power control. For standalone power plant fuel electrical efficiency estimate of up to 60%, the round trip electrical storage efficiency computed for the distributed CAES wherein heat generated by running compressors is utilized in the preheat stage of running high pressure expanders while fuel is introduced and combusted before the low pressure expanders, was comparable to reported round trip storage electrical efficiencies for bulk Adiabatic CAES.

Keywords: hybrid wind farm, distributed CAES, diabatic CAES, active power control, dynamic modeling and simulation

Procedia PDF Downloads 82
2325 Improved Reuse and Storage Performances at Room Temperature of a New Environmental-Friendly Lactate Oxidase Biosensor Made by Ambient Electrospray Deposition

Authors: Antonella Cartoni, Mattea Carmen Castrovilli

Abstract:

A biosensor for lactate detection has been developed using an environmentally friendly approach. The biosensor is based on lactate oxidase (LOX) and has remarkable capabilities for reuse and storage at room temperature. The manufacturing technique employed is ambient electrospray deposition (ESD), which enables efficient and sustainable immobilization of the LOX enzyme on a cost-effective com-mercial screen-printed Prussian blue/carbon electrode (PB/C-SPE). The study demonstrates that the ESD technology allows the biosensor to be stored at ambient pressure and temperature for extended periods without affecting the enzymatic activity. The biosensor can be stored for up to 90 days without requiring specific storage conditions, and it can be reused for up to 24 measurements on both freshly prepared electrodes and electrodes that are three months old. The LOX-based biosensor exhibits a lin-ear range of lactate detection between 0.1 and 1 mM, with a limit of detection of 0.07±0.02 mM. Ad-ditionally, it does not exhibit any memory effects. The immobilization process does not involve the use of entrapment matrices or hazardous chemicals, making it environmentally sustainable and non-toxic compared to current methods. Furthermore, the application of a electrospray deposition cycle on previously used biosensors rejuvenates their performance, making them comparable to freshly made biosensors. This highlights the excellent recycling potential of the technique, eliminating the waste as-sociated with disposable devices.

Keywords: green friendly, reuse, storage performance, immobilization, matrix-free, electrospray deposition, biosensor, lactate oxidase, enzyme

Procedia PDF Downloads 63
2324 Space Utilisation during Meal Preparation in an Indian Kitchen Belonging to Middle-Income Group Family

Authors: Poonam Magu, Kumud Khanna, P. Seetharaman

Abstract:

A kitchen is a major workplace in any home. A large variety of tasks, mainly related to meal preparation is performed here. The types of activities performed are varied and vast. In a way, it is the activities performed that determine the way the space within the kitchen is going to be utilised. A study was conducted in 510 Indian kitchens belonging to middle-income group families living in Delhi. It was conducted in three phases. In the first phase, 510 non-working homemakers were interviewed and questions pertaining to their personal characteristics, meal preparation and physical aspects related to the kitchen were asked. In the second phase, the technique of Path Process Chart was developed. Subsequently, a sub-sample of 50 homemakers was selected from the larger group. The activity of meal preparation was carried out by the homemakers themselves in their kitchens. A time and motion study was conducted using the technique of Path Process Chart. The results were analysed using the appropriate analysis sheets and conclusions were drawn. It was found that the entire kitchen and more specifically, the counter had been 'divided' into a number of workplaces. These workplaces were being used either for performing operations or for the purpose of storage. In many cases, it was used for both. On the whole, in 50 kitchens studied, 21 workplaces were identified which were used for performing operations related to meal preparation and 17 for storage It was also observed that almost the entire kitchen was used for the purpose of storage of some item or the other. The major workplaces where operations were performed were the range, workplaces to the right and left of range and sink and workplaces to the right or left of the sink. The same workplaces were also used for the purpose of storage. There were some workplaces outside the kitchen too, which were used for operations or storage. These were the dining table, courtyard or balcony, bedroom cupboard. On the whole, the range centre and the sink centre were found to be the two most important centres in an Indian kitchen belonging to urban middle-income group family.

