Search results for: cross layer security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8748

Search results for: cross layer security

8328 Layer-By-Layer Deposition of Poly (Amidoamine) and Poly (Acrylic Acid) on Grafted-Polylactide Nonwoven with Different Surface Charge

Authors: Sima Shakoorjavan, Mahdieh Eskafi, Dawid Stawski, Somaye Akbari

Abstract:

In this study, poly (amidoamine) dendritic material (PAMAM) and poly (acrylic acid) (PAA) as polycation and polyanion were deposited on surface charged polylactide (PLA) nonwoven to study the relationship of dye absorption capacity of layered-PLA with the number of deposited layers. To produce negatively charged-PLA, acrylic acid (AA) was grafted on the PLA surface (PLA-g-AA) through a chemical redox reaction with the strong oxidizing agent. Spectroscopy analysis, water contact measurement, and FTIR-ATR analysis confirm the successful grafting of AA on the PLA surface through the chemical redox reaction method. In detail, an increase in dye absorption percentage by 19% and immediate absorption of water droplets ensured hydrophilicity of PLA-g-AA surface; and the presence of new carbonyl bond at 1530 cm-¹ and a wide peak of hydroxyl between 3680-3130 cm-¹ confirm AA grafting. In addition, PLA as linear polyester can undergo aminolysis, which is the cleavage of ester bonds and replacement with amid bonds when exposed to an aminolysis agent. Therefore, to produce positively charged PLA, PAMAM as amine-terminated dendritic material was introduced to PLA molecular chains at different conditions; (1) at 60 C for 0.5, 1, 1.5, 2 hours of aminolysis and (2) at room temperature (RT) for 1, 2, 3, and 4 hours of aminolysis. Weight changes and spectrophotometer measurements showed a maximum in weight gain graph and K/S value curve indicating the highest PAMAM attachment at 60 C for 1 hour and RT for 2 hours which is considered as an optimum condition. Also, the emerging new peak around 1650 cm-1 corresponding to N-H bending vibration and double wide peak at around 3670-3170 cm-1 corresponding to N-H stretching vibration confirm PAMAM attachment in selected optimum condition. In the following, regarding the initial surface charge of grafted-PLA, lbl deposition was performed and started with PAA or PAMAM. FTIR-ATR results confirm chemical changes in samples due to deposition of the first layer (PAA or PAMAM). Generally, spectroscopy analysis indicated that an increase in layer number costed dye absorption capacity. It can be due to the partial deposition of a new layer on the previously deposited layer; therefore, the available PAMAM at the first layer is more than the third layer. In detail, in the case of layer-PLA starting lbl with negatively charged, having PAMAM as the first top layer (PLA-g-AA/PAMAM) showed the highest dye absorption of both cationic and anionic model dye.

Keywords: surface modification, layer-by-layer technique, dendritic materials, PAMAM, dye absorption capacity, PLA nonwoven

Procedia PDF Downloads 65
8327 Improving Security by Using Secure Servers Communicating via Internet with Standalone Secure Software

Authors: Carlos Gonzalez

Abstract:

This paper describes the use of the Internet as a feature to enhance the security of our software that is going to be distributed/sold to users potentially all over the world. By placing in a secure server some of the features of the secure software, we increase the security of such software. The communication between the protected software and the secure server is done by a double lock algorithm. This paper also includes an analysis of intruders and describes possible responses to detect threats.

Keywords: internet, secure software, threats, cryptography process

Procedia PDF Downloads 308
8326 Layer-By-Layer Deposition of Poly(Ethylene Imine) Nanolayers on Polypropylene Nonwoven Fabric: Electrostatic and Thermal Properties

Authors: Dawid Stawski, Silviya Halacheva, Dorota Zielińska

Abstract:

The surface properties of many materials can be readily and predictably modified by the controlled deposition of thin layers containing appropriate functional groups and this research area is now a subject of widespread interest. The layer-by-layer (lbl) method involves depositing oppositely charged layers of polyelectrolytes onto the substrate material which are stabilized due to strong electrostatic forces between adjacent layers. This type of modification affords products that combine the properties of the original material with the superficial parameters of the new external layers. Through an appropriate selection of the deposited layers, the surface properties can be precisely controlled and readily adjusted in order to meet the requirements of the intended application. In the presented paper a variety of anionic (poly(acrylic acid)) and cationic (linear poly(ethylene imine), polymers were successfully deposited onto the polypropylene nonwoven using the lbl technique. The chemical structure of the surface before and after modification was confirmed by reflectance FTIR spectroscopy, volumetric analysis and selective dyeing tests. As a direct result of this work, new materials with greatly improved properties have been produced. For example, following a modification process significant changes in the electrostatic activity of a range of novel nanocomposite materials were observed. The deposition of polyelectrolyte nanolayers was found to strongly accelerate the loss of electrostatically generated charges and to increase considerably the thermal resistance properties of the modified fabric (the difference in T50% is over 20°C). From our results, a clear relationship between the type of polyelectrolyte layer deposited onto the flat fabric surface and the properties of the modified fabric was identified.

