Search results for: quantum protocols
666 Integrating Blockchain and Internet of Things Platforms: An Empirical Study on Immunization Cold Chain
Authors: Fawzia Abujalala, Asma Elmangoush, Majdi Ashibani
Abstract:
The adoption of Blockchain technology introduces the possibility to decentralize cold chain systems. This adaptation enhances them to be more efficient, accessible, verifiable, and data security. Additionally, the Internet of Things (IoT) concept is considered as an added-value to various application domains. Cargo tracking and cold chain are a few to name. However, the security of the IoT transactions and integrated devices remains one of the key challenges to the IoT application’s success. Consequently, Blockchain technology and its consensus protocols have been used to solve many information security problems. In this paper, the researchers discussed the advantages of integrating Blockchain technology into IoT platform to improve security and provide an overview of existing literature on integrating Blockchain and IoT platforms. Then, presented the immunization cold chain solution as a use-case that could apply to any critical goods based on integrating hyperledger fabric platform and IoT platform.Keywords: blockchain, hyperledger fabric, internet of things, security, traceability
Procedia PDF Downloads 149665 A Bio-Inspired Approach to Produce Wettable Nylon Fabrics
Authors: Sujani B. Y. Abeywardena, Srimala Perera, K. M. Nalin De Silva, S. Walpalage
Abstract:
Surface modifications are vital to accomplish the moisture management property in highly demanded synthetic fabrics. Biomimetic and bio-inspired surface modifications are identified as one of the fascinating areas of research. In this study, nature’s way of cooling elephants’ body temperature using mud bathing was mimicked to create a superior wettable nylon fabric with improved comfortability. For that, bentonite nanoclay was covalently grafted on nylon fabric using silane as a coupling agent. Fourier transform infrared spectra and Scanning electron microscopy images confirmed the successful grafting of nanoclay on nylon. The superior wettability of surface modified nylon was proved by standard protocols. This fabric coating strongly withstands more than 50 cycles of laundry. It is expected that this bio-inspired wettable nylon fabric may break the barrier of using nylon in various hydrophilic textile applications.Keywords: bentonite nanoclay, biomimetic, covalent modification, nylon fabric, surface, wettability
Procedia PDF Downloads 200664 Literature Review: The Efficacy of Play-Based Therapy Programs in Decreasing Core Symptoms of Autism Spectrum Disorder
Authors: Rozan El-Khateeb
Abstract:
This literature review examines the effectiveness of therapy programs that utilize play as an intervention for reducing symptoms associated with Autism Spectrum Disorder (ASD). Play-based therapy approaches provide a child-centered and developmentally appropriate framework to address the core symptoms of ASD, including social communication deficits, restricted and repetitive behaviors, and sensory sensitivities. The review explores various play-based therapy strategies and their impact on improving social skills, communication abilities, adaptive behaviors, and overall functioning in individuals with ASD. The findings suggest that play-based therapy programs hold promise as effective interventions for reducing symptoms and enhancing the quality of life for individuals with ASD. However, further research is necessary to establish standardized protocols, identify optimal dosage and duration, and evaluate long-term outcomes.Keywords: autism, ABA, play, NET, systematic review
Procedia PDF Downloads 77663 AI Predictive Modeling of Excited State Dynamics in OPV Materials
Authors: Pranav Gunhal., Krish Jhurani
Abstract:
This study tackles the significant computational challenge of predicting excited state dynamics in organic photovoltaic (OPV) materials—a pivotal factor in the performance of solar energy solutions. Time-dependent density functional theory (TDDFT), though effective, is computationally prohibitive for larger and more complex molecules. As a solution, the research explores the application of transformer neural networks, a type of artificial intelligence (AI) model known for its superior performance in natural language processing, to predict excited state dynamics in OPV materials. The methodology involves a two-fold process. First, the transformer model is trained on an extensive dataset comprising over 10,000 TDDFT calculations of excited state dynamics from a diverse set of OPV materials. Each training example includes a molecular structure and the corresponding TDDFT-calculated excited state lifetimes and key electronic transitions. Second, the trained model is tested on a separate set of molecules, and its predictions are rigorously compared to independent TDDFT calculations. The results indicate a remarkable degree of predictive accuracy. Specifically, for a test set of 1,000 OPV materials, the transformer model predicted excited state lifetimes with a mean absolute error of 0.15 picoseconds, a negligible deviation from TDDFT-calculated values. The model also correctly identified key electronic transitions contributing to the