Search results for: composite security index
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8080

Search results for: composite security index

7570 Protein-Starch-Potassium Iodide Composite as a Sensor for Chlorine in Water

Authors: S. Mowafi, A. Abou El-Kheir, M. Abou Taleb, H. El-Sayed

Abstract:

Two proteinic biopolymers; namely keratin and sericin, were extracted from their respective natural resources by simple appropriate methods. The said proteins were dissolved in the appropriate solvents followed by regeneration in a form of film polyvinyl alcohol. Protein-starch-potassium iodide (PSPI) composite was prepared by anchoring starch and potassium iodide mixture onto the film surface using appropriate polymeric material. The possibility of using PSPI composite for determination of the concentration of chlorine ions in domestic as well as industrial water was examined. The concentration of chlorine in water was determined spectrophotometrically by measuring the intensity of blue colour of formed between starch and the released iodine obtained by interaction of potassium iodide chlorine in the tested water sample.

Keywords: chlorine, protein, potassium iodide, water

Procedia PDF Downloads 371
7569 Global Voltage Harmonic Index for Measuring Harmonic Situation of Power Grids: A Focus on Power Transformers

Authors: Alireza Zabihi, Saeed Peyghami, Hossein Mokhtari

Abstract:

With the increasing deployment of renewable power plants, such as solar and wind, it is crucial to measure the harmonic situation of the grid. This paper proposes a global voltage harmonic index to measure the harmonic situation of the power grid with a focus on power transformers. The power electronics systems used to connect these plants to the network can introduce harmonics, leading to increased losses, reduced efficiency, false operation of protective relays, and equipment damage due to harmonic intensifications. The proposed index considers the losses caused by harmonics in power transformers which are of great importance and value to the network, providing a comprehensive measure of the harmonic situation of the grid. The effectiveness of the proposed index is evaluated on a real-world distribution network, and the results demonstrate its ability to identify the harmonic situation of the network, particularly in relation to power transformers. The proposed index provides a comprehensive measure of the harmonic situation of the grid, taking into account the losses caused by harmonics in power transformers. The proposed index has the potential to support power companies in optimizing their power systems and to guide researchers in developing effective mitigation strategies for harmonics in the power grid.

Keywords: global voltage harmonic index, harmonics, power grid, power quality, power transformers, renewable energy

Procedia PDF Downloads 121
7568 Enhancing Internet of Things Security: A Blockchain-Based Approach for Preventing Spoofing Attacks

Authors: Salha Abdullah Ali Al-Shamrani, Maha Muhammad Dhaher Aljuhani, Eman Ali Ahmed Aldhaheri

Abstract:

With the proliferation of Internet of Things (IoT) devices in various industries, there has been a concurrent rise in security vulnerabilities, particularly spoofing attacks. This study explores the potential of blockchain technology in enhancing the security of IoT systems and mitigating these attacks. Blockchain's decentralized and immutable ledger offers significant promise for improving data integrity, transaction transparency, and tamper-proofing. This research develops and implements a blockchain-based IoT architecture and a reference network to simulate real-world scenarios and evaluate a blockchain-integrated intrusion detection system. Performance measures including time delay, security, and resource utilization are used to assess the system's effectiveness, comparing it to conventional IoT networks without blockchain. The results provide valuable insights into the practicality and efficacy of employing blockchain as a security mechanism, shedding light on the trade-offs between speed and security in blockchain deployment for IoT. The study concludes that despite minor increases in time consumption, the security benefits of incorporating blockchain technology into IoT systems outweigh potential drawbacks, demonstrating a significant potential for blockchain in bolstering IoT security.

Keywords: internet of things, spoofing, IoT, access control, blockchain, raspberry pi

Procedia PDF Downloads 67
7567 Survey of Corrosion and Scaling of Urban Drinking Water Supply Reservoirs (Case Study: Ilam City)

Authors: Ehsan Derikvand, Hamid Kaykha, Rooholah Mansoori Yekta, Taleb Javanmard, Mohsen Mehdi Zadeh

Abstract:

Corrosion and scaling are one of the most complicated and costly problems of drinking water supply. Corrosion has adverse effect on general health and public acceptance of water source and drinking water supply costs. The present study aimed to determine the potentials of corrosion and scaling of potable water supply reservoirs of Ilam city in June 2013 and August 2014 by Langelier Index (LI) and Reynar. The results of experiments and calculations show that the mean index of LSI in the first and second sampling stages is 0.34, 0.2, respectively and the mean index RSI in the first and second stages of sampling is 7.15 and 7.22, respectively. Based on LSI index of reservoirs water in the first phase, none of stations are corrosive and only one station in the second sampling phase has corrosive tendency. According to RSI index, there is no corrosive tendency in two phases. Based on the results, the water of drinking water reservoirs in Ilam city has no corrosion tendency and the analyses and results of Langelier Index (LI) and Ryznar are in relatively good condition.