Keywords: layer-by-layer technique, polypropylene nonwoven, surface modification, surface properties

Procedia PDF Downloads 421
8325 Sri Lankan Contribution to Peace and Security in the World: Legal Perspective

Authors: Muthukuda Arachchige Dona Shiroma Jeeva Shirajanie Niriella

Abstract:

Suppressing terrorism and ensuring peace and security of the people is one of the topics which have gained serious attention of the world community. Commissions of terrorist activities, locally and internationally lead to an uncertainty of peace and security, violations of human rights of the people. Thereby it demands stringent security laws and strong criminal justice systems, both at domestic and international levels. This paper intends to evaluate security laws in Sri Lanka through the criminal justice perspective, including their efficacy in relation to combat terrorism. The paper further intends to discuss the importance of such laws in upholding the peace and security at both local and universal levels. The paper argues that the term ‘efficacy’ does not stand for, sending people to jail at large-scale, but the ability to combat terrorism crime without violating the rights of the innocent people. The qualitative research method is followed to conduct this research which contains an extensive examination of security laws available as counter-terrorism laws in Sri Lanka with the relevant international standards adopted by the UN treaties. Primary sources which are relevant to the research, including judicial pronouncements are also discussed in this regard. Secondary sources such as reports, research articles and textbooks on this topic and information available on the internet are also reviewed in this analysis.

Keywords: terrorism, security laws, criminal justice system, Sri Lanka, international treaty law

Procedia PDF Downloads 365
8324 Contemporary Mexican Shadow Politics: The War on Drugs and the Issue of Security

Authors: Lisdey Espinoza Pedraza

Abstract:

Organised crime in Mexico evolves faster that our capacity to understand and explain it. Organised gangs have become successful entrepreneurs in many ways ad they have somehow mimicked the working ways of the authorities and in many cases, they have successfully infiltrated the governmental spheres. This business model is only possible under a clear scheme of rampant impunity. Impunity, however, is not exclusive to the PRI. Nor the PRI, PAN, or PRD can claim the monopoly of corruption, but what is worse is that none can claim full honesty in their acts either. The current security crisis in Mexico shows a crisis in the Mexican political party system. Corruption today is not only a problem of dishonesty and the correct use of public resources. It is the principal threat to Mexican democracy, governance, and national security.

Keywords: security, war on drugs, drug trafficking, Mexico, Latin America, United States

Procedia PDF Downloads 401
8323 Alternative Futures for the Middle East

Authors: Dorsa Bakhshandehgeyazdi

Abstract:

This paper examines elective future of security in the Middle East trying to find a way that could take the district from a shaky past to a more secure future. Taking a gander at five situations about the eventual future of world legislative issues, in particular, globalization, fragmentation, conflict of civilizations, majority rule peace and the development of a security group, the paper contends that albeit every situation has its qualities (and in addition shortcomings), it is the situation that predicts the foundation of a security group that joins a more express thought for forming a more secure future for the Middle East.

Keywords: Middle East, Globalization, Fragmentation, Conflict of civilizations, Majority rule peace, Development of a security group

Procedia PDF Downloads 284
8322 Assessing EU-China Security Interests from Contradiction to Convergence

Authors: Julia Gurol

Abstract:

Why do we observe a shift towards convergence in EU-China security interests? While contradicting attitudes towards key principles of inter-state and region-to-state relations, including state sovereignty, territorial integrity, and intervention policies have ever since hindered EU-China inter-regional cooperation beyond the economic realm, collaboration in peace and security issues is now becoming a key pillar of European-Chinese relations. In addition, the Belt and Road Initiative as most ambitious Chinese foreign policy project explicitly touches upon several European foreign policy and security preferences. Based on these counterintuitive findings, this paper traces the process of convergence of Sino-European security interests. Drawing on qualitative text analysis of official Chinese and European policy papers and documents from the establishment of diplomatic relations in 1975 until today, it assesses the striking change over time. On this basis, the paper uses theories of neo-functionalism, inter-regionalism, and securitization and borrows from constructivist views in International Relations’ theory, to expound possible motives for the change in Chinese and respectively European preferences in the security realm. The results reveal interesting insights into the decisive factors and motives behind both countries’ foreign policies. The paper concludes with a discussion of further potential and difficulties of EU-China security cooperation.

Keywords: belt and road initiative, China, European Union, foreign policy, neo-functionalism, security

Procedia PDF Downloads 265
8321 Food Security Model and the Role of Community Empowerment: The Case of a Marginalized Village in Mexico, Tatoxcac, Puebla

Authors: Marco Antonio Lara De la Calleja, María Catalina Ovando Chico, Eduardo Lopez Ruiz

Abstract:

Community empowerment has been proved to be a key element in the solution of the food security problem. As a result of a conceptual analysis, it was found that agricultural production, economic development and governance, are the traditional basis of food security models. Although the literature points to social inclusion as an important factor for food security, no model has considered it as the basis of it. The aim of this research is to identify different dimensions that make an integral model for food security, with emphasis on community empowerment. A diagnosis was made in the study community (Tatoxcac, Zacapoaxtla, Puebla), to know the aspects that impact the level of food insecurity. With a statistical sample integrated by 200 families, the Latin American and Caribbean Food Security Scale (ELCSA) was applied, finding that: in households composed by adults and children, have moderated food insecurity, (ELCSA scale has three levels, low, moderated and high); that result is produced mainly by the economic income capacity and the diversity of the diet on its food. With that being said, a model was developed to promote food security through five dimensions: 1. Regional context of the community; 2. Structure and system of local food; 3. Health and nutrition; 4. Information and technology access; and 5. Self-awareness and empowerment. The specific actions on each axis of the model, allowed a systemic approach needed to attend food security in the community, through the empowerment of society. It is concluded that the self-awareness of local communities is an area of extreme importance, which must be taken into account for participatory schemes to improve food security. In the long term, the model requires the integrated participation of different actors, such as government, companies and universities, to solve something such vital as food security.

Keywords: community empowerment, food security, model, systemic approach

Procedia PDF Downloads 353
8320 The Damage and Durability of a Sport Synthetic Resin Floor: A Case Study

Authors: C. Paglia, C. Mosca

Abstract:

Synthetic resin floorsare often used in sport infrastructure. These organic materials are often in contact with a bituminous substrate, which in turn is placed on the ground. In this work, the damage of a basket resin field surface was characterized by means of visual inspection, optical microscopy, resin thickness measurements, adhesion strength, water vapor transmission capacity, capillary water adsorption, granulometry of the bituminous conglomerate, the surface properties, and the water ground infiltration speed. The infiltration speed indicates water pemeability. This was due to its composition: clean sand mixed with gravel. Relatively good adhesion was present between the synthetic resin and the bituminous layer. The adhesion resistance of the bituminous layer was relatively low. According to the required bitumoniousasphalt-concrete mixes AC 11 S, the placed material was more porous. Insufficient constipation was present. The spaces values were above the standard limits, while the apparent densities were lower compared to the conventional AC 11 mixtures. The microstructure outlines the high permeability and porosity of the bituminous layer. The synthetic resin wasvapourproof and did not exhibit capillary adsorption. It exhibited a lower thickness as required, and no multiple placing steps were observed. Multiple cavities were detected along with the interface between the bituminous layer and the resin coating with no intermediate layers. The layer for the pore filling in the bituminous surface was not properly applied. The swelling bubbles on the synthetic pavement were caused by the humidity in the bituminous layer. Water or humidity were present prior to the application of the resin, and the effect was worsened by the upward movement of the water from the ground.

Keywords: resin, floor, damage, durability

Procedia PDF Downloads 145
8319 Tribological Study of TiC Powder Cladding on 6061 Aluminum Alloy

Authors: Yuan-Ching Lin, Sin-Yu Chen, Pei-Yu Wu

Abstract:

This study reports the improvement in the wear performance of A6061 aluminum alloy clad with mixed powders of titanium carbide (TiC), copper (Cu) and aluminum (Al) using the gas tungsten arc welding (GTAW) method. The wear performance of the A6061 clad layers was evaluated by performing pin-on-disc mode wear test. Experimental results clearly indicate an enhancement in the hardness of the clad layer by about two times that of the A6061 substrate without cladding. Wear test demonstrated a significant improvement in the wear performance of the clad layer when compared with the A6061 substrate without cladding. Moreover, the interface between the clad layer and the A6061 substrate exhibited superior metallurgical bonding. Due to this bonding, the clad layer did not spall during the wear test; as such, massive wear loss was prevented. Additionally, massive oxidized particulate debris was generated on the worn surface during the wear test; this resulted in three-body abrasive wear and reduced the wear behavior of the clad surface.

Keywords: GTAW、A6061 aluminum alloy, 、surface modification, tribological study, TiC powder cladding

Procedia PDF Downloads 443
8318 Chlorhexidine, Effects in Application to Hybrid Layers

Authors: Ilma Robo, Saimir Heta, Edona Hasanaj, Vera Ostreni

Abstract:

The hybrid layer, the way it is created and how it is protected against degradation over time, is the key to the clinical success of a composite restoration. The composite supports the dentinal structure exactly with the realized surface of microretension. Thus, this surface is in direct proportion to its size versus the duration of clinical use of composite dental restoration. Micro-retention occurs between dentin or acidified enamel and adhesive resin extensions versus pre-prepared spaces, such as hollow dentinal tubules. The way the adhesive resin binds to the acidified dentinal structure depends on the physical or chemical factors of this interrelationship between two structures with very different characteristics. During the acidification process, a precursor to the placement of the adhesive resin layer, activation of metaloproteinases of dental origin occurs, enzymes which are responsible for the degradation of the hybrid layer. These enzymes have expressed activity depending on the presence of Zn2 + or Ca2 + ions. There are several ways to inhibit these enzymes, and consequently, there are several ways to inhibit the degradation process of the hybrid layer. The study aims to evaluate chlorhexidine as a solution element, inhibitor of dentin activated metalloproteinases, as a result of the application of acidification. This study aims to look at this solution in advantage or contraindication theories, already published in the literature.

