Search results for: microwave security system
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 19468

Search results for: microwave security system

19018 Pulsed Electric Field as Pretreatment for Different Drying Method in Chilean Abalone (Concholepas Concholepas) Mollusk: Effects on Product Physical Properties and Drying Methods Sustainability

Authors: Luis González-Cavieres, Mario Perez-Won, Anais Palma-Acevedo, Gipsy Tabilo-Munizaga, Erick Jara-Quijada, Roberto Lemus-Mondaca

Abstract:

In this study, pulsed electric field (PEF: 2.0 kV/cm) was used as pretreatment in drying methods, vacuum microwave (VMD); freeze-drying (FD); and hot air (HAD), in Chilean abalone mollusk. Drying parameters, quality, energy consumption, and Sustainability parameters were evaluated. PEF+VMD showed better values than the other drying systems, with drying times 67% and 83% lower than PEF+FD and FD. In the quality parameters, PEF+FD showed a significantly lower value for hardness (250 N), and a lower change of color value (ΔE = 12). In the case of HAD, the PEF application did not significantly influence its processing. In energy parameters, VMD and PEF+VMD reduced energy consumption and CO2 emissions.

Keywords: PEF technology, vacuum microwave drying, energy consumption, CO2 emissions

Procedia PDF Downloads 63
19017 Design and Development of a Computerized Medical Record System for Hospitals in Remote Areas

Authors: Grace Omowunmi Soyebi

Abstract:

A computerized medical record system is a collection of medical information about a person that is stored on a computer. One principal problem of most hospitals in rural areas is using the file management system for keeping records. A lot of time is wasted when a patient visits the hospital, probably in an emergency, and the nurse or attendant has to search through voluminous files before the patient's file can be retrieved; this may cause an unexpected to happen to the patient. This data mining application is to be designed using a structured system analysis and design method which will help in a well-articulated analysis of the existing file management system, feasibility study, and proper documentation of the design and implementation of a computerized medical record system. This computerized system will replace the file management system and help to quickly retrieve a patient's record with increased data security, access clinical records for decision-making, and reduce the time range at which a patient gets attended to.

Keywords: programming, data, software development, innovation

Procedia PDF Downloads 68
19016 Security System for Safe Transmission of Medical Image

Authors: Mohammed Jamal Al-Mansor, Kok Beng Gan

Abstract:

This paper develops an optimized embedding of payload in medical image by using genetic optimization. The goal is to preserve region of interest from being distorted because of the watermark. By using this developed system there is no need of manual defining of region of interest through experts as the system will apply the genetic optimization to select the parts of image that can carry the watermark with guaranteeing less distortion. The experimental results assure that genetic based optimization is useful for performing steganography with less mean square error percentage.

Keywords: AES, DWT, genetic algorithm, watermarking

Procedia PDF Downloads 395
19015 Global-Scale Evaluation of Two Satellite-Based Passive Microwave Soil Moisture Data Sets (SMOS and AMSR-E) with Respect to Modelled Estimates

Authors: A. Alyaaria, b, J. P. Wignerona, A. Ducharneb, Y. Kerrc, P. de Rosnayd, R. de Jeue, A. Govinda, A. Al Bitarc, C. Albergeld, J. Sabaterd, C. Moisya, P. Richaumec, A. Mialonc

Abstract:

Global Level-3 surface soil moisture (SSM) maps from the passive microwave soil moisture and Ocean Salinity satellite (SMOSL3) have been released. To further improve the Level-3 retrieval algorithm, evaluation of the accuracy of the spatio-temporal variability of the SMOS Level 3 products (referred to here as SMOSL3) is necessary. In this study, a comparative analysis of SMOSL3 with a SSM product derived from the observations of the Advanced Microwave Scanning Radiometer (AMSR-E) computed by implementing the Land Parameter Retrieval Model (LPRM) algorithm, referred to here as AMSRM, is presented. The comparison of both products (SMSL3 and AMSRM) were made against SSM products produced by a numerical weather prediction system (SM-DAS-2) at ECMWF (European Centre for Medium-Range Weather Forecasts) for the 03/2010-09/2011 period at global scale. The latter product was considered here a 'reference' product for the inter-comparison of the SMOSL3 and AMSRM products. Three statistical criteria were used for the evaluation, the correlation coefficient (R), the root-mean-squared difference (RMSD), and the bias. Global maps of these criteria were computed, taking into account vegetation information in terms of biome types and Leaf Area Index (LAI). We found that both the SMOSL3 and AMSRM products captured well the spatio-temporal variability of the SM-DAS-2 SSM products in most of the biomes. In general, the AMSRM products overestimated (i.e., wet bias) while the SMOSL3 products underestimated (i.e., dry bias) SSM in comparison to the SM-DAS-2 SSM products. In term of correlation values, the SMOSL3 products were found to better capture the SSM temporal dynamics in highly vegetated biomes ('Tropical humid', 'Temperate Humid', etc.) while best results for AMSRM were obtained over arid and semi-arid biomes ('Desert temperate', 'Desert tropical', etc.). When removing the seasonal cycles in the SSM time variations to compute anomaly values, better correlation with the SM-DAS-2 SSM anomalies were obtained with SMOSL3 than with AMSRM, in most of the biomes with the exception of desert regions. Eventually, we showed that the accuracy of the remotely sensed SSM products is strongly related to LAI. Both the SMOSL3 and AMSRM (slightly better) SSM products correlate well with the SM-DAS2 products over regions with sparse vegetation for values of LAI < 1 (these regions represent almost 50% of the pixels considered in this global study). In regions where LAI>1, SMOSL3 outperformed AMSRM with respect to SM-DAS-2: SMOSL3 had almost consistent performances up to LAI = 6, whereas AMSRM performance deteriorated rapidly with increasing values of LAI.

