Search results for: cross layer security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8748

Search results for: cross layer security

8298 Zero Cross-Correlation Codes Based on Balanced Incomplete Block Design: Performance Analysis and Applications

Authors: Garadi Ahmed, Boubakar S. Bouazza

Abstract:

The Zero Cross-Correlation (C, w) code is a family of binary sequences of length C and constant Hamming-weight, the cross correlation between any two sequences equal zero. In this paper, we evaluate the performance of ZCC code based on Balanced Incomplete Block Design (BIBD) for Spectral Amplitude Coding Optical Code Division Multiple Access (SAC-OCDMA) system using direct detection. The BER obtained is better than 10-9 for five simultaneous users.

Keywords: spectral amplitude coding-optical code-division-multiple-access (SAC-OCDMA), phase induced intensity noise (PIIN), balanced incomplete block design (BIBD), zero cross-correlation (ZCC)

Procedia PDF Downloads 346
8297 Analysis of BSF Layer N-Gaas/P-Gaas/P+-Gaas Solar Cell

Authors: Abderrahmane Hemmani, Hamid Khachab, Dennai Benmoussa, Hassane Benslimane, Abderrachid Helmaoui

Abstract:

Back surface field GaAs with n -p-p+ structures are found to have better characteristics than the conventional solar cells. A theory, based on the transport of both minority carriers under the charge neutrality condition, has been developed in the present paper which explains behavior of the back surface field solar cells. That is reported with an efficiency of 25,05% (Jsc=33.5mA/cm2, Vco=0.87v and fill factor 86% under AM1.5 global conditions). We present the effect of technological parameters of the p+ layer on the conversion efficiency on the solar cell. Good agreement is achieved between our results and the simulation results given the variation of the equivalent recombination velocity to p+ layer as a function of BSF thickness and BSF doping.

Keywords: back surface field, GaAs, solar cell, technological parameters

Procedia PDF Downloads 418
8296 Multi-Layer Multi-Feature Background Subtraction Using Codebook Model Framework

Authors: Yun-Tao Zhang, Jong-Yeop Bae, Whoi-Yul Kim

Abstract:

Background modeling and subtraction in video analysis has been widely proved to be an effective method for moving objects detection in many computer vision applications. Over the past years, a large number of approaches have been developed to tackle different types of challenges in this field. However, the dynamic background and illumination variations are two of the most frequently occurring issues in the practical situation. This paper presents a new two-layer model based on codebook algorithm incorporated with local binary pattern (LBP) texture measure, targeted for handling dynamic background and illumination variation problems. More specifically, the first layer is designed by block-based codebook combining with LBP histogram and mean values of RGB color channels. Because of the invariance of the LBP features with respect to monotonic gray-scale changes, this layer can produce block-wise detection results with considerable tolerance of illumination variations. The pixel-based codebook is employed to reinforce the precision from the outputs of the first layer which is to eliminate false positives further. As a result, the proposed approach can greatly promote the accuracy under the circumstances of dynamic background and illumination changes. Experimental results on several popular background subtraction datasets demonstrate a very competitive performance compared to previous models.

Keywords: background subtraction, codebook model, local binary pattern, dynamic background, illumination change

Procedia PDF Downloads 199
8295 The Need for Educational Psychology in Teacher Education for Sustainable Transformation and Security in Nigeria

Authors: Kaltume Kabir Sharrif

Abstract:

Teacher education is the bedrock of educational growth and development of any nation. With development in education all human problems can be overcome. Educational Psychology, on the other hand, is in a strategic position for any programme in teacher education to be successful hence other aspects of societal issues. In other words, no teacher education can be of any help in ensuring transformation and security without adequate study in Educational Psychology. Without adequate knowledge and skills in Educational Psychology the teacher may not function effectively in the course of discharging his duty. It is in view of this, that the paper discusses some aspects of Educational Psychology that are of paramount importance in teacher education for sustainable transformation and security of Nigeria. Some recommendations were offered on the role educational psychology play in resolving security challenges facing the country. These include enriching educational psychology with topics from forensic psychology that will provide the teacher the skills of fighting crime in the school, Behavioural Science Unit should be established in each school to monitor the behavior of students, among others.

Keywords: transformation, security challenges, teacher education, educational psychology

Procedia PDF Downloads 483
8294 Smart Grids Cyber Security Issues and Challenges

Authors: Imen Aouini, Lamia Ben Azzouz

Abstract:

The energy need is growing rapidly due to the population growth and the large new usage of power. Several works put considerable efforts to make the electricity grid more intelligent to reduce essentially energy consumption and provide efficiency and reliability of power systems. The Smart Grid is a complex architecture that covers critical devices and systems vulnerable to significant attacks. Hence, security is a crucial factor for the success and the wide deployment of Smart Grids. In this paper, we present security issues of the Smart Grid architecture and we highlight open issues that will make the Smart Grid security a challenging research area in the future.

