Search results for: communication with physical layer security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13945

Search results for: communication with physical layer security

13375 Food Security Model and the Role of Community Empowerment: The Case of a Marginalized Village in Mexico, Tatoxcac, Puebla

Authors: Marco Antonio Lara De la Calleja, María Catalina Ovando Chico, Eduardo Lopez Ruiz

Abstract:

Community empowerment has been proved to be a key element in the solution of the food security problem. As a result of a conceptual analysis, it was found that agricultural production, economic development and governance, are the traditional basis of food security models. Although the literature points to social inclusion as an important factor for food security, no model has considered it as the basis of it. The aim of this research is to identify different dimensions that make an integral model for food security, with emphasis on community empowerment. A diagnosis was made in the study community (Tatoxcac, Zacapoaxtla, Puebla), to know the aspects that impact the level of food insecurity. With a statistical sample integrated by 200 families, the Latin American and Caribbean Food Security Scale (ELCSA) was applied, finding that: in households composed by adults and children, have moderated food insecurity, (ELCSA scale has three levels, low, moderated and high); that result is produced mainly by the economic income capacity and the diversity of the diet on its food. With that being said, a model was developed to promote food security through five dimensions: 1. Regional context of the community; 2. Structure and system of local food; 3. Health and nutrition; 4. Information and technology access; and 5. Self-awareness and empowerment. The specific actions on each axis of the model, allowed a systemic approach needed to attend food security in the community, through the empowerment of society. It is concluded that the self-awareness of local communities is an area of extreme importance, which must be taken into account for participatory schemes to improve food security. In the long term, the model requires the integrated participation of different actors, such as government, companies and universities, to solve something such vital as food security.

Keywords: community empowerment, food security, model, systemic approach

Procedia PDF Downloads 353
13374 The Interethnic Communication Apprehension Experiences of Indigenous Peoples in the Philippines

Authors: Christine Alvarez, Rio Gojar, Hannah Jimala

Abstract:

The Philippines is a large country composed of geographic islands and distinct cultural groups. But what makes such a diverse country connect and communicate with one another? This case study examines the narrative of lived experiences expressed by the selected indigenous peoples through an in-depth interview. Based on the results, some indigenous peoples feel that they are motivated to engage in interethnic discussions that concern their ethnic identity and such cultural misconceptions about them. Their experiences in being involved in indigenous people centered and community/academic organizations helped them in every interethnic communication. After all, some indigenous peoples expressed that they find their own communities as a safe space. Although indigenous peoples present less interethnic communication apprehension, its existence is still manifested in their experiences in verbal communication, non-verbal communication, and mediated communication. Lastly, their Interethnic Communication Apprehension manifested on their innate and learned personality whenever there is a large crowd, and is affected by their socioeconomic status. This study mainly focuses on what are the interethnic communication apprehension experiences of indigenous peoples in the country. Concepts are applied from the Contextual Theory of Interethnic Communication theory, Interethnic Communication Apprehension, and other types of communication. Meanwhile, the participants are determined through a purposive sampling with the criteria as indigenous people who stays in Manila in pursuit of higher education.

Keywords: ethnic identity, interethnic relation, intercultural communication, indigenous people community

Procedia PDF Downloads 93
13373 Information Security Risk Management in IT-Based Process Virtualization: A Methodological Design Based on Action Research

Authors: Jefferson Camacho Mejía, Jenny Paola Forero Pachón, Luis Carlos Gómez Flórez

Abstract:

Action research is a qualitative research methodology, which leads the researcher to delve into the problems of a community in order to understand its needs in depth and finally, to propose actions that lead to a change of social paradigm. Although this methodology had its beginnings in the human sciences, it has attracted increasing interest and acceptance in the field of information systems research since the 1990s. The countless possibilities offered nowadays by the use of Information Technologies (IT) in the development of different socio-economic activities have meant a change of social paradigm and the emergence of the so-called information and knowledge society. According to this, governments, large corporations, small entrepreneurs and in general, organizations of all kinds are using IT to virtualize their processes, taking them from the physical environment to the digital environment. However, there is a potential risk for organizations related with exposing valuable information without an appropriate framework for protecting it. This paper shows progress in the development of a methodological design to manage the information security risks associated with the IT-based processes virtualization, by applying the principles of the action research methodology and it is the result of a systematic review of the scientific literature. This design consists of seven fundamental stages. These are distributed in the three stages described in the action research methodology: 1) Observe, 2) Analyze and 3) Take actions. Finally, this paper aims to offer an alternative tool to traditional information security management methodologies with a view to being applied specifically in the planning stage of IT-based process virtualization in order to foresee risks and to establish security controls before formulating IT solutions in any type of organization.

