Search results for: physical layer wireless security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11087

Search results for: physical layer wireless security

10457 High-Speed Particle Image Velocimetry of the Flow around a Moving Train Model with Boundary Layer Control Elements

Authors: Alexander Buhr, Klaus Ehrenfried

Abstract:

Trackside induced airflow velocities, also known as slipstream velocities, are an important criterion for the design of high-speed trains. The maximum permitted values are given by the Technical Specifications for Interoperability (TSI) and have to be checked in the approval process. For train manufactures it is of great interest to know in advance, how new train geometries would perform in TSI tests. The Reynolds number in moving model experiments is lower compared to full-scale. Especially the limited model length leads to a thinner boundary layer at the rear end. The hypothesis is that the boundary layer rolls up to characteristic flow structures in the train wake, in which the maximum flow velocities can be observed. The idea is to enlarge the boundary layer using roughness elements at the train model head so that the ratio between the boundary layer thickness and the car width at the rear end is comparable to a full-scale train. This may lead to similar flow structures in the wake and better prediction accuracy for TSI tests. In this case, the design of the roughness elements is limited by the moving model rig. Small rectangular roughness shapes are used to get a sufficient effect on the boundary layer, while the elements are robust enough to withstand the high accelerating and decelerating forces during the test runs. For this investigation, High-Speed Particle Image Velocimetry (HS-PIV) measurements on an ICE3 train model have been realized in the moving model rig of the DLR in Göttingen, the so called tunnel simulation facility Göttingen (TSG). The flow velocities within the boundary layer are analysed in a plain parallel to the ground. The height of the plane corresponds to a test position in the EN standard (TSI). Three different shapes of roughness elements are tested. The boundary layer thickness and displacement thickness as well as the momentum thickness and the form factor are calculated along the train model. Conditional sampling is used to analyse the size and dynamics of the flow structures at the time of maximum velocity in the train wake behind the train. As expected, larger roughness elements increase the boundary layer thickness and lead to larger flow velocities in the boundary layer and in the wake flow structures. The boundary layer thickness, displacement thickness and momentum thickness are increased by using larger roughness especially when applied in the height close to the measuring plane. The roughness elements also cause high fluctuations in the form factors of the boundary layer. Behind the roughness elements, the form factors rapidly are approaching toward constant values. This indicates that the boundary layer, while growing slowly along the second half of the train model, has reached a state of equilibrium.

Keywords: boundary layer, high-speed PIV, ICE3, moving train model, roughness elements

Procedia PDF Downloads 285
10456 Approach to Study the Workability of Concrete with the Fractal Model

Authors: Achouri Fatima, Chouicha Kaddour

Abstract:

The main parameters affecting the workability are the water content, particle size, and the total surface of the grains, as long as the mixing water begins by wetting the surface of the grains and then fills the voids between the grains to form entrapped water, the quantity of water remaining is called free water. The aim is to undertake a fractal approach through the relationship between the concrete formulation parameters and workability, to develop this approach a series of concrete taken from the literature was investigated by varying formulation parameters such as G / S, the quantity of cement C and the quantity of mixing water E. We also call on other model as the model for the thickness of the water layer and model of the thickness of the paste layer to judge their relevance, hence the following results : the relevance of the model of the thickness of the water layer is considered relevant when there is a variation in the water quantity, the model of the thickness of the layer of the paste is only applicable if we consider that the paste is made with the grain value Dmax = 2.85: value from which we see a stable model.

Keywords: concrete, fractal method, paste thickness, water thickness, workability

Procedia PDF Downloads 355
10455 Hysteresis Effect in Organometallic Perovskite Solar Cells with Mesoscopic NiO as a Hole Transport Layer

Authors: D. C. Asebiah, D. Saranin, S. Karazhanov, A. R. Tameev, M. Kah

Abstract:

In this paper, the mesoscopic NiO was used as a hole transport layer in the inverted planar organometallic hybrid perovskite solar cell to study the effect of hysteresis. The devices we fabricated have the structures Fluorine Tin Oxide (FTO)/mesoscopic NiO/perovskite/[6,6]-phenyl C₆₁-butyric acid methyl ester (PC₆₁BM) photovoltaic device. The perovskite solar cell was done by toluene air (TLA) method and horn sonication for the dispersion of the NiO nanoparticles in deionized water. The power conversion efficiency was 12.07% under 1.5 AM illumination. We report hysteresis in the in current-voltage dependence of the solar cells with mesoscopic NiO as a hole transport layer.