Keywords: smart grids, smart meters, home area network, neighbor area network

Procedia PDF Downloads 403
8293 Parameter Selection for Computationally Efficient Use of the Bfvrns Fully Homomorphic Encryption Scheme

Authors: Cavidan Yakupoglu, Kurt Rohloff

Abstract:

In this study, we aim to provide a novel parameter selection model for the BFVrns scheme, which is one of the prominent FHE schemes. Parameter selection in lattice-based FHE schemes is a practical challenges for experts or non-experts. Towards a solution to this problem, we introduce a hybrid principles-based approach that combines theoretical with experimental analyses. To begin, we use regression analysis to examine the parameters on the performance and security. The fact that the FHE parameters induce different behaviors on performance, security and Ciphertext Expansion Factor (CEF) that makes the process of parameter selection more challenging. To address this issue, We use a multi-objective optimization algorithm to select the optimum parameter set for performance, CEF and security at the same time. As a result of this optimization, we get an improved parameter set for better performance at a given security level by ensuring correctness and security against lattice attacks by providing at least 128-bit security. Our result enables average ~ 5x smaller CEF and mostly better performance in comparison to the parameter sets given in [1]. This approach can be considered a semiautomated parameter selection. These studies are conducted using the PALISADE homomorphic encryption library, which is a well-known HE library. The abstract goes here.

Keywords: lattice cryptography, fully homomorphic encryption, parameter selection, LWE, RLWE

Procedia PDF Downloads 129
8292 Water-Repellent Coating Based on Thermoplastic Polyurethane, Silica Nanoparticles and Graphene Nanoplatelets

Authors: S. Naderizadeh, A. Athanassiou, I. S. Bayer

Abstract:

This work describes a layer-by-layer spraying method to produce a non-wetting coating, based on thermoplastic polyurethane (TPU) and silica nanoparticles (Si-NPs). The main purpose of this work was to transform a hydrophilic polymer to superhydrophobic coating. The contact angle of pure TPU was measured about 77˚ ± 2, and water droplets did not roll away upon tilting even at 90°. But after applying a layer of Si-NPs on top of this, not only the contact angle increased to 165˚ ± 2, but also water droplets can roll away even below 5˚ tilting. The most important restriction in this study was the weak interfacial adhesion between polymer and nanoparticles, which had a bad effect on durability of the coatings. To overcome this problem, we used a very thin layer of graphene nanoplatelets (GNPs) as an interlayer between TPU and Si-NPs layers, followed by thermal treatment at 150˚C. The sample’s morphology and topography were characterized by scanning electron microscopy (SEM), EDX analysis and atomic force microscopy (AFM). It was observed that Si-NPs embedded into the polymer phase in the presence of GNPs layer. It is probably because of the high surface area and considerable thermal conductivity of the graphene platelets. The contact angle value for the sample containing graphene decreased a little bit respected to the coating without graphene and reached to 156.4˚ ± 2, due to the depletion of the surface roughness. The durability of the coatings against abrasion was evaluated by Taber® abrasion test, and it was observed that superhydrophobicity of the coatings remains for a longer time, in the presence of GNPs layer. Due to the simple fabrication method and good durability of the coating, this coating can be used as a durable superhydrophobic coating for metals and can be produced in large scale.

Keywords: graphene, silica nanoparticles, superhydrophobicity, thermoplastic polyurethane

Procedia PDF Downloads 168
8291 Improving Biodegradation Behavior of Fabricated WE43 Magnesium Alloy by High-Temperature Oxidation

Authors: Jinge Liu, Shuyuan Min, Bingchuan Liu, Bangzhao Yin, Bo Peng, Peng Wen, Yun Tian

Abstract:

WE43 magnesium alloy can be additively manufactured via laser powder bed fusion (LPBF) for biodegradable applications, but the as-built WE43 exhibits an excessively rapid corrosion rate. High-temperature oxidation (HTO) was performed on the as-built WE43 to improve its biodegradation behavior. A sandwich structure including an oxide layer at the surface, a transition layer in the middle, and the matrix was generated influenced by the oxidation reaction and diffusion of RE atoms when heated at 525 ℃for 8 hours. The oxide layer consisted of Y₂O₃ and Nd₂O₃ oxides with a thickness of 2-3 μm. The transition layer is composed of α-Mg and Y₂O₃ with a thickness of 60-70 μm, while Mg24RE5 could be observed except α-Mg and Y₂O₃. The oxide layer and transition layer appeared to have an effective passivation effect. The as-built WE43 lost 40% weight after the in vitro immersion test for three days and finally broke into debris after seven days of immersion. The high-temperature oxidation samples kept the structural integrity and lost only 6.88 % weight after 28-day immersion. The corrosion rate of HTO samples was significantly controlled, which improved the biocompatibility of the as-built WE43 at the same time. The samples after HTO had better osteogenic capability according to ALP activity. Moreover, as built WE43 performed unqualified in cell adhesion and hemolytic test due to its excessively rapid corrosion rate. While as for HTO samples, cells adhered well, and the hemolysis ratio was only 1.59%.