Keywords: remote sensing, microwave, soil moisture, AMSR-E, SMOS

Procedia PDF Downloads 343
19014 Applications of AI, Machine Learning, and Deep Learning in Cyber Security

Authors: Hailyie Tekleselase

Abstract:

Deep learning is increasingly used as a building block of security systems. However, neural networks are hard to interpret and typically solid to the practitioner. This paper presents a detail survey of computing methods in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. There are many AI-based applications used in industrial scenarios such as Internet of Things (IoT), smart grids, and edge computing. Machine learning technologies require a training process which introduces the protection problems in the training data and algorithms. We present machine learning techniques currently applied to the detection of intrusion, malware, and spam. Our conclusions are based on an extensive review of the literature as well as on experiments performed on real enterprise systems and network traffic. We conclude that problems can be solved successfully only when methods of artificial intelligence are being used besides human experts or operators.

Keywords: artificial intelligence, machine learning, deep learning, cyber security, big data

Procedia PDF Downloads 109
19013 A CM-Based Model for 802.11 Networks Security Policies Enforcement

Authors: Karl Mabiala Dondia, Jing Ma

Abstract:

In recent years, networks based on the 802.11 standards have gained a prolific deployment. The reason for this massive acceptance of the technology by both home users and corporations is assuredly due to the "plug-and-play" nature of the technology and the mobility. The lack of physical containment due to inherent nature of the wireless medium makes maintenance very challenging from a security standpoint. This study examines via continuous monitoring various predictable threats that 802.11 networks can face, how they are executed, where each attack may be executed and how to effectively defend against them. The key goal is to identify the key components of an effective wireless security policy.

Keywords: wireless LAN, IEEE 802.11 standards, continuous monitoring, security policy

Procedia PDF Downloads 360
19012 Development of a Steam or Microwave-Assisted Sequential Salt-Alkali Pretreatment for Sugarcane Leaf Waste

Authors: Preshanthan Moodley

Abstract:

This study compares two different pretreatments for sugarcane leaf waste (SLW): steam salt-alkali (SSA) and microwave salt-alkali (MSA). The two pretreatment types were modelled, optimized, and validated with R² > 0.97. Reducing sugar yields of 1.21g/g were obtained with optimized SSA pretreatment using 1.73M ZnCl₂, 1.36M NaOH and 9.69% solid loading, and 1.17g/g with optimized MSA pretreatment using 1.67M ZnCl₂, 1.52M NaOH at 400W for 10min. A lower pretreatment time (10min) was required for the MSA model (83% lower). The structure of pretreated SLW was assessed using scanning electron microscopy (SEM) and Fourier Transform Infrared analysis (FTIR). The optimized SSA and MSA models showed lignin removal of 80.5 and 73% respectively. The MSA pretreatment was further examined on sorghum leaves and Napier grass and showed yield improvements of 1.9- and 2.8-fold compared to recent reports. The developed pretreatment methods demonstrated high efficiency at enhancing enzymatic hydrolysis on various lignocellulosic substrates.

Keywords: lignocellulosic biomass, pretreatment, salt, sugarcane leaves

Procedia PDF Downloads 246
19011 Global Peace and Security: The Role of International Peace and Security Organizations and the Need for Institutional and Operational Reforms

Authors: Saint C. Nguedjip

Abstract:

This paper is an analytical review a set of 20 literatures as required by the assignment prompt. The review centers on global peace and security. What role do international organizations play in global peace and security? The review centers around three main points. First, I examine global peace and security impacts on global governance. Secondly, it highlights the role traditional international community and security organizations such as the United Nations (UN), the North Atlantic Treaty Organization (NATO), and others play in providing the globe with peace and collective security. Third, it suggests a way forward as those institutions seek betterment and improvement. The review begins by defining some concepts and addressing the ambivalent meaning of peace and war. Scholars and researchers have conducted extensive research on the importance of international organizations. Yet, there is still a lot to consider if betterment and improvement are on the agenda. The review will shed light on the failures and challenges that these organizations. Those challenges are continuously undermining peacebuilding and peacekeeping actions of a great number among those institutions created with an ultimate mission of keeping the world order organized and coordinated for peace and security regardless of differences, cultures, and backgrounds. Women face violence on a daily basis, while racism and discrimination cause klm; ]]];inflammations worldwide. The chaotic situation in Ukraine is a wake-up call on scholarship and practitioners alike to come up with suggestions as well as recommendations that help mitigate insecurity while promoting peace and security, not only for Ukrainians but also for all countries facing wars and others issues. This paper will point the audience toward the right direction.