Keywords: action research, information security, information technology, methodological design, process virtualization, risk management

Procedia PDF Downloads 148
13372 Performance Evaluation of Fingerprint, Auto-Pin and Password-Based Security Systems in Cloud Computing Environment

Authors: Emmanuel Ogala

Abstract:

Cloud computing has been envisioned as the next-generation architecture of Information Technology (IT) enterprise. In contrast to traditional solutions where IT services are under physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This is due to the fact that the systems are opened to the whole world and as people tries to have access into the system, many people also are there trying day-in day-out on having unauthorized access into the system. This research contributes to the improvement of cloud computing security for better operation. The work is motivated by two problems: first, the observed easy access to cloud computing resources and complexity of attacks to vital cloud computing data system NIC requires that dynamic security mechanism evolves to stay capable of preventing illegitimate access. Second; lack of good methodology for performance test and evaluation of biometric security algorithms for securing records in cloud computing environment. The aim of this research was to evaluate the performance of an integrated security system (ISS) for securing exams records in cloud computing environment. In this research, we designed and implemented an ISS consisting of three security mechanisms of biometric (fingerprint), auto-PIN and password into one stream of access control and used for securing examination records in Kogi State University, Anyigba. Conclusively, the system we built has been able to overcome guessing abilities of hackers who guesses people password or pin. We are certain about this because the added security system (fingerprint) needs the presence of the user of the software before a login access can be granted. This is based on the placement of his finger on the fingerprint biometrics scanner for capturing and verification purpose for user’s authenticity confirmation. The study adopted the conceptual of quantitative design. Object oriented and design methodology was adopted. In the analysis and design, PHP, HTML5, CSS, Visual Studio Java Script, and web 2.0 technologies were used to implement the model of ISS for cloud computing environment. Note; PHP, HTML5, CSS were used in conjunction with visual Studio front end engine design tools and MySQL + Access 7.0 were used for the backend engine and Java Script was used for object arrangement and also validation of user input for security check. Finally, the performance of the developed framework was evaluated by comparing with two other existing security systems (Auto-PIN and password) within the school and the results showed that the developed approach (fingerprint) allows overcoming the two main weaknesses of the existing systems and will work perfectly well if fully implemented.

Keywords: performance evaluation, fingerprint, auto-pin, password-based, security systems, cloud computing environment

Procedia PDF Downloads 119
13371 The Damage and Durability of a Sport Synthetic Resin Floor: A Case Study

Authors: C. Paglia, C. Mosca

Abstract:

Synthetic resin floorsare often used in sport infrastructure. These organic materials are often in contact with a bituminous substrate, which in turn is placed on the ground. In this work, the damage of a basket resin field surface was characterized by means of visual inspection, optical microscopy, resin thickness measurements, adhesion strength, water vapor transmission capacity, capillary water adsorption, granulometry of the bituminous conglomerate, the surface properties, and the water ground infiltration speed. The infiltration speed indicates water pemeability. This was due to its composition: clean sand mixed with gravel. Relatively good adhesion was present between the synthetic resin and the bituminous layer. The adhesion resistance of the bituminous layer was relatively low. According to the required bitumoniousasphalt-concrete mixes AC 11 S, the placed material was more porous. Insufficient constipation was present. The spaces values were above the standard limits, while the apparent densities were lower compared to the conventional AC 11 mixtures. The microstructure outlines the high permeability and porosity of the bituminous layer. The synthetic resin wasvapourproof and did not exhibit capillary adsorption. It exhibited a lower thickness as required, and no multiple placing steps were observed. Multiple cavities were detected along with the interface between the bituminous layer and the resin coating with no intermediate layers. The layer for the pore filling in the bituminous surface was not properly applied. The swelling bubbles on the synthetic pavement were caused by the humidity in the bituminous layer. Water or humidity were present prior to the application of the resin, and the effect was worsened by the upward movement of the water from the ground.

Keywords: resin, floor, damage, durability

Procedia PDF Downloads 145
13370 Tribological Study of TiC Powder Cladding on 6061 Aluminum Alloy

Authors: Yuan-Ching Lin, Sin-Yu Chen, Pei-Yu Wu

Abstract:

This study reports the improvement in the wear performance of A6061 aluminum alloy clad with mixed powders of titanium carbide (TiC), copper (Cu) and aluminum (Al) using the gas tungsten arc welding (GTAW) method. The wear performance of the A6061 clad layers was evaluated by performing pin-on-disc mode wear test. Experimental results clearly indicate an enhancement in the hardness of the clad layer by about two times that of the A6061 substrate without cladding. Wear test demonstrated a significant improvement in the wear performance of the clad layer when compared with the A6061 substrate without cladding. Moreover, the interface between the clad layer and the A6061 substrate exhibited superior metallurgical bonding. Due to this bonding, the clad layer did not spall during the wear test; as such, massive wear loss was prevented. Additionally, massive oxidized particulate debris was generated on the worn surface during the wear test; this resulted in three-body abrasive wear and reduced the wear behavior of the clad surface.

Keywords: GTAW、A6061 aluminum alloy, 、surface modification, tribological study, TiC powder cladding

Procedia PDF Downloads 443
13369 The Study of Security Techniques on Information System for Decision Making

Authors: Tejinder Singh

Abstract:

Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.

Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data

Procedia PDF Downloads 285
13368 Two Layer Photo-Thermal Deflection Model to Investigate the Electronic Properties in BGaAs/GaAs Alloys

Authors: S. Ilahi, M. Baira, F. Saidi, N. Yacoubi, L. Auvray, H. Maaref

Abstract:

Photo-thermal deflection technique (PTD) is used to study the nonradiative recombination process in BGaAs/GaAs alloy with boron composition of 3% and 8% grown by metal organic chemical vapor deposition (MOCVD). A two layer theoretical model has been developed taking into account both thermal and electronic contribution in the photothermal signal allowing to extract the electronic parameters namely electronic diffusivity, surface and interface recombination. It is found that the increase of boron composition alters the BGaAs epilayers transport properties.

Keywords: photothermal defelction technique, two layer model, BGaAs/GaAs alloys, boron composition

Procedia PDF Downloads 284
13367 Leveraging Li-Fi to Enhance Security and Performance of Medical Devices

Authors: Trevor Kroeger, Hayden Williams, Edward Holzinger, David Coleman, Brian Haberman

Abstract:

The network connectivity of medical devices is increasing at a rapid rate. Many medical devices, such as vital sign monitors, share information via wireless or wired connections. However, these connectivity options suffer from a variety of well-known limitations. Wireless connectivity, especially in the unlicensed radio frequency bands, can be disrupted. Such disruption could be due to benign reasons, such as a crowded spectrum, or to malicious intent. While wired connections are less susceptible to interference, they inhibit the mobility of the medical devices, which could be critical in a variety of scenarios. This work explores the application of Light Fidelity (Li-Fi) communication to enhance the security, performance, and mobility of medical devices in connected healthcare scenarios. A simple bridge for connected devices serves as an avenue to connect traditional medical devices to the Li-Fi network. This bridge was utilized to conduct bandwidth tests on a small Li-Fi network installed into a Mock-ICU setting with a backend enterprise network similar to that of a hospital. Mobile and stationary tests were conducted to replicate various different situations that might occur within a hospital setting. Results show that in room Li-Fi connectivity provides reasonable bandwidth and latency within a hospital like setting.

Keywords: hospital, light fidelity, Li-Fi, medical devices, security

Procedia PDF Downloads 83
13366 Study on Meristem Culture of Purwoceng (Pimpinella pruatjan Molk.) and Its Stigmasterol Detected by Thin Layer Chromatography

Authors: Totik Sri Mariani, Sukrasno Isna, Tet Fatt Chia

Abstract:

Purwoceng (Pimpinella pruatjan Molk) is a legend plant used for increasing stamina by Kings in Java Island, Indonesia. Purpose of this study was to perform meristem culture and detected its stigmasterol by thin layer chromatography (TLC). Our result show that meristem culture could be propagated and grew into plantlet. After extracting intact acclimatized plant derived from meristem culture by hexane, we could detected stigmasterol by TLC. For suggestion, our extraction and TLC method could be used for detecting stigmasterol in others plant.

Keywords: purwoceng (pimpinella pruatjan), meristem culture, extraction, thin layer chromatography

Procedia PDF Downloads 413
13365 Integrating Blockchain and Internet of Things Platforms: An Empirical Study on Immunization Cold Chain

Authors: Fawzia Abujalala, Asma Elmangoush, Majdi Ashibani

Abstract:

The adoption of Blockchain technology introduces the possibility to decentralize cold chain systems. This adaptation enhances them to be more efficient, accessible, verifiable, and data security. Additionally, the Internet of Things (IoT) concept is considered as an added-value to various application domains. Cargo tracking and cold chain are a few to name. However, the security of the IoT transactions and integrated devices remains one of the key challenges to the IoT application’s success. Consequently, Blockchain technology and its consensus protocols have been used to solve many information security problems. In this paper, the researchers discussed the advantages of integrating Blockchain technology into IoT platform to improve security and provide an overview of existing literature on integrating Blockchain and IoT platforms. Then, presented the immunization cold chain solution as a use-case that could apply to any critical goods based on integrating hyperledger fabric platform and IoT platform.

Keywords: blockchain, hyperledger fabric, internet of things, security, traceability

Procedia PDF Downloads 129
13364 Single-Crystal Kerfless 2D Array Transducer for Volumetric Medical Imaging: Theoretical Study

Authors: Jurij Tasinkiewicz

Abstract:

The aim of this work is to present a theoretical analysis of a 2D ultrasound transducer comprised of crossed arrays of metal strips placed on both sides of thin piezoelectric layer (a). Such a structure is capable of electronic beam-steering of generated wave beam both in elevation and azimuth. In this paper, a semi-analytical model of the considered transducer is developed. It is based on generalization of the well-known BIS-expansion method. Specifically, applying the electrostatic approximation, the electric field components on the surface of the layer are expanded into fast converging series of double periodic spatial harmonics with corresponding amplitudes represented by the properly chosen Legendre polynomials. The problem is reduced to numerical solving of certain system of linear equations for unknown expansion coefficients.