Keywords: laser powder bed fusion, biodegradable metal, high temperature oxidation, biodegradation behavior, WE43

Procedia PDF Downloads 84
8290 Research on High Dielectric HfO₂ Stack Structure Applied to Field Effect Transistors

Authors: Kuan Yu Lin, Shih Chih Chen

Abstract:

This study focuses on the Al/HfO₂/Si/Al structure to explore the electrical properties of the structure. This experiment uses a radio frequency magnetron sputtering system to deposit high dielectric materials on p-type silicon substrates of 1~10 Ω-cm (100). Consider the hafnium dioxide film as a dielectric layer. Post-deposition annealing at 750°C in nitrogen atmosphere. Electron beam evaporation of metallic aluminum is then used to complete the top/bottom electrodes. The metal is post-annealed at 450°C for 20 minutes in a nitrogen environment to complete the MOS component. Its dielectric constant, equivalent oxide layer thickness, oxide layer defects, and leakage current mechanism are discussed. At PDA 750°C-5s, the maximum k value was found to be 21.2, and the EOT was 3.68nm.

Keywords: high-k gate dielectrics, HfO₂, post deposition annealing, RF magnetic

Procedia PDF Downloads 44
8289 Enhancement of Environmental Security by the Application of Wireless Sensor Network in Nigeria

Authors: Ahmadu Girgiri, Lawan Gana Ali, Mamman M. Baba

Abstract:

Environmental security clearly articulates the perfections and developments of various communities around the world irrespective of the region, culture, religion or social inclination. Although, the present state of insecurity has become serious issue devastating the peace, unity, stability and progress of man and his physical environment particularly in developing countries. Recently, measure of security and it management in Nigeria has been a bottle-neck to the effectiveness and advancement of various sectors that include; business, education, social relations, politics and above all an economy. Several measures have been considered on mitigating environment insecurity such as surveillance, demarcation, security personnel empowerment and the likes, but still the issue remains disturbing. In this paper, we present the application of new technology that contributes to the improvement of security surveillance known as “Wireless Sensor Network (WSN)”. The system is new, smart and emerging technology that provides monitoring, detection and aggregation of information using sensor nodes and wireless network. WSN detects, monitors and stores information or activities in the deployed area such as schools, environment, business centers, public squares, industries, and outskirts and transmit to end users. This will reduce the cost of security funding and eases security surveillance depending on the nature and the requirement of the deployment.

Keywords: application, environment, insecurity, sensor, wireless sensor network

Procedia PDF Downloads 241
8288 A Study on Prediction Model for Thermally Grown Oxide Layer in Thermal Barrier Coating

Authors: Yongseok Kim, Jeong-Min Lee, Hyunwoo Song, Junghan Yun, Jungin Byun, Jae-Mean Koo, Chang-Sung Seok

Abstract:

Thermal barrier coating(TBC) is applied for gas turbine components to protect the components from extremely high temperature condition. Since metallic substrate cannot endure such severe condition of gas turbines, delamination of TBC can cause failure of the system. Thus, delamination life of TBC is one of the most important issues for designing the components operating at high temperature condition. Thermal stress caused by thermally grown oxide(TGO) layer is known as one of the major failure mechanisms of TBC. Thermal stress by TGO mainly occurs at the interface between TGO layer and ceramic top coat layer, and it is strongly influenced by the thickness and shape of TGO layer. In this study, Isothermal oxidation is conducted on coin-type TBC specimens prepared by APS(air plasma spray) method. After the isothermal oxidation at various temperature and time condition, the thickness and shape(rumpling shape) of the TGO is investigated, and the test data is processed by numerical analysis. Finally, the test data is arranged into a mathematical prediction model with two variables(temperature and exposure time) which can predict the thickness and rumpling shape of TGO.