Keywords: corrosion, scaling, water reservoirs, langelier and ryznar indices, Ilam city

Procedia PDF Downloads 403
7566 Urban Design via Estimation Model for Traffic Index of Cities Based on an Artificial Intelligence

Authors: Seyed Sobhan Alvani, Mohammad Gohari

Abstract:

By developing cities and increasing the population, traffic congestion has become a vital problem. Due to this crisis, urban designers try to present solutions to decrease this difficulty. On the other hand, predicting the model with perfect accuracy is essential for solution-providing. The current study presents a model based on artificial intelligence which can predict traffic index based on city population, growth rate, and area. The accuracy of the model was evaluated, which is acceptable and it is around 90%. Thus, urban designers and planners can employ it for predicting traffic index in the future to provide strategies.

Keywords: traffic index, population growth rate, cities wideness, artificial neural network

Procedia PDF Downloads 28
7565 Health Risk Assessment According to Exposure with Heavy Metals and Physicochemical Parameters; Water Quality Index and Contamination Degree Evaluation in Bottled Water

Authors: Samaneh Abolli, Mahmood Alimohammadi

Abstract:

The survey analyzed 71 bottled water brands in Tehran, Iran, examining 10 physicochemical parameters and 16 heavy metals. The water quality index (WQI) approach was used to assess water quality, and methods such as carcinogen risk (CR) and hazard index (HI) were employed to evaluate health risks. The results indicated that the bottled water had good quality overall, but some brands were of poor or very poor quality. The study also revealed significant human health risks, especially for children, due to the presence of minerals and heavy metals in bottled water. Correlation analyses and risk assessments for various substances were conducted, providing valuable insights into the potential health impacts of the analyzed bottled water.

Keywords: bottled wate, rwater quality index, health risk assessment, contamination degree, heavy metal evaluation index

Procedia PDF Downloads 46
7564 An Electrochemical Study on Ethanol Oxidation with Pt/Pd Composite Electrodes in Sodium Hydroxide Solution

Authors: Yu-Chen Luo, Wan-Tzu Yen, I-Ping Liu, Po-Hsuan Yeh, Yuh-Lang Lee

Abstract:

The use of a Pt electrode leads to high catalytic efficiency in the ethanol electro-oxidation. However, the carbon monoxide (CO) released in the reaction will poison the Pt surfaces, lowering the electrocatalytic activity. In this study, composite electrodes are prepared to overcome the poisoning issue, and the related electro-oxidation behaviors are studied by surface-enhanced infrared absorption spectroscopy (SEIRAS) and cyclic voltammetry (CV). An electroless plating method is utilized to deposit Pt catalytic layers on the Pd film-coated FTO substrates. According to the SEIRAS spectra, the carbon dioxide signal of the Pt/Pd composite electrode is larger than that of the Pt one, whereas the CO signal of the composite electrode is relatively smaller. This result suggests that the studied Pt/Pd electrode has a better ability against CO poisoning. The CV analyses are conducted in alkaline environments, and current densities related to the ethanol oxidation in the forward scan (If) and to the CO poisoning in the backward scan (Ib) are measured. A higher ratio of If to Ib (If/Ib) usually represents a better ability against the poisoning effect. The If/Ib values are 2.53 and 2.07 for the Pt and Pt/Pd electrodes, respectively, which is possibly attributed to the increasing ability of CO adsorption of Pt electrode. Despite the lower If/Ib, the Pt/Pd composite electrode shows a higher ethanol oxidation performance in the alkaline system than the Pt does. Furthermore, its stability is also superior.