Keywords: security, peace, global governance, global peace and security, peacekeeping, international organizations, human rights, multilateralism, and unilateralism, gender, women

Procedia PDF Downloads 91
19010 Proactive WPA/WPA2 Security Using DD-WRT Firmware

Authors: Mustafa Kamoona, Mohamed El-Sharkawy

Abstract:

Although the latest Wireless Local Area Network technology Wi-Fi 802.11i standard addresses many of the security weaknesses of the antecedent Wired Equivalent Privacy (WEP) protocol, there are still scenarios where the network security are still vulnerable. The first security model that 802.11i offers is the Personal model which is very cheap and simple to install and maintain, yet it uses a Pre Shared Key (PSK) and thus has a low to medium security level. The second model that 802.11i provide is the Enterprise model which is highly secured but much more expensive and difficult to install/maintain and requires the installation and maintenance of an authentication server that will handle the authentication and key management for the wireless network. A central issue with the personal model is that the PSK needs to be shared with all the devices that are connected to the specific Wi-Fi network. This pre-shared key, unless changed regularly, can be cracked using offline dictionary attacks within a matter of hours. The key is burdensome to change in all the connected devices manually unless there is some kind of algorithm that coordinate this PSK update. The key idea of this paper is to propose a new algorithm that proactively and effectively coordinates the pre-shared key generation, management, and distribution in the cheap WPA/WPA2 personal security model using only a DD-WRT router.

Keywords: Wi-Fi, WPS, TLS, DD-WRT

Procedia PDF Downloads 216
19009 Energy Security and Sustainable Development: Challenges and Prospects

Authors: Abhimanyu Behera

Abstract:

Over the past few years, energy security and sustainable development have moved rapidly into the global agenda. There are two main reasons: first, the impact of high and often volatile energy prices; second, concerns over environmental sustainability particularly about the global climate. Both issues are critically important in which impressive economic growth has boosted the demand for energy and put corresponding strains on the environment. Energy security is a broad concept that focuses on energy availability and pricing. Specifically, it refers to the ability of the energy supply system i.e. suppliers, transporters, distributors and regulatory, financial and R&D institutions to deliver the amount of competitively priced energy that customers demand, within accepted standards of reliability, timeliness, quality, safety. Traditionally, energy security has been defined in the context of the geopolitical risks to external oil supplies but today it is encompassing all energy forms, all the external and internal links bringing the energy to the final consumer, and all the many ways energy supplies can be disrupted including equipment malfunctions, system design flaws, operator errors, malicious computer activities, deficient market and regulatory frameworks, corporate financial problems, labour actions, severe weather and natural events, aggressive acts (e.g. war, terrorism and sabotage), and geopolitical disruptions. In practice, the most challenging disruptions are those linked to: 1) extreme weather events; 2) mismatched electricity supply and demand; 3) regulatory failures; and 4) concentration of oil and gas resources in certain regions of the world. However, insecure energy supplies inhibit development by raising energy costs and imposing expensive cuts in services when disruptions actually occur. The energy supply sector can best advance sustainable development by producing and delivering secure and environmentally-friendly sources of energy and by increasing the efficiency of energy use. With this objective, this paper seeks to highlight the significance of energy security and sustainable development in today’s world. Moreover, it critically overhauls the major challenges towards sustainability of energy security and what are the major policies are taken to overcome these challenges by Government is lucidly explicated in this paper.

Keywords: energy, policies, security, sustainability

Procedia PDF Downloads 367
19008 Foresight in Food Supply System in Bogota

Authors: Suarez-Puello Alejandro, Baquero-Ruiz Andrés F, Suarez-Puello Rodrigo

Abstract:

This paper discusses the results of a foresight exercise which analyzes Bogota’s fruit, vegetable and tuber supply chain strategy- described at the Food Supply and Security Master Plan (FSSMP)-to provide the inhabitants of Bogotá, Colombia, with basic food products at a fair price. The methodology consisted of using quantitative and qualitative foresight tools such as system dynamics and variable selection methods to better represent interactions among stakeholders and obtain more integral results that could shed light on this complex situation. At first, the Master Plan is an input to establish the objectives and scope of the exercise. Then, stakeholders and their relationships are identified. Later, system dynamics is used to model product, information and money flow along the fruit, vegetable and tuber supply chain. Two scenarios are presented, discussing actions by the public sector and the reactions that could be expected from the whole food supply system. Finally, these impacts are compared to the Food Supply and Security Master Plan’s objectives suggesting recommendations that could improve its execution. This foresight exercise performed at a governmental level is intended to promote the widen the use of foresight as an anticipatory, decision-making tool that offers solutions to complex problems.

Keywords: decision making, foresight, public policies, supply chain, system dynamics

Procedia PDF Downloads 417
19007 Autonomic Threat Avoidance and Self-Healing in Database Management System

Authors: Wajahat Munir, Muhammad Haseeb, Adeel Anjum, Basit Raza, Ahmad Kamran Malik

Abstract:

Databases are the key components of the software systems. Due to the exponential growth of data, it is the concern that the data should be accurate and available. The data in databases is vulnerable to internal and external threats, especially when it contains sensitive data like medical or military applications. Whenever the data is changed by malicious intent, data analysis result may lead to disastrous decisions. Autonomic self-healing is molded toward computer system after inspiring from the autonomic system of human body. In order to guarantee the accuracy and availability of data, we propose a technique which on a priority basis, tries to avoid any malicious transaction from execution and in case a malicious transaction affects the system, it heals the system in an isolated mode in such a way that the availability of system would not be compromised. Using this autonomic system, the management cost and time of DBAs can be minimized. In the end, we test our model and present the findings.