Keywords: thermal barrier coating, thermally grown oxide, thermal stress, isothermal oxidation, numerical analysis

Procedia PDF Downloads 325
8287 An Investigation on Interactions between Social Security with Police Operation and Economics in the Field of Tourism

Authors: Mohammad Mahdi Namdari, Hosein Torki

Abstract:

Security as an abstract concept, has involved human being from the beginning of creation to the present, and certainly to the future. Accordingly, battles, conflicts, challenges, legal proceedings, crimes and all issues related to human kind are associated with this concept. Today by interviewing people about their life, the security of societies and Social crimes are interviewed too. Along with the security as an infrastructure and vital concept, the economy and related issues e.g. welfare, per capita income, total government revenue, export, import and etc. is considered another infrastructure and vital concept. These two vital concepts (Security and Economic) have linked together complexly and significantly. The present study employs analytical-descriptive research method using documents and Statistics of official sources. Discovery and explanation of this mutual connection are comprising a profound and extensive research; so management, development and reform in system and relationships of the scope of this two concepts are complex and difficult. Tourism and its position in today's economy is one of the main pillars of the economy of the 21st century that maybe associate with the security and social crimes more than other pillars. Like all human activities, economy of societies and partially tourism dependent on security especially in the public and social security. On the other hand, the true economic development (generally) and the growth of the tourism industry (dedicated) are a security generating and supporting for it, because a dynamic economic infrastructure prevents the formation of centers of crime and illegal activities by providing a context for socio-economic development for all segments of society in a fair and humane. This relationship is a formula of the complexity between the two concept of economy and security. Police as a revealed or people-oriented organization in the field of security directly has linked with the economy of a community and is very effective In the face of the tourism industry. The relationship between security and national crime index, and economic indicators especially ones related to tourism is confirming above discussion that is notable. According to understanding processes about security and economic as two key and vital concepts are necessary and significant for sovereignty of governments.

Keywords: economic, police, tourism, social security

Procedia PDF Downloads 306
8286 The Effectiveness of a Hybrid Diffie-Hellman-RSA-Advanced Encryption Standard Model

Authors: Abdellahi Cheikh

Abstract:

With the emergence of quantum computers with very powerful capabilities, the security of the exchange of shared keys between two interlocutors poses a big problem in terms of the rapid development of technologies such as computing power and computing speed. Therefore, the Diffie-Hellmann (DH) algorithm is more vulnerable than ever. No mechanism guarantees the security of the key exchange, so if an intermediary manages to intercept it, it is easy to intercept. In this regard, several studies have been conducted to improve the security of key exchange between two interlocutors, which has led to interesting results. The modification made on our model Diffie-Hellman-RSA-AES (DRA), which encrypts the information exchanged between two users using the three-encryption algorithms DH, RSA and AES, by using stenographic photos to hide the contents of the p, g and ClesAES values that are sent in an unencrypted state at the level of DRA model to calculate each user's public key. This work includes a comparative study between the DRA model and all existing solutions, as well as the modification made to this model, with an emphasis on the aspect of reliability in terms of security. This study presents a simulation to demonstrate the effectiveness of the modification made to the DRA model. The obtained results show that our model has a security advantage over the existing solution, so we made these changes to reinforce the security of the DRA model.

Keywords: Diffie-Hellmann, DRA, RSA, advanced encryption standard

Procedia PDF Downloads 71
8285 Investigate the Effects of Geometrical Structure and Layer Orientation on Strength of 3D-FDM Rapid Prototyped Samples

Authors: Ahmed A.D. Sarhan, Chong Feng Duan, Mum Wai Yip, M. Sayuti

Abstract:

Rapid Prototyping (RP) technologies enable physical parts to be produced from various materials without depending on the conventional tooling. Fused Deposition Modeling (FDM) is one of the famous RP processes used at present. Tensile strength and compressive strength resistance will be identified for different sample structures and different layer orientations of ABS rapid prototype solid models. The samples will be fabricated by a FDM rapid prototyping machine in different layer orientations with variations in internal geometrical structure. The 0° orientation where layers were deposited along the length of the samples displayed superior strength and impact resistance over all the other orientations. The anisotropic properties were probably caused by weak interlayer bonding and interlayer porosity.

Keywords: building orientation, compression strength, rapid prototyping, tensile strength

Procedia PDF Downloads 680
8284 Collagen Hydrogels Cross-Linked by Squaric Acid

Authors: Joanna Skopinska-Wisniewska, Anna Bajek, Marta Ziegler-Borowska, Alina Sionkowska

Abstract:

Hydrogels are a class of materials widely used in medicine for many years. Proteins, such as collagen, due to the presence of a large number of functional groups are easily wettable by polar solvents and can create hydrogels. The supramolecular network capable to swelling is created by cross-linking of the biopolymers using various reagents. Many cross-linking agents has been tested for last years, however, researchers still are looking for a new, more secure reactants. Squaric acid, 3,4-dihydroxy 3-cyclobutene 1,2- dione, is a very strong acid, which possess flat and rigid structure. Due to the presence of two carboxyl groups the squaric acid willingly reacts with amino groups of collagen. The main purpose of this study was to investigate the influence of addition of squaric acid on the chemical, physical and biological properties of collagen materials. The collagen type I was extracted from rat tail tendons and 1% solution in 0.1M acetic acid was prepared. The samples were cross-linked by the addition of 5%, 10% and 20% of squaric acid. The mixtures of all reagents were incubated 30 min on magnetic stirrer and then dialyzed against deionized water. The FTIR spectra show that the collagen structure is not changed by cross-linking by squaric acid. Although the mechanical properties of the collagen material deteriorate, the temperature of thermal denaturation of collagen increases after cross-linking, what indicates that the protein network was created. The lyophilized collagen gels exhibit porous structure and the pore size decreases with the higher addition of squaric acid. Also the swelling ability is lower after the cross-linking. The in vitro study demonstrates that the materials are attractive for 3T3 cells. The addition of squaric acid causes formation of cross-ling bonds in the collagen materials and the transparent, stiff hydrogels are obtained. The changes of physicochemical properties of the material are typical for cross-linking process, except mechanical properties – it requires further experiments. However, the results let us to conclude that squaric acid is a suitable cross-linker for protein materials for medicine and tissue engineering.

Keywords: collagen, squaric acid, cross-linking, hydrogel

Procedia PDF Downloads 372
8283 Effect of Porous Multi-Layer Envelope System on Effective Wind Pressure of Building Ventilation

Authors: Ying-Chang Yu, Yuan-Lung Lo

Abstract:

Building ventilation performance is an important indicator of indoor comfort. However, in addition to the geometry of the building or the proportion of the opening, the ventilation performance is also very much related to the actual wind pressure of the building. There are more and more contemporary building designs built with multi-layer exterior envelope. Due to ventilation and view observatory requirement, the porous outer layer of the building is commonly adopted and has a significant wind damping effect, causing the phenomenon of actual wind pressure loss. However, the relationship between the wind damping effect and the actual wind pressure is not linear. This effect can make the indoor ventilation of the building rationalized to reasonable range under the condition of high wind pressure, and also maintain a good amount of ventilation performance under the condition of low wind pressure. In this study, wind tunnel experiments were carried out to simulate the different wind pressures flow through the porous outer layer, and observe the actual wind pressure strength engage with the window layer to find the decreasing relationship between the damping effect of the porous shell and the wind pressure. Experiment specimen scale was designed to be 1:50 for testing real-world building conditions; the study found that the porous enclosure has protective shielding without affecting low-pressure ventilation. Current study observed the porous skin may damp more wind energy to ease the wind pressure under high-speed wind. Differential wind speed may drop the pressure into similar pressure level by using porous skin. The actual mechanism and value of this phenomenon will need further study in the future.

Keywords: multi-layer facade, porous media, wind damping, wind tunnel test, building ventilation

Procedia PDF Downloads 121
8282 Packet Fragmentation Caused by Encryption and Using It as a Security Method

Authors: Said Rabah Azzam, Andrew Graham

Abstract:

Fragmentation of packets caused by encryption applied on the network layer of the IOS model in Internet Protocol version 4 (IPv4) networks as well as the possibility of using fragmentation and Access Control Lists (ACLs) as a method of restricting network access to certain hosts or areas of a network.Using default settings, fragmentation is expected to occur and each fragment to be reassembled at the other end. If this does not occur then a high number of ICMP messages should be generated back towards the source host indicating that the packet is too large and that it needs to be made smaller. This result is also expected when the MTU is changed for certain links between devices.When using ACLs and packet fragments to restrict access to hosts or network segments it is possible that ACLs cannot be set up in this way. If ACLs cannot be setup to allow only fragments then it is a limitation of the hardware’s firmware holding back this particular method. If the ACL on the restricted switch can be set up in such a way to allow only fragments then a connection that forces packets to fragment should be allowed to pass through the ACL. This should then make a network connection to the destination machine allowing data to be sent to and from the destination machine. ICMP messages from the restricted access switch and host should also be blocked from being sent back across the link which will be shown in an SSH session into the switch.

Keywords: fragmentation, encryption, security, switch

Procedia PDF Downloads 311
8281 Microwave Security System in Museums: Design and Implementation

Authors: Dalia Elsheakh, Hala Elsadek

Abstract:

The objective of this paper is to propose a competitive microwave security system that can be applied with reasonable price at museums in Egypt, considering the priceless elements in 23 Egyptian museums countrywide and the lack of good recent security systems even in big ones. The system main goal is to detect valuable targets to ensure their presence in the pre-defined positions in order to protect them from being stolen. The system is based on real time microwave scanning for the required space volume through transmitting RF waves at consecutive angles and detecting the back scattered waves from required objects to detect their existence at pre-specified locations.