Keywords: cyclic voltammogram, electroless deposition, ethanol electro-oxidation, surface-enhanced infrared absorption spectroscopy

Procedia PDF Downloads 115
7563 The Effort of Good Governance in Enhancing Foods Security for Sustainable National Development

Authors: Egboja Simon Oga

Abstract:

One of the most important keys to the success of a nation is to ensure steady development and national economic self-sufficiency and independence. It is therefore in this regard that this paper is designed to identify food security to be crucial to all nations’ effort toward sustainable national development. Nigeria as a case study employed various effort by the successive government towards food security. Emphasis were placed on the extent to which government has boosted food security situation on the basis of the identified limitations, conclusion was drawn, recommendation/suggestions proffered, that subsidization of the process of farm inputs like fertilizer, improved seeds and agrochemical, education of farmers on modern methods of farming through extension services, improvisation of village-based food storage mechanism and provision of infrastructural facilities in rural areas to facilitate the preservation and easy evacuation of farm produces are necessary.

Keywords: food, governance, development, security

Procedia PDF Downloads 329
7562 Transition Dynamic Analysis of the Urban Disparity in Iran “Case Study: Iran Provinces Center”

Authors: Marzieh Ahmadi, Ruhullah Alikhan Gorgani

Abstract:

The usual methods of measuring regional inequalities can not reflect the internal changes of the country in terms of their displacement in different development groups, and the indicators of inequalities are not effective in demonstrating the dynamics of the distribution of inequality. For this purpose, this paper examines the dynamics of the urban inertial transport in the country during the period of 2006-2016 using the CIRD multidimensional index and stochastic kernel density method. it firstly selects 25 indicators in five dimensions including macroeconomic conditions, science and innovation, environmental sustainability, human capital and public facilities, and two-stage Principal Component Analysis methodology are developed to create a composite index of inequality. Then, in the second stage, using a nonparametric analytical approach to internal distribution dynamics and a stochastic kernel density method, the convergence hypothesis of the CIRD index of the Iranian provinces center is tested, and then, based on the ergodic density, long-run equilibrium is shown. Also, at this stage, for the purpose of adopting accurate regional policies, the distribution dynamics and process of convergence or divergence of the Iranian provinces for each of the five. According to the results of the first Stage, in 2006 & 2016, the highest level of development is related to Tehran and zahedan is at the lowest level of development. The results show that the central cities of the country are at the highest level of development due to the effects of Tehran's knowledge spillover and the country's lower cities are at the lowest level of development. The main reason for this may be the lack of access to markets in the border provinces. Based on the results of the second stage, which examines the dynamics of regional inequality transmission in the country during 2006-2016, the first year (2006) is not multifaceted and according to the kernel density graph, the CIRD index of about 70% of the cities. The value is between -1.1 and -0.1. The rest of the sequence on the right is distributed at a level higher than -0.1. In the kernel distribution, a convergence process is observed and the graph points to a single peak. Tends to be a small peak at about 3 but the main peak at about-0.6. According to the chart in the final year (2016), the multidimensional pattern remains and there is no mobility in the lower level groups, but at the higher level, the CIRD index accounts for about 45% of the provinces at about -0.4 Take it. That this year clearly faces the twin density pattern, which indicates that the cities tend to be closely related to each other in terms of development, so that the cities are low in terms of development. Also, according to the distribution dynamics results, the provinces of Iran follow the single-density density pattern in 2006 and the double-peak density pattern in 2016 at low and moderate inequality index levels and also in the development index. The country diverges during the years 2006 to 2016.

Keywords: Urban Disparity, CIRD Index, Convergence, Distribution Dynamics, Random Kernel Density

Procedia PDF Downloads 121
7561 Clustering of Extremes in Financial Returns: A Comparison between Developed and Emerging Markets

Authors: Sara Ali Alokley, Mansour Saleh Albarrak

Abstract:

This paper investigates the dependency or clustering of extremes in the financial returns data by estimating the extremal index value θ∈[0,1]. The smaller the value of θ the more clustering we have. Here we apply the method of Ferro and Segers (2003) to estimate the extremal index for a range of threshold values. We compare the dependency structure of extremes in the developed and emerging markets. We use the financial returns of the stock market index in the developed markets of US, UK, France, Germany and Japan and the emerging markets of Brazil, Russia, India, China and Saudi Arabia. We expect that more clustering occurs in the emerging markets. This study will help to understand the dependency structure of the financial returns data.