Keywords: autonomic computing, self-healing, threat avoidance, security

Procedia PDF Downloads 490
19006 The Sustained Utility of Japan's Human Security Policy

Authors: Maria Thaemar Tana

Abstract:

The paper examines the policy and practice of Japan’s human security. Specifically, it asks the question: How does Japan’s shift towards a more proactive defence posture affect the place of human security in its foreign policy agenda? Corollary to this, how is Japan sustaining its human security policy? The objective of this research is to understand how Japan, chiefly through the Ministry of Foreign Affairs (MOFA) and JICA (Japan International Cooperation Agency), sustains the concept of human security as a policy framework. In addition, the paper also aims to show how and why Japan continues to include the concept in its overall foreign policy agenda. In light of the recent developments in Japan’s security policy, which essentially result from the changing security environment, human security appears to be gradually losing relevance. The paper, however, argues that despite the strategic challenges Japan faced and is facing, as well as the apparent decline of its economic diplomacy, human security remains to be an area of critical importance for Japanese foreign policy. In fact, as Japan becomes more proactive in its international affairs, the strategic value of human security also increases. Human security was initially envisioned to help Japan compensate for its weaknesses in the areas of traditional security, but as Japan moves closer to a more activist foreign policy, the soft policy of human security complements its hard security policies. Using the framework of neoclassical realism (NCR), the paper recognizes that policy-making is essentially a convergence of incentives and constraints at the international and domestic levels. The theory posits that there is no perfect 'transmission belt' linking material power on the one hand, and actual foreign policy on the other. State behavior is influenced by both international- and domestic-level variables, but while systemic pressures and incentives determine the general direction of foreign policy, they are not strong enough to affect the exact details of state conduct. Internal factors such as leaders’ perceptions, domestic institutions, and domestic norms, serve as intervening variables between the international system and foreign policy. Thus, applied to this study, Japan’s sustained utilization of human security as a foreign policy instrument (dependent variable) is essentially a result of systemic pressures (indirectly) (independent variables) and domestic processes (directly) (intervening variables). Two cases of Japan’s human security practice in two regions are examined in two time periods: Iraq in the Middle East (2001-2010) and South Sudan in Africa (2011-2017). The cases show that despite the different motives behind Japan’s decision to participate in these international peacekeepings ad peace-building operations, human security continues to be incorporated in both rhetoric and practice, thus demonstrating that it was and remains to be an important diplomatic tool. Different variables at the international and domestic levels will be examined to understand how the interaction among them results in changes and continuities in Japan’s human security policy.

Keywords: human security, foreign policy, neoclassical realism, peace-building

Procedia PDF Downloads 114
19005 Rethinking Military Aid to Civil Authorities for Internal Security Operations: A Sustainable Solution to Rebuilding Civil Military Relations in Nigeria

Authors: Emmanuela Ngozi Maduka

Abstract:

In Nigeria, civil-military relations is at its lowest point as a result of the challenges emanating from incessant initiation of military aid to civil authorities (MACA) for internal security operations. This paper is concerned with the question whether it is appropriate for the military to handle internal security crisis with exception to terrorism and armed militia. It analyses the legal framework for MACA in internal security operations which appear to be in contradiction with military tactical and equipment training. The paper argues that the expectation that transitional re-training of the military for internal security operations will reconcile these inconsistencies specifically on the issue of use of force is not practicable and will always pose challenges for both the military and the citizens. Accordingly, this paper adopts a socio-legal methodology for better clarity on the interactions between the legal framework on MACA and military internal security operations. The paper also identifies the lack of effective and proficient paramilitary within the security design of Nigeria as the key issue which results in incessant initiation of MACA and advocates for the establishment of an effective and proficient paramilitary to effectively handle internal security crisis within Nigeria.

Keywords: civil-military relations, MACA, military training, operational challenges, paramilitary, use of force

Procedia PDF Downloads 122
19004 Demonstration of Powering up Low Power Wireless Sensor Network by RF Energy Harvesting System

Authors: Lim Teck Beng, Thiha Kyaw, Poh Boon Kiat, Lee Ngai Meng

Abstract:

This work presents discussion on the possibility of merging two emerging technologies in microwave; wireless power transfer (WPT) and RF energy harvesting. The current state of art of the two technologies is discussed and the strength and weakness of the two technologies is also presented. The equivalent circuit of wireless power transfer is modeled and explained as how the range and efficiency can be further increased by controlling certain parameters in the receiver. The different techniques of harvesting the RF energy from the ambient are also extensive study. Last but not least, we demonstrate that a low power wireless sensor network (WSN) can be power up by RF energy harvesting. The WSN is designed to transmit every 3 minutes of information containing the temperature of the environment and also the voltage of the node. One thing worth mention is both the sensors that are used for measurement are also powering up by the RF energy harvesting system.

Keywords: energy harvesting, wireless power transfer, wireless sensor network and magnetic coupled resonator

Procedia PDF Downloads 501
19003 2106 kA/cm² Peak Tunneling Current Density in GaN-Based Resonant Tunneling Diode with an Intrinsic Oscillation Frequency of ~260GHz at Room Temperature

Authors: Fang Liu, JunShuai Xue, JiaJia Yao, GuanLin Wu, ZuMaoLi, XueYan Yang, HePeng Zhang, ZhiPeng Sun

Abstract:

Terahertz spectra is in great demand since last two decades for many photonic and electronic applications. III-Nitride resonant tunneling diode is one of the promising candidates for portable and compact THz sources. Room temperature microwave oscillator based on GaN/AlN resonant tunneling diode was reported in this work. The devices, grown by plasma-assisted molecular-beam epitaxy on free-standing c-plane GaN substrates, exhibit highly repeatable and robust negative differential resistance (NDR) characteristics at room temperature. To improve the interface quality at the active region in RTD, indium surfactant assisted growth is adopted to enhance the surface mobility of metal atoms on growing film front. Thanks to the lowered valley current associated with the suppression of threading dislocation scattering on low dislocation GaN substrate, a positive peak current density of record-high 2.1 MA/cm2 in conjunction with a peak-to-valley current ratio (PVCR) of 1.2 are obtained, which is the best results reported in nitride-based RTDs up to now considering the peak current density and PVCR values simultaneously. When biased within the NDR region, microwave oscillations are measured with a fundamental frequency of 0.31 GHz, yielding an output power of 5.37 µW. Impedance mismatch results in the limited output power and oscillation frequency described above. The actual measured intrinsic capacitance is only 30fF. Using a small-signal equivalent circuit model, the maximum intrinsic frequency of oscillation for these diodes is estimated to be ~260GHz. This work demonstrates a microwave oscillator based on resonant tunneling effect, which can meet the demands of terahertz spectral devices, more importantly providing guidance for the fabrication of the complex nitride terahertz and quantum effect devices.

Keywords: GaN resonant tunneling diode, peak current density, microwave oscillation, intrinsic capacitance

Procedia PDF Downloads 113
19002 Efficient Position Based Operation Code Authentication

Authors: Hashim Ali, Sheheryar Khan

Abstract:

Security for applications is always been a keen issue of concern. In general, security is to allow access of grant to legal user or to deny non-authorized access to the system. Shoulder surfing is an observation technique to hack an account or to enter into a system. When a malicious observer is capturing or recording the fingers of a user while he is entering sensitive inputs (PIN, Passwords etc.) and may be able to observe user’s password credential. It is very rigorous for a novice user to prevent himself from shoulder surfing or unaided observer in a public place while accessing his account. In order to secure the user account, there are five factors of authentication; they are: “(i) something you have, (ii) something you are, (iii) something you know, (iv) somebody you know, (v) something you process”. A technique has been developed of fifth-factor authentication “something you process” to provide novel approach to the user. In this paper, we have applied position based operational code authentication in such a way to more easy and user friendly to the user.

Keywords: shoulder surfing, malicious observer, sensitive inputs, authentication

Procedia PDF Downloads 253
19001 Nitriding of Super-Ferritic Stainless Steel by Plasma Immersion Ion Implantation in Radio Frequency and Microwave Plasma System

Authors: H. Bhuyan, S. Mändl, M. Favre, M. Cisternas, A. Henriquez, E. Wyndham, M. Walczak, D. Manova

Abstract:

The 470 Li-24 Cr and 460Li-21 Cr are two alloys belonging to the next generation of super-ferritic nickel free stainless steel grades, containing titanium (Ti), niobium (Nb) and small percentage of carbon (C) and nitrogen (N). The addition of Ti and Nb improves in general the corrosion resistance while the low interstitial content of C and N assures finer precipitates and greater ductility compared to conventional ferritic grades. These grades are considered an economic alternative to AISI 316L and 304 due to comparable or superior corrosion. However, since 316L and 304 can be nitrided to improve the mechanical surface properties like hardness and wear; it is hypothesize that the tribological properties of these super-ferritic stainless steels grades can also be improved by plasma nitriding. Thus two sets of plasma immersion ion implantation experiments have been carried out, one with a high pressure capacitively coupled radio frequency plasma at PUC Chile and the other using a low pressure microwave plasma at IOM Leipzig, in order to explore further improvements in the mechanical properties of 470 Li-24 Cr and 460Li-21 Cr steel. Nitrided and unnitrided substrates have been subsequently investigated using different surface characterization techniques including secondary ion mass spectroscopy, scanning electron microscopy, energy dispersive x-ray analysis, Vickers hardness, wear resistance, as well as corrosion test. In most of the characterizations no major differences have been observed for nitrided 470 Li-24 Cr and 460Li-21 Cr. Due to the ion bombardment, an increase in the surface roughness is observed for higher treatment temperature, independent of the steel types. The formation of chromium nitride compound takes place only at a treatment temperature around 4000C-4500C, or above. However, corrosion properties deteriorate after treatment at higher temperatures. The physical characterization results show up to 25 at.% of nitrogen for a diffusion zone of 4-6 m, and a 4-5 times increase in hardness for different experimental conditions. The samples implanted with temperature higher than 400 °C presented a wear resistance around two orders of magnitude higher than the untreated substrates. The hardness is apparently affected by the different roughness of the samples and their different profile of nitrogen.

Keywords: ion implantation, plasma, RF and microwave plasma, stainless steel

Procedia PDF Downloads 451
19000 Improvement and Miniaturization RFID Patch Antenna by Inclusion the Complementary Metamaterials

Authors: Seif Naoui, Lassaad Latrach, Ali Gharsallah

Abstract:

This paper is specialized to highlight the method of miniaturization and improvement the patch antenna by using the complementary metamaterial. This method is presented by a simple technique is composed a structure of patch antenna integrated in its surface a cell of complementary split ring resonator. This resonator is placed at the middle of the radiating patch in parallel with the transmission line and with a variable angle of orientation. The objective is to find the ultimate angle where the best results are obtained on improving the characteristics of the considered antenna. This motif widespread at the traceability applications by wireless communication for RFID technology at the operation frequency 2.45 GHz. Our contribution is based on studies empirical often presented in this article. All simulation results were made by the CST Microwave Studio.