Keywords: hybrid layer, chlorhexidine, degradation, application

Procedia PDF Downloads 116
8317 The Study of Security Techniques on Information System for Decision Making

Authors: Tejinder Singh

Abstract:

Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.

Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data

Procedia PDF Downloads 285
8316 Two Layer Photo-Thermal Deflection Model to Investigate the Electronic Properties in BGaAs/GaAs Alloys

Authors: S. Ilahi, M. Baira, F. Saidi, N. Yacoubi, L. Auvray, H. Maaref

Abstract:

Photo-thermal deflection technique (PTD) is used to study the nonradiative recombination process in BGaAs/GaAs alloy with boron composition of 3% and 8% grown by metal organic chemical vapor deposition (MOCVD). A two layer theoretical model has been developed taking into account both thermal and electronic contribution in the photothermal signal allowing to extract the electronic parameters namely electronic diffusivity, surface and interface recombination. It is found that the increase of boron composition alters the BGaAs epilayers transport properties.

Keywords: photothermal defelction technique, two layer model, BGaAs/GaAs alloys, boron composition

Procedia PDF Downloads 284
8315 Cross Ventilation Potential in an Array of Building Blocks: The Case Study of Alexandria

Authors: Bakr Gomaa

Abstract:

Wind driven Cross ventilation is achieved when air moves indoors due to the pressure difference on the building envelope. This is especially important in breezy moderate to humid settings in which fast air flow can promote thermal comfort. Studies have shown that the use of simple building forms or ignoring the urban context when studying natural ventilation can lead to inaccurate results. In this paper, the impact of the urban form of a regular array of buildings is investigated to define the impact of this urban setting on cross ventilation potential. The objective of this paper is to provide the necessary tools to achieve natural ventilation for cooling purposes in an array of building blocks context. The array urban form has been studied before for natural ventilation purposes yet to the best of our knowledge no study has considered the relationship between the urban form and the pressure patterns that develop on the buildings envelope for cross ventilation. For this we use detailed weather data for a case study city of Alexandria (Egypt), as well as a validated CFD simulations to investigate the cross ventilation potential in terms of pressure patterns in waterfront as well as in-city wind flows perpendicular to the buildings array. it was found that for both waterfront and in-city wind speeds the windows needed for cross ventilation in rear raws of the array are significantly larger than those needed for front raw.

Keywords: Alexandria, CFD, cross ventilation, pressure coefficient

Procedia PDF Downloads 374
8314 Study on Meristem Culture of Purwoceng (Pimpinella pruatjan Molk.) and Its Stigmasterol Detected by Thin Layer Chromatography

Authors: Totik Sri Mariani, Sukrasno Isna, Tet Fatt Chia

Abstract:

Purwoceng (Pimpinella pruatjan Molk) is a legend plant used for increasing stamina by Kings in Java Island, Indonesia. Purpose of this study was to perform meristem culture and detected its stigmasterol by thin layer chromatography (TLC). Our result show that meristem culture could be propagated and grew into plantlet. After extracting intact acclimatized plant derived from meristem culture by hexane, we could detected stigmasterol by TLC. For suggestion, our extraction and TLC method could be used for detecting stigmasterol in others plant.

Keywords: purwoceng (pimpinella pruatjan), meristem culture, extraction, thin layer chromatography

Procedia PDF Downloads 413
8313 Integrating Blockchain and Internet of Things Platforms: An Empirical Study on Immunization Cold Chain

Authors: Fawzia Abujalala, Asma Elmangoush, Majdi Ashibani

Abstract:

The adoption of Blockchain technology introduces the possibility to decentralize cold chain systems. This adaptation enhances them to be more efficient, accessible, verifiable, and data security. Additionally, the Internet of Things (IoT) concept is considered as an added-value to various application domains. Cargo tracking and cold chain are a few to name. However, the security of the IoT transactions and integrated devices remains one of the key challenges to the IoT application’s success. Consequently, Blockchain technology and its consensus protocols have been used to solve many information security problems. In this paper, the researchers discussed the advantages of integrating Blockchain technology into IoT platform to improve security and provide an overview of existing literature on integrating Blockchain and IoT platforms. Then, presented the immunization cold chain solution as a use-case that could apply to any critical goods based on integrating hyperledger fabric platform and IoT platform.

Keywords: blockchain, hyperledger fabric, internet of things, security, traceability

Procedia PDF Downloads 129
8312 Single-Crystal Kerfless 2D Array Transducer for Volumetric Medical Imaging: Theoretical Study

Authors: Jurij Tasinkiewicz

Abstract:

The aim of this work is to present a theoretical analysis of a 2D ultrasound transducer comprised of crossed arrays of metal strips placed on both sides of thin piezoelectric layer (a). Such a structure is capable of electronic beam-steering of generated wave beam both in elevation and azimuth. In this paper, a semi-analytical model of the considered transducer is developed. It is based on generalization of the well-known BIS-expansion method. Specifically, applying the electrostatic approximation, the electric field components on the surface of the layer are expanded into fast converging series of double periodic spatial harmonics with corresponding amplitudes represented by the properly chosen Legendre polynomials. The problem is reduced to numerical solving of certain system of linear equations for unknown expansion coefficients.