Keywords: clustring, extremes, returns, dependency, extermal index

Procedia PDF Downloads 399
7560 Flammability of Banana Fibre Reinforced Epoxy/Sodium Bromate Blend: Investigation of Variation in Mechanical Properties

Authors: S. Badrinarayanan, R. Vimal, H. Sivaraman, P. Deepak, R. Vignesh Kumar, A. Ponshanmugakumar

Abstract:

In the present study, the flammability properties of banana fibre reinforced epoxy/ sodium bromate blended composites are studied. Two sets of composite material were prepared, one formed by blending sodium bromate with epoxy matrix and other with neat epoxy matrix. Epoxy resin was blended with various weight fractions of sodium bromate, 4%, 8% and 12%. The composite made with plain epoxy matrix was used as the standard reference material. The mechanical tests, heat deflection tests and flammability tests were carried out on all the composite samples. Flammability test shows the improved flammability properties of the sodium bromated banana-epoxy composite. The modification in flammability properties of the composites by the addition of sodium bromate results in the reduced mechanical properties. The fractured surfaces under various mechanical testing were analysed using morphological analysis done using scanning electron microscope.

Keywords: banana fibres, epoxy resin, sodium bromate, flammability test, heat deflection

Procedia PDF Downloads 295
7559 Construction of Large Scale UAVs Using Homebuilt Composite Techniques

Authors: Brian J. Kozak, Joshua D. Shipman, Peng Hao Wang, Blake Shipp

Abstract:

The unmanned aerial system (UAS) industry is growing at a rapid pace. This growth has increased the demand for low cost, custom made and high strength unmanned aerial vehicles (UAV). The area of most growth is in the area of 25 kg to 200 kg vehicles. Vehicles this size are beyond the size and scope of simple wood and fabric designs commonly found in hobbyist aircraft. These high end vehicles require stronger materials to complete their mission. Traditional aircraft construction materials such as aluminum are difficult to use without machining or advanced computer controlled tooling. However, by using general aviation composite aircraft homebuilding techniques and materials, a large scale UAV can be constructed cheaply and easily. Furthermore, these techniques could be used to easily manufacture cost made composite shapes and airfoils that would be cost prohibitive when using metals. These homebuilt aircraft techniques are being demonstrated by the researchers in the construction of a 75 kg aircraft.

Keywords: composite aircraft, homebuilding, unmanned aerial system industry, UAS, unmanned aerial vehicles, UAV

Procedia PDF Downloads 130
7558 Farmers' Perspective on Soil Health in the Indian Punjab: A Quantitative Analysis of Major Soil Parameters

Authors: Sukhwinder Singh, Julian Park, Dinesh Kumar Benbi

Abstract:

Although soil health, which is recognized as one of the key determinants of sustainable agricultural development, can be measured by a range of physical, chemical and biological parameters, the widely used parameters include pH, electrical conductivity (EC), organic carbon (OC), plant available phosphorus (P) and potassium (K). Soil health is largely affected by the occurrence of natural events or human activities and can be improved by various land management practices. A database of 120 soil samples collected from farmers’ fields spread across three major agro-climatic zones of Punjab suggested that the average pH, EC, OC, P and K was 8.2 (SD = 0.75, Min = 5.5, Max = 9.1), 0.27 dS/m (SD = 0.17, Min = 0.072 dS/m, Max = 1.22 dS/m), 0.49% (SD = 0.20, Min = 0.06%, Max = 1.2%), 19 mg/kg soil (SD = 22.07, Min = 3 mg/kg soil, Max = 207 mg/kg soil) and 171 mg/kg soil (SD = 47.57, Min = 54 mg/kg soil, Max = 288 mg/kg soil), respectively. Region-wise, pH, EC and K were the highest in south-western district of Ferozpur whereas farmers in north-eastern district of Gurdaspur had the best soils in terms of OC and P. The soils in the central district of Barnala had lower OC, P and K than the respective overall averages while its soils were normal but skewed towards alkalinity. Besides agro-climatic conditions, the size of landholding and farmer education showed a significant association with Soil Fertility Index (SFI), a composite index calculated using the aforementioned parameters’ normalized weightage. All the four stakeholder groups cited the current cropping patterns, burning of rice crop residue, and imbalanced use of chemical fertilizers for change in soil health. However, the current state of soil health in Punjab is unclear, which needs further investigation based on temporal data collected from the same field to see the short and long-term impacts of various crop combinations and varied cropping intensity levels on soil health.