Keywords: kitchen, workplace, meal preparation, path process chart

Procedia PDF Downloads 196
2323 Effect of Seed Treatment on Seed Quality and Storability in Wheat (Triticum Aestivum L.) in Northwestern Himalayas

Authors: Anubhav Thakur, Karam Chand Dhiman

Abstract:

Storage experiment was conducted to study the effect of polymer, fungicides and insecticide on seed quality parameters and storability in wheat. The experimental material consisted of carry over wheat seeds (variety HPW- 155) of rabi 2017 - 18. The observations were recorded bimonthly on parameters viz; germination (%), seedling length (cm), dry weight (g), vigour index - I, vigour - II, speed of germination, field emergence (%), 100 seed weight (g) for 12 months of storage. All parameters declined with the advancement in storage period. The results showed that seeds treated with polymer + vitavax 200 @ 2 g/kg of seed recorded higher germination percentage (95.00 %), seedling length (17.58 cm), seedling dry weight (0.0138 g), vigour index - I (1670) & vigour - II (1.311), speed of germination (19.98), 100 seed weight (5.54 g) and field emergence (87.33 %) which was at par with vitavax 200 @ 2 g/kg of seed, over untreated control (T1). So it can be concluded that for maintain seed quality and enhancing storability, seed of wheat can either be treated with polymer @ 3 ml/kg of seed + vitavax 200 @ 2 g/kg of seed or vitavax 200 @ 2 g/kg of seed.

Keywords: wheat, seed treatment, storability, seed quality

Procedia PDF Downloads 170
2322 Characterization of the Pore System and Gas Storage Potential in Unconventional Reservoirs: A Case of Study of the Cretaceous la Luna Formation, Middle Magdalena Valley Basin, Colombia

Authors: Carlos Alberto Ríos-Reyes, Efraín Casadiego-Quintero

Abstract:

We propose a generalized workflow for mineralogy investigation of unconventional reservoirs using multi-scale imaging and pore-scale analyses. This workflow can be used for the integral evaluation of these resources. The Cretaceous La Luna Formation´s mudstones in the Middle Magdalena Valley Basin (Colombia) inherently show a heterogeneous pore system with organic and inorganic pores. For this reason, it is necessary to carry out the integration of high resolution 2D images of mapping by conventional petrography, scanning electron microscopy and quantitative evaluation of minerals by scanning electron microscopy to describe their organic and inorganic porosity to understand the transport mechanism through pores. The analyzed rocks show several pore types, including interparticle pores, organoporosity, intraparticle pores, intraparticle pores, and microchannels and/or microfractures. The existence of interconnected pores in pore system of these rocks promotes effective pathways for primary gas migration and storage space for residual hydrocarbons in mudstones, which is very useful in this type of gas reservoirs. It is crucial to understand not only the porous system of these rocks and their mineralogy but also to project the gas flow in order to design the appropriate strategies for the stimulation of unconventional reservoirs. Keywords: mudstones; La Luna Formation; gas storage; migration; hydrocarbon.

Keywords: mudstones, La luna formation, gas storage, migration, hydrocarbon

Procedia PDF Downloads 74
2321 Sustainable Thermal Energy Storage Technologies: Enhancing Post-Harvest Drying Efficiency in Sub-Saharan Agriculture

Authors: Luís Miguel Estevão Cristóvão, Constâncio Augusto Machanguana, Fernando Chichango, Salvador Grande

Abstract:

Sub-Saharan African nations depend greatly on agriculture, a sector mainly marked by low production. Most of the farmers live in rural areas and employ basic labor-intensive technologies that lead to time inefficiencies and low overall effectiveness. Even with attempts to enhance farmers’ welfare through improved seeds and fertilizers, meaningful outcomes are yet to be achieved due to huge amounts of post-harvest losses. Such losses significantly endanger food security, economic stability, and result in unsustainable agricultural practices because more land, water, labor, energy, fertilizer, and other inputs must be used to produce more food. Drying, as a critical post-harvest process involving simultaneous heat and mass transfer, deserves attention. Among alternative green-energy sources, solar energy-based drying garners attention, particularly for small-scale farmers in remote communities. However, the intermittent nature of solar radiation poses challenges. To address this, energy storage solutions like rock-based thermal energy storage offer cost-effective solutions tailored to the needs of farmers. Methodologically, three solar dryers were constructed of metal, wood, and clay brick. Several tests were carried out with and without energy storage material. Notably, it has been demonstrated that soapstone stands out as a promising material due to its affordability and high specific energy capacity. By implementing these greener technologies, Sub-Saharan African countries could mitigate post-harvest losses, enhance food availability, improve nutrition, and promote sustainable resource utilization.