Keywords: beamforming, transducer array, BIS-expansion, piezoelectric layer

Procedia PDF Downloads 410
13363 Monitoring Surface Modification of Polylactide Nonwoven Fabric with Weak Polyelectrolytes

Authors: Sima Shakoorjavan, Dawid Stawski, Somaye Akbari

Abstract:

In this study, great attempts have been made to initially modify polylactide (PLA) nonwoven surface with poly(amidoamine) (PAMMA) dendritic polymer to create amine active sites on PLA surface through aminolysis reaction. Further, layer-by-layer deposition of four layers of two weak polyelectrolytes, including PAMAM as polycation and polyacrylic acid (PAA) as polyanion on activated PLA, was monitored with turbidity analysis of waste-polyelectrolytes after each deposition step. The FTIR-ATR analysis confirmed the successful introduction of amine groups into PLA polymeric chains through the emerging peak around 1650 cm⁻¹ corresponding to N-H bending vibration and a double wide peak at around 3670-3170 cm⁻¹ corresponding to N-H stretching vibration. The adsorption-desorption behavior of (PAMAM) and poly (PAA) deposition was monitored by turbidity test. Turbidity results showed the desorption and removal of the previously deposited layer (second and third layers) upon the desorption of the next layers (third and fourth layers). Also, the importance of proper rinsing after aminolysis of PLA nonwoven fabric was revealed by turbidity test. Regarding the sample with insufficient rinsing process, higher desorption and removal of ungrafted PAMAM from aminolyzed-PLA surface into PAA solution was detected upon the deposition of the first PAA layer. This phenomenon can be due to electrostatic attraction between polycation (PAMAM) and polyanion (PAA). Moreover, the successful layer deposition through LBL was confirmed by the staining test of acid red 1 through spectrophotometry analysis. According to the results, layered PLA with four layers with PAMAM as the top layer showed higher dye absorption (46.7%) than neat (1.2%) and aminolyzed PLA (21.7%). In conclusion, the complicated adsorption-desorption behavior of dendritic polycation and linear polyanion systems was observed. Although desorption and removal of previously adsorbed layers occurred upon the deposition of the next layer, the remaining polyelectrolyte on the substrate is sufficient for the adsorption of the next polyelectrolyte through electrostatic attraction between oppositely charged polyelectrolytes. Also, an increase in dye adsorption confirmed more introduction of PAMAM onto PLA surface through LBL.

Keywords: surface modification, layer-by-layer technique, weak polyelectrolytes, adsorption-desorption behavior

Procedia PDF Downloads 45
13362 Shifting of Global Energy Security: A Comparative Analysis of Indonesia and China’s Renewable Energy Policies

Authors: Widhi Hanantyo Suryadinata

Abstract:

Efforts undertaken by Indonesia and China to shift the strategies and security of renewable energy on a global stage involve approaches through policy construction related to rare minerals processing or value-adding in Indonesia and manufacturing policies through the New Energy Vehicles (NEVs) policy in China. Both policies encompass several practical regulations and policies that can be utilized for the implementation of Indonesia and China's grand efforts and ideas. Policy development in Indonesia and China can be analyzed using a comparative analysis method, as well as employing a pyramid illustration to identify policy construction phases based on the real conditions of the domestic market and implemented policies. This approach also helps to identify the potential integration of policies needed to enhance the policy development phase of a country within the pyramid. It also emphasizes the significance of integration policy to redefine renewable energy strategy and security on the global stage.

Keywords: global renewable energy security, global energy security, policy development, comparative analysis, shifting of global energy security, Indonesia, China

Procedia PDF Downloads 47
13361 Multi-Dimension Threat Situation Assessment Based on Network Security Attributes

Authors: Yang Yu, Jian Wang, Jiqiang Liu, Lei Han, Xudong He, Shaohua Lv

Abstract:

As the increasing network attacks become more and more complex, network situation assessment based on log analysis cannot meet the requirements to ensure network security because of the low quality of logs and alerts. This paper addresses the lack of consideration of security attributes of hosts and attacks in the network. Identity and effectiveness of Distributed Denial of Service (DDoS) are hard to be proved in risk assessment based on alerts and flow matching. This paper proposes a multi-dimension threat situation assessment method based on network security attributes. First, the paper offers an improved Common Vulnerability Scoring System (CVSS) calculation, which includes confident risk, integrity risk, availability risk and a weighted risk. Second, the paper introduces deterioration rate of properties collected by sensors in hosts and network, which aimed at assessing the time and level of DDoS attacks. Third, the paper introduces distribution of asset value in security attributes considering features of attacks and network, which aimed at assessing and show the whole situation. Experiments demonstrate that the approach reflects effectiveness and level of DDoS attacks, and the result can show the primary threat in network and security requirement of network. Through comparison and analysis, the method reflects more in security requirement and security risk situation than traditional methods based on alert and flow analyzing.