Keywords: complimentary split ring resonators, computer simulation technology microwave studio, metamaterials patch antennas, microstrip patch antenna, radio frequency identification

Procedia PDF Downloads 426
18999 World on the Edge: Migration and Cross Border Crimes in West Africa

Authors: Adeyemi Kamil Hamzah

Abstract:

The contiguity of nations in international system suggests that world is a composite of socio-economic unit with people exploring and exploiting the potentials in the world via migrations. Thus, cross border migration has made positive contributions to social and economic development of individuals and nations by increasing the household incomes of the host countries. However, the cross border migrations in West Africa are becoming part of a dynamic and unstable world migration system. This is due to the nature and consequences of trans-border crimes in West Africa, with both short and long term effects on the socio-economic viability of developing countries like West African States. The paper identified that migration influenced cross-border crimes as well as the high spate of insurgencies in the sub-region. Furthermore, the consequential effect of a global village has imbalanced population flows, making some countries host and parasites to others. Also, stern and deft cross-border rules and regulations, as well as territorial security and protections, ameliorate cross border crimes and migration in West African sub-regions. Therefore, the study concluded that cross border migration is the linchpin of all kinds of criminal activities which affect the security of states in the sub-region.

Keywords: cross-border migration, border crimes, security, West Africa, development, globalisation

Procedia PDF Downloads 209
18998 Microwave Synthesis and Molecular Docking Studies of Azetidinone Analogous Bearing Diphenyl Ether Nucleus as a Potent Antimycobacterial and Antiprotozoal Agent

Authors: Vatsal M. Patel, Navin B. Patel

Abstract:

The present studies deal with the developing a series bearing a diphenyl ethers nucleus using structure-based drug design concept. A newer series of diphenyl ether based azetidinone namely N-(3-chloro-2-oxo-4-(3-phenoxyphenyl)azetidin-1-yl)-2-(substituted amino)acetamide (2a-j) have been synthesized by condensation of m-phenoxybenzaldehyde with 2-(substituted-phenylamino)acetohydrazide followed by the cyclisation of resulting Schiff base (1a-j) by conventional method as well as microwave heating approach as a part of an environmentally benign synthetic protocol. All the synthesized compounds were characterized by spectral analysis and were screened for in vitro antimicrobial, antitubercular and antiprotozoal activity. The compound 2f was found to be most active M. tuberculosis (6.25 µM) MIC value in the primary screening as well as this same derivative has been found potency against L. mexicana and T. cruzi with MIC value 2.09 and 6.69 µM comparable to the reference drug Miltefosina and Nifurtimox. To provide understandable evidence to predict binding mode and approximate binding energy of a compound to a target in the terms of ligand-protein interaction, all synthesized compounds were docked against an enoyl-[acyl-carrier-protein] reductase of M. tuberculosis (PDB ID: 4u0j). The computational studies revealed that azetidinone derivatives have a high affinity for the active site of enzyme which provides a strong platform for new structure-based design efforts. The Lipinski’s parameters showed good drug-like properties and can be developed as an oral drug candidate.

Keywords: antimycobacterial, antiprotozoal, azetidinone, diphenylether, docking, microwave

Procedia PDF Downloads 143
18997 The Effort of Good Governance in Enhancing Foods Security for Sustainable National Development

Authors: Egboja Simon Oga

Abstract:

One of the most important keys to the success of a nation is to ensure steady development and national economic self-sufficiency and independence. It is therefore in this regard that this paper is designed to identify food security to be crucial to all nations’ effort toward sustainable national development. Nigeria as a case study employed various effort by the successive government towards food security. Emphasis were placed on the extent to which government has boosted food security situation on the basis of the identified limitations, conclusion was drawn, recommendation/suggestions proffered, that subsidization of the process of farm inputs like fertilizer, improved seeds and agrochemical, education of farmers on modern methods of farming through extension services, improvisation of village-based food storage mechanism and provision of infrastructural facilities in rural areas to facilitate the preservation and easy evacuation of farm produces are necessary.

Keywords: food, governance, development, security

Procedia PDF Downloads 313
18996 Geo-Spatial Distribution of Radio Refractivity and the Influence of Fade Depth on Microwave Propagation Signals over Nigeria

Authors: Olalekan Lawrence Ojo

Abstract:

Designing microwave terrestrial propagation networks requires a thorough evaluation of the severity of multipath fading, especially at frequencies below 10 GHz. In nations like Nigeria, without a large enough databases to support the existing empirical models, the mistakes in the prediction technique intended for the evaluation may be severe. The need for higher bandwidth for various satellite applications makes the investigation of the effects of radio refractivity, fading due to multipath, and Geoclimatic factors on satellite propagation links more important. One of the key elements to take into account for the best functioning of microwave frequencies is the clear air effects. This work has taken into account the geographical distribution of radio refractivity and fades depth over a number of stations in Nigeria. Data from five locations in Nigeria—Akure, Enugu, Jos, Minna, and Sokoto—based on five-year (2017–2021) measurement methods of atmospheric pressure, relative, and humidity temperature—at two levels (ground surface and 100 m heights)—are studied to deduced their effects on signals propagated through a µwave communication links. The assessments included considerations for µwave communication systems as well as the impacts of the dry and wet components of radio refractivity, the effects of the fade depth at various frequencies, and a 20 km link distance. The results demonstrate that the percentage occurrence of the dry terms dominated the radio refractivity constituent at the surface level, contributing a minimum of about 78% and a maximum of about 92%, while at heights of 100 meters, the percentage occurrence of the dry terms dominated the radio refractivity constituent, contributing a minimum of about 79% and a maximum of about 92%. The spatial distribution reveals that, regardless of height, the country's tropical rainforest (TRF) and freshwater swampy mangrove (FWSM) regions reported the greatest values of radio refractivity. The statistical estimate shows that fading values can differ by as much as 1.5 dB, especially near the TRF and FWSM coastlines, even during clear air conditions. The current findings will be helpful for budgeting Earth-space microwave links, particularly for the rollout of Nigeria's 5G and 6G projected microcellular networks.

