Search results for: secure sockets layer/transport layer security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7341

Search results for: secure sockets layer/transport layer security

6711 Key Roles of the N-Type Oxide Layer in Hybrid Perovskite Solar Cells

Authors: Thierry Pauporté

Abstract:

Wide bandgap n-type oxide layers (TiO2, SnO2, ZnO etc.) play key roles in perovskite solar cells. They act as electron transport layers, and they permit the charge separation. They are also the substrate for the preparation of perovskite in the direct architecture. Therefore, they have a strong influence on the perovskite loading, its crystallinity and they can induce a degradation phenomenon upon annealing. The interface between the oxide and the perovskite is important, and the quality of this heterointerface must be optimized to limit the recombination of charges phenomena and performance losses. One can also play on the oxide and use two oxide contact layers for improving the device stability and durability. These aspects will be developed and illustrated on the basis of recent results obtained at Chimie-ParisTech.

Keywords: oxide, hybrid perovskite, solar cells, impedance

Procedia PDF Downloads 315
6710 Optimal Power Exchange of Multi-Microgrids with Hierarchical Coordination

Authors: Beom-Ryeol Choi, Won-Poong Lee, Jin-Young Choi, Young-Hak Shin, Dong-Jun Won

Abstract:

A Microgrid (MG) has a major role in power system. There are numerous benefits, such as ability to reduce environmental impact and enhance the reliability of a power system. Hence, Multi-MG (MMG) consisted of multiple MGs is being studied intensively. This paper proposes the optimal power exchange of MMG with hierarchical coordination. The whole system architecture consists of two layers: 1) upper layer including MG of MG Center (MoMC) which is in charge of the overall management and coordination and 2) lower layer comprised of several Microgrid-Energy Management Systems (MG-EMSs) which make a decision for own schedule. In order to accomplish the optimal power exchange, the proposed coordination algorithm is applied to MMG system. The objective of this process is to achieve optimal operation for improving economics under the grid-connected operation. The simulation results show how the output of each MG can be changed through coordination algorithm.

Keywords: microgrids, multi-microgrids, power exchange, hierarchical coordination

Procedia PDF Downloads 372
6709 Speedup Breadth-First Search by Graph Ordering

Authors: Qiuyi Lyu, Bin Gong

Abstract:

Breadth-First Search(BFS) is a core graph algorithm that is widely used for graph analysis. As it is frequently used in many graph applications, improve the BFS performance is essential. In this paper, we present a graph ordering method that could reorder the graph nodes to achieve better data locality, thus, improving the BFS performance. Our method is based on an observation that the sibling relationships will dominate the cache access pattern during the BFS traversal. Therefore, we propose a frequency-based model to construct the graph order. First, we optimize the graph order according to the nodes’ visit frequency. Nodes with high visit frequency will be processed in priority. Second, we try to maximize the child nodes overlap layer by layer. As it is proved to be NP-hard, we propose a heuristic method that could greatly reduce the preprocessing overheads. We conduct extensive experiments on 16 real-world datasets. The result shows that our method could achieve comparable performance with the state-of-the-art methods while the graph ordering overheads are only about 1/15.

Keywords: breadth-first search, BFS, graph ordering, graph algorithm

Procedia PDF Downloads 138
6708 Performance Evaluation of Filtration System for Groundwater Recharging Well in the Presence of Medium Sand-Mixed Storm Water

Authors: Krishna Kumar Singh, Praveen Jain

Abstract:

The collection of storm water runoff and forcing it into the groundwater is the need of the hour to sustain the ground water table. However, the runoff entraps various types of sediments and other floating objects whose removal are essential to avoid pollution of ground water and blocking of pores of aquifer. However, it requires regular cleaning and maintenance due to the problem of clogging. To evaluate the performance of filter system consisting of coarse sand (CS), gravel (G) and pebble (P) layers, a laboratory experiment was conducted in a rectangular column. The effect of variable thickness of CS, G and P layers of the filtration unit of the recharge shaft on the recharge rate and the sediment concentration of effluent water were evaluated. Medium sand (MS) of three particle sizes, viz. 0.150–0.300 mm (T1), 0.300–0.425 mm (T2) and 0.425–0.600 mm of thickness 25 cm, 30 cm, and 35 cm respectively in the top layer of the filter system and having seven influent sediment concentrations of 250–3,000 mg/l were used for the experimental study. The performance was evaluated in terms of recharge rates and clogging time. The results indicated that 100 % suspended solids were entrapped in the upper 10 cm layer of MS, the recharge rates declined sharply for influent concentrations of more than 1,000 mg/l. All treatments with a higher thickness of MS media indicated recharge rate slightly more than that of all treatment with a lower thickness of MS media respectively. The performance of storm water infiltration systems was highly dependent on the formation of a clogging layer at the filter. An empirical relationship has been derived between recharge rates, inflow sediment load, size of MS and thickness of MS with using MLR.