Keywords: soil health, punjab agriculture, sustainability, soil fertility index

Procedia PDF Downloads 355
7557 FE Analysis of the Notch Effect on the Behavior of Repaired Crack with Bonded Composite Patch in Aircraft Structures

Authors: Faycal Benyahia, Abdelmohsen Albedah, Bel Abbes Bachir Bouiadjra

Abstract:

In this paper, the finite element analysis is applied to study the performance of the bonded composite reinforcement or repair for reducing stress concentration at a semi-circular lateral notch and repairing cracks emanating from this kind of notch. The effects of the adhesive properties on the variation of the stress intensity factor at the crack tip were highlighted. The obtained results show that the stress concentration factor at the notch tip is reduced about 30% and the maximal reduction of the stress intensity factor is about 80%. The adhesive properties must be optimized in order to increase the performance of the patch repair or reinforcement.

Keywords: bonded repair, notch, crack, adhesive, composite

Procedia PDF Downloads 385
7556 Classification of Attacks Over Cloud Environment

Authors: Karim Abouelmehdi, Loubna Dali, Elmoutaoukkil Abdelmajid, Hoda Elsayed, Eladnani Fatiha, Benihssane Abderahim

Abstract:

The security of cloud services is the concern of cloud service providers. In this paper, we will mention different classifications of cloud attacks referred by specialized organizations. Each agency has its classification of well-defined properties. The purpose is to present a high-level classification of current research in cloud computing security. This classification is organized around attack strategies and corresponding defenses.

Keywords: cloud computing, classification, risk, security

Procedia PDF Downloads 539
7555 Investigation of Failure Mechanisms of Composite Laminates with Delamination and Repaired with Bolts

Authors: Shuxin Li, Peihao Song, Haixiao Hu, Dongfeng Cao

Abstract:

The interactive deformation and failure mechanisms, including local bucking/delamination propagation and global bucking, are investigated in this paper with numerical simulation and validation with experimental results. Three dimensional numerical models using ABAQUS brick elements combined with cohesive elements and contact elements are developed to simulate the deformation and failure characteristics of composite laminates with and without delamination under compressive loading. The zero-thickness cohesive elements are inserted on the possible path of delamination propagation, and the inter-laminate behavior is characterized by the mixed-mode traction-separation law. The numerical simulations identified the complex feature of interaction among local buckling and/or delamination propagation and final global bucking for composite laminates with delamination under compressive loading. Firstly there is an interaction between the local buckling and delamination propagation, i.e., local buckling induces delamination propagation, and then delamination growth further enhances the local buckling. Secondly, the interaction between the out-plan deformation caused by local buckling and the global bucking deformation results in final failure of the composite laminates. The simulation results are validated by the good agreement with the experimental results published in the literature. The numerical simulation validated with experimental results revealed that the degradation of the load capacity, in particular of the compressive strength of composite structures with delamination, is mainly attributed to the combined local buckling/delamination propagation effects. Consequently, a simple field-bolt repair approach that can hinder the local buckling and prevent delamination growth is explored. The analysis and simulation results demonstrated field-bolt repair could effectively restore compressive strength of composite laminates with delamination.

Keywords: cohesive elements, composite laminates, delamination, local and global bucking, field-bolt repair

Procedia PDF Downloads 116
7554 Application of Digital Image Correlation Technique on Vacuum Assisted Resin Transfer Molding Process and Performance Evaluation of the Produced Materials

Authors: Dingding Chen, Kazuo Arakawa, Masakazu Uchino, Changheng Xu

Abstract:

Vacuum assisted resin transfer moulding (VARTM) is a promising manufacture process for making large and complex fiber reinforced composite structures. However, the complexity of the flow of the resin in the infusion stage usually leads to nonuniform property distribution of the produced composite part. In order to control the flow of the resin, the situation of flow should be mastered. For the safety of the usage of the produced composite in practice, the understanding of the property distribution is essential. In this paper, we did some trials on monitoring the resin infusion stage and evaluation for the fiber volume fraction distribution of the VARTM produced composite using the digital image correlation methods. The results show that 3D-DIC is valid on monitoring the resin infusion stage and it is possible to use 2D-DIC to estimate the distribution of the fiber volume fraction on a FRP plate.

Keywords: digital image correlation, VARTM, FRP, fiber volume fraction

Procedia PDF Downloads 335
7553 Security Model for RFID Systems

Authors: John Ayoade

Abstract:

Radio Frequency Identification (RFID) has gained a lot of popularity in all walks of life due to its usefulness and diverse use of the technology in almost every application. However, there have been some security concerns most especially in regards to how authentic readers and tags can confirm their authenticity before confidential data is exchanged between them. In this paper, Kerberos protocol is adopted for the mutual authentication of RFID system components in order to ensure the secure communication between those components and to realize the authenticity of the communicating components.