Keywords: beamforming, transducer array, BIS-expansion, piezoelectric layer

Procedia PDF Downloads 410
8311 Monitoring Surface Modification of Polylactide Nonwoven Fabric with Weak Polyelectrolytes

Authors: Sima Shakoorjavan, Dawid Stawski, Somaye Akbari

Abstract:

In this study, great attempts have been made to initially modify polylactide (PLA) nonwoven surface with poly(amidoamine) (PAMMA) dendritic polymer to create amine active sites on PLA surface through aminolysis reaction. Further, layer-by-layer deposition of four layers of two weak polyelectrolytes, including PAMAM as polycation and polyacrylic acid (PAA) as polyanion on activated PLA, was monitored with turbidity analysis of waste-polyelectrolytes after each deposition step. The FTIR-ATR analysis confirmed the successful introduction of amine groups into PLA polymeric chains through the emerging peak around 1650 cm⁻¹ corresponding to N-H bending vibration and a double wide peak at around 3670-3170 cm⁻¹ corresponding to N-H stretching vibration. The adsorption-desorption behavior of (PAMAM) and poly (PAA) deposition was monitored by turbidity test. Turbidity results showed the desorption and removal of the previously deposited layer (second and third layers) upon the desorption of the next layers (third and fourth layers). Also, the importance of proper rinsing after aminolysis of PLA nonwoven fabric was revealed by turbidity test. Regarding the sample with insufficient rinsing process, higher desorption and removal of ungrafted PAMAM from aminolyzed-PLA surface into PAA solution was detected upon the deposition of the first PAA layer. This phenomenon can be due to electrostatic attraction between polycation (PAMAM) and polyanion (PAA). Moreover, the successful layer deposition through LBL was confirmed by the staining test of acid red 1 through spectrophotometry analysis. According to the results, layered PLA with four layers with PAMAM as the top layer showed higher dye absorption (46.7%) than neat (1.2%) and aminolyzed PLA (21.7%). In conclusion, the complicated adsorption-desorption behavior of dendritic polycation and linear polyanion systems was observed. Although desorption and removal of previously adsorbed layers occurred upon the deposition of the next layer, the remaining polyelectrolyte on the substrate is sufficient for the adsorption of the next polyelectrolyte through electrostatic attraction between oppositely charged polyelectrolytes. Also, an increase in dye adsorption confirmed more introduction of PAMAM onto PLA surface through LBL.

Keywords: surface modification, layer-by-layer technique, weak polyelectrolytes, adsorption-desorption behavior

Procedia PDF Downloads 45
8310 Shifting of Global Energy Security: A Comparative Analysis of Indonesia and China’s Renewable Energy Policies

Authors: Widhi Hanantyo Suryadinata

Abstract:

Efforts undertaken by Indonesia and China to shift the strategies and security of renewable energy on a global stage involve approaches through policy construction related to rare minerals processing or value-adding in Indonesia and manufacturing policies through the New Energy Vehicles (NEVs) policy in China. Both policies encompass several practical regulations and policies that can be utilized for the implementation of Indonesia and China's grand efforts and ideas. Policy development in Indonesia and China can be analyzed using a comparative analysis method, as well as employing a pyramid illustration to identify policy construction phases based on the real conditions of the domestic market and implemented policies. This approach also helps to identify the potential integration of policies needed to enhance the policy development phase of a country within the pyramid. It also emphasizes the significance of integration policy to redefine renewable energy strategy and security on the global stage.

Keywords: global renewable energy security, global energy security, policy development, comparative analysis, shifting of global energy security, Indonesia, China

Procedia PDF Downloads 47
8309 Multi-Dimension Threat Situation Assessment Based on Network Security Attributes

Authors: Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, Shaohua Lv

Abstract:

As the increasing network attacks become more and more complex, network situation assessment based on log analysis cannot meet the requirements to ensure network security because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in the network. Identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. This paper proposes a multi-dimension threat situation assessment method based on network security attributes. First, the paper offers an improved Common Vulnerability Scoring System (CVSS) calculation, which includes confident risk, integrity risk, availability risk and a weighted risk. Second, the paper introduces deterioration rate of properties collected by sensors in hosts and network, which aimed at assessing the time and level of DDoS attacks. Third, the paper introduces distribution of asset value in security attributes considering features of attacks and network, which aimed at assessing and show the whole situation. Experiments demonstrate that the approach reflects effectiveness and level of DDoS attacks, and the result can show the primary threat in network and security requirement of network. Through comparison and analysis, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing.