Keywords: groundwater, medium sand-mixed storm water filter, inflow sediment load

Procedia PDF Downloads 392
6707 Experimental Study of Flow Characteristics for a Cylinder with Respect to Attached Flexible Strip Body of Various Reynolds Number

Authors: S. Teksin, S. Yayla

Abstract:

The aim of the present study was to investigate details of flow structure in downstream of a circular cylinder base mounted on a flat surface in a rectangular duct with the dimensions of 8000 x 1000 x 750 mm in deep water flow for the Reynolds number 2500, 5000 and 7500. A flexible strip was attached to behind the cylinder and compared the bare body. Also, it was analyzed that how boundary layer affects the structure of flow around the cylinder. Diameter of the cylinder was 60 mm and the length of the flexible splitter plate which had a certain modulus of elasticity was 150 mm (L/D=2.5). Time-averaged velocity vectors, vortex contours, streamwise and transverse velocity components were investigated via Particle Image Velocimetry (PIV). Velocity vectors and vortex contours were displayed through the sections in which boundary layer effect was not present. On the other hand, streamwise and transverse velocity components were monitored for both cases, i.e. with and without boundary layer effect. Experiment results showed that the vortex formation occured in a larger area for L/D=2.5 and the point where the vortex was maximum from the base of the cylinder was shifted. Streamwise and transverse velocity component contours were symmetrical with reference to the center of the cylinder for all cases. All Froud numbers based on the Reynolds numbers were quite smaller than 1. The flow characteristics of velocity component values of attached circular cylinder arrangement decreased approximately twenty five percent comparing to bare cylinder case.

Keywords: partical image velocimetry, elastic plate, cylinder, flow structure

Procedia PDF Downloads 314
6706 Temperature Distribution for Asphalt Concrete-Concrete Composite Pavement

Authors: Tetsya Sok, Seong Jae Hong, Young Kyu Kim, Seung Woo Lee

Abstract:

The temperature distribution for asphalt concrete (AC)-Concrete composite pavement is one of main influencing factor that affects to performance life of pavement. The temperature gradient in concrete slab underneath the AC layer results the critical curling stress and lead to causes de-bonding of AC-Concrete interface. These stresses, when enhanced by repetitive axial loadings, also contribute to the fatigue damage and eventual crack development within the slab. Moreover, the temperature change within concrete slab extremely causes the slab contracts and expands that significantly induces reflective cracking in AC layer. In this paper, the numerical prediction of pavement temperature was investigated using one-dimensional finite different method (FDM) in fully explicit scheme. The numerical predicted model provides a fundamental and clear understanding of heat energy balance including incoming and outgoing thermal energies in addition to dissipated heat in the system. By using the reliable meteorological data for daily air temperature, solar radiation, wind speech and variable pavement surface properties, the predicted pavement temperature profile was validated with the field measured data. Additionally, the effects of AC thickness and daily air temperature on the temperature profile in underlying concrete were also investigated. Based on obtained results, the numerical predicted temperature of AC-Concrete composite pavement using FDM provided a good accuracy compared to field measured data and thicker AC layer significantly insulates the temperature distribution in underlying concrete slab.

Keywords: asphalt concrete, finite different method (FDM), curling effect, heat transfer, solar radiation

Procedia PDF Downloads 269
6705 A TiO₂-Based Memristor Reliable for Neuromorphic Computing

Authors: X. S. Wu, H. Jia, P. H. Qian, Z. Zhang, H. L. Cai, F. M. Zhang

Abstract:

A bipolar resistance switching behaviour is detected for a Ti/TiO2-x/Au memristor device, which is fabricated by a masked designed magnetic sputtering. The current dependence of voltage indicates the curve changes slowly and continuously. When voltage pulses are applied to the device, the set and reset processes maintains linearity, which is used to simulate the synapses. We argue that the conduction mechanism of the device is from the oxygen vacancy channel model, and the resistance of the device change slowly due to the reaction between the titanium electrode and the intermediate layer and the existence of a large number of oxygen vacancies in the intermediate layer. Then, Hopfield neural network is constructed to simulate the behaviour of neural network in image processing, and the accuracy rate is more than 98%. This shows that titanium dioxide memristor has a broad application prospect in high performance neural network simulation.