Keywords: perovskite, mesoscopic, hysteresis, toluene air

Procedia PDF Downloads 150
10454 Numerical Simulations of Acoustic Imaging in Hydrodynamic Tunnel with Model Adaptation and Boundary Layer Noise Reduction

Authors: Sylvain Amailland, Jean-Hugh Thomas, Charles Pézerat, Romuald Boucheron, Jean-Claude Pascal

Abstract:

The noise requirements for naval and research vessels have seen an increasing demand for quieter ships in order to fulfil current regulations and to reduce the effects on marine life. Hence, new methods dedicated to the characterization of propeller noise, which is the main source of noise in the far-field, are needed. The study of cavitating propellers in closed-section is interesting for analyzing hydrodynamic performance but could involve significant difficulties for hydroacoustic study, especially due to reverberation and boundary layer noise in the tunnel. The aim of this paper is to present a numerical methodology for the identification of hydroacoustic sources on marine propellers using hydrophone arrays in a large hydrodynamic tunnel. The main difficulties are linked to the reverberation of the tunnel and the boundary layer noise that strongly reduce the signal-to-noise ratio. In this paper it is proposed to estimate the reflection coefficients using an inverse method and some reference transfer functions measured in the tunnel. This approach allows to reduce the uncertainties of the propagation model used in the inverse problem. In order to reduce the boundary layer noise, a cleaning algorithm taking advantage of the low rank and sparse structure of the cross-spectrum matrices of the acoustic and the boundary layer noise is presented. This approach allows to recover the acoustic signal even well under the boundary layer noise. The improvement brought by this method is visible on acoustic maps resulting from beamforming and DAMAS algorithms.

Keywords: acoustic imaging, boundary layer noise denoising, inverse problems, model adaptation

Procedia PDF Downloads 309
10453 Improving the Security of Internet of Things Using Encryption Algorithms

Authors: Amirhossein Safi

Abstract:

Internet of things (IOT) is a kind of advanced information technology which has drawn societies’ attention. Sensors and stimulators are usually recognized as smart devices of our environment. Simultaneously, IOT security brings up new issues. Internet connection and possibility of interaction with smart devices cause those devices to involve more in human life. Therefore, safety is a fundamental requirement in designing IOT. IOT has three remarkable features: overall perception, reliable transmission, and intelligent processing. Because of IOT span, security of conveying data is an essential factor for system security. Hybrid encryption technique is a new model that can be used in IOT. This type of encryption generates strong security and low computation. In this paper, we have proposed a hybrid encryption algorithm which has been conducted in order to reduce safety risks and enhancing encryption's speed and less computational complexity. The purpose of this hybrid algorithm is information integrity, confidentiality, non-repudiation in data exchange for IOT. Eventually, the suggested encryption algorithm has been simulated by MATLAB software, and its speed and safety efficiency were evaluated in comparison with conventional encryption algorithm.

Keywords: internet of things, security, hybrid algorithm, privacy

Procedia PDF Downloads 438
10452 The High Temperature Damage of DV–2 Turbine Blade Made from Ni–Base Superalloy

Authors: Juraj Belan, Lenka Hurtalová, Eva Tillová, Alan Vaško, Milan Uhríčik

Abstract:

High-pressure turbine (HPT) blades of DV–2 jet engines are made from Ni–base superalloy, a former Soviet Union production, specified as ŽS6K. For improving its high-temperature resistance are blades covered with Al–Si diffusion layer. A regular operation temperature of HPT blades vary from 705°C to 750°C depending on jet engine regime. An over-crossing working temperature range causes degradation of protective alitize layer as well as base material–gamma matrix and gamma prime particles what decreases turbine blade lifetime. High-temperature degradation has mainly diffusion mechanism and causes coarsening of strengthening phase gamma prime and protective alitize layer thickness growing. All changes have a significant influence on high-temperature properties of base material.

Keywords: alitize layer, gamma prime phase, high-temperature degradation, Ni–base superalloy ŽS6K, turbine blade

Procedia PDF Downloads 509
10451 Deep Groundwater Potential and Chemical Analysis Based on Well Logging Analysis at Kapuk-Cengkareng, West Jakarta, DKI Jakarta, Indonesia

Authors: Josua Sihotang

Abstract:

Jakarta Capital Special Region is the province that densely populated with rapidly growing infrastructure but less attention for the environmental condition. This makes some social problem happened like lack of clean water supply. Shallow groundwater and river water condition that has contaminated make the layer of deep water carrier (aquifer) should be done. This research aims to provide the people insight about deep groundwater potential and to determine the depth, location, and quality where the aquifer can be found in Jakarta’s area, particularly Kapuk-Cengkareng’s people. This research was conducted by geophysical method namely Well Logging Analysis. Well Logging is the geophysical method to know the subsurface lithology with the physical characteristic. The observation in this research area was conducted with several well devices that is Spontaneous Potential Log (SP Log), Resistivity Log, and Gamma Ray Log (GR Log). The first devices well is SP log which is work by comprising the electrical potential difference between the electrodes on the surface with the electrodes that is contained in the borehole and rock formations. The second is Resistivity Log, used to determine both the hydrocarbon and water zone based on their porosity and permeability properties. The last is GR Log, work by identifying radioactivity levels of rocks which is containing elements of thorium, uranium, or potassium. The observation result is curve-shaped which describes the type of lithological coating in subsurface. The result from the research can be interpreted that there are four of the deep groundwater layer zone with different quality. The good groundwater layer can be found in layers with good porosity and permeability. By analyzing the curves, it can be known that most of the layers which were found in this wellbore are clay stone with low resistivity and high gamma radiation. The resistivity value of the clay stone layers is about 2-4 ohm-meter with 65-80 Cps gamma radiation. There are several layers with high resistivity value and low gamma radiation (sand stone) that can be potential for being an aquifer. This is reinforced by the sand layer with a right-leaning SP log curve proving that this layer is permeable. These layers have 4-9 ohm-meter resistivity value with 40-65 Cps gamma radiation. These are mostly found as fresh water aquifer.