Keywords: fade depth, geoclimatic factor, refractivity, refractivity gradient

Procedia PDF Downloads 58
18995 Classification of Attacks Over Cloud Environment

Authors: Karim Abouelmehdi, Loubna Dali, Elmoutaoukkil Abdelmajid, Hoda Elsayed, Eladnani Fatiha, Benihssane Abderahim

Abstract:

The security of cloud services is the concern of cloud service providers. In this paper, we will mention different classifications of cloud attacks referred by specialized organizations. Each agency has its classification of well-defined properties. The purpose is to present a high-level classification of current research in cloud computing security. This classification is organized around attack strategies and corresponding defenses.

Keywords: cloud computing, classification, risk, security

Procedia PDF Downloads 526
18994 Food Waste Management in the Restaurant Industry

Authors: Vijayakumar Karunamoothei, Stephen Wylie, Andy Shaw, Al Shamma'A Ahmed

Abstract:

The main aim of this research is to investigate, analyse and provide solutions for the reduction of food waste in the restaurant industry. The amount of food waste that is sent to landfill by UK restaurants and food chains is considerably high, and also acts as an additional cost to the restaurants, as well as being a significant environmental issue. Food waste, for the most part, is disposed in landfill, but due to rising costs associated with waste disposal, it increases public concerns about the environmental issue. This makes conversion of food waste to energy an economic solution. The relevant properties, such as water content and calorific value, will vary considerably, depending on the particular type of food. This work, therefore, includes the collection and analysis of real data from restaurants on weekly basis. It will also investigate how the waste destined for landfill can be instead reused to produce fuels such as syngas or ethanol, or alternatively as fertilizer. The potential for syngas production will be tested using a microwave plasma reactor.

Keywords: fertilizer, microwave, plasma reactor, syngas

Procedia PDF Downloads 336
18993 Tribal Food Security Assessment and Its Measurement Index: A Study of Tribes and Particularly Vulnerable Tribal Groups in Jharkhand, India

Authors: Ambika Prasad Gupta, Harshit Sosan Lakra

Abstract:

Food security is an important issue that has been widely discussed in literature. However, there is a lack of research on the specific food security challenges faced by tribal communities. Tribal food security refers to the ability of indigenous or tribal communities to consistently access and afford an adequate and nutritious supply of food. These communities often have unique cultural, social, and economic contexts that can impact their food security. The study aims to assess the food security status of all thirty-two major tribes, including Particularly Vulnerable Tribal Groups (PVTG) people living in various blocks of Jharkhand State. The methodology of this study focuses on measuring the food security index of indigenous people by developing and redefining a new Tribal Food Security Index (TFSI) as per the indigenous community-level indicators identified by the Global Food Security Index and other indicators relevant to food security. Affordability, availability, quality and safety, and natural resources were the dimensions used to calculate the overall Tribal Food Security Index. A survey was conducted for primary data collection of tribes and PVTGs at the household level in various districts of Jharkhand with a considerable tribal population. The result shows that due to the transition from rural to urban areas, there is a considerable change in TFSI and a decrease in forest dependency of tribal communities. Socioeconomic factors like occupation and household size had a significant correlation with TFSI. Tribal households living in forests have a higher food security index than tribal households residing in urban transition areas. The study also shows that alternative methodology adopted to measure specific community-level food security creates high significant impact than using commonly used indices.

Keywords: indigenous people, tribal food security, particularly vulnerable tribal groups, Jharkhand

Procedia PDF Downloads 58
18992 Stressors Faced by Border Security Officers: The Singapore Experience

Authors: Jansen Ang, Andrew Neo, Dawn Chia

Abstract:

Border Security is unlike mainstream policing in that officers are essentially in static deployment, working round the clock every day and every hour of the year looking for illegitimate entry of persons and goods. In Singapore, Border Security officers perform multiple functions to ensure the nation’s safety and security. They are responsible for safeguarding the borders of Singapore to prevent threats from entering the country. Being the first line of defence in ensuring the nation’s border security officers are entrusted with the responsibility of screening travellers inbound and outbound of Singapore daily. They examined 99 million arrivals and departures at the various checkpoints in 2014, which is a considerable volume compared to most immigration agencies. The officers’ work scopes also include cargo clearance, protective and security functions of checkpoints. The officers work in very demanding environment which can range from the smog at the land checkpoints to the harshness of the ports at the sea checkpoints. In addition, all immigration checkpoints are located at the boundaries, posing commuting challenges for officers. At the land checkpoints, festive seasons and school breaks are peak periods as given the surge of inbound and outbound travellers at the various checkpoints. Such work provides unique challenges in comparison to other law enforcement duties. This paper assesses the current stressors faced by officers of a border security agency through the conduct of ground observations as well as a perceived stress survey as well as recommendations in combating stressors faced by border security officers. The findings from the field observations and surveys indicate organisational and operational stressors that are unique to border security and recommends interventions in managing these stressors. Understanding these stressors would better inform border security agencies on the interventions needed to enhance the resilience of border security officers.