Keywords: microwave security system, object locating system, real time locating system (RTLS), antenna array, array electronic scanning

Procedia PDF Downloads 327
8280 Mathematical and Numerical Analysis of a Nonlinear Cross Diffusion System

Authors: Hassan Al Salman

Abstract:

We consider a nonlinear parabolic cross diffusion model arising in applied mathematics. A fully practical piecewise linear finite element approximation of the model is studied. By using entropy-type inequalities and compactness arguments, existence of a global weak solution is proved. Providing further regularity of the solution of the model, some uniqueness results and error estimates are established. Finally, some numerical experiments are performed.

Keywords: cross diffusion model, entropy-type inequality, finite element approximation, numerical analysis

Procedia PDF Downloads 366
8279 An Examination of the Effects of Implantable Technologies on the Practices of Governmentality

Authors: Benn Van Den Ende

Abstract:

Over the last three decades, there has been an exponential increase in developments in implantable technologies such as the cardiac pacemaker, bionic prosthesis, and implantable chips. The effect of these technologies has been well researched in many areas. However, there is a lack of critical research in security studies. This paper will provide preliminary findings to an ongoing research project which aims to examine how implantable technologies effect the practices of governmentality in the context of security. It will do this by looking at the practices and techniques of governmentality along with different implantable technologies which increase, change or otherwise affect governmental practices. The preliminary research demonstrates that implantable technologies have a profound effect on the practices of governmentality, while also paving the way for further research into a potential ‘new’ form of governmentality in relation to these implantable technologies.

Keywords: critical security studies, governmentality, security theory, political theory, Foucault

Procedia PDF Downloads 167
8278 Conflict and Hunger Revisit: Evidences from Global Surveys, 1989-2020

Authors: Manasse Elusma, Thung-Hong Lin, Chun-yin Lee

Abstract:

The relationship between hunger and war or conflict remains to be discussed. Do wars or conflicts cause hunger and food scarcity, or is the reverse relationship is true? As the world becomes more peaceful and wealthier, some countries are still suffered from hunger and food shortage. So, eradicating hunger calls for a more comprehensive understanding of the relationship between conflict and hunger. Several studies are carried out to detect the importance of conflict or war on food security. Most of these studies, however, perform only descriptive analysis and largely use food security indicators instead of the global hunger index. Few studies have employed cross-country panel data to explicitly analyze the association between conflict and chronic hunger, including hidden hunger. Herein, this study addresses this issue and the knowledge gap. We combine global datasets to build a new panel dataset including 143 countries from 1989 to 2020. This study examines the effect of conflict on hunger with fixed effect models, and the results show that the increase of conflict frequency deteriorates hunger. Peacebuilding efforts and war prevention initiative are required to eradicate global hunger.

Keywords: armed conflict, food scarcity, hidden hunger, hunger, malnutrition

Procedia PDF Downloads 151
8277 Free Shape Optimisation of Cold Formed Steel Sections

Authors: Mina Mortazavi, Pezhman Sharafi

Abstract:

Cold-formed steel sections are popular construction materials as structural or non-structural elements. The objective of this paper is to propose an optimisation method for open cross sections targeting the maximum nominal axial strength. The cross sections considered in the optimisation process should all meet a determined critical global buckling load to be considered as a candidate for optimisation process. The maximum dimensions of the cross section are fixed and limited into a predefined rectangular area. The optimisation process is repeated for different available coil thicknesses of 1 mm, 2.5 mm and 3 mm to determine the optimum thickness according to the cross section buckling behaviour. A simple-simple boundary is assumed as end conditions. The number of folds is limited to 20 folds to prevent extra complicated sections. The global buckling load is considered as Euler load and is determined according to the moment of inertia of the cross-section with a constant length. The critical buckling loads are obtained using Finite Strip Method. The results of the optimisation analysis are provided, and the optimum cross-section within the considered range is determined.

Keywords: shape optimisation, buckling, cold formed steel, finite strip method

Procedia PDF Downloads 390
8276 Harnessing Entrepreneurial Opportunities for National Security

Authors: Itiola Kehinde Adeniran

Abstract:

This paper investigated the influence of harnessing entrepreneurial opportunities on the national security in Nigeria with a specific focus on the security situation of the post-amnesty programmes of the Federal Government in Ondo State. The self-administered structured questionnaire was employed to collect data from one hundred and twenty participants through purposive sampling method. Inferential statistics was used to analyze the data, specifically; ordinary least squares linear regression method was employed with the aid of statistical package for social science (SPSS) version 20 in order to determine the influence of independent variable (entrepreneurial opportunities) on dependent variable (national security). The result showed that business opportunities have a significant influence on the rate of criminal activities. The study also revealed that entrepreneurial opportunity creation and discovery as well as providing a model on how these entrepreneurial opportunities could be effectively and efficiently utilized jointly predict better national security, which counted for 69% variance of crime rate reduction. The paper, therefore, recommended that citizens should be encouraged to develop an interest in the skill-based activities in order to change their mindset towards self-employment which can motivate them in identify entrepreneurial opportunities.