Keywords: RFID, security, mutual authentication, Kerberos

Procedia PDF Downloads 463
7552 Stressors Faced by Border Security Officers: The Singapore Experience

Authors: Jansen Ang, Andrew Neo, Dawn Chia

Abstract:

Border Security is unlike mainstream policing in that officers are essentially in static deployment, working round the clock every day and every hour of the year looking for illegitimate entry of persons and goods. In Singapore, Border Security officers perform multiple functions to ensure the nation’s safety and security. They are responsible for safeguarding the borders of Singapore to prevent threats from entering the country. Being the first line of defence in ensuring the nation’s border security officers are entrusted with the responsibility of screening travellers inbound and outbound of Singapore daily. They examined 99 million arrivals and departures at the various checkpoints in 2014, which is a considerable volume compared to most immigration agencies. The officers’ work scopes also include cargo clearance, protective and security functions of checkpoints. The officers work in very demanding environment which can range from the smog at the land checkpoints to the harshness of the ports at the sea checkpoints. In addition, all immigration checkpoints are located at the boundaries, posing commuting challenges for officers. At the land checkpoints, festive seasons and school breaks are peak periods as given the surge of inbound and outbound travellers at the various checkpoints. Such work provides unique challenges in comparison to other law enforcement duties. This paper assesses the current stressors faced by officers of a border security agency through the conduct of ground observations as well as a perceived stress survey as well as recommendations in combating stressors faced by border security officers. The findings from the field observations and surveys indicate organisational and operational stressors that are unique to border security and recommends interventions in managing these stressors. Understanding these stressors would better inform border security agencies on the interventions needed to enhance the resilience of border security officers.

Keywords: border security, Singapore, stress, operations

Procedia PDF Downloads 319
7551 Behavior of Double Skin Circular Tubular Steel-Concrete-Composite Column

Authors: Usha Sivasankaran, Seetha Raman

Abstract:

Experimental work on Double skin Concrete Filled tubes (DSCFT) are a variation of CFT (Concrete- filled steel tubular) with a hollow core formed by two concentric steel tubes in – filled with concrete. Six Specimens with three different volume fractions of steel fibres are cast and tested. Experiments on circular steel tubes in – filled with steel fibre reinforced concrete (SFRC) and normal concrete have been performed to investigate the contribution of steel fibres to the load bearing capacity of Short Composite Columns. The main Variable considered in the test study is the percentage of steel fibres added to the in –filled concrete. All the specimens were tested under axial compression until failure state realisation. This project presents the percentage Variation in the compression strengths of the 3 types of Composite members taken under Study. The results show that 1.5% SFRC in filled steel columns exhibit enhanced ultimate load carrying capacity.

Keywords: composite columns, optimization of steel, double skin, DSCFT

Procedia PDF Downloads 545
7550 Programming Systems in Implementation of Process Safety at Chemical Process Industry

Authors: Maryam Shayan

Abstract:

Programming frameworks have been utilized as a part of chemical industry process safety operation and configuration to enhance its effectiveness. This paper gives a brief survey and investigation of the best in class and effects of programming frameworks in process security. A study was completed by talking staff accountable for procedure wellbeing practices in the Iranian chemical process industry and diving into writing of innovation for procedure security. This article investigates the useful and operational attributes of programming frameworks for security and endeavors to sort the product as indicated by its level of effect in the administration chain of importance. The study adds to better comprehension of the parts of Information Communication Technology in procedure security, the future patterns and conceivable gaps for innovative work.

Keywords: programming frameworks, chemical industry process, process security, administration chain, information communication technology

Procedia PDF Downloads 367
7549 Improved Accuracy of Ratio Multiple Valuation

Authors: Julianto Agung Saputro, Jogiyanto Hartono

Abstract:

Multiple valuation is widely used by investors and practitioners but its accuracy is questionable. Multiple valuation inaccuracies are due to the unreliability of information used in valuation, inaccuracies comparison group selection, and use of individual multiple values. This study investigated the accuracy of valuation to examine factors that can increase the accuracy of the valuation of multiple ratios, that are discretionary accruals, the comparison group, and the composite of multiple valuation. These results indicate that multiple value adjustment method with discretionary accruals provides better accuracy, the industry comparator group method combined with the size and growth of companies also provide better accuracy. Composite of individual multiple valuation gives the best accuracy. If all of these factors combined, the accuracy of valuation of multiple ratios will give the best results.