Keywords: DDoS evaluation, improved CVSS, network security attribute, threat situation assessment

Procedia PDF Downloads 195
8308 A Study of User Awareness and Attitudes Towards Civil-ID Authentication in Oman’s Electronic Services

Authors: Raya Al Khayari, Rasha Al Jassim, Muna Al Balushi, Fatma Al Moqbali, Said El Hajjar

Abstract:

This study utilizes linear regression analysis to investigate the correlation between user account passwords and the probability of civil ID exposure, offering statistical insights into civil ID security. The study employs multiple linear regression (MLR) analysis to further investigate the elements that influence consumers’ views of civil ID security. This aims to increase awareness and improve preventive measures. The results obtained from the MLR analysis provide a thorough comprehension and can guide specific educational and awareness campaigns aimed at promoting improved security procedures. In summary, the study’s results offer significant insights for improving existing security measures and developing more efficient tactics to reduce risks related to civil ID security in Oman. By identifying key factors that impact consumers’ perceptions, organizations can tailor their strategies to address vulnerabilities effectively. Additionally, the findings can inform policymakers on potential regulatory changes to enhance civil ID security in the country.

Keywords: civil-id disclosure, awareness, linear regression, multiple regression

Procedia PDF Downloads 38
8307 Cybersecurity Engineering BS Degree Curricula Design Framework and Assessment

Authors: Atma Sahu

Abstract:

After 9/11, there will only be cyberwars. The cyberwars increase in intensity the country's cybersecurity workforce's hiring and retention issues. Currently, many organizations have unfilled cybersecurity positions, and to a lesser degree, their cybersecurity teams are understaffed. Therefore, there is a critical need to develop a new program to help meet the market demand for cybersecurity engineers (CYSE) and personnel. Coppin State University in the United States was responsible for developing a cybersecurity engineering BS degree program. The CYSE curriculum design methodology consisted of three parts. First, the ACM Cross-Cutting Concepts standard's pervasive framework helped curriculum designers and students explore connections among the core courses' knowledge areas and reinforce the security mindset conveyed in them. Second, the core course context was created to assist students in resolving security issues in authentic cyber situations involving cyber security systems in various aspects of industrial work while adhering to the NIST standards framework. The last part of the CYSE curriculum design aspect was the institutional student learning outcomes (SLOs) integrated and aligned in content courses, representing more detailed outcomes and emphasizing what learners can do over merely what they know. The CYSE program's core courses express competencies and learning outcomes using action verbs from Bloom's Revised Taxonomy. This aspect of the CYSE BS degree program's design is based on these three pillars: the ACM, NIST, and SLO standards, which all CYSE curriculum designers should know. This unique CYSE curriculum design methodology will address how students and the CYSE program will be assessed and evaluated. It is also critical that educators, program managers, and students understand the importance of staying current in this fast-paced CYSE field.

Keywords: cyber security, cybersecurity engineering, systems engineering, NIST standards, physical systems

Procedia PDF Downloads 66
8306 Enhancing Metaverse Security: A Multi-Factor Authentication Scheme

Authors: R. Chinnaiyaprabhu, S. Bharanidharan, V. Dharsana, Rajalavanya

Abstract:

The concept of the Metaverse represents a potential evolution in the realm of cyberspace. In the early stages of Web 2.0, we observed a proliferation of online pseudonyms or 'nyms,' which increased the prevalence of fake accounts and made it challenging to establish unique online identities for various roles. However, in the era of Web 3.0, particularly in the context of the Metaverse, an individual's digital identity is intrinsically linked to their real-world identity. Consequently, actions taken in the Metaverse can carry significant consequences in the physical world. In light of these considerations, we propose the development of an innovative authentication system known as 'Metasec.' This system is designed to enhance security for digital assets, online identities, avatars, and user accounts within the Metaverse. Notably, Metasec operates as a password less authentication solution, relying on a multifaceted approach to security, encompassing device attestation, facial recognition, and pattern-based security keys.

Keywords: metaverse, multifactor authentication, security, facial recognition, patten password

Procedia PDF Downloads 51
8305 Rethinking the Role of Small States in the Hybrid Era: Shifts in the Cypriot Foreign and Defence Policies, 2004-2019

Authors: Constantinos Adamides, Petros Petrikkos

Abstract:

In the era of growing hybrid threats, small states find themselves in need to re-evaluate existing foreign and defense policies. The pressure to establishing or maintain a status of a reliable partner in the community in which they belong to, vis-à-vis their multilateral relations with other organisations and entities, small states may need to shift their policies in the field to accommodate security needs that are not only pertinent to their security, but also to that of the organisations (bloc) in which they interact. Unlike potential shortcomings in a small state’s mainstream security and defence framework where the threat would be limited to the state itself, in more contemporary times with dominating hybrid threats, the small states’ security shortcomings may also become a security problem for the bloc in which these states belong to. An indicative example is small states like Cyprus and Malta, which belong and 'interact' in the European Union. As a result, the nature of hybrid threats can be utilised to hurt bigger states in a bloc by exploiting the small states’ vulnerabilities and security gaps. Inevitably, both the defensive and foreign policy collaborations of small states with bigger states have been and are constantly re-evaluated to tackle and prevent such problems. In essence, the goal of this ‘re-evaluation’ aims to achieve a twofold goal: The first is the small states’ quest to appear as a reliable partner within the bloc, while the second is to avoid being the weakest security link in the bloc’s defence against hybrid threats. Indeed, the hybrid arena is a security area where they can excel in the bloc, despite the potential and expected conventional military deficiencies. This new environment prompts us to think security from the perspective of small states differently and in relation to their role as members or big organisations. The paper focuses on the case of Cyprus following its accession to the European Union and examines how a country that has had a very focused security orientation –not least due to its ongoing security problems– altered its foreign and defence policies within the European Union to ensure compliance with the rest of the bloc, while at the same time maximizing its role as a security player. Specifically, it examines the methods through which the country shifted its policies as well as the challenges and opportunities that emerged from these security shifts.