Keywords: entrepreneurship, entrepreneurial opportunities, national security, unemployment

Procedia PDF Downloads 311
8275 Buoyancy Effects in Pressure Retarded Osmosis with Extremely High Draw Solution Concentration

Authors: Ivonne Tshuma, Ralf Cord-Ruwisch, Wendell Ela

Abstract:

Water crisis is a world-wide problem because of population growth and climate change. Hence, desalination is a solution to water scarcity, which threatens the world. Reverse osmosis (RO) is the most used technique for desalination; unfortunately, this process, usually requires high-pressure requirement hence requires a lot of energy about 3 – 5.5 KWhr/m³ of electrical energy. The pressure requirements of RO can be alleviated by the use of PRO (pressure retarded osmosis) to drive the RO process. This paper proposes a process of utilizing the energy directly from PRO to drive an RO process. The paper mostly analyses the PRO process parameters such as cross-flow velocity, density, and buoyancy and how these have an effect on PRO hence ultimately the RO process. The experimental study of the PRO with various feed solution concentrations and cross-flow velocities at fixed applied pressure with different orientations of the PRO cell was performed. The study revealed that without cross-flow velocity, buoyancy effects were observed but not with cross-flow velocity.

Keywords: cross-flow velocity, pressure retarded osmosis, density, buoyancy

Procedia PDF Downloads 128
8274 The Adaptive Properties of the Strategic Assurance System of the National Economy Sustainability to the Economic Security Threats

Authors: Badri Gechbaia

Abstract:

Adaptive management as a fundamental element of the concept of the assurance of economy`s sustainability to the economic security of the system-synergetic type has been considered. It has been proved that the adaptive sustainable development is a transitional phase from the extensive one and later on from the rapid growth to the sustainable development. It has been determined that the adaptive system of the strategic assurance of the sustainability of the economy to the economic security threats is formed on the principles of the domination in its complex of the subsystems with weightier adaptive characteristics that negate the destructive influence of external and internal environmental factors on the sustainability of the national economy.

Keywords: adaptive management, adaptive properties, economic security, strategic assurance

Procedia PDF Downloads 486
8273 Bifurcations of the Rotations in the Thermocapillary Flows

Authors: V. Batishchev, V. Getman

Abstract:

We study the self-similar fluid flows in the Marangoni layers with the axial symmetry. Such flows are induced by the radial gradients of the temperatures whose distributions along the free boundary obey some power law. The self-similar solutions describe thermo-capillar flows both in the thin layers and in the case of infinite thickness. We consider both positive and negative temperature gradients. In the former case the cooling of free boundary nearby the axis of symmetry gives rise to the rotation of fluid. The rotating flow concentrates itself inside the Marangoni layer while outside of it the fluid does not revolve. In the latter case we observe no rotating flows at all. In the layers of infinite thickness the separation of the rotating flow creates two zones where the flows are directed oppositely. Both the longitudinal velocity and the temperature have exactly one critical point inside the boundary layer. It is worth to note that the profiles are monotonic in the case of non-swirling flows. We describe the flow outside the boundary layer with the use of self-similar solution of the Euler equations. This flow is slow and non-swirling. The introducing of an outer flow gives rise to the branching of swirling flows from the non-swirling ones. There is such the critical velocity of the outer flow that a non-swirling flow exists for supercritical velocities and cannot be extended to the sub-critical velocities. For the positive temperature gradients there are two non-swirling flows. For the negative temperature gradients the non-swirling flow is unique. We determine the critical velocity of the outer flow for which the branching of the swirling flows happens. In the case of a thin layer confined within free boundaries we show that the cooling of the free boundaries near the axis of symmetry leads to the separating of the layer and creates two sub-layers with opposite rotations inside. This makes sharp contrast with the case of infinite thickness. We show that such rotation arises provided the thickness of the layer exceed some critical value. In the case of a thin layer confined within free and rigid boundaries we construct the branching equation and the asymptotic approximation for the secondary swirling flows near the bifurcation point. It turns out that the bifurcation gives rise to one pair of the secondary swirling flows with different directions of swirl.