Keywords: DDoS evaluation, improved CVSS, network security attribute, threat situation assessment

Procedia PDF Downloads 195
13360 A Study of User Awareness and Attitudes Towards Civil-ID Authentication in Oman’s Electronic Services

Authors: Raya Al Khayari, Rasha Al Jassim, Muna Al Balushi, Fatma Al Moqbali, Said El Hajjar

Abstract:

This study utilizes linear regression analysis to investigate the correlation between user account passwords and the probability of civil ID exposure, offering statistical insights into civil ID security. The study employs multiple linear regression (MLR) analysis to further investigate the elements that influence consumers’ views of civil ID security. This aims to increase awareness and improve preventive measures. The results obtained from the MLR analysis provide a thorough comprehension and can guide specific educational and awareness campaigns aimed at promoting improved security procedures. In summary, the study’s results offer significant insights for improving existing security measures and developing more efficient tactics to reduce risks related to civil ID security in Oman. By identifying key factors that impact consumers’ perceptions, organizations can tailor their strategies to address vulnerabilities effectively. Additionally, the findings can inform policymakers on potential regulatory changes to enhance civil ID security in the country.

Keywords: civil-id disclosure, awareness, linear regression, multiple regression

Procedia PDF Downloads 38
13359 The Prevalence of Organized Retail Crime in Riyadh, Saudi Arabia

Authors: Saleh Dabil

Abstract:

This study investigates the level of existence of organized retail crime in supermarkets of Riyadh, Saudi Arabia. The store managers, security managers and general employees were asked about the types of retail crimes occur in the stores. Three independent variables were related to the report of organized retail theft. The independent variables are: (1) the supermarket profile (volume, location, standard and type of the store), (2) the social physical environment of the store (maintenance, cleanness and overall organizational cooperation), (3) the security techniques and loss prevention electronics techniques used. The theoretical framework of this study based on the social disorganization theory. This study concluded that the organized retail theft, in specific, organized theft is moderately apparent in Riyadh stores. The general result showed that the environment of the stores has an effect on the prevalence of organized retail theft with relation to the gender of thieves, age groups, working shift, type of stolen items as well as the number of thieves in one case. Among other reasons, some factors of the organized theft are: economic pressure of customers based on the location of the store. The dealing of theft also was investigated to have a clear picture of stores dealing with organized retail theft. The result showed that mostly, thieves sent without any action and sometimes given written warning. Very few cases dealt with by police. There are other factors in the study can be looked up in the text. This study suggests solving the problem of organized theft; first is ‘the well distributing of the duties and responsibilities between the employees especially for security purposes’. Second is ‘installation of strong security system’ and ‘making well-designed store layout’. Third is ‘giving training for general employees’ and ‘to give periodically security skills training of employees’. There are other suggestions in the study can be looked up in the text.

Keywords: organized crime, retail, theft, loss prevention, store environment

Procedia PDF Downloads 178
13358 Rethinking the Role of Small States in the Hybrid Era: Shifts in the Cypriot Foreign and Defence Policies, 2004-2019

Authors: Constantinos Adamides, Petros Petrikkos

Abstract:

In the era of growing hybrid threats, small states find themselves in need to re-evaluate existing foreign and defense policies. The pressure to establishing or maintain a status of a reliable partner in the community in which they belong to, vis-à-vis their multilateral relations with other organisations and entities, small states may need to shift their policies in the field to accommodate security needs that are not only pertinent to their security, but also to that of the organisations (bloc) in which they interact. Unlike potential shortcomings in a small state’s mainstream security and defence framework where the threat would be limited to the state itself, in more contemporary times with dominating hybrid threats, the small states’ security shortcomings may also become a security problem for the bloc in which these states belong to. An indicative example is small states like Cyprus and Malta, which belong and 'interact' in the European Union. As a result, the nature of hybrid threats can be utilised to hurt bigger states in a bloc by exploiting the small states’ vulnerabilities and security gaps. Inevitably, both the defensive and foreign policy collaborations of small states with bigger states have been and are constantly re-evaluated to tackle and prevent such problems. In essence, the goal of this ‘re-evaluation’ aims to achieve a twofold goal: The first is the small states’ quest to appear as a reliable partner within the bloc, while the second is to avoid being the weakest security link in the bloc’s defence against hybrid threats. Indeed, the hybrid arena is a security area where they can excel in the bloc, despite the potential and expected conventional military deficiencies. This new environment prompts us to think security from the perspective of small states differently and in relation to their role as members or big organisations. The paper focuses on the case of Cyprus following its accession to the European Union and examines how a country that has had a very focused security orientation –not least due to its ongoing security problems– altered its foreign and defence policies within the European Union to ensure compliance with the rest of the bloc, while at the same time maximizing its role as a security player. Specifically, it examines the methods through which the country shifted its policies as well as the challenges and opportunities that emerged from these security shifts.