Keywords: multiple, valuation, composite, accuracy

Procedia PDF Downloads 275
7548 Mobile Agent Security Using Reference Monitor Based Security Framework

Authors: Sandhya Armoogum

Abstract:

In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially hostile hosts. Mobile code such as a mobile agent is vulnerable when executing on remote hosts. The mobile agent may be subjected to various attacks such as tampering, inspection, and replay attack by a malicious host. Much research has been done to provide solutions for various security problems, such as authentication of mobile agent and hosts, integrity and confidentiality of the data carried by the mobile agent. Many of such proposed solutions in literature are not suitable for open systems whereby the mobile code arrives and executes on a host which is not known and trusted by the mobile agent owner. In this paper, we propose the adoption of the reference monitor by hosts in an open system for providing trust and security for mobile code execution. A secure protocol for the distribution of the reference monitor entity is described. This reference monitor entity on the remote host may also provide several security services such as authentication and integrity to the mobile code.

Keywords: security, mobile agents, reference monitor, trust

Procedia PDF Downloads 434
7547 Comprehensive Review of Ultralightweight Security Protocols

Authors: Prashansa Singh, Manjot Kaur, Rohit Bajaj

Abstract:

The proliferation of wireless sensor networks and Internet of Things (IoT) devices in the quickly changing digital landscape has highlighted the urgent need for strong security solutions that can handle these systems’ limited resources. A key solution to this problem is the emergence of ultralightweight security protocols, which provide strong security features while respecting the strict computational, energy, and memory constraints imposed on these kinds of devices. This in-depth analysis explores the field of ultralightweight security protocols, offering a thorough examination of their evolution, salient features, and the particular security issues they resolve. We carefully examine and contrast different protocols, pointing out their advantages and disadvantages as well as the compromises between resource limitations and security resilience. We also study these protocols’ application domains, including the Internet of Things, RFID systems, and wireless sensor networks, to name a few. In addition, the review highlights recent developments and advancements in the field, pointing out new trends and possible avenues for future research. This paper aims to be a useful resource for researchers, practitioners, and developers, guiding the design and implementation of safe, effective, and scalable systems in the Internet of Things era by providing a comprehensive overview of ultralightweight security protocols.

Keywords: wireless sensor network, machine-to-machine, MQTT broker, server, ultralightweight, TCP/IP

Procedia PDF Downloads 71
7546 Effects of Stirring Time and Reinforcement Preheating on the Porosity of Particulate Periwinkle Shell-Aluminium 6063 Metal Matrix Composite (PPS-ALMMC) Produced by Two-Step Casting

Authors: Reginald Umunakwe, Obinna Chibuzor Okoye, Uzoma Samuel Nwigwe, Damilare John Olaleye, Akinlabi Oyetunji

Abstract:

The potential for the development of PPS-AlMMCs as light weight material for industrial applications was investigated. Periwinkle shells were milled and the density of the particles determined. Particulate periwinkle shell of particle size 75µm was used to reinforce aluminium 6063 alloy at 10wt% filler loading using two-step stir casting technique. The composite materials were stirred for five minutes in a semi-solid state and the stirring time varied as 3, 6 and 9 minutes at above the liquidus temperature. A specimen was also produced with pre-heated filler. The effect of variation in stirring time and reinforcement pre-heating on the porosity of the composite materials was investigated. The results of the analysis show that a composition of reinforcement pre-heating and stirring for 3 minutes produced a composite material with the lowest porosity of 1.05%.

Keywords: composites, periwinkle shell, two-step casting, porosity

Procedia PDF Downloads 347
7545 Seismic Behavior of Masonry Reinforced Concrete Composite Columns

Authors: Hassane Ousalem, Hideki Kimura, Akitoshi Hamada, Masuda Hiroyuki

Abstract:

To provide tall unreinforced brick masonry walls of a century-old existing building with sufficient resistance against earthquake loading actions, additional reinforced concrete columns were integrated into the building at some designated locations and jointed to the existing masonry walls through dowel shear steel bars, resulting in composite structural elements. As conditions at the interface between the existing masonry and newly added reinforced concrete parts were not well grasped and the behavior of such composite elements would be complex, the experimental investigation was carried out. Three relatively large specimens were tested to investigate the overall behavior of brick masonry-reinforced concrete composite elements under lateral cyclic loadings. Confining the brick walls on only one side or on two opposite sides, as well as providing different amounts of dowel shear steel bars at the interface were the main parameters of the investigation. Test results showed that such strengthening provide a good seismic performance even at very large lateral drifts and the investigated amount of shear dowel lead to a good performance level that would result in a considerable cost reduction of the strengthening.