excited state dynamics in 92% of the test cases, signifying a substantial concordance with the results obtained via conventional quantum chemistry calculations. The practical integration of the transformer model with existing quantum chemistry software was also realized, demonstrating its potential as a powerful tool in the arsenal of materials scientists and chemists. The implementation of this AI model is estimated to reduce the computational cost of predicting excited state dynamics by two orders of magnitude compared to conventional TDDFT calculations. The successful utilization of transformer neural networks to accurately predict excited state dynamics provides an efficient computational pathway for the accelerated discovery and design of new OPV materials, potentially catalyzing advancements in the realm of sustainable energy solutions.Keywords: transformer neural networks, organic photovoltaic materials, excited state dynamics, time-dependent density functional theory, predictive modeling
Procedia PDF Downloads 117662 Secure Intelligent Information Management by Using a Framework of Virtual Phones-On Cloud Computation
Authors: Mohammad Hadi Khorashadi Zadeh
Abstract:
Many new applications and internet services have been emerged since the innovation of mobile networks and devices. However, these applications have problems of security, management, and performance in business environments. Cloud systems provide information transfer, management facilities, and security for virtual environments. Therefore, an innovative internet service and a business model are proposed in the present study for creating a secure and consolidated environment for managing the mobile information of organizations based on cloud virtual phones (CVP) infrastructures. Using this method, users can run Android and web applications in the cloud which enhance performance by connecting to other CVP users and increases privacy. It is possible to combine the CVP with distributed protocols and central control which mimics the behavior of human societies. This mix helps in dealing with sensitive data in mobile devices and facilitates data management with less application overhead.Keywords: BYOD, mobile cloud computing, mobile security, information management
Procedia PDF Downloads 317661 A Review Paper on Data Security in Precision Agriculture Using Internet of Things
Authors: Tonderai Muchenje, Xolani Mkhwanazi
Abstract:
Precision agriculture uses a number of technologies, devices, protocols, and computing paradigms to optimize agricultural processes. Big data, artificial intelligence, cloud computing, and edge computing are all used to handle the huge amounts of data generated by precision agriculture. However, precision agriculture is still emerging and has a low level of security features. Furthermore, future solutions will demand data availability and accuracy as key points to help farmers, and security is important to build robust and efficient systems. Since precision agriculture comprises a wide variety and quantity of resources, security addresses issues such as compatibility, constrained resources, and massive data. Moreover, conventional protection schemes used in the traditional internet may not be useful for agricultural systems, creating extra demands and opportunities. Therefore, this paper aims at reviewing state of the art of precision agriculture security, particularly in open field agriculture, discussing its architecture, describing security issues, and presenting the major challenges and future directions.Keywords: precision agriculture, security, IoT, EIDE
Procedia PDF Downloads 90660 Relay Node Selection Algorithm for Cooperative Communications in Wireless Networks
Authors: Sunmyeng Kim
Abstract:
IEEE 802.11a/b/g standards support multiple transmission rates. Even though the use of multiple transmission rates increase the WLAN capacity, this feature leads to the performance anomaly problem. Cooperative communication was introduced to relieve the performance anomaly problem. Data packets are delivered to the destination much faster through a relay node with high rate than through direct transmission to the destination at low rate. In the legacy cooperative protocols, a source node chooses a relay node only based on the transmission rate. Therefore, they are not so feasible in multi-flow environments since they do not consider the effect of other flows. To alleviate the effect, we propose a new relay node selection algorithm based on the transmission rate and channel contention level. Performance evaluation is conducted using simulation, and shows that the proposed protocol significantly outperforms the previous protocol in terms of throughput and delay.Keywords: cooperative communications, MAC protocol, relay node, WLAN
Procedia PDF Downloads 330659 DFT Theoretical Investigation for Evaluating Global Scalar Properties and Validating with Quantum Chemical Based COSMO-RS Theory for Dissolution of Bituminous and Anthracite Coal in Ionic Liquid
Authors: Debanjan Dey, Tamal Banerjee, Kaustubha Mohanty
Abstract:
Global scalar properties are calculated based on higher occupied molecular orbital (HOMO) and lower unoccupied molecular orbital (LUMO) energy to study the interaction between ionic liquids with Bituminous and Anthracite coal using density function theory (DFT) method. B3LYP/6-31G* calculation predicts HOMO-LUMO energy gap, electronegativity, global hardness, global softness, chemical potential and global softness for individual compounds with their clusters. HOMO-LUMO interaction, electron delocalization, electron donating and accepting is the main source of attraction between individual compounds with their complexes. Cation used in this study: 1-butyl-1-methylpyrrolidinium [BMPYR], 1-methyl -3-propylimmidazolium [MPIM], Tributylmethylammonium [TMA] and Tributylmethylphosphonium [MTBP] with the combination of anion: bis(trifluromethylsulfonyl)imide [Tf2N], methyl carbonate [CH3CO3], dicyanamide [N(CN)2] and methylsulfate [MESO4]. Basically three-tier approach comprising HOMO/LUMO energy, Scalar quantity and infinite dilution activity coefficient (IDAC) by sigma profile generation with COSMO-RS (Conductor like screening model for real solvent) model was chosen for simultaneous interaction. [BMPYR]CH3CO3] (1-butyl-1-methylpyrrolidinium methyl carbonate) and [MPIM][CH3CO3] (1-methyl -3-propylimmidazolium methyl carbonate ) are the best effective ILs on the basis of HOMO-LUMO band gap for Anthracite and Bituminous coal respectively and the corresponding band gap is 0.10137 hartree for Anthracite coal and 0.12485 hartree for Bituminous coal. Further ionic liquids are screened quantitatively with all the scalar parameters and got the same result based on CH-π interaction which is found for HOMO-LUMO gap. To check our findings IDAC were predicted using quantum chemical based COSMO-RS methodology which gave the same trend as observed our scalar quantity calculation. Thereafter a qualitative measurement is doing by sigma profile analysis which gives complementary behavior between IL and coal that means highly miscible with each other.Keywords: coal-ionic liquids cluster, COSMO-RS, DFT method, HOMO-LUMO interaction
Procedia PDF Downloads 304658 Mindfulness and Employability: A Course on the Control of Stress during the Search for Work
Authors: O. Lasaga
Abstract:
Defining professional objectives and the search for work are some of the greatest stress factors for final year university students and recent graduates. To manage correctly the stress brought about by the uncertainty, confusion and frustration this process often generates, a course to control stress based on mindfulness has been designed and taught. This course provides tools based on relaxation, mindfulness and meditation that enable students to address personal and professional challenges in the transition to the job market, eliminating or easing the anxiety involved. The course is extremely practical and experiential, combining theory classes and practical classes of relaxation, meditation and mindfulness, group dynamics, reflection, application protocols and session integration. The evaluation of the courses highlighted on the one hand the high degree of satisfaction and, on the other, the usefulness for the students in becoming aware of stressful situations and how these affect them and learning new coping techniques that enable them to reach their goals more easily and with greater satisfaction and well-being.Keywords: employability, meditation, mindfulness, relaxation techniques, stress
Procedia PDF Downloads 386657 Coal Mining Safety Monitoring Using Wsn
Authors: Somdatta Saha
Abstract:
The main purpose was to provide an implementable design scenario for underground coal mines using wireless sensor networks (WSNs). The main reason being that given the intricacies in the physical structure of a coal mine, only low power WSN nodes can produce accurate surveillance and accident detection data. The work mainly concentrated on designing and simulating various alternate scenarios for a typical mine and comparing them based on the obtained results to arrive at a final design. In the Era of embedded technology, the Zigbee protocols are used in more and more applications. Because of the rapid development of sensors, microcontrollers, and network technology, a reliable technological condition has been provided for our automatic real-time monitoring of coal mine. The underground system collects temperature, humidity and methane values of coal mine through sensor nodes in the mine; it also collects the number of personnel inside the mine with the help of an IR sensor, and then transmits the data to information processing terminal based on ARM.Keywords: ARM, embedded board, wireless sensor network (Zigbee)
Procedia PDF Downloads 340656 Growth Nanostructured CdO Thin Film via Solid-Vapor Deposition
Authors: A. S. Obaid, K. H. T. Hassan, A. M. Asij, B. M. Salih, M. Bououdina
Abstract:
Cadmium Oxide (CdO) thin films have been prepared by vacuum evaporation method on Si (111) substrate at room temperature using CdCl2 as a source of Cd. Detailed structural properties of the films are presented using XRD and SEM. The films was pure polycrystalline CdO phase with high crystallinity. The lattice constant average crystallite size of the nanocrystalline CdO thin films were calculated. SEM image confirms the formation nanostructure. Energy dispersive X-ray analysis spectra of CdO thin films shows the presence of Cd and O peaks only, no additional peaks attributed to impurities or contamination are observed.Keywords: nanostructured CdO, solid-vapor deposition, quantum size effect, cadmium oxide