Keywords: Cyprus, defence, foreign policy, hybrid threats, ontological security, small states

Procedia PDF Downloads 122
13357 Study of the Hysteretic I-V Characteristics in a Polystyrene/ZnO-Nanorods Stack Layer

Authors: You-Lin Wu, Yi-Hsing Sung, Shih-Hung Lin, Jing-Jenn Lin

Abstract:

Performance improvement in optoelectronic devices such as solar cells and photodetectors has been reported when a polymer/ZnO nanorods stack is used. Resistance switching of polymer/ZnO nanocrystals (or nanorods) hybrid has also gained a lot of research interests recently. It has been reported that high- and low-resistance states of a metal/insulator/metal (MIM) structure diode with a polystyrene (PS) and ZnO hybrid as the insulator layer can be switched by applied bias after a high-voltage forming process, while the same device structure merely with a PS layer does not show any forming behavior. In this work, we investigated the current-voltage (I-V) characteristics of an MIM device with a PS/ZnO nanorods stack deposited on fluorine-doped tin oxide (FTO) glass substrate. The ZnO nanorods were grown by a hydrothermal method using a mixture of zinc nitrate, hexamethylenetetramine, and DI water. Following that, a PS layer was deposited by spin coating. Finally, the device with a structure of Ti/ PS/ZnO nanorods/FTO was completed by e-gun evaporated Ti layer on top of the PS layer. Semiconductor parameters analyzer Agilent 4156C was then used to measure the I-V characteristics of the device by applying linear ramp sweep voltage with sweep sequence of 0V → 4V → 0V → 3V → 0V → 2V → 0V → 1V → 0V in both positive and negative directions. It is interesting to find that the I-V characteristics are bias dependent and hysteretic, indicating that the device Ti/PS/ZnO nanorods/FTO structure has ferroelectricity. Our results also show that the maximum hysteresis loop height of the I-V characteristics as well as the voltage at which the maximum hysteresis loop height of each scan occurs increase with increasing maximum sweep voltage. It should be noticed that, although ferroelectricity has been found in ZnO at its melting temperature (1975℃) and in Li- or Co-doped ZnO, neither PS nor ZnO has ferroelectricity at room temperature. Using the same structure but with a PS or ZnO layer only as the insulator does not give and hysteretic I-V characteristics. It is believed that a charge polarization layer is induced near the PS/ZnO nanorods stack interface and thus causes the ferroelectricity in the device with Ti/PS/ZnO nanorods/FTO structure. Our results show that the PS/ZnO stack can find a potential application in a resistive switching memory device with MIM structure.

Keywords: ferroelectricity, hysteresis, polystyrene, resistance switching, ZnO nanorods

Procedia PDF Downloads 298
13356 Current Global Education Trends: Issues and Challenges of Physical and Health Education Teaching and Learning in Nigerian Schools

Authors: Bichi Muktar Sani

Abstract:

The philosophy of Physical and Health Education is to develop academic and professional competency which will enable individuals earn a living and render unique services to the society and also provide good basis of knowledge and experience that characterize an educated and fully developed person through physical activities. With the increase of sedentary activities such as watching television, playing videogames, increased computer technology, automation and reduction of high school Physical and Health Education schedules, young people are most likely to become overweight, and less fit. Physical Education is a systematic instruction in sports, training, practice, gymnastics, exercises, and hygiene given as part of a school or college program. Physical and Health Education is the study, practice, and appreciation of the art and science of human movement. Physical and Health Education is course in the curricula that utilizes the learning in the cognitive, affective, and psychomotor domains in a lay or movement exploration setting. The paper made some recommendations on the way forward.

Keywords: issues, challenges, physical education, school

Procedia PDF Downloads 12
13355 Transfer of Information Heritage between Algerian Veterinarians and Breeders: Assessment of Information and Communication Technology Using Mobile Phone

Authors: R. Bernaoui, P. Ohly

Abstract:

Our research shows the use of the mobile phone that consolidates the relationship between veterinarians, and that between breeders and veterinarians. On the other hand it asserts that the tool in question is a means of economic development. The results of our survey reveal a positive return to the veterinary community, which shows that the mobile phone has become an effective means of sustainable development through the transfer of a rapid and punctual information inheritance via social networks; including many Internet applications. Our results show that almost all veterinarians use the mobile phone for interprofessional communication. We therefore believe that the use of the mobile phone by livestock operators has greatly improved the working conditions, just as the use of this tool contributes to a better management of the exploitation as long as it allows limit travel but also save time. These results show that we are witnessing a growth in the use of mobile telephony technologies that impact is as much in terms of sustainable development. Allowing access to information, especially technical information, the mobile phone, and Information and Communication of Technology (ICT) in general, give livestock sector players not only security, by limiting losses, but also an efficiency that allows them a better production and productivity.

Keywords: algeria, breeder-veterinarian, digital heritage, networking

Procedia PDF Downloads 102
13354 Numerical Analysis of Core-Annular Blood Flow in Microvessels at Low Reynolds Numbers

Authors: L. Achab, F. Iachachene

Abstract:

In microvessels, red blood cells (RBCs) exhibit a tendency to migrate towards the vessel center, establishing a core-annular flow pattern. The core region, marked by a high concentration of RBCs, is governed by significantly non-Newtonian viscosity. Conversely, the annular layer, composed of cell-free plasma, is characterized by Newtonian low viscosity. This property enables the plasma layer to act as a lubricant for the vessel walls, efficiently reducing resistance to the movement of blood cells. In this study, we investigate the factors influencing blood flow in microvessels and the thickness of the annular plasma layer using a non-miscible fluids approach in a 2D axisymmetric geometry. The governing equations of an incompressible unsteady flow are solved numerically through the Volume of Fluid (VOF) method to track the interface between the two immiscible fluids. To model blood viscosity in the core region, we adopt the Quemada constitutive law which is accurately captures the shear-thinning blood rheology over a wide range of shear rates. Our results are then compared to an established theoretical approach under identical flow conditions, particularly concerning the radial velocity profile and the thickness of the annular plasma layer. The simulation findings for low Reynolds numbers, demonstrate a notable agreement with the theoretical solution, emphasizing the pivotal role of blood’s rheological properties in the core region in determining the thickness of the annular plasma layer.