Keywords: memristor fabrication, neuromorphic computing, bionic synaptic application, TiO₂-based

Procedia PDF Downloads 90
6704 The Influence of Microscopic Features on the Self-Cleaning Ability of Developed 3D Printed Fabric-Like Structures Using Different Printing Parameters

Authors: Ayat Adnan Atwah, Muhammad A. Khan

Abstract:

Self-cleaning surfaces are getting significant attention in industrial fields. Especially for textile fabrics, it is observed that self-cleaning textile fabric surfaces are created by manipulating the surface features with the help of coatings and nanoparticles, which are considered costly and far more complicated. However, controlling the fabrication parameters of textile fabrics at the microscopic level by exploring the potential for self-cleaning has not been addressed. This study aimed to establish the context of self-cleaning textile fabrics by controlling the fabrication parameters of the textile fabric at the microscopic level. Therefore, 3D-printed textile fabrics were fabricated using the low-cost fused filament fabrication (FFF) technique. The printing parameters, such as orientation angle (O), layer height (LH), and extruder width (EW), were used to control the microscopic features of the printed fabrics. The combination of three printing parameters was created to provide the best self-cleaning textile fabric surface: (LH) (0.15, 0.13, 0.10 mm) and (EW) (0.5, 0.4, 0.3 mm) along with two different (O) of (45º and 90º). Three different thermoplastic flexible filament materials were used: (TPU 98A), (TPE felaflex), and (TPC flex45). The printing parameters were optimised to get the optimum self-cleaning ability of the printed specimens. Furthermore, the impact of these characteristics on mechanical strength at the fabric-woven structure level was investigated. The study revealed that the printing parameters significantly affect the self-cleaning properties after adjusting the selected combination of layer height, extruder width, and printing orientation. A linear regression model was effectively developed to demonstrate the association between 3D printing parameters (layer height, extruder width, and orientation). According to the experimental results, (TPE felaflex) has a better self-cleaning ability than the other two materials.

Keywords: 3D printing, self-cleaning fabric, microscopic features, printing parameters, fabrication

Procedia PDF Downloads 90
6703 Dielectric Behavior of 2D Layered Insulator Hexagonal Boron Nitride

Authors: Nikhil Jain, Yang Xu, Bin Yu

Abstract:

Hexagonal boron nitride (h-BN) has been used as a substrate and gate dielectric for graphene field effect transistors (GFETs). Using a graphene/h-BN/TiN (channel/dielectric/gate) stack, key material properties of h-BN were investigated i.e. dielectric strength and tunneling behavior. Work function difference between graphene and TiN results in spontaneous p-doping of graphene through a multi-layer h-BN flake. However, at high levels of current stress, n-doping of graphene is observed, possibly due to the charge transfer across the thin h-BN multi layer. Neither Direct Tunneling (DT) nor Fowler-Nordheim Tunneling (FNT) was observed in TiN/h-BN/Au hetero structures with h-BN showing two distinct volatile conduction states before breakdown. Hexagonal boron nitride emerges as a material of choice for gate dielectrics in GFETs because of robust dielectric properties and high tunneling barrier.

Keywords: graphene, transistors, conduction, hexagonal boron nitride, dielectric strength, tunneling

Procedia PDF Downloads 365
6702 Image Processing on Geosynthetic Reinforced Layers to Evaluate Shear Strength and Variations of the Strain Profiles

Authors: S. K. Khosrowshahi, E. Güler

Abstract:

This study investigates the reinforcement function of geosynthetics on the shear strength and strain profile of sand. Conducting a series of simple shear tests, the shearing behavior of the samples under static and cyclic loads was evaluated. Three different types of geosynthetics including geotextile and geonets were used as the reinforcement materials. An image processing analysis based on the optical flow method was performed to measure the lateral displacements and estimate the shear strains. It is shown that besides improving the shear strength, the geosynthetic reinforcement leads a remarkable reduction on the shear strains. The improved layer reduces the required thickness of the soil layer to resist against shear stresses. Consequently, the geosynthetic reinforcement can be considered as a proper approach for the sustainable designs, especially in the projects with huge amount of geotechnical applications like subgrade of the pavements, roadways, and railways.

Keywords: image processing, soil reinforcement, geosynthetics, simple shear test, shear strain profile

Procedia PDF Downloads 220
6701 A Finite Element/Finite Volume Method for Dam-Break Flows over Deformable Beds

Authors: Alia Alghosoun, Ashraf Osman, Mohammed Seaid

Abstract:

A coupled two-layer finite volume/finite element method was proposed for solving dam-break flow problem over deformable beds. The governing equations consist of the well-balanced two-layer shallow water equations for the water flow and a linear elastic model for the bed deformations. Deformations in the topography can be caused by a brutal localized force or simply by a class of sliding displacements on the bathymetry. This deformation in the bed is a source of perturbations, on the water surface generating water waves which propagate with different amplitudes and frequencies. Coupling conditions at the interface are also investigated in the current study and two mesh procedure is proposed for the transfer of information through the interface. In the present work a new procedure is implemented at the soil-water interface using the finite element and two-layer finite volume meshes with a conservative distribution of the forces at their intersections. The finite element method employs quadratic elements in an unstructured triangular mesh and the finite volume method uses the Rusanove to reconstruct the numerical fluxes. The numerical coupled method is highly efficient, accurate, well balanced, and it can handle complex geometries as well as rapidly varying flows. Numerical results are presented for several test examples of dam-break flows over deformable beds. Mesh convergence study is performed for both methods, the overall model provides new insight into the problems at minimal computational cost.

