Search results for: electronic attack
1707 Macrocycles Enable Tuning of Uranyl Electrochemistry by Lewis Acids
Authors: Amit Kumar, Davide Lionetti, Victor Day, James Blakemore
Abstract:
Capture and activation of the water-soluble uranyl dication (UO22+) remains a challenging problem, as few rational approaches are available for modulating the reactivity of this species. Here, we report the divergent synthesis of heterobimetallic complexes in which UO22+ is held in close proximity to a range of redox-inactive metals by tailored macrocyclic ligands. Crystallographic and spectroscopic studies confirm assembly of homologous UVI(μ-OAr)2Mn+ cores with a range of mono-, di-, and trivalent Lewis acids (Mn+). X-ray diffraction (XRD) and cyclic voltammetry (CV) data suggest preferential binding of K+ in an 18-crown-6-like cavity and Na+ in a 15-crown-5-like cavity, both appended to Schiff-base type sites that selectively bind UO22+. CV data demonstrate that the UVI/UV reduction potential in these complexes shifts positive and the rate of electron transfer decreases with increasing Lewis acidity of the incorporated redox-inactive metals. Moreover, spectroelectrochemical studies confirm the formation of [UV] species in the case of monometallic UO22+ complex, consistent with results from prior studies. However, unique features were observed during spectroelectrochemical studies in the presence of the K+ ion, suggesting new insights into electronic structure may be accessible with the heterobimetallic complexes. Overall, these findings suggest that interactions with Lewis acids could be effectively leveraged for rational tuning of the electronic and thermochemical properties of the 5f elements, reminiscent of strategies more commonly employed with 3d transition metals.Keywords: electrochemistry, Lewis acid, macrocycle, uranyl
Procedia PDF Downloads 1421706 Design and Implementation of Generative Models for Odor Classification Using Electronic Nose
Authors: Kumar Shashvat, Amol P. Bhondekar
Abstract:
In the midst of the five senses, odor is the most reminiscent and least understood. Odor testing has been mysterious and odor data fabled to most practitioners. The delinquent of recognition and classification of odor is important to achieve. The facility to smell and predict whether the artifact is of further use or it has become undesirable for consumption; the imitation of this problem hooked on a model is of consideration. The general industrial standard for this classification is color based anyhow; odor can be improved classifier than color based classification and if incorporated in machine will be awfully constructive. For cataloging of odor for peas, trees and cashews various discriminative approaches have been used Discriminative approaches offer good prognostic performance and have been widely used in many applications but are incapable to make effectual use of the unlabeled information. In such scenarios, generative approaches have better applicability, as they are able to knob glitches, such as in set-ups where variability in the series of possible input vectors is enormous. Generative models are integrated in machine