Keywords: core-annular flows, microvessels, Quemada model, plasma layer thickness, volume of fluid method

Procedia PDF Downloads 38
13353 Magnetohydrodynamics (MHD) Boundary Layer Flow Past A Stretching Plate with Heat Transfer and Viscous Dissipation

Authors: Jiya Mohammed, Tsadu Shuaib, Yusuf Abdulhakeem

Abstract:

The research work focuses on the cases of MHD boundary layer flow past a stretching plate with heat transfer and viscous dissipation. The non-linear of momentum and energy equation are transform into ordinary differential equation by using similarity transformation, the resulting equation are solved using Adomian Decomposition Method (ADM). An attempt has been made to show the potentials and wide range application of the Adomian decomposition method in the comparison with the previous one in solving heat transfer problems. The Pade approximates value (η= 11[11, 11]) is use on the difficulty at infinity. The results are compared by numerical technique method. A vivid conclusion can be drawn from the results that ADM provides highly precise numerical solution for non-linear differential equations. The result where accurate especially for η ≤ 4, a general equating terms of Eckert number (Ec), Prandtl number (Pr) and magnetic parameter ( ) is derived which was used to investigate velocity and temperature profiles in boundary layer.

Keywords: MHD, Adomian decomposition, boundary layer, viscous dissipation

Procedia PDF Downloads 531
13352 Enhancing Goal Achievement through Improved Communication Skills

Authors: Lin Xie, Yang Wang

Abstract:

An extensive body of research studies suggest that students, teachers, and supervisors can enhance the likelihood of reaching their goals by improving their communication skills. It is highly important to learn how and when to provide different kinds of feedback, e.g. anticipatory, corrective and positive) will gain better result and higher morale. The purpose of this mixed methods research is twofold: 1) To find out what factors affect effective communication among different stakeholders and how these factors affect student learning2) What are the good practices for improving communication among different stakeholders and improve student achievement. This presentation first begins with an introduction to the recent research on Marshall’s Nonviolent Communication Techniques (NVC), including four important components: observations, feelings, needs, requests. These techniques can be effectively applied at all levels of communication. To develop an in-depth understanding of the relationship among different techniques within, this research collected, compared, and combined qualitative and quantitative data to better improve communication and support student learning.

Keywords: education, communication, psychology, student learning, language teaching

Procedia PDF Downloads 36
13351 Military Role of Russia beyond Its National Boundary

Authors: Nipuli Gajanayake

Abstract:

The Russian military role beyond its national frontier has become a debatable hot topic in the international political arena. It’s advanced, and strategic responses in combating regional and international security problems have always been a factor to debate and criticize. Under such critical circumstances, Russia is attentive to play its military role according to the provisions of the Military Doctrine of the Russian Federation. Most importantly, the legal basis of the doctrine has also consisted with the generally recognized principles and norms of international law. Therefore, Russian international military assistances are pledged to accomplish international peace and security. The expansion of Russian military participation in the United Nations Peacekeeping operations, and military- political, and technical cooperation have largely evident the great effort of Russia in maintaining and restoring international peace and security. Moreover, the conflict management diplomacy and the development of dialogue with nation states to confront military risks and threats can also identify as a part of preserving international peace and security. In addition, Russia strives to strengthen the system of collective security with regional and international organizations through the legal framework of the Collective Security Treaty Organization (CSTO). Maintaining cooperative ties with the Commonwealth of Independent States (CIS), the Organization for Security and Cooperation in Europe (OSCE) and the Shanghai Cooperation Organization (SCO) have highlighted the Russian deliberation on maintaining regional peace and security. Nevertheless, the extension of cordial relations with nation states and providing of military assistances during tensions and conflicts on their territories can also underscore as Russians commitments on maintaining international peace and security. Observing and recognizing the disparity between the West portrayed terms like ‘illegal Russian interventions’ and the comprehensive reality behind the ‘Russian military assistances’ are important to understand. However, a lopsided vision or a perspective towards the Russian international military role would not present a clear understanding about its valued and also dedicated hard work on maintaining international peace and security.