Keywords: border security, Singapore, stress, operations

Procedia PDF Downloads 309
18991 Modeling and Energy Analysis of Limestone Decomposition with Microwave Heating

Authors: Sofia N. Gonçalves, Duarte M. S. Albuquerque, José C. F. Pereira

Abstract:

The energy transition is spurred by structural changes in energy demand, supply, and prices. Microwave technology was first proposed as a faster alternative for cooking food. It was found that food heated instantly when interacting with high-frequency electromagnetic waves. The dielectric properties account for a material’s ability to absorb electromagnetic energy and dissipate this energy in the form of heat. Many energy-intense industries could benefit from electromagnetic heating since many of the raw materials are dielectric at high temperatures. Limestone sedimentary rock is a dielectric material intensively used in the cement industry to produce unslaked lime. A numerical 3D model was implemented in COMSOL Multiphysics to study the limestone continuous processing under microwave heating. The model solves the two-way coupling between the Energy equation and Maxwell’s equations as well as the coupling between heat transfer and chemical interfaces. Complementary, a controller was implemented to optimize the overall heating efficiency and control the numerical model stability. This was done by continuously matching the cavity impedance and predicting the required energy for the system, avoiding energy inefficiencies. This controller was developed in MATLAB and successfully fulfilled all these goals. The limestone load influence on thermal decomposition and overall process efficiency was the main object of this study. The procedure considered the Verification and Validation of the chemical kinetics model separately from the coupled model. The chemical model was found to correctly describe the chosen kinetic equation, and the coupled model successfully solved the equations describing the numerical model. The interaction between flow of material and electric field Poynting vector revealed to influence limestone decomposition, as a result from the low dielectric properties of limestone. The numerical model considered this effect and took advantage from this interaction. The model was demonstrated to be highly unstable when solving non-linear temperature distributions. Limestone has a dielectric loss response that increases with temperature and has low thermal conductivity. For this reason, limestone is prone to produce thermal runaway under electromagnetic heating, as well as numerical model instabilities. Five different scenarios were tested by considering a material fill ratio of 30%, 50%, 65%, 80%, and 100%. Simulating the tube rotation for mixing enhancement was proven to be beneficial and crucial for all loads considered. When uniform temperature distribution is accomplished, the electromagnetic field and material interaction is facilitated. The results pointed out the inefficient development of the electric field within the bed for 30% fill ratio. The thermal efficiency showed the propensity to stabilize around 90%for loads higher than 50%. The process accomplished a maximum microwave efficiency of 75% for the 80% fill ratio, sustaining that the tube has an optimal fill of material. Electric field peak detachment was observed for the case with 100% fill ratio, justifying the lower efficiencies compared to 80%. Microwave technology has been demonstrated to be an important ally for the decarbonization of the cement industry.

Keywords: CFD numerical simulations, efficiency optimization, electromagnetic heating, impedance matching, limestone continuous processing

Procedia PDF Downloads 160
18990 Programming Systems in Implementation of Process Safety at Chemical Process Industry

Authors: Maryam Shayan

Abstract:

Programming frameworks have been utilized as a part of chemical industry process safety operation and configuration to enhance its effectiveness. This paper gives a brief survey and investigation of the best in class and effects of programming frameworks in process security. A study was completed by talking staff accountable for procedure wellbeing practices in the Iranian chemical process industry and diving into writing of innovation for procedure security. This article investigates the useful and operational attributes of programming frameworks for security and endeavors to sort the product as indicated by its level of effect in the administration chain of importance. The study adds to better comprehension of the parts of Information Communication Technology in procedure security, the future patterns and conceivable gaps for innovative work.

Keywords: programming frameworks, chemical industry process, process security, administration chain, information communication technology

Procedia PDF Downloads 355
18989 Comprehensive Review of Ultralightweight Security Protocols

Authors: Prashansa Singh, Manjot Kaur, Rohit Bajaj

Abstract:

The proliferation of wireless sensor networks and Internet of Things (IoT) devices in the quickly changing digital landscape has highlighted the urgent need for strong security solutions that can handle these systems’ limited resources. A key solution to this problem is the emergence of ultralightweight security protocols, which provide strong security features while respecting the strict computational, energy, and memory constraints imposed on these kinds of devices. This in-depth analysis explores the field of ultralightweight security protocols, offering a thorough examination of their evolution, salient features, and the particular security issues they resolve. We carefully examine and contrast different protocols, pointing out their advantages and disadvantages as well as the compromises between resource limitations and security resilience. We also study these protocols’ application domains, including the Internet of Things, RFID systems, and wireless sensor networks, to name a few. In addition, the review highlights recent developments and advancements in the field, pointing out new trends and possible avenues for future research. This paper aims to be a useful resource for researchers, practitioners, and developers, guiding the design and implementation of safe, effective, and scalable systems in the Internet of Things era by providing a comprehensive overview of ultralightweight security protocols.

Keywords: wireless sensor network, machine-to-machine, MQTT broker, server, ultralightweight, TCP/IP

Procedia PDF Downloads 45