Keywords: free surface, rotation, fluid flow, bifurcation, boundary layer, Marangoni layer

Procedia PDF Downloads 332
8272 Defence Diplomacy and Collective Security in Africa: Case of Rwanda Defence Forces

Authors: Emmanuel Mugiraneza

Abstract:

Rwanda uses defence diplomacy to pursue international collective security through different mechanisms. This paper shows that with an intent of promoting international collective security, Rwanda has constituted its defense diplomacy policy in three standpoints. First, Rwanda has formed strategic cooperation alliances with state actors, regional and international Organizations that enables her to participate in and promote international collective peace, security and cooperation. Secondary, Rwanda uses defence diplomacy to foster cooperation in to pre-empt, minimize and neutralize potential triggers that would lead to the outbreak of international conflict. Thirdly, Rwanda implements defence diplomacy policy strategy through internationally recognized operational and tactical standards while dispelling hostilities, assisting the friendly nation’s forces and or building and maintaining public confidence and trust in the areas where Rwanda Defence Force deploys for peacekeeping missions in Sudan, South Sudan, Central African Republic and Mozambique for a counterterrorism mission.

Keywords: defence diplomacy, collective security, Rwanda, Peacekeeping

Procedia PDF Downloads 103
8271 Cost Analysis of Optimized Fast Network Mobility in IEEE 802.16e Networks

Authors: Seyyed Masoud Seyyedoshohadaei, Borhanuddin Mohd Ali

Abstract:

To support group mobility, the NEMO Basic Support Protocol has been standardized as an extension of Mobile IP that enables an entire network to change its point of attachment to the Internet. Using NEMO in IEEE 802.16e (WiMax) networks causes latency in handover procedure and affects seamless communication of real-time applications. To decrease handover latency and service disruption time, an integrated scheme named Optimized Fast NEMO (OFNEMO) was introduced by authors of this paper. In OFNEMO a pre-establish multi tunnels concept, cross function optimization and cross layer design are used. In this paper, an analytical model is developed to evaluate total cost consisting of signaling and packet delivery costs of the OFNEMO compared with RFC3963. Results show that OFNEMO increases probability of predictive mode compared with RFC3963 due to smaller handover latency. Even though OFNEMO needs extra signalling to pre-establish multi tunnel, it has less total cost thanks to its optimized algorithm. OFNEMO can minimize handover latency for supporting real time application in moving networks.

Keywords: fast mobile IPv6, handover latency, IEEE802.16e, network mobility

Procedia PDF Downloads 173
8270 Proposal of a Model Supporting Decision-Making on Information Security Risk Treatment

Authors: Ritsuko Kawasaki, Takeshi Hiromatsu

Abstract:

Management is required to understand all information security risks within an organization, and to make decisions on which information security risks should be treated in what level by allocating how much amount of cost. However, such decision-making is not usually easy, because various measures for risk treatment must be selected with the suitable application levels. In addition, some measures may have objectives conflicting with each other. It also makes the selection difficult. Therefore, this paper provides a model which supports the selection of measures by applying multi-objective analysis to find an optimal solution. Additionally, a list of measures is also provided to make the selection easier and more effective without any leakage of measures.

Keywords: information security risk treatment, selection of risk measures, risk acceptance, multi-objective optimization

Procedia PDF Downloads 363
8269 Silicon-To-Silicon Anodic Bonding via Intermediate Borosilicate Layer for Passive Flow Control Valves

Authors: Luc Conti, Dimitry Dumont-Fillon, Harald van Lintel, Eric Chappel

Abstract:

Flow control valves comprise a silicon flexible membrane that deflects against a substrate, usually made of glass, containing pillars, an outlet hole, and anti-stiction features. However, there is a strong interest in using silicon instead of glass as substrate material, as it would simplify the process flow by allowing the use of well controlled anisotropic etching. Moreover, specific devices demanding a bending of the substrate would also benefit from the inherent outstanding mechanical strength of monocrystalline silicon. Unfortunately, direct Si-Si bonding is not easily achieved with highly structured wafers since residual stress may prevent the good adhesion between wafers. Using a thermoplastic polymer, such as parylene, as intermediate layer is not well adapted to this design as the wafer-to-wafer alignment is critical. An alternative anodic bonding method using an intermediate borosilicate layer has been successfully tested. This layer has been deposited onto the silicon substrate. The bonding recipe has been adapted to account for the presence of the SOI buried oxide and intermediate glass layer in order not to exceed the breakdown voltage. Flow control valves dedicated to infusion of viscous fluids at very high pressure have been made and characterized. The results are compared to previous data obtained using the standard anodic bonding method.

Keywords: anodic bonding, evaporated glass, flow control valve, drug delivery

Procedia PDF Downloads 186