Procedia PDF Downloads 666655 Quantum Chemical Investigation of Hydrogen Isotopes Adsorption on Metal Ion Functionalized Linde Type A and Faujasite Type Zeolites
Authors: Gayathri Devi V, Aravamudan Kannan, Amit Sircar
Abstract:
In the inner fuel cycle system of a nuclear fusion reactor, the Hydrogen Isotopes Removal System (HIRS) plays a pivoted role. It enables the effective extraction of the hydrogen isotopes from the breeder purge gas which helps to maintain the tritium breeding ratio and sustain the fusion reaction. One of the components of HIRS, Cryogenic Molecular Sieve Bed (CMSB) columns with zeolites adsorbents are considered for the physisorption of hydrogen isotopes at 1 bar and 77 K. Even though zeolites have good thermal stability and reduced activation properties making them ideal for use in nuclear reactor applications, their modest capacity for hydrogen isotopes adsorption is a cause of concern. In order to enhance the adsorbent capacity in an informed manner, it is helpful to understand the adsorption phenomena at the quantum electronic structure level. Physicochemical modifications of the adsorbent material enhances the adsorption capacity through the incorporation of active sites. This may be accomplished through the incorporation of suitable metal ions in the zeolite framework. In this work, molecular hydrogen isotopes adsorption on the active sites of functionalized zeolites are investigated in detail using Density Functional Theory (DFT) study. This involves the utilization of hybrid Generalized Gradient Approximation (GGA) with dispersion correction to account for the exchange and correlation functional of DFT. The electronic energies, adsorption enthalpy, adsorption free energy, Highest Occupied Molecular Orbital (HOMO), Lowest Unoccupied Molecular Orbital (LUMO) energies are computed on the stable 8T zeolite clusters as well as the periodic structure functionalized with different active sites. The characteristics of the dihydrogen bond with the active metal sites and the isotopic effects are also studied in detail. Validation studies with DFT will also be presented for adsorption of hydrogen on metal ion functionalized zeolites. The ab-inito screening analysis gave insights regarding the mechanism of hydrogen interaction with the zeolites under study and also the effect of the metal ion on adsorption. This detailed study provides guidelines for selection of the appropriate metal ions that may be incorporated in the zeolites framework for effective adsorption of hydrogen isotopes in the HIRS.Keywords: adsorption enthalpy, functionalized zeolites, hydrogen isotopes, nuclear fusion, physisorption
Procedia PDF Downloads 179654 Tag Impersonation Attack on Ultra-lightweight Radio Frequency Identification Authentication Scheme (ESRAS)
Authors: Reham Al-Zahrani, Noura Aleisa
Abstract:
The proliferation of Radio Frequency Identification (RFID) technology has raised concerns about system security, particularly regarding tag impersonation attacks. Regarding RFID systems, an appropriate authentication protocol must resist active and passive attacks. A tag impersonation occurs when an adversary's tag is used to fool an authenticating reader into believing it is a legitimate tag. This paper analyzed the security of the efficient, secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS). Then, the paper presents a comprehensive analysis of the Efficient, Secure, and Practical Ultra-Lightweight RFID Authentication Scheme (ESRAS) in the context of radio frequency identification (RFID) systems that employed the Scyther tool to examine the protocol's security against a tag impersonation attack.Keywords: RFID, impersonation attack, authentication, ultra-lightweight protocols
Procedia PDF Downloads 65653 Portable Hands-Free Process Assistant for Gas Turbine Maintenance
Authors: Elisabeth Brandenburg, Robert Woll, Rainer Stark
Abstract:
This paper presents how smart glasses and voice commands can be used for improving the maintenance process of industrial gas turbines. It presents the process of inspecting a gas turbine’s combustion chamber and how it is currently performed using a set of paper-based documents. In order to improve this process, a portable hands-free process assistance system has been conceived. In the following, it will be presented how the approach of user-centered design and the method of paper prototyping have been successfully applied in order to design a user interface and a corresponding workflow model that describes the possible interaction patterns between the user and the interface. The presented evaluation of these results suggests that the assistance system could help the user by rendering multiple manual activities obsolete, thus allowing him to work hands-free and to save time for generating protocols.Keywords: paper prototyping, smart glasses, turbine maintenance, user centered design
Procedia PDF Downloads 321652 Ancelim: Health System Restoration Protocol for Cancer Patients
Authors: Mark Berry
Abstract:
A number of studies have identified several factors involved in the malignant progression of cancer cells. The Primary modulator in driving inflammation to these transformed cells has been identified as the transcription factor known as nuclear factor-κB. This essential regulator of inflammation and the development of cancer, combined with a microenvironment of inflammation and signaling molecules, plays a major role in the malignant progression of cancer, and this progression is the result of the mutagenic predisposition of persistent substances that combat infection at tumor sites and other areas of chronic inflammation. Inflammation-induced tumors, and their inflammatory cells and regulators may be the primary source of metastasis of tumor cells through angiogenesis. Previous research on cytokines and chemokines, including their downstream targets, has been the focus of the cancer/inflammation connection. The identification of the biological mechanisms of other proteins vital to the inflammation cascade and their interactions are crucial to novel and effective therapeutic protocols for the treatment of inflammation-induced cancers. The Ancelim HSRP Protocol is just such a therapeutic intervention.Keywords: ancelim, cancer, inflammation, tumor
Procedia PDF Downloads 545651 The Nature and Impact of Trojan Horses in Cybersecurity
Authors: Mehrab Faraghti
Abstract:
Trojan horses, a form of malware masquerading as legitimate software, pose significant cybersecurity threats. These malicious programs exploit user trust, infiltrate systems, and can lead to data breaches, financial loss, and compromised privacy. This paper explores the mechanisms through which Trojan horses operate, including delivery methods such as phishing and software vulnerabilities. It categorizes various types of Trojan horses and their specific impacts on individuals and organizations. Additionally, the research highlights the evolution of Trojan threats and the importance of user awareness and proactive security measures. By analyzing case studies of notable Trojan attacks, this study identifies common vulnerabilities that can be exploited and offers insights into effective countermeasures, including behavioral analysis, anomaly detection, and robust incident response strategies. The findings emphasize the need for comprehensive cybersecurity education and the implementation of advanced security protocols to mitigate the risks associated with Trojan horses.Keywords: Trojan horses, cybersecurity, malware, data breach
Procedia PDF Downloads 9650 Solving Crimes through DNA Methylation Analysis
Authors: Ajay Kumar Rana
Abstract:
Predicting human behaviour, discerning monozygotic twins or left over remnant tissues/fluids of a single human source remains a big challenge in forensic science. Recent advances in the field of DNA methylations which are broadly chemical hallmarks in response to environmental factors can certainly help to identify and discriminate various single-source DNA samples collected from the crime scenes. In this review, cytosine methylation of DNA has been methodologically discussed with its broad applications in many challenging forensic issues like body fluid identification, race/ethnicity identification, monozygotic twins dilemma, addiction or behavioural prediction, age prediction, or even authenticity of the human DNA. With the advent of next-generation sequencing techniques, blooming of DNA methylation datasets and together with standard molecular protocols, the prospect of investigating and solving the above issues and extracting the exact nature of the truth for reconstructing the crime scene events would be undoubtedly helpful in defending and solving the critical crime cases.Keywords: DNA methylation, differentially methylated regions, human identification, forensics
Procedia PDF Downloads 320649 Laser Induced Transient Current in Quasi-One-Dimensional Nanostructure
Authors: Tokuei Sako
Abstract:
Light-induced ultrafast charge transfer in low-dimensional nanostructure has been studied by a model of a few electrons confined in a 1D electrostatic potential coupled to electrodes at both ends and subjected to an ultrashort pulsed laser field. The time-propagation of the one- and two-electron wave packets has been calculated by integrating the time-dependent Schrödinger equation by the symplectic integrator method with uniform Fourier grid. The temporal behavior of the resultant light-induced current in the studied systems has been discussed with respect to the central frequency and pulse width of the applied laser fields.Keywords: pulsed laser field, nanowire, wave packet, quantum dots, conductivity
Procedia PDF Downloads 509648 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble
Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi
Abstract:
Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble
Procedia PDF Downloads 221647 The Relationship Study between Topological Indices in Contrast with Thermodynamic Properties of Amino Acids
Authors: Esmat Mohammadinasab, Mostafa Sadeghi
Abstract:
In this study are computed some thermodynamic properties such as entropy and specific heat capacity, enthalpy, entropy and gibbs free energy in 10 type different Aminoacids using Gaussian software with DFT method and 6-311G basis set. Then some topological indices such as Wiener, shultz are calculated for mentioned molecules. Finaly is showed relationship between thermodynamic peoperties and above topological indices and with different curves is represented that there is a good correlation between some of the quantum properties with topological indices of them. The instructive example is directed to the design of the structure-property model for predicting the thermodynamic properties of the amino acids which are discussed here.Keywords: amino acids, DFT Method, molecular descriptor, thermodynamic properties
Procedia PDF Downloads 432646 An Energy Efficient Clustering Approach for Underwater Wireless Sensor Networks
Authors: Mohammad Reza Taherkhani
Abstract:
Wireless sensor networks that are used to monitor a special environment, are formed from a large number of sensor nodes. The role of these sensors is to sense special parameters from ambient and to make a connection. In these networks, the most important challenge is the management of energy usage. Clustering is one of the methods that are broadly used to face this challenge. In this paper, a distributed clustering protocol based on learning automata is proposed for underwater wireless sensor networks. The proposed algorithm that is called LA-Clustering forms clusters in the same energy level, based on the energy level of nodes and the connection radius regardless of size and the structure of sensor network. The proposed approach is simulated and is compared with some other protocols with considering some metrics such as network lifetime, number of alive nodes, and number of transmitted data. The simulation results demonstrate the efficiency of the proposed approach.Keywords: underwater sensor networks, clustering, learning automata, energy consumption
Procedia PDF Downloads 361645 Broadcast Routing in Vehicular Ad hoc Networks (VANETs)
Authors: Muazzam A. Khan, Muhammad Wasim
Abstract:
Vehicular adhoc network (VANET) Cars for network (VANET) allowing vehicles to talk to each other, which is committed to building a strong network of mobile vehicles is technical. In VANETs vehicles are equipped with special devices that can get and share info with the atmosphere and other vehicles in the network. Depending on this data security and safety of the vehicles can be enhanced. Broadcast routing is dispersion of any audio or visual medium of mass communication scattered audience distribute audio and video content, but usually using electromagnetic radiation (waves). The lack of server or fixed infrastructure media messages in VANETs plays an important role for every individual application. Broadcast Message VANETs still open research challenge and requires some effort to come to good solutions. This paper starts with a brief introduction of VANET, its applications, and the law of the message-trends in this network starts. This work provides an important and comprehensive study of reliable broadcast routing in VANET scenario.Keywords: vehicular ad-hoc network , broadcasting, networking protocols, traffic pattern, low intensity conflict
Procedia PDF Downloads 532644 Design, Construction and Characterization of a 3He Proportional Counter for Detecting Thermal Neutron
Authors: M. Fares, S. Mameri, I. Abdlani, K. Negara
Abstract:
Neutron detectors in general, proportional counters gas filling based isotope 3He in particular are going to be essential for monitoring and control of certain nuclear facilities, monitoring of experimentation around neutron beams and channels nuclear research reactors, radiation protection instruments and other tools multifaceted exploration and testing of materials, etc. This work consists of a measurement campaign features two Proportional Counters 3He (3He: LND252/USA CP, CP prototype: 3He LND/DDM). This is to make a comparison study of a CP 3He LND252/USA reference one hand, and in the context of routine periodic monitoring of the characteristics of the detectors for controlling the operation especially for laboratory prototypes. In this paper, we have described the different characteristics of the detectors and the experimental protocols used. Tables of measures have been developed and the different curves were plotted. The experimental campaign at stake: 2 PC 3He were thus characterized: Their characteristics (sensitivity, energy pulse height distribution spectra, gas amplification etc.) Were identified: 01 PC 3He 1'' Type: prototype DEDIN/DDM, 01 PC 3He 1'' Type: LND252/USA.Keywords: PC 3He, sensitivity, pulse height distribution spectra, gas amplification
Procedia PDF Downloads 442643 A Distributed Smart Battery Management System – sBMS, for Stationary Energy Storage Applications
Authors: António J. Gano, Carmen Rangel
Abstract:
Currently, electric energy storage systems for stationary applications have known an increasing interest, namely with the integration of local renewable energy power sources into energy communities. Li-ion batteries are considered the leading electric storage devices to achieve this integration, and Battery Management Systems (BMS) are decisive for their control and optimum performance. In this work, the advancement of a smart BMS (sBMS) prototype with a modular distributed topology is described. The system, still under development, has a distributed architecture with modular characteristics to operate with different battery pack topologies and charge capacities, integrating adaptive algorithms for functional state real-time monitoring and management of multicellular Li-ion batteries, and is intended for application in the context of a local energy community fed by renewable energy sources. This sBMS system includes different developed hardware units: (1) Cell monitoring units (CMUs) for interfacing with each individual cell or module monitoring within the battery pack; (2) Battery monitoring and switching unit (BMU) for global battery pack monitoring, thermal control and functional operating state switching; (3) Main management and local control unit (MCU) for local sBMS’s management and control, also serving as a communications gateway to external systems and devices. This architecture is fully expandable to battery packs with a large number of cells, or modules, interconnected in series, as the several units have local data acquisition and processing capabilities, communicating over a standard CAN bus and will be able to operate almost autonomously. The CMU units are intended to be used with Li-ion cells but can be used with other cell chemistries, with output voltages within the 2.5 to 5 V range. The different unit’s characteristics and specifications are described, including the different implemented hardware solutions. The developed hardware supports both passive and active methods for charge equalization, considered fundamental functionalities for optimizing the performance and the useful lifetime of a Li-ion battery package. The functional characteristics of the different units of this sBMS system, including different process variables data acquisition using a flexible set of sensors, can support the development of custom algorithms for estimating the parameters defining the functional states of the battery pack (State-of-Charge, State-of-Health, etc.) as well as different charge equalizing strategies and algorithms. This sBMS system is intended to interface with other systems and devices using standard communication protocols, like those used by the Internet of Things. In the future, this sBMS architecture can evolve to a fully decentralized topology, with all the units using Wi-Fi protocols and integrating a mesh network, making unnecessary the MCU unit. The status of the work in progress is reported, leading to conclusions on the system already executed, considering the implemented hardware solution, not only as fully functional advanced and configurable battery management system but also as a platform for developing custom algorithms and optimizing strategies to achieve better performance of electric energy stationary storage devices.Keywords: Li-ion battery, smart BMS, stationary electric storage, distributed BMS
Procedia PDF Downloads 100642 Spin Coherent States Without Squeezing
Authors: A. Dehghani, S. Shirin
Abstract:
We propose in this article a new configuration of quantum states, |α, β> := |α>×|β>. Which are composed of vector products of two different copies of spin coherent states, |α> and |β>. Some mathematical as well as physical properties of such states are discussed. For instance, it has been shown that the cross products of two coherent vectors remain coherent again. They admit a resolution of the identity through positive definite measures on the complex plane. They represent packets similar to the true coherent states, in other words we would not expect to take spin squeezing in any of the field quadratures Lˆx, Lˆy and Lˆz. Depending on the particular choice of parameters in the above scenarios, they can be converted into the so-called Dicke states which minimize the uncertainty relations of each pair of the angular momentum components.Keywords: vector (Cross-)products, minimum uncertainty, angular momentum, measurement, Dicke states
Procedia PDF Downloads 412641 Literature for Learning: Cultivating Global Competence in the Classroom
Authors: April Mattix Foster, Kathleen A. Ramos, Sarah Rich, Rebecca Eisenberg, Lisa Dornan
Abstract:
As the number of children from immigrant and refugee backgrounds in our schools continues to grow, the need to cultivate antiracist educators is crucial. This e-poster outlines the design of online university course modules, funded by the Longview Foundation, designed to support pre- and in-service educators in developing great awareness of, empathy for, and advocacy with immigrant and refugee students in the classroom. These modules guide educators in using children’s and adolescent literature that highlights the lived experiences of immigrant and refugee families, utilizing scaffolded reading and thinking protocols as a model for encouraging empathy and global competence in young learners. Educators reported several benefits of using the modules and curated literature, including greater awareness of the significance of diverse literature, deeper self-reflection and empathy, and stronger connections to classroom practice—ultimately benefiting both educators and their students.Keywords: antiracist, children’s literature, global competence, empathy, self-reflection
Procedia PDF Downloads 25640 A Survey on the Blockchain Smart Contract System: Security Strengths and Weaknesses
Authors: Malaw Ndiaye, Karim Konate
Abstract:
Smart contracts are computer protocols that facilitate, verify, and execute the negotiation or execution of a contract, or that render a contractual term unnecessary. Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. Smart contracts have become lucrative and profitable targets for attackers because they can hold a great amount of money. Smart contracts, although widely used in blockchain technology, are far from perfect due to security concerns. Since there are recent studies on smart contract security, none of them systematically study the strengths and weaknesses of smart contract security. Some have focused on an analysis of program-related vulnerabilities by providing a taxonomy of vulnerabilities. Other studies are responsible for listing the series of attacks linked to smart contracts. Although a series of attacks are listed, there is a lack of discussions and proposals on improving security. This survey takes stock of smart contract security from a more comprehensive perspective by correlating the level of vulnerability and systematic review of security levels in smart contracts.Keywords: blockchain, Bitcoin, smart contract, criminal smart contract, security
Procedia PDF Downloads 168639 Exploring the Applications of Modular Forms in Cryptography
Authors: Berhane Tewelday Weldhiwot
Abstract:
This research investigates the pivotal role of modular forms in modern cryptographic systems, particularly focusing on their applications in secure communications and data integrity. Modular forms, which are complex analytic functions with rich arithmetic properties, have gained prominence due to their connections to number theory and algebraic geometry. This study begins by outlining the fundamental concepts of modular forms and their historical development, followed by a detailed examination of their applications in cryptographic protocols such as elliptic curve cryptography and zero-knowledge proofs. By employing techniques from analytic number theory, the research delves into how modular forms can enhance the efficiency and security of cryptographic algorithms. The findings suggest that leveraging modular forms not only improves computational performance but also fortifies security measures against emerging threats in digital communication. This work aims to contribute to the ongoing discourse on integrating advanced mathematical theories into practical applications, ultimately fostering innovation in cryptographic methodologies.Keywords: modular forms, cryptography, elliptic curves, applications, mathematical theory
Procedia PDF Downloads 16638 Generalized π-Armendariz Authentication Cryptosystem
Authors: Areej M. Abduldaim, Nadia M. G. Al-Saidi
Abstract:
Algebra is one of the important fields of mathematics. It concerns with the study and manipulation of mathematical symbols. It also concerns with the study of abstractions such as groups, rings, and fields. Due to the development of these abstractions, it is extended to consider other structures, such as vectors, matrices, and polynomials, which are non-numerical objects. Computer algebra is the implementation of algebraic methods as algorithms and computer programs. Recently, many algebraic cryptosystem protocols are based on non-commutative algebraic structures, such as authentication, key exchange, and encryption-decryption processes are adopted. Cryptography is the science that aimed at sending the information through public channels in such a way that only an authorized recipient can read it. Ring theory is the most attractive category of algebra in the area of cryptography. In this paper, we employ the algebraic structure called skew -Armendariz rings to design a neoteric algorithm for zero knowledge proof. The proposed protocol is established and illustrated through numerical example, and its soundness and completeness are proved.Keywords: cryptosystem, identification, skew π-Armendariz rings, skew polynomial rings, zero knowledge protocol
Procedia PDF Downloads 217637 HPPDFIM-HD: Transaction Distortion and Connected Perturbation Approach for Hierarchical Privacy Preserving Distributed Frequent Itemset Mining over Horizontally-Partitioned Dataset
Authors: Fuad Ali Mohammed Al-Yarimi
Abstract:
Many algorithms have been proposed to provide privacy preserving in data mining. These protocols are based on two main approaches named as: the perturbation approach and the Cryptographic approach. The first one is based on perturbation of the valuable information while the second one uses cryptographic techniques. The perturbation approach is much more efficient with reduced accuracy while the cryptographic approach can provide solutions with perfect accuracy. However, the cryptographic approach is a much slower method and requires considerable computation and communication overhead. In this paper, a new scalable protocol is proposed which combines the advantages of the perturbation and distortion along with cryptographic approach to perform privacy preserving in distributed frequent itemset mining on horizontally distributed data. Both the privacy and performance characteristics of the proposed protocol are studied empirically.Keywords: anonymity data, data mining, distributed frequent itemset mining, gaussian perturbation, perturbation approach, privacy preserving data mining
Procedia PDF Downloads 505