Keywords: energy storage, food security, post-harvest, solar dryer

Procedia PDF Downloads 22
2320 Zinc Oxide Nanorods Decorated Nanofibers Based Flexible Electrodes for Capacitive Energy Storage Applications

Authors: Syed Kamran Sami, Saqib Siddiqui

Abstract:

In recent times, flexible supercapacitors retaining high electrochemical performance and steadiness along with mechanical endurance has developed as a spring of attraction due to the exponential progress and innovations in energy storage devices. To meet the rampant increasing demand of energy storage device with the small form factor, a unique, low cost and high-performance supercapacitor with considerably higher capacitance and mechanical robustness is required to recognize their real-life applications. Here in this report, synthesis route of electrode materials with low rigidity and high charge storage performance is reported using 1D-1D hybrid structure of zinc oxide (ZnO) nanorods, and conductive polymer smeared polyvinylidene fluoride–trifluoroethylene (P(VDF–TrFE)) electrospun nanofibers. The ZnO nanorods were uniformly grown on poly (3,4-ethylenedioxythiophene) polystyrene sulfonate (PEDOT: PSS) coated P(VDF-TrFE) nanofibers using hydrothermal growth to manufacture light weight, permeable electrodes for supercapacitor. The PEDOT: PSS coated P(VDF-TrFE) porous web of nanofibers act as framework with high surface area. The incorporation of ZnO nanorods further boost the specific capacitance by 59%. The symmetric device using the fabricated 1D-1D hybrid electrodes reveals fairly high areal capacitance of 1.22mF/cm² at a current density of 0.1 mA/cm² with a power density of more than 1600 W/Kg. Moreover, the fabricated electrodes show exceptional flexibility and high endurance with 90% and 76% specific capacitance retention after 1000 and 5000 cycles respectively signifying the astonishing mechanical durability and long-term stability. All the properties exhibited by the fabricated electrode make it convenient for making flexible energy storage devices with the low form factor.

Keywords: ZnO nanorods, electrospinning, mechanical endurance, flexible supercapacitor

Procedia PDF Downloads 279
2319 Studies on the Effect of Dehydration Techniques, Treatments, Packaging Material and Methods on the Quality of Buffalo Meat during Ambient Temperature Storage

Authors: Tariq Ahmad Safapuri, Saghir Ahmad, Farhana Allai

Abstract:

The present study was conducted to evaluate the effect dehydration techniques (polyhouse and tray drying), different treatment (SHMP, SHMP+ salt, salt + turmeric), different packaging material (HDPE, combination film), and different packaging methods (air, vacuum, CO2 Flush) on quality of dehydrated buffalo meat during ambient temperature storage. The quality measuring parameters included physico-chemical characteristics i.e. pH, rehydration ratio, moisture content and microbiological characteristics viz total plate content. It was found that the treatment of (SHMP, SHMP + salt, salt + turmeric increased the pH. Moisture Content of dehydrated meat samples were found in between 7.20% and 5.54%.the rehydration ratio of salt+ turmeric treated sample was found to be highest and lowest for controlled meat sample. the bacterial count log TPC/g of salt + turmeric and tray dried was lowest i.e. 1.80.During ambient temperature storage ,there was no considerable change in pH of dehydrated sample till 150 days. however the moisture content of samples increased in different packaging system in different manner. The highest moisture rise was found in case of controlled meat sample HDPE/air packed while the lowest increase was reported for SHMP+ Salt treated Packed by vacuum in combination film packed sample. Rehydration ratio was found considerably affected in case of HDPE and air packed sample dehydrated in polyhouse after 150 days of ambient storage. While there was a very little change in the rehydration ratio of meat samples packed in combination film CO2 flush system. The TPC was found under safe limit even after 150 days of storage. The microbial count was found to be lowest for salt+ turmeric treated samples after 150 days of storage.