Keywords: Cyprus, defence, foreign policy, hybrid threats, ontological security, small states

Procedia PDF Downloads 122
8304 Study of the Hysteretic I-V Characteristics in a Polystyrene/ZnO-Nanorods Stack Layer

Authors: You-Lin Wu, Yi-Hsing Sung, Shih-Hung Lin, Jing-Jenn Lin

Abstract:

Performance improvement in optoelectronic devices such as solar cells and photodetectors has been reported when a polymer/ZnO nanorods stack is used. Resistance switching of polymer/ZnO nanocrystals (or nanorods) hybrid has also gained a lot of research interests recently. It has been reported that high- and low-resistance states of a metal/insulator/metal (MIM) structure diode with a polystyrene (PS) and ZnO hybrid as the insulator layer can be switched by applied bias after a high-voltage forming process, while the same device structure merely with a PS layer does not show any forming behavior. In this work, we investigated the current-voltage (I-V) characteristics of an MIM device with a PS/ZnO nanorods stack deposited on fluorine-doped tin oxide (FTO) glass substrate. The ZnO nanorods were grown by a hydrothermal method using a mixture of zinc nitrate, hexamethylenetetramine, and DI water. Following that, a PS layer was deposited by spin coating. Finally, the device with a structure of Ti/ PS/ZnO nanorods/FTO was completed by e-gun evaporated Ti layer on top of the PS layer. Semiconductor parameters analyzer Agilent 4156C was then used to measure the I-V characteristics of the device by applying linear ramp sweep voltage with sweep sequence of 0V → 4V → 0V → 3V → 0V → 2V → 0V → 1V → 0V in both positive and negative directions. It is interesting to find that the I-V characteristics are bias dependent and hysteretic, indicating that the device Ti/PS/ZnO nanorods/FTO structure has ferroelectricity. Our results also show that the maximum hysteresis loop height of the I-V characteristics as well as the voltage at which the maximum hysteresis loop height of each scan occurs increase with increasing maximum sweep voltage. It should be noticed that, although ferroelectricity has been found in ZnO at its melting temperature (1975℃) and in Li- or Co-doped ZnO, neither PS nor ZnO has ferroelectricity at room temperature. Using the same structure but with a PS or ZnO layer only as the insulator does not give and hysteretic I-V characteristics. It is believed that a charge polarization layer is induced near the PS/ZnO nanorods stack interface and thus causes the ferroelectricity in the device with Ti/PS/ZnO nanorods/FTO structure. Our results show that the PS/ZnO stack can find a potential application in a resistive switching memory device with MIM structure.

Keywords: ferroelectricity, hysteresis, polystyrene, resistance switching, ZnO nanorods

Procedia PDF Downloads 298
8303 Numerical Analysis of Core-Annular Blood Flow in Microvessels at Low Reynolds Numbers

Authors: L. Achab, F. Iachachene

Abstract:

In microvessels, red blood cells (RBCs) exhibit a tendency to migrate towards the vessel center, establishing a core-annular flow pattern. The core region, marked by a high concentration of RBCs, is governed by significantly non-Newtonian viscosity. Conversely, the annular layer, composed of cell-free plasma, is characterized by Newtonian low viscosity. This property enables the plasma layer to act as a lubricant for the vessel walls, efficiently reducing resistance to the movement of blood cells. In this study, we investigate the factors influencing blood flow in microvessels and the thickness of the annular plasma layer using a non-miscible fluids approach in a 2D axisymmetric geometry. The governing equations of an incompressible unsteady flow are solved numerically through the Volume of Fluid (VOF) method to track the interface between the two immiscible fluids. To model blood viscosity in the core region, we adopt the Quemada constitutive law which is accurately captures the shear-thinning blood rheology over a wide range of shear rates. Our results are then compared to an established theoretical approach under identical flow conditions, particularly concerning the radial velocity profile and the thickness of the annular plasma layer. The simulation findings for low Reynolds numbers, demonstrate a notable agreement with the theoretical solution, emphasizing the pivotal role of blood’s rheological properties in the core region in determining the thickness of the annular plasma layer.