Keywords: dam-break flows, deformable beds, finite element method, finite volume method, hybrid techniques, linear elasticity, shallow water equations

Procedia PDF Downloads 181
6700 Influence of Composite Adherents Properties on the Dynamic Behavior of Double Lap Bonded Joint

Authors: P. Saleh, G. Challita, R. Hazimeh, K. Khalil

Abstract:

In this paper 3D FEM analysis was carried out on double lap bonded joint with composite adherents subjected to dynamic shear. The adherents are made of Carbon/Epoxy while the adhesive is epoxy Araldite 2031. The maximum average shear stress and the stress homogeneity in the adhesive layer were examined. Three fibers textures were considered: UD; 2.5D and 3D with same volume fiber then a parametric study based on changing the thickness and the type of fibers texture in 2.5D was accomplished. Moreover, adherents’ dissimilarity was also investigated. It was found that the main parameter influencing the behavior is the longitudinal stiffness of the adherents. An increase in the adherents’ longitudinal stiffness induces an increase in the maximum average shear stress in the adhesive layer and an improvement in the shear stress homogeneity within the joint. No remarkable improvement was observed for dissimilar adherents.

Keywords: adhesive, composite adherents, impact shear, finite element

Procedia PDF Downloads 442
6699 Influence of Thermal Radiation on MHD Micropolar Fluid Flow, Heat and Mass Transfer over Vertical Flat Plate

Authors: Alouaoui Redha, Ferhat Samira, Bouaziz Mohamed Najib

Abstract:

In this work, we examine the thermal radiation effect on heat and mass transfer in steady laminar boundary layer flow of an incompressible viscous micropolar fluid over a vertical plate, with the presence of a magnetic field. Rosseland approximation is applied to describe the radiative heat flux in the energy equation. The resulting similarity equations are solved numerically. Many results are obtained and representative set is displayed graphically to illustrate the influence of the various parameters on different profiles. The conclusion is drawn that the flow field, temperature, concentration and microrotation as well as the skin friction coefficient and the both local Nusselt and local Sherwood numbers are significantly influenced by Magnetic parameter, material parameter and thermal radiation parameter.

Keywords: MHD, micropolar fluid, thermal radiation, heat and mass transfer, boundary layer

Procedia PDF Downloads 453
6698 Shape Optimization of a Hole for Water Jetting in a Spudcan for a Jack-Up Rig

Authors: Han Ik Park, Jeong Hyeon Seong, Dong Seop Han, Su-Chul Shin, Young Chul Park

Abstract:

A Spudcan is mounted on the lower leg of the jack-up rig, a device for preventing a rollover of a structure and to support the structure in a stable sea floor. At the time of inserting the surface of the spud can to penetrate when the sand layer is stable and smoothly pulled to the clay layer, and at that time of recovery when uploading the spud can is equipped with a water injection device. In this study, it is significant to optimize the shape of pipelines holes for water injection device and it was set in two kinds of shape, the oval and round. Interpretation of the subject into the site of Gulf of Mexico offshore Wind Turbine Installation Vessels (WTIV)was chosen as a target platform. Using the ANSYS Workbench commercial programs, optimal design was conducted. The results of this study can be applied to the hole-shaped design of various marine structures.

Keywords: kriging method, jack-up rig, shape optimization, spudcan

Procedia PDF Downloads 508
6697 Diffusive Transport of VOCs Through Composite Liners

Authors: Christina Jery, R. K. Anjana, D. N. Arnepalli, R. Sobha

Abstract:

Modern landfills employ a composite liner consisting of a geomembrane overlying a compacted clay liner (CCL) or a geosynthetic clay liner (GCL) as a barrier system. The primary function of a barrier system is to control the contaminant transport from the leachate (dissolved phase) and landfill gas (vapour phase) out of the landfill thereby minimizing the environmental impact. This study is undertaken to investigate the diffusive migration of VOCs through composite liners. VOCs are known hazardous air pollutants were often existing in both the vapour phase and dissolved phase. These compounds are known to diffuse readily through the polymeric geomembranes. The objective of the research is to develop a comprehensive data set of diffusive parameters involved in the diffusion of VOCs in the composite liner (1.5 mm HDPE geomembrane overlying a 30mm compacted clay layer). For this purpose, the study aims to develop a new experimental setup for determining the diffusion characteristics. The key parameters of diffusion (partitioning, diffusion and permeation coefficients) are examined. The diffusion tests are carried out both in aqueous and vapor phase. Finally, an attempt is also made to study the effect of low temperature on the diffusion characteristics.