Keywords: ambient temperature, dehydration technique, rehydration ratio, SHMP (sodium hexa meta phosphate), HDPE (high density polyethelene)

Procedia PDF Downloads 415
2318 Comparative Study between Two Methods for Extracting Pomegranate Juice and Their Effect on Product Quality

Authors: Amani Aljahani

Abstract:

The purpose of the study was to identify the physical and chemical properties of pomegranate juices and to evaluate their sensory quality. The samples were collected from the local markets and included four types of pomegranate produced in the western and southern region of the kingdom. The juices were extracted by manual squeezing and by centrifugal force. The juices were analyzed periodically for their content of organic acids, total acidity, glucose and fructose, total sugars, and the anthosianine. A panel of 30 judges evaluated the juices for their color, smell, taste, consistency and general acceptance using a prepared scale for that purpose. Result showed that pomegranate juices were acidic in nature (PH between 3.56–4.27). The major organic acids were citric, tartaric, malic, and oxalic aids total organic acidity was between 596.32–763.49 ng/100 ml and increased over storage time, however; total acidity almost stable over time except for the southern produced. The major monosaccharide's in pomegranate juices were glucose and fructose. Their concentration in the juice varied by storage. On the average glucose concentration was between 6.68–7.71 g/100 ml while fructose concentration was between 6.72–7.98 g/100 ml. total sugars content was 16% on the average and dropped by storage. Anthosianine concertration increased after five hours of storage then dropped and stabilized over time regardless of method of treatment. In addition, sensory evaluation of the juices showed general acceptance of them as of color, flavor, and constercy but the preferred one was with that of the western kind extracted by squeezing.

Keywords: extracting, pomegranate, juice, quality

Procedia PDF Downloads 349
2317 Image Encryption Using Eureqa to Generate an Automated Mathematical Key

Authors: Halima Adel Halim Shnishah, David Mulvaney

Abstract:

Applying traditional symmetric cryptography algorithms while computing encryption and decryption provides immunity to secret keys against different attacks. One of the popular techniques generating automated secret keys is evolutionary computing by using Eureqa API tool, which got attention in 2013. In this paper, we are generating automated secret keys for image encryption and decryption using Eureqa API (tool which is used in evolutionary computing technique). Eureqa API models pseudo-random input data obtained from a suitable source to generate secret keys. The validation of generated secret keys is investigated by performing various statistical tests (histogram, chi-square, correlation of two adjacent pixels, correlation between original and encrypted images, entropy and key sensitivity). Experimental results obtained from methods including histogram analysis, correlation coefficient, entropy and key sensitivity, show that the proposed image encryption algorithms are secure and reliable, with the potential to be adapted for secure image communication applications.

Keywords: image encryption algorithms, Eureqa, statistical measurements, automated key generation

Procedia PDF Downloads 480
2316 Possibilities of Using Chia Seeds in Fermented Beverages Made from Mare’s and Cow’s Milk

Authors: Nancy Mahmoud, Joanna Teichert

Abstract:

Nowadays, fermented milk containing probiotic microorganisms is fundamental to human health. The changes in the properties of fermented milk during storage influence the quality and consumer acceptability. This study aimed to evaluate the effect of 1.5 % of chia seeds on the chemical, physical and sensory properties of fermented cow’s and mare’s milk for two weeks at 4°C. The results showed that the pH of cow’s milk drops significantly at the 2nd hour, but mare's milk drops significantly at the 6th hour. The acidity of both types of milk increased as the storage time progressed. Adding chia seeds increased firmness significantly and improved color and consistency. A decrease in brightness (L*), an increase in redness (a*), and yellowness (b*) during storage were observed. Our study showed that the chia seeds have more effect on reducing the brightness of fermented mare milk than fermented cow milk. Analysis of taste and smell parameters showed that after adding chia seeds, the scores changed and became much higher. The sour taste of fermented milk had reduced this positively affected the acceptance of the product. Chia seeds induced beneficial effects on sensory outcomes and enhanced physiochemical properties.

Keywords: mare milk, cow milk, feremnted milk, kefir, koumiss

Procedia PDF Downloads 96