Keywords: unreinforced masonry, reinforced concrete, composite column, seismic strengthening, structural testing

Procedia PDF Downloads 212
7544 The Social Perception of National Security Risks: A Comparative Perspective

Authors: Nicula Valentin, Andrei Virginia

Abstract:

Nowadays, the individual plays a central role in the state’s architecture. This is why the subjective dimension of the security represents a key concept in risk assessment. The paper’s scope is to emphasize the discrepancy between expert and lay evaluations of national security hazards, which is caused by key factors like emotions, personal experience, knowledge and media. Therefore, we have chosen to apply, using these two different groups of respondents, the Q-sort method, which reveals individual beliefs, attitudes, preferences hidden behind the subjects’ own way of prioritizing the risks they are confronted with. Our study’s conclusions are meant to unveil significant indicators needed to be taken into consideration by a state’s leadership in order to understand the social perception of national security hazards, to communicate better with the public opinion and prevent or mitigate the overestimation of the severity or probability of these dangers.

Keywords: risk perception, Q-sort method, national security hazards, individual beliefs

Procedia PDF Downloads 302
7543 Pavement Roughness Prediction Systems: A Bump Integrator Approach

Authors: Manish Pal, Rumi Sutradhar

Abstract:

Pavement surface unevenness plays a pivotal role on roughness index of road which affects on riding comfort ability. Comfort ability refers to the degree of protection offered to vehicle occupants from uneven elements in the road surface. So, it is preferable to have a lower roughness index value for a better riding quality of road users. Roughness is generally defined as an expression of irregularities in the pavement surface which can be measured using different equipment like MERLIN, Bump integrator, Profilometer etc. Among them Bump Integrator is quite simple and less time consuming in case of long road sections. A case study is conducted on low volume roads in West District in Tripura to determine roughness index (RI) using Bump Integrator at the standard speed of 32 km/h. But it becomes too tough to maintain the requisite standard speed throughout the road section. The speed of Bump Integrator (BI) has to lower or higher in some distinctive situations. So, it becomes necessary to convert these roughness index values of other speeds to the standard speed of 32 km/h. This paper highlights on that roughness index conversional model. Using SPSS (Statistical Package of Social Sciences) software a generalized equation is derived among the RI value at standard speed of 32 km/h and RI value at other speed conditions.

Keywords: bump integrator, pavement distresses, roughness index, SPSS

Procedia PDF Downloads 242
7542 Influence of Security Attributes in Component-Based Software Development

Authors: Somayeh Zeinali

Abstract:

A component is generally defined as a piece of executable software with a published interface. Component-based software engineering (CBSE) has become recognized as a new sub-discipline of software engineering. In the component-based software development, components cannot be completely secure and thus easily become vulnerable. Some researchers have investigated this issue and proposed approaches to detect component intrusions or protect distributed components. Software security also refers to the process of creating software that is considered secure.The terms “dependability”, “trustworthiness”, and “survivability” are used interchangeably to describe the properties of software security.

Keywords: component-based software development, component-based software engineering , software security attributes, dependability, component

Procedia PDF Downloads 550
7541 Study on the OTP Authentication Method and Security for User Mobility in the Cloud

Authors: Jong-Won Lee

Abstract:

Since Cloud environment has appeared as the most powerful keyword in the computing industry, the growth in VDI (Virtual Desktop Infrastructure) became remarkable in domestic market. In recent years, with the trend that mobile devices such as smartphones and pads spread so rapidly, the strengths of VDI that allows people to access and perform business on the move along with companies' office needs expedite more rapid spread of VDI. However, although this enhanced accessibility and mobility can bring the enhanced productivity, it sometimes conflicts with the security, so there should be more detailed security solution, which is user authentication. In this paper, mobile OTP (One-Time Password) authentication method is proposed to secure mobile device portability through rapid and secure authentication using mobile devices such as mobile phones or pads, which does not require additional purchase or possession of OTP tokens of users. However, in order to use the service continuously and reliably in the cloud environment, both service provider and user have to prepare for security awareness and security threats, and continuously study the conflicting aspect between the improving user convenience and the security and supplement so that cloud service can provide opportunities to develop as a new growth industry in the future and create a new market in IT industry.

Keywords: cloud, OTP, mobility, security, authentication

Procedia PDF Downloads 345