Keywords: diffusion, sorption, organic compounds, composite liners, geomembrane

Procedia PDF Downloads 366
6696 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption

Authors: Waziri Victor Onomza, John K. Alhassan, Idris Ismaila, Noel Dogonyaro Moses

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy, confidentiality, availability of the users. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute theoretical presentations in high-level computational processes that are based on number theory and algebra that can easily be integrated and leveraged in the Cloud computing with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, homomorphic, homomorphic encryption scheme

Procedia PDF Downloads 379
6695 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control

Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod

Abstract:

The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.

Keywords: XML database, trust-based access control, severity-aware, trust values, log file

Procedia PDF Downloads 300
6694 Thermal Annealing Effects on Minority Carrier Lifetime in GaInAsSb/GaSb by Means of Photothermal Defletion Technique

Authors: Souha Bouagila, Soufiene Ilahi

Abstract:

Photothermal deflection technique PTD have been employed to study the impact of thermal annealing on minority carrier in GaInAsSb grown on GaSb substarte, which used as an active layer for Vertical Cavity Surface Emitting laser (VCSEL). Photothermal defelction technique is nondescructive and accurate technique for electronics parameters determination. The measure of non-radiative recombination, electronic diffusivity, surface and interface recombination are effectuated by fitting the theoretical PTD signal to the experimental ones. As a results, we have found that Non-radiative lifetime increases from 3.8 µs (± 3, 9 %) for not annealed GaInAsSb to the 7.1 µs (± 5, 7%). In fact, electronic diffusivity D increased from 60.1 (± 3.9 %) to 89.6 cm2 / s (± 2.7%) for the as grown to that annealed for 60 min respectively. We have remarked that surface recombination velocity (SRV) decreases from 7963 m / s (± 6.3%) to 1450 m / s (± 3.6).

Keywords: nonradiative lifetime, mobility of minority carrier, diffusion length, Surface and interface recombination velocity.GaInAsSb active layer

Procedia PDF Downloads 69
6693 The Contact between a Rigid Substrate and a Thick Elastic Layer

Authors: Nicola Menga, Giuseppe Carbone

Abstract:

Although contact mechanics has been widely focused on the study of contacts between half-space, it has been recently pointed out that in presence of finite thickness elastic layers the results of the contact problem show significant difference in terms of the main contact quantities (e.g. contact area, penetration, mean pressure, etc.). Actually, there exist a wide range of industrial application demanding for this kind of studies, such as seals leakage prediction or pressure-sensitive coatings for electrical applications. In this work, we focus on the contact between a rigid profile and an elastic layer of thickness h confined under two different configurations: rigid constrain and applied uniform pressure. The elastic problem at hand has been formalized following Green’s function method and then numerically solved by means of a matrix inversion. We study different contact conditions, both considering and neglecting adhesive interactions at the interface. This leads to different solution techniques: Adhesive contacts equilibrium solution is found, in term of contact area for given penetration, making stationary the total free energy of the system; whereas, adhesiveless contacts are addressed defining an equilibrium criterion, again on the contact area, relying on the fracture mechanics stress intensity factor KI. In particular, we make the KI vanish at the edges of the contact area, as peculiar for adhesiveless elastic contacts. The results are obtained in terms of contact area, penetration, and mean pressure for both adhesive and adhesiveless contact conditions. As expected, in the case of a uniform applied pressure the slab turns out much more compliant than the rigidly constrained one. Indeed, we have observed that the peak value of the contact pressure, for both the adhesive and adhesiveless condition, is much higher for the rigidly constrained configuration than in the case of applied uniform pressure. Furthermore, we observed that, for little contact area, both systems behave the same and the pull-off occurs at approximately the same contact area and mean contact pressure. This is an expected result since in this condition the ratio between the layers thickness and the contact area is very high and both layer configurations recover the half-space behavior where the pull-off occurrence is mainly controlled by the adhesive interactions, which are kept constant among the cases.