Keywords: core-annular flows, microvessels, Quemada model, plasma layer thickness, volume of fluid method

Procedia PDF Downloads 38
8302 Magnetohydrodynamics (MHD) Boundary Layer Flow Past A Stretching Plate with Heat Transfer and Viscous Dissipation

Authors: Jiya Mohammed, Tsadu Shuaib, Yusuf Abdulhakeem

Abstract:

The research work focuses on the cases of MHD boundary layer flow past a stretching plate with heat transfer and viscous dissipation. The non-linear of momentum and energy equation are transform into ordinary differential equation by using similarity transformation, the resulting equation are solved using Adomian Decomposition Method (ADM). An attempt has been made to show the potentials and wide range application of the Adomian decomposition method in the comparison with the previous one in solving heat transfer problems. The Pade approximates value (η= 11[11, 11]) is use on the difficulty at infinity. The results are compared by numerical technique method. A vivid conclusion can be drawn from the results that ADM provides highly precise numerical solution for non-linear differential equations. The result where accurate especially for η ≤ 4, a general equating terms of Eckert number (Ec), Prandtl number (Pr) and magnetic parameter ( ) is derived which was used to investigate velocity and temperature profiles in boundary layer.

Keywords: MHD, Adomian decomposition, boundary layer, viscous dissipation

Procedia PDF Downloads 531
8301 Military Role of Russia beyond Its National Boundary

Authors: Nipuli Gajanayake

Abstract:

The Russian military role beyond its national frontier has become a debatable hot topic in the international political arena. It’s advanced, and strategic responses in combating regional and international security problems have always been a factor to debate and criticize. Under such critical circumstances, Russia is attentive to play its military role according to the provisions of the Military Doctrine of the Russian Federation. Most importantly, the legal basis of the doctrine has also consisted with the generally recognized principles and norms of international law. Therefore, Russian international military assistances are pledged to accomplish international peace and security. The expansion of Russian military participation in the United Nations Peacekeeping operations, and military- political, and technical cooperation have largely evident the great effort of Russia in maintaining and restoring international peace and security. Moreover, the conflict management diplomacy and the development of dialogue with nation states to confront military risks and threats can also identify as a part of preserving international peace and security. In addition, Russia strives to strengthen the system of collective security with regional and international organizations through the legal framework of the Collective Security Treaty Organization (CSTO). Maintaining cooperative ties with the Commonwealth of Independent States (CIS), the Organization for Security and Cooperation in Europe (OSCE) and the Shanghai Cooperation Organization (SCO) have highlighted the Russian deliberation on maintaining regional peace and security. Nevertheless, the extension of cordial relations with nation states and providing of military assistances during tensions and conflicts on their territories can also underscore as Russians commitments on maintaining international peace and security. Observing and recognizing the disparity between the West portrayed terms like ‘illegal Russian interventions’ and the comprehensive reality behind the ‘Russian military assistances’ are important to understand. However, a lopsided vision or a perspective towards the Russian international military role would not present a clear understanding about its valued and also dedicated hard work on maintaining international peace and security.

Keywords: collective security, diplomacy, international military role of Russia, international peace and security

Procedia PDF Downloads 283
8300 On Dynamic Chaotic S-BOX Based Advanced Encryption Standard Algorithm for Image Encryption

Authors: Ajish Sreedharan

Abstract:

Security in transmission and storage of digital images has its importance in today’s image communications and confidential video conferencing. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Advanced Encryption Standard (AES) is a well known block cipher that has several advantages in data encryption. However, it is not suitable for real-time applications. This paper presents modifications to the Advanced Encryption Standard to reflect a high level security and better image encryption. The modifications are done by adjusting the ShiftRow Transformation and using On Dynamic chaotic S-BOX. In AES the Substitute bytes, Shift row and Mix columns by themselves would provide no security because they do not use the key. In Dynamic chaotic S-BOX Based AES the Substitute bytes provide security because the S-Box is constructed from the key. Experimental results verify and prove that the proposed modification to image cryptosystem is highly secure from the cryptographic viewpoint. The results also prove that with a comparison to original AES encryption algorithm the modified algorithm gives better encryption results in terms of security against statistical attacks.

Keywords: advanced encryption standard (AES), on dynamic chaotic S-BOX, image encryption, security analysis, ShiftRow transformation

Procedia PDF Downloads 417
8299 Investigating the Impact of the Laundry and Sterilization Process on the Performance of Reusable Surgical Gowns

Authors: N. Khomarloo, F. Mousazadegan, M. Latifi, N. Hemmatinejad

Abstract:

Recently, the utilization of reusable surgical gowns in order to decrease costs, environmental protection and enhance surgeon’s comfort is considered. One of the concerns in applying this kind of medical protective clothing is reduction of their resistance to bacterial penetration especially in wet state, after repeated laundering and sterilizing process. The purpose of this study is to investigate the effect of the laundering and sterilizing process on the reusable surgical gown’s resistance against bacterial wet penetration. To this end, penetration of Staphylococcus aureus bacteria in wet state after 70 washing and sterilizing cycles was evaluated on the two single-layer and three-layer reusable gowns. The outcomes reveal that up to 20 laundering and sterilizing cycles, protective property of samples improves due to fabric shrinkage, after that because of the fabric’s construction opening, the bacterial penetration increase. However, the three-layer gown presents higher protective performance comparing to the single-layer one.

Keywords: laundry, porosity, reusable surgical gown, sterilization, wet bacterial penetration

Procedia PDF Downloads 259