Keywords: collective security, diplomacy, international military role of Russia, international peace and security

Procedia PDF Downloads 283
13350 On Dynamic Chaotic S-BOX Based Advanced Encryption Standard Algorithm for Image Encryption

Authors: Ajish Sreedharan

Abstract:

Security in transmission and storage of digital images has its importance in today’s image communications and confidential video conferencing. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. Advanced Encryption Standard (AES) is a well known block cipher that has several advantages in data encryption. However, it is not suitable for real-time applications. This paper presents modifications to the Advanced Encryption Standard to reflect a high level security and better image encryption. The modifications are done by adjusting the ShiftRow Transformation and using On Dynamic chaotic S-BOX. In AES the Substitute bytes, Shift row and Mix columns by themselves would provide no security because they do not use the key. In Dynamic chaotic S-BOX Based AES the Substitute bytes provide security because the S-Box is constructed from the key. Experimental results verify and prove that the proposed modification to image cryptosystem is highly secure from the cryptographic viewpoint. The results also prove that with a comparison to original AES encryption algorithm the modified algorithm gives better encryption results in terms of security against statistical attacks.

Keywords: advanced encryption standard (AES), on dynamic chaotic S-BOX, image encryption, security analysis, ShiftRow transformation

Procedia PDF Downloads 417
13349 Investigating the Impact of the Laundry and Sterilization Process on the Performance of Reusable Surgical Gowns

Authors: N. Khomarloo, F. Mousazadegan, M. Latifi, N. Hemmatinejad

Abstract:

Recently, the utilization of reusable surgical gowns in order to decrease costs, environmental protection and enhance surgeon’s comfort is considered. One of the concerns in applying this kind of medical protective clothing is reduction of their resistance to bacterial penetration especially in wet state, after repeated laundering and sterilizing process. The purpose of this study is to investigate the effect of the laundering and sterilizing process on the reusable surgical gown’s resistance against bacterial wet penetration. To this end, penetration of Staphylococcus aureus bacteria in wet state after 70 washing and sterilizing cycles was evaluated on the two single-layer and three-layer reusable gowns. The outcomes reveal that up to 20 laundering and sterilizing cycles, protective property of samples improves due to fabric shrinkage, after that because of the fabric’s construction opening, the bacterial penetration increase. However, the three-layer gown presents higher protective performance comparing to the single-layer one.

Keywords: laundry, porosity, reusable surgical gown, sterilization, wet bacterial penetration

Procedia PDF Downloads 259
13348 Analysis of BSF Layer N-Gaas/P-Gaas/P+-Gaas Solar Cell

Authors: Abderrahmane Hemmani, Hamid Khachab, Dennai Benmoussa, Hassane Benslimane, Abderrachid Helmaoui

Abstract:

Back surface field GaAs with n -p-p+ structures are found to have better characteristics than the conventional solar cells. A theory, based on the transport of both minority carriers under the charge neutrality condition, has been developed in the present paper which explains behavior of the back surface field solar cells. That is reported with an efficiency of 25,05% (Jsc=33.5mA/cm2, Vco=0.87v and fill factor 86% under AM1.5 global conditions). We present the effect of technological parameters of the p+ layer on the conversion efficiency on the solar cell. Good agreement is achieved between our results and the simulation results given the variation of the equivalent recombination velocity to p+ layer as a function of BSF thickness and BSF doping.

Keywords: back surface field, GaAs, solar cell, technological parameters

Procedia PDF Downloads 418
13347 A System Functions Set-Up through Near Field Communication of a Smartphone

Authors: Jaemyoung Lee

Abstract:

We present a method to set up system functions through a near filed communication (NFC) of a smartphone. The short communication distance of the NFC which is usually less than 4 cm could prevent any interferences from other devices and establish a secure communication channel between a system and the smartphone. The proposed set-up method for system function values is demonstrated for a blacbox system in a car. In demonstration, system functions of a blackbox which is manipulated through NFC of a smartphone are controls of image quality, sound level, shock sensing level to store images, etc. The proposed set-up method for system function values can be used for any devices with NFC.

Keywords: system set-up, near field communication, smartphone, android

Procedia PDF Downloads 322
13346 Increasing the Resilience of Cyber Physical Systems in Smart Grid Environments using Dynamic Cells

Authors: Andrea Tundis, Carlos García Cordero, Rolf Egert, Alfredo Garro, Max Mühlhäuser

Abstract:

Resilience is an important system property that relies on the ability of a system to automatically recover from a degraded state so as to continue providing its services. Resilient systems have the means of detecting faults and failures with the added capability of automatically restoring their normal operations. Mastering resilience in the domain of Cyber-Physical Systems is challenging due to the interdependence of hybrid hardware and software components, along with physical limitations, laws, regulations and standards, among others. In order to overcome these challenges, this paper presents a modeling approach, based on the concept of Dynamic Cells, tailored to the management of Smart Grids. Additionally, a heuristic algorithm that works on top of the proposed modeling approach, to find resilient configurations, has been defined and implemented. More specifically, the model supports a flexible representation of Smart Grids and the algorithm is able to manage, at different abstraction levels, the resource consumption of individual grid elements on the presence of failures and faults. Finally, the proposal is evaluated in a test scenario where the effectiveness of such approach, when dealing with complex scenarios where adequate solutions are difficult to find, is shown.

Keywords: cyber-physical systems, energy management, optimization, smart grids, self-healing, resilience, security

Procedia PDF Downloads 313