Keywords: aquifer, deep groundwater potential, well devices, well logging analysis

Procedia PDF Downloads 226
10450 Post-Covid 19 Pandemic Economy: Corporate Governance and Performance of Private Security Firms in Kenya

Authors: Sewe Silvanus Odhiambo

Abstract:

Globally, many governments have publicly recognized private security firms as essential services providers. The private security firms face a lot of challenges, but the COVID-19 situation also has exacerbated them to another level. This paper locates its relevance in the post-coronavirus era. The COVID-19 pandemic has redefined the world operation, which shows a higher impact on the security field. Accordingly, the purpose of the study was to examine the role of corporate governance on the performance of private security firms in a post-covid pandemic era in Kenya. The study employed a descriptive research design, which included a quantitative approach and secondary data. The study was carried in the month of July 2021 from the registered private security firms. After targeting all private security firms, only 54 firms had disclosed their annual report by the time of conducting the study. The results depicted that pandemic has affected the performance of private security firms measures unfavorably. Further, boards of directors show a positive association with security firm performance. The study recommends that there is need board of directors to enhance management’s risk assessments in the midst of COVID-19; ensure that there are business continuity plans; there is organizational resilience; there is need for the development of new digital strategies; enabling the digital workforce in the firms and have effective communication plans with both internal and external stakeholders to deal with uncertainties and develop more post-COVID practices for boards of directors to improve performance of private security firms in Kenya. The practical implications of the study are that the research outcomes might assist regulatory bodies, investors, policymakers, and the security sector in general in their formulation of public and corporate governance strategies concerning future emergency preparedness and responses. This study also provides a unique contribution to the literature of COVID-19 and security firm performance in emerging economies context.

Keywords: COVID-19, corporate governance, firm performance, private security firms

Procedia PDF Downloads 137
10449 Study and Simulation of the Thrust Vectoring in Supersonic Nozzles

Authors: Kbab H, Hamitouche T

Abstract:

In recent years, significant progress has been accomplished in the field of aerospace propulsion and propulsion systems. These developments are associated with efforts to enhance the accuracy of the analysis of aerothermodynamic phenomena in the engine. This applies in particular to the flow in the nozzles used. One of the most remarkable processes in this field is thrust vectoring by means of devices able to orientate the thrust vector and control the deflection of the exit jet in the engine nozzle. In the study proposed, we are interested in the fluid thrust vectoring using a second injection in the nozzle divergence. This fluid injection causes complex phenomena, such as boundary layer separation, which generates a shock wave in the primary jet upstream of the fluid interacting zone (primary jet - secondary jet). This will cause the deviation of the main flow, and therefore of the thrust vector with reference to the axis nozzle. In the modeling of the fluidic thrust vector, various parameters can be used. The Mach number of the primary jet and the injected fluid, the total pressures ratio, the injection rate, the thickness of the upstream boundary layer, the injector position in the divergent part, and the nozzle geometry are decisive factors in this type of phenomenon. The complexity of the latter challenges researchers to understand the physical phenomena of the turbulent boundary layer encountered in supersonic nozzles, as well as the calculation of its thickness and the friction forces induced on the walls. The present study aims to numerically simulate the thrust vectoring by secondary injection using the ANSYS-FLUENT, then to analyze and validate the results and the performances obtained (angle of deflection, efficiency...), which will then be compared with those obtained by other authors.

Keywords: CD Nozzle, TVC, SVC, NPR, CFD, NPR, SPR

Procedia PDF Downloads 117
10448 Energy-Efficient Contact Selection Method for CARD in Wireless Ad-Hoc Networks

Authors: Mehdi Assefi, Keihan Hataminezhad

Abstract:

One of the efficient architectures for exploring the resources in wireless ad-hoc networks is contact-based architecture. In this architecture, each node assigns a unique zone for itself and each node keeps all information from inside the zone, as well as some from outside the zone, which is called contact. Reducing the overlap between different zones of a node and its contacts increases its performance, therefore Edge Method (EM) is designed for this purpose. Contacts selected by EM do not have any overlap with their sources, but for choosing the contact a vast amount of information must be transmitted. In this article, we will offer a new protocol for contact selection, which is called PEM. The objective would be reducing the volume of transmitted information, using Non-Uniform Dissemination Probabilistic Protocols. Consumed energy for contact selection is a function of the size of transmitted information between nodes. Therefore, by reducing the content of contact selection message using the PEM will decrease the consumed energy. For evaluation of the PEM we applied the simulation method. Results indicated that PEM consumes less energy compared to EM, and by increasing the number of nodes (level of nodes), performance of PEM will improve in comparison with EM.

Keywords: wireless ad-hoc networks, contact selection, method for CARD, energy-efficient

Procedia PDF Downloads 268
10447 The Investigation of Correlation between Body Composition and Physical Activity in University Students

Authors: Ferruh Taspinar, Gulce K. Seyyar, Gamze Kurt, Eda O. Okur, Emrah Afsar, Ismail Saracoglu, Betul Taspinar

Abstract:

Alterations of physical activity can effect body composition (especially body fat ratio); however body mass index may not sufficient to indicate these minimal differences. The aim of this study was to evaluate the relationship between body composition and physical activity in university students. In this study, 132 university students (mean age; 21.21±1.51) were included. Tanita BC-418 and International Physical Activity Questionnaire (IPAQ) were used to evaluate participants. The correlation between the parameters was analysed via Spearman correlation analysis. Significance level in statistical analyses was accepted is 0.05. The results showed that there was no correlation between body mass index and physical activity (p>0.05). There was a positive correlation between body muscle ratio and physical activity, whereas a negative correlation between body fat ratio and physical activity (p<0.05). This study showed that body fat and muscle ratio affects the level of physical activity in healthy university students. Therefore, we thought that physical activity might reduce effects of the diseases caused by disturbed body composition. Further studies are required to support this idea.

Keywords: body composition, body mass index, physical activity, university student

Procedia PDF Downloads 337
10446 Enhancing Cybersecurity Protective Behaviour: Role of Information Security Competencies and Procedural Information Security Countermeasure Awareness

Authors: Norshima Humaidi, Saif Hussein Abdallah Alghazo

Abstract:

Cybersecurity threat have become a serious issue recently, and one of the cause is because human error, which is usually constituted by carelessness, ignorance, and failure to practice cybersecurity behaviour adequately. Using a data from a quantitative survey, Partial Least Squares-Structural Equation Modelling (PLS-SEM) analysis was used to determine the factors that affect cybersecurity protective behaviour (CPB). This study adapts cybersecurity protective behaviour model by focusing on two constructs that can enhance CPB: manager’s information security competencies (MISI) and procedural information security countermeasure (PCM) awareness. Theory of leadership competencies were adapted to measure user’s perception towards competencies among security managers/leader in the organization. Confirmatory factor analysis (CFA) testing shows that all the measurement items of each constructs were adequate in their validity individually based on their factor loading value. Moreover, each constructs are valid based on their parameter estimates and statistical significance. The quantitative research findings show that PCM awareness strongly influences CPB compared to MISI. Meanwhile, MISI was significantlyPCM awarenss. This study believes that the research findings can contribute to human behaviour in IS studies and are particularly beneficial to policy makers in improving organizations’ strategic plans in information security, especially in this new era. Most organizations spend time and resources to provide and establish strategic plans of information security; however, if employees are not willing to comply and practice information security behaviour appropriately, then these efforts are in vain.

Keywords: cybersecurity, protection behaviour, information security, information security competencies, countermeasure awareness

Procedia PDF Downloads 77
10445 Best Practices to Enhance Patient Security and Confidentiality When Using E-Health in South Africa

Authors: Lethola Tshikose, Munyaradzi Katurura

Abstract:

Information and Communication Technology (ICT) plays a critical role in improving daily healthcare processes. The South African healthcare organizations have adopted Information Systems to integrate their patient records. This has made it much easier for healthcare organizations because patient information can now be accessible at any time. The primary purpose of this research study was to investigate the best practices that can be applied to enhance patient security and confidentiality when using e-health systems in South Africa. Security and confidentiality are critical in healthcare organizations as they ensure safety in EHRs. The research study used an inductive research approach that included a thorough literature review; therefore, no data was collected. The research paper’s scope included patient data and possible security threats associated with healthcare systems. According to the study, South African healthcare organizations discovered various patient data security and confidentiality issues. The study also revealed that when it comes to handling patient data, health professionals sometimes make mistakes. Some may not be computer literate, which posed issues and caused data to be tempered with. The research paper recommends that healthcare organizations ensure that security measures are adequately supported and promoted by their IT department. This will ensure that adequate resources are distributed to keep patient data secure and confidential. Healthcare organizations must correctly use standards set up by IT specialists to solve patient data security and confidentiality issues. Healthcare organizations must make sure that their organizational structures are adaptable to improve security and confidentiality.

Keywords: E-health, EHR, security, confidentiality, healthcare

Procedia PDF Downloads 34
10444 Mobile Device Applications in Physical Education: Investigating New Pedagogical Possibilities

Authors: Danica Vidotto

Abstract:

Digital technology is continuing to disrupt and challenge local conventions of teaching and education. As mobile devices continue to make their way into contemporary classrooms, educators need new pedagogies incorporating information communication technology to help reform the learning environment. In physical education, however, this can seem controversial as physical inactivity is often related to an excess of screen-time. This qualitative research project is an investigation on how physical educators use mobile device applications (apps) in their pedagogy and to what end. A comprehensive literature review is included to examine and engage current academic research of new pedagogies and technology, and their relevance to physical activity. Data were collected through five semi-structured interviews resulting in three overarching themes; i) changing pedagogies in physical education; ii) the perceived benefits and experienced challenges of using apps; and iii) apps, physical activity, and physical education. This study concludes with a discussion of the findings engaging the literature, discussing the implications of findings, and recommendations for future research.