Keywords: contact mechanics, adhesion, friction, thick layer

Procedia PDF Downloads 510
6692 Effect of Environmental Conditions on the Substrate Cu(In,Ga)Se2 Solar Cell Performances

Authors: Mekhannene Amine

Abstract:

In this paper, we began in the first step by two-dimensional simulation of a CIGS solar cell, in order to increase the current record efficiency of 20.48% for a single CIGS cell. Was created by utilizing a set of physical and technological parameters a solar cell of reference (such as layer thicknesses, gallium ratio, doping levels and materials properties) documented in bibliography and very known in the experimental field. This was accomplished through modeling and simulation using Atlas SILVACO-TCAD, an tool two and three dimensions very powerful and very adapted. This study has led us to determine the influence of different environmental parameters such as illumination (G) and temperature (T). In the second step, we continued our study by determining the influence of physical parameters (the acceptor of concentration NA) and geometric (thickness t) of the CIGS absorber layer, were varied to produce an optimum efficiency of 24.36%. This approach is promising to produce a CIGS classic solar cell to conduct a maximum performance.

Keywords: solar cell, cigs, photovoltaic generator, illumination, temperature, Atlas SILVACO-TCAD

Procedia PDF Downloads 645
6691 BAN Logic Proof of E-passport Authentication Protocol

Authors: Safa Saoudi, Souheib Yousfi, Riadh Robbana

Abstract:

E-passport is a relatively new electronic document which maintains the passport features and provides better security. It deploys new technologies such as biometrics and Radio Frequency identification (RFID). The international civil aviation organization (ICAO) and the European union define mechanisms and protocols to provide security but their solutions present many threats. In this paper, a new mechanism is presented to strengthen e-passport security and authentication process. We propose a new protocol based on Elliptic curve, identity based encryption and shared secret between entities. Authentication in our contribution is formally proved with BAN Logic verification language. This proposal aims to provide a secure data storage and authentication.

Keywords: e-passport, elliptic curve cryptography, identity based encryption, shared secret, BAN Logic

Procedia PDF Downloads 435
6690 Atomic Layer Deposition of Metal Oxides on Si/C Materials for the Improved Cycling Stability of High-Capacity Lithium-Ion Batteries

Authors: Philipp Stehle, Dragoljub Vrankovic, Montaha Anjass

Abstract:

Due to its high availability and extremely high specific capacity, silicon (Si) is the most promising anode material for next generation lithium-ion batteries (LIBs). However, Si anodes are suffering from high volume changes during cycling causing unstable solid-electrolyte interface (SEI). One approach for mitigation of these effects is to embed Si particles into a carbon matrix to create silicon/carbon composites (Si/C). These typically show more stable electrochemical performance than bare silicon materials. Nevertheless, the same failure mechanisms mentioned earlier appear in a less pronounced form. In this work, we further improved the cycling performance of two commercially available Si/C materials by coating thin metal oxide films of different thicknesses on the powders via Atomic Layer Deposition (ALD). The coated powders were analyzed via ICP-OES and AFM measurements. Si/C-graphite anodes with automotive-relevant loadings (~3.5 mAh/cm2) were processed out of the materials and tested in half coin cells (HCCs) and full pouch cells (FPCs). During long-term cycling in FPCs, a significant improvement was observed for some of the ALD-coated materials. After 500 cycles, the capacity retention was already up to 10% higher compared to the pristine materials. Cycling of the FPCs continued until they reached a state of health (SOH) of 80%. By this point, up to the triple number of cycles were achieved by ALD-coated compared to pristine anodes. Post-mortem analysis via various methods was carried out to evaluate the differences in SEI formation and thicknesses.

Keywords: silicon anodes, li-ion batteries, atomic layer deposition, silicon-carbon composites, surface coatings

Procedia PDF Downloads 121
6689 Antireflection Performance of Graphene Directly Deposited on Silicon Substrate by the Atmospheric Pressure Chemical Vapor Deposition Method

Authors: Samira Naghdi, Kyong Yop Rhee

Abstract:

Transfer-free synthesis of graphene on dielectric substrates is highly desirable but remains challenging. Here, by using a thin sacrificial platinum layer as a catalyst, graphene was deposited on a silicon substrate through a simple and transfer-free synthesis method. During graphene growth, the platinum layer evaporated, resulting in direct deposition of graphene on the silicon substrate. In this work, different growth conditions of graphene were optimized. Raman spectra of the produced graphene indicated that the obtained graphene was bilayer. The sheet resistance obtained from four-point probe measurements demonstrated that the deposited graphene had high conductivity. Reflectance spectroscopy of graphene-coated silicon showed a decrease in reflectance across the wavelength range of 200-800 nm, indicating that the graphene coating on the silicon surface had antireflection capabilities.

Keywords: antireflection coating, chemical vapor deposition, graphene, the sheet resistance

Procedia PDF Downloads 180
6688 Towards a Secure Storage in Cloud Computing

Authors: Mohamed Elkholy, Ahmed Elfatatry

Abstract:

Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.

Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security

Procedia PDF Downloads 335
6687 Integrating Knowledge Distillation of Multiple Strategies

Authors: Min Jindong, Wang Mingxia

Abstract:

With the widespread use of artificial intelligence in life, computer vision, especially deep convolutional neural network models, has developed rapidly. With the increase of the complexity of the real visual target detection task and the improvement of the recognition accuracy, the target detection network model is also very large. The huge deep neural network model is not conducive to deployment on edge devices with limited resources, and the timeliness of network model inference is poor. In this paper, knowledge distillation is used to compress the huge and complex deep neural network model, and the knowledge contained in the complex network model is comprehensively transferred to another lightweight network model. Different from traditional knowledge distillation methods, we propose a novel knowledge distillation that incorporates multi-faceted features, called M-KD. In this paper, when training and optimizing the deep neural network model for target detection, the knowledge of the soft target output of the teacher network in knowledge distillation, the relationship between the layers of the teacher network and the feature attention map of the hidden layer of the teacher network are transferred to the student network as all knowledge. in the model. At the same time, we also introduce an intermediate transition layer, that is, an intermediate guidance layer, between the teacher network and the student network to make up for the huge difference between the teacher network and the student network. Finally, this paper adds an exploration module to the traditional knowledge distillation teacher-student network model. The student network model not only inherits the knowledge of the teacher network but also explores some new knowledge and characteristics. Comprehensive experiments in this paper using different distillation parameter configurations across multiple datasets and convolutional neural network models demonstrate that our proposed new network model achieves substantial improvements in speed and accuracy performance.

Keywords: object detection, knowledge distillation, convolutional network, model compression

Procedia PDF Downloads 278
6686 Lung HRCT Pattern Classification for Cystic Fibrosis Using a Convolutional Neural Network

Authors: Parisa Mansour

Abstract:

Cystic fibrosis (CF) is one of the most common autosomal recessive diseases among whites. It mostly affects the lungs, causing infections and inflammation that account for 90% of deaths in CF patients. Because of this high variability in clinical presentation and organ involvement, investigating treatment responses and evaluating lung changes over time is critical to preventing CF progression. High-resolution computed tomography (HRCT) greatly facilitates the assessment of lung disease progression in CF patients. Recently, artificial intelligence was used to analyze chest CT scans of CF patients. In this paper, we propose a convolutional neural network (CNN) approach to classify CF lung patterns in HRCT images. The proposed network consists of two convolutional layers with 3 × 3 kernels and maximally connected in each layer, followed by two dense layers with 1024 and 10 neurons, respectively. The softmax layer prepares a predicted output probability distribution between classes. This layer has three exits corresponding to the categories of normal (healthy), bronchitis and inflammation. To train and evaluate the network, we constructed a patch-based dataset extracted from more than 1100 lung HRCT slices obtained from 45 CF patients. Comparative evaluation showed the effectiveness of the proposed CNN compared to its close peers. Classification accuracy, average sensitivity and specificity of 93.64%, 93.47% and 96.61% were achieved, indicating the potential of CNNs in analyzing lung CF patterns and monitoring lung health. In addition, the visual features extracted by our proposed method can be useful for automatic measurement and finally evaluation of the severity of CF patterns in lung HRCT images.

Keywords: HRCT, CF, cystic fibrosis, chest CT, artificial intelligence

Procedia PDF Downloads 65
6685 Design of a Dual Polarized Resonator Antenna for Mobile Communication System

Authors: N. Fhafhiem, P. Krachodnok, R. Wongsan

Abstract:

This paper proposes the development and design of double layer metamaterials based on electromagnetic band gap (EBG) rods as a superstrate of a resonator antenna to enhance required antenna characteristics for the mobile base station. The metallic rod type metamaterial can partially reflect wave of a primary radiator. The antenna was designed and analyzed by a simulation result from CST Microwave Studio and designed technique could be confirmed by a measurement results from prototype antenna that agree with simulation results. The results indicate that the antenna can also generate a dual polarization by using a 45˚ oriented curved strip dipole located at the center of the reflector plane with double layer superstrate. It can be used to simplify the feed system of an antenna. The proposed antenna has a bandwidth covering the frequency range of 1920 – 2200 MHz, the gain of the antenna increases up to 14.06 dBi. In addition, an interesting sectoral 60˚ pattern is presented in horizontal plane.