Keywords: applications (apps), mobile devices, new pedagogies, physical education

Procedia PDF Downloads 180
10443 AC Electro-Kinetics, Bipolar Current and Concentration-Polarization in a Microchannel-Nafion Membrane System

Authors: Sinwook Park, Gilad Yossifon

Abstract:

The presence of a floating electrode array located within the depletion layer formed due to concentration-polarization (CP) across a microchannel-membrane device, produces not only induced-charge electro-osmosis (ICEO) vortex and but also a bipolar current resulting from faradaic reactions. It has been shown that there exists an optimal SiO2 layer thickness of ~50nm which is sufficient to suppress bipolar currents (at least up to 5V applied voltage) but still enables ICEO vortices that stir the depletion layer, thereby affecting its I-V response. This effect is pronounced beyond the limiting current where the existence of the depletion layer results in increased local electric field due to decreased solution conductivity. This comprehensive study of the interaction of embedded electrodes with the induced CP in microchannel-perm selective medium systems, allows one to choose the thickness of the thin dielectric coating to either enhance the mixing as a means to control the diffuse layer, or suppress it, for example, in the case where electrodes are intended for local measurements of the solution conductivity with minimal invasion. In addition, the use of alternating-current electro-osmosis by activating electrodes results in further enhancement of the fluid stirring and opens new routes for on-demand spatiotemporal control of the CP length. In addition, the use of embedded heaters within the depletion layer generates electro-thermal vortices that in turn also control the CP length.

Keywords: AC electrokinetics, microchannel, concentration-polarization, bipolar current

Procedia PDF Downloads 481
10442 Physical Fitness Activities for Elementary School Pupils of Matacon Elementary School

Authors: Ariel B. Domagsang

Abstract:

This study dealt with the physical fitness activities for elementary school pupils of Matacon Elementary School, Polangui South District, Albay Division are presented in this chapter. Specifically, it looked into the pre-post test performance based on the Physical Fitness Test which were subjected to statistical significant test of difference including health- and skill-related improvement. Finally, it came up with physical fitness activities to improve the physical fitness performance of the pupils. The descriptive method through survey using questionnaire-checklist, unstructured interview and document(ary) analysis were utilized in this research. There were 171 grades five and six pupil participants in this undertaking.

Keywords: Matakon, fitness acitivities, elementary schools, physical fitness of pupils

Procedia PDF Downloads 513
10441 Physical Activity, Exercise and Physical Fitness in Different Generation

Authors: Carl J. Caspersen, Kenneth E. Powell, Gregory M. Christenson, Kirupa V. Patel

Abstract:

‘Physical activity’, ‘exercise’, and ‘physical fitness’ are terms that describe different concepts. However, they are often confused with one another, and the terms are sometimes used interchangeably. This paper proposes definitions to distinguish them. Physical activity is defined as any bodily movement produced by skeletal muscles that result in energy expenditure. The energy expenditure can be measured in kilocalories. Physical activity in daily life can be categorized into occupational, sports, Conditioning, household, or other activities. Exercise is a subset of physical activity that is planned, structured, and repetitive and has as a final or an intermediate objective the improvement or maintenance of physical fitness. Physical fitness is a set of attributes that are either health- or skill-related. The degree to which people have these attributes can be measured with specific tests. These definitions are offered as an interpretational framework for comparing studies that relate physical activity, exercise, and physical fitness to health. Physical activity is defined as any bodily movement produced by skeletal muscles that require energy expenditure. Physical inactivity has been identified as the fourth leading risk factor for global mortality causing an estimated 3.2 million deaths globally. Regular moderate intensity physical activity – such as walking, cycling, or participating in sports – has significant benefits for health. For instance, it can reduce the risk of cardiovascular diseases, diabetes, colon and breast cancer, and depression. Moreover, adequate levels of physical activity will decrease the risk of a hip or vertebral fracture and help control weight. Any bodily movement produced by the contraction of skeletal muscle that increases energy expenditure above a basal level. In these guidelines, physical activity generally refers to the subset of physical activity that enhances health.

Keywords: physical activity, exercise, physical fitness, sports

Procedia PDF Downloads 333
10440 A Discussion on Electrically Small Antenna Property

Authors: Riki H. Patel, Arpan Desia, Trushit Upadhayay

Abstract:

The demand of compact antenna is ever increasing since the inception of wireless communication devices. In the age of wireless communication, requirement of miniaturized antennas is quite high. It is quite often that antenna dimensions are decided based on application based requirement compared to practical antenna constraints. The tradeoff in efficiency and other antenna parameters against to antenna size is always a debatable issue. The article presents detailed review of fundamentals of electrically small antennas and its potential applications. In addition, constraints and challenges of electrically small antennas are also presented in the article.

Keywords: bandwidth, communication, electrically small antenna, communication engineering

Procedia PDF Downloads 504
10439 The Nexus between Migration and Human Security: The Case of Ethiopian Female Migration to Sudan

Authors: Anwar Hassen Tsega

Abstract:

International labor migration is an integral part of the modern globalized world. However, the phenomenon has its roots in some earlier periods in human history. This paper discusses the relatively new phenomenon of female migration in Africa. In the past, African women migrants were only spouses or dependent family members. But as modernity swept most African societies, with rising unemployment rates, there is evidence everywhere in Africa that women labor migration is a growing phenomenon that deserves to be understood in the context of human security research. This work explores these issues further, focusing on the experience of Ethiopian women labor migrants to Sudan. The migration of Ethiopian people to Sudan is historical; nevertheless, labor migration mainly started since the discovery and subsequent exploration of oil in the Sudan. While the paper is concerned with the human security aspect of the migrant workers, we need to be certain that the migration process will provide with a decent wage, good working conditions, the necessary social security coverage, and labor protection as a whole. However, migration to Sudan is not always safe and female migrants become subject to violence at the hands of brokers, employers and migration officials. For this matter, the paper argued that identifying the vulnerable stages and major problem facing female migrant workers at various stages of migration is a prerequisite to combat the problem and secure the lives of the migrant workers. The major problems female migrants face include extra degrees of gender-based violence, underpayment, various forms of abuse like verbal, physical and sexual and other forms of torture which include beating and slaps. This peculiar situation could be attributed to the fact that most of these women are irregular migrants and fall under the category of unskilled and/or illiterate migrants.

Keywords: Ethiopia, human security, labor migration, Sudan

Procedia PDF Downloads 226
10438 The Legal Personality of The Security Council

Authors: Helyeh Doutaghi

Abstract:

The United Nations Security Council (UNSC) is one of the six principal organs of the United Nations. Under the Charter of the United Nations (UN Charter), the UNSC’s primary responsibility is maintaining international peace and security, which it does through establishing and adopting a Security Council resolution. United Nations resolutions are formal expressions of the opinion or will of United Nations organs. However, there have been times when powerful politicians (or governments with great political power) had the first say in situations where the UNSC should have had jurisdiction based on the principle of rule of law, which is the notion that people are governed by the law rather than by officials. This paper will assess the effectiveness of the UNSC by analyzing its actions during the Iran-Iraq war for it has been found that one of the major reasons for the prolongation of the war was a result of the one-sided positions taken by the UNSC and many nations. The UNSC’s success in achieving its primary goal during the war will be discussed, including an examination of the duties and structure of the UNSC by reviewing the articles in the UN Charter; this will include examples of the UNSC’s role in other international disputes as well.

Keywords: UN Security Council, Iran, Iraq, charter, international law

Procedia PDF Downloads 436
10437 Cooperative Sensing for Wireless Sensor Networks

Authors: Julien Romieux, Fabio Verdicchio

Abstract:

Wireless Sensor Networks (WSNs), which sense environmental data with battery-powered nodes, require multi-hop communication. This power-demanding task adds an extra workload that is unfairly distributed across the network. As a result, nodes run out of battery at different times: this requires an impractical individual node maintenance scheme. Therefore we investigate a new Cooperative Sensing approach that extends the WSN operational life and allows a more practical network maintenance scheme (where all nodes deplete their batteries almost at the same time). We propose a novel cooperative algorithm that derives a piecewise representation of the sensed signal while controlling approximation accuracy. Simulations show that our algorithm increases WSN operational life and spreads communication workload evenly. Results convey a counterintuitive conclusion: distributing workload fairly amongst nodes may not decrease the network power consumption and yet extend the WSN operational life. This is achieved as our cooperative approach decreases the workload of the most burdened cluster in the network.

Keywords: cooperative signal processing, signal representation and approximation, power management, wireless sensor networks

Procedia PDF Downloads 368
10436 An Efficient Resource Management Algorithm for Mobility Management in Wireless Mesh Networks

Authors: Mallikarjuna Rao Yamarthy, Subramanyam Makam Venkata, Satya Prasad Kodati

Abstract:

The main objective of the proposed work is to reduce the overall network traffic incurred by mobility management, packet delivery cost and to increase the resource utilization. The proposed algorithm, An Efficient Resource Management Algorithm (ERMA) for mobility management in wireless mesh networks, relies on pointer based mobility management scheme. Whenever a mesh client moves from one mesh router to another, the pointer is set up dynamically between the previous mesh router and current mesh router based on the distance constraints. The algorithm evaluated for signaling cost, data delivery cost and total communication cost performance metrics. The proposed algorithm is demonstrated for both internet sessions and intranet sessions. The proposed algorithm yields significantly better performance in terms of signaling cost, data delivery cost, and total communication cost.