Keywords: metamaterial, electromagnetic band gap, dual polarization, resonator antenna

Procedia PDF Downloads 386
6684 Numerical Studies on 2D and 3D Boundary Layer Blockage and External Flow Choking at Wing in Ground Effect

Authors: K. Dhanalakshmi, N. Deepak, E. Manikandan, S. Kanagaraj, M. Sulthan Ariff Rahman, P. Chilambarasan C. Abhimanyu, C. A. Akaash Emmanuel Raj, V. R. Sanal Kumar

Abstract:

In this paper using a validated double precision, density-based implicit standard k-ε model, the detailed 2D and 3D numerical studies have been carried out to examine the external flow choking at wing-in-ground (WIG) effect craft. The CFD code is calibrated using the exact solution based on the Sanal flow choking condition for adiabatic flows. We observed that at the identical WIG effect conditions the numerically predicted 2D boundary layer blockage is significantly higher than the 3D case and as a result, the airfoil exhibited an early external flow choking than the corresponding wing, which is corroborated with the exact solution. We concluded that, in lieu of the conventional 2D numerical simulation, it is invariably beneficial to go for a realistic 3D simulation of the wing in ground effect, which is analogous and would have the aspects of a real-time parametric flow. We inferred that under the identical flying conditions the chances of external flow choking at WIG effect is higher for conventional aircraft than an aircraft facilitating a divergent channel effect at the bottom surface of the fuselage as proposed herein. We concluded that the fuselage and wings integrated geometry optimization can improve the overall aerodynamic performance of WIG craft. This study is a pointer to the designers and/or pilots for perceiving the zone of danger a priori due to the anticipated external flow choking at WIG effect craft for safe flying at the close proximity of the terrain and the dynamic surface of the marine.

Keywords: boundary layer blockage, chord dominated ground effect, external flow choking, WIG effect

Procedia PDF Downloads 271
6683 Scanning Transmission Electron Microscopic Analysis of Gamma Ray Exposed Perovskite Solar Cells

Authors: Aleksandra Boldyreva, Alexander Golubnichiy, Artem Abakumov

Abstract:

Various perovskite materials have surprisingly high resistance towards high-energy electrons, protons, and hard ionization, such as X-rays and gamma-rays. Superior radiation hardness makes a family of perovskite semiconductors an attractive candidate for single- and multijunction solar cells for the space environment and as X-ray and gamma-ray detectors. One of the methods to study the radiation hardness of different materials is by exposing them to gamma photons with high energies (above 500 keV) Herein, we have explored the recombination dynamics and defect concentration of a mixed cation mixed halide perovskite Cs0.17FA0.83PbI1.8Br1.2 with 1.74 eV bandgap after exposure to a gamma-ray source (2.5 Gy/min). We performed an advanced STEM EDX analysis to reveal different types of defects formed during gamma exposure. It was found that 10 kGy dose results in significant improvement of perovskite crystallinity and homogeneous distribution of I ions. While the absorber layer withstood gamma exposure, the hole transport layer (PTAA) as well as indium tin oxide (ITO) were significantly damaged, which increased the interface recombination rate and reduction of fill factor in solar cells. Thus, STEM analysis is a powerful technique that can reveal defects formed by gamma exposure in perovskite solar cells. Methods: Data will be collected from perovskite solar cells (PSCs) and thin films exposed to gamma ionisator. For thin films 50 μL of the Cs0.17FA0.83PbI1.8Br1.2 solution in DMF was deposited (dynamically) at 3000 rpm followed by quenching with 100 μL of ethyl acetate (dropped 10 sec after perovskite precursor) applied at the same spin-coating frequency. The deposited Cs0.17FA0.83PbI1.8Br1.2 films were annealed for 10 min at 100 °C, which led to the development of a dark brown color. For the solar cells, 10% suspension of SnO2 nanoparticles (Alfa Aesar) was deposited at 4000 rpm, followed by annealing on air at 170 ˚C for 20 min. Next, samples were introduced into a nitrogen glovebox for the deposition of all remaining layers. Perovskite film was applied in the same way as in thin films described earlier. Solution of poly-triaryl amine PTAA (Sigma Aldrich) (4 mg in chlorobenzene) was applied at 1000 rpm atop of perovskite layer. Next, 30 nm of VOx was deposited atop the PTAA layer on the whole sample surface using the physical vapor deposition (PVD) technique. Silver electrodes (100 nm) were evaporated in a high vacuum (10-6 mbar) through a shadow mask, defining the active area of each device as ~0.16 cm2. The prepared samples (thin films and solar cells) were packed in Al lamination foil inside the argon glove box. The set of samples consisted of 6 thin films and 6 solar cells, which were exposed to 6, 10, and 21 kGy (2 samples per dose) with 137Cs gamma-ray source (E = 662 keV) with a dose rate of 2.5 Gy/min. The exposed samples will be studied on a focused ion beam (FIB) on a dual-beam scanning electron microscope from ThermoFisher, the Helios G4 Plasma FIB Uxe, operating with a xenon plasma.

Keywords: perovskite solar cells, transmission electron microscopy, radiation hardness, gamma irradiation

Procedia PDF Downloads 24
6682 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 345