Keywords: data delivery cost, mobility management, pointer forwarding, resource management, wireless mesh networks

Procedia PDF Downloads 341
10435 Adult Education for Transformation and Security Challenges in Nigeria

Authors: Asmau Zarma Gogaram

Abstract:

The paper examines adult education and how it can be employed as a strategy for transformation and security challenges in Nigeria. It defines the meaning of adult education and its objectives.The issue of the necessity of employing adult education as a strategy for transformation and security challenges was also examined in the paper.In doing this it discussed the different types of adult education programmes, i.e.continuing education, literacy education, retirement and pre-retirement education and civic education. The paper concluded by stating that if the programmes stated are internalizes and applied they can help to raise awareness. Finally the paper proffered some recommendations one of which was that government should at all levels increase their efforts or promoting acquisition of adult education.

Keywords: adult education, transformation and security challenges, Nigeria, education and human development

Procedia PDF Downloads 494
10434 Analysis of Thermal Damping in Si Based Torsional Micromirrors

Authors: R. Resmi, M. R. Baiju

Abstract:

The thermal damping of a dynamic vibrating micromirror is an important factor affecting the design of MEMS based actuator systems. In the development process of new micromirror systems, assessing the extent of energy loss due to thermal damping accurately and predicting the performance of the system is very essential. In this paper, the depth of the thermal penetration layer at different eigenfrequencies and the temperature variation distributions surrounding a vibrating micromirror is analyzed. The thermal penetration depth corresponds to the thermal boundary layer in which energy is lost which is a measure of the thermal damping is found out. The energy is mainly dissipated in the thermal boundary layer and thickness of the layer is an important parameter. The detailed thermoacoustics is used to model the air domain surrounding the micromirror. The thickness of the boundary layer, temperature variations and thermal power dissipation are analyzed for a Si based torsional mode micromirror. It is found that thermal penetration depth decreases with eigenfrequency and hence operating the micromirror at higher frequencies is essential for reducing thermal damping. The temperature variations and thermal power dissipations at different eigenfrequencies are also analyzed. Both frequency-response and eigenfrequency analyses are done using COMSOL Multiphysics software.

Keywords: Eigen frequency analysis, micromirrors, thermal damping, thermoacoustic interactions

Procedia PDF Downloads 340
10433 Wait-Optimized Scheduler Algorithm for Efficient Process Scheduling in Computer Systems

Authors: Md Habibur Rahman, Jaeho Kim

Abstract:

Efficient process scheduling is a crucial factor in ensuring optimal system performance and resource utilization in computer systems. While various algorithms have been proposed over the years, there are still limitations to their effectiveness. This paper introduces a new Wait-Optimized Scheduler (WOS) algorithm that aims to minimize process waiting time by dividing them into two layers and considering both process time and waiting time. The WOS algorithm is non-preemptive and prioritizes processes with the shortest WOS. In the first layer, each process runs for a predetermined duration, and any unfinished process is subsequently moved to the second layer, resulting in a decrease in response time. Whenever the first layer is free or the number of processes in the second layer is twice that of the first layer, the algorithm sorts all the processes in the second layer based on their remaining time minus waiting time and sends one process to the first layer to run. This ensures that all processes eventually run, optimizing waiting time. To evaluate the performance of the WOS algorithm, we conducted experiments comparing its performance with traditional scheduling algorithms such as First-Come-First-Serve (FCFS) and Shortest-Job-First (SJF). The results showed that the WOS algorithm outperformed the traditional algorithms in reducing the waiting time of processes, particularly in scenarios with a large number of short tasks with long wait times. Our study highlights the effectiveness of the WOS algorithm in improving process scheduling efficiency in computer systems. By reducing process waiting time, the WOS algorithm can improve system performance and resource utilization. The findings of this study provide valuable insights for researchers and practitioners in developing and implementing efficient process scheduling algorithms.

Keywords: process scheduling, wait-optimized scheduler, response time, non-preemptive, waiting time, traditional scheduling algorithms, first-come-first-serve, shortest-job-first, system performance, resource utilization

Procedia PDF Downloads 72
10432 The Superhydrophobic Surface Effect on Laminar Boundary Layer Flows

Authors: Chia-Yung Chou, Che-Chuan Cheng, Chin Chi Hsu, Chun-Hui Wu

Abstract:

This study investigates the fluid of boundary layer flow as it flows through the superhydrophobic surface. The superhydrophobic surface will be assembled into an observation channel for fluid experiments. The fluid in the channel will be doped with visual flow field particles, which will then be pumped by the syringe pump and introduced into the experimentally observed channel through the pipeline. Through the polarized light irradiation, the movement of the particles in the channel is captured by a high-speed camera, and the velocity of the particles is analyzed by MATLAB to find out the particle velocity field changes caused on the fluid boundary layer. This study found that the superhydrophobic surface can effectively increase the velocity near the wall surface, and the faster with the flow rate increases. The superhydrophobic surface also had longer the slip length compared with the plan surface. In the calculation of the drag coefficient, the superhydrophobic surface produces a lower drag coefficient, and there is a more significant difference when the Re reduced in the flow field.

Keywords: hydrophobic, boundary layer, slip length, friction

Procedia PDF Downloads 123
10431 Passive Solar-Driven Membrane Distiller for Desalination: Effect of Middle Layer Material and Thickness on Desalination Performance

Authors: Glebert C. Dadol, Camila Flor Y. Lobarbio, Noel Peter B. Tan

Abstract:

Water scarcity is a global problem. One of the promising solutions to this challenge is the use of membrane-based desalination technologies. In this study, a passive solar-driven membrane (PSDM) distillation was employed to test its desalination performance. The PSDM was fabricated using a TiNOX sheet solar absorber, cellulose-based hydrophilic top and bottom layers, and a middle layer. The effects of the middle layer material and thickness on the desalination performance in terms of distillate flow rate, productivity, and salinity were investigated. An air-gap screen mesh (2 mm, 4 mm, 6 mm thickness) and a hydrophobic PTFE membrane (0.3 mm thickness) were used as middle-layer materials. Saltwater input (35 g/L NaCl) was used for the PSDM distiller on a rooftop setting at the University of San Carlos, Cebu City, Philippines. The highest distillate flow rate and productivity of 1.08 L/m²-h and 1.47 L/kWh, respectively, were achieved using a 2 mm air-gap middle layer, but it also resulted in a high salinity of 25.20 g/L. Increasing the air gap lowered the salinity but also decreased the flow rate and productivity. The lowest salinity of 1.07 g/L was achieved using 6 mm air gap, but the flow rate and productivity were reduced to 0.08 L/m²-h and 0.17 L/kWh, respectively. The use of a hydrophobic PTFE membrane, on the other hand, did not offer a significant improvement in its performance. A PDSM distiller with a thick air gap as the middle layer can deliver a distillate with low salinity and is preferred over a thin hydrophobic PTFE membrane. Various modifications and optimizations to the distiller can be done to improve its performance further.

Keywords: desalination, membrane distillation, passive solar-driven membrane distiller, solar distillation

Procedia PDF Downloads 104
10430 Enhancing Food Security through Cabbage Production by Local Fammers in Nkokobe Municipality

Authors: Sipumle Qapeshu, Bongiwe Mcata, Ajuruchukwu Obi

Abstract:

Subsistence farmers practice farming for survival while commercial farmers produce to feed themselves and larger society with the motive to achieve highest profit. These types of farmers are characterised by growing what they eat, live without making regular purchases in the markets. The main objective of subsistence/peasant farmers is to ensure food security at household level. Cabbage is a crop that has been identified to have vital food nutrient sources like Vitamin A, B and C, protein, calcium, iron and antioxidative compounds beneficial for preventing cancer. This paper, therefore, looks at the potential that cabbage production has in enhancing household food security and also the challenges encountered by these cabbage producers. Primary data was obtained from 50 respondents, and linear regression model was used to analyse the data used. Income was used as food security measure. The results showed that three variables were statistically significant and they are gender (10%), education (5%) and household size (5%). Meaning that these are variables that influenced cabbage production by these households, and it also affects their food security status since income is affected.

Keywords: subsistence farmers, food security, cabbage, farming

Procedia PDF Downloads 278
10429 Disaster Management Using Wireless Sensor Networks

Authors: Akila Murali, Prithika Manivel

Abstract:

Disasters are defined as a serious disruption of the functioning of a community or a society, which involves widespread human, material, economic or environmental impacts. The number of people suffering food crisis as a result of natural disasters has tripled in the last thirty years. The economic losses due to natural disasters have shown an increase with a factor of eight over the past four decades, caused by the increased vulnerability of the global society, and also due to an increase in the number of weather-related disasters. Efficient disaster detection and alerting systems could reduce the loss of life and properties. In the event of a disaster, another important issue is a good search and rescue system with high levels of precision, timeliness and safety for both the victims and the rescuers. Wireless Sensor Networks technology has the capability of quick capturing, processing, and transmission of critical data in real-time with high resolution. This paper studies the capacity of sensors and a Wireless Sensor Network to collect, collate and analyze valuable and worthwhile data, in an ordered manner to help with disaster management.

Keywords: alerting systems, disaster detection, Ad Hoc network, WSN technology

Procedia PDF Downloads 390
10428 Network User Rules in Universities

Authors: Michel Berthiaume, Daniel Chamberland-Tremblay, Elaine Paiva Mosconi, Jérôme Blanchet-Brisson

Abstract:

This presentation documents the overall failure of North-American universities to build an effective IT Policies communication with their primary users: the students. A sample of 12 universities was selected. A set of indicators based on usability principles to assess the content of IT Policies vas devised. Then, IT Policies were rated according to the indicators and the results analyzed to build an overall picture of the potential of communication problems in policy communication. The initial finding is that network security professionals in Universities have to reach a delicate balance between asset protection, asset valorization and user security awareness.

Keywords: computer security, IT policy, security awareness, network user rules

Procedia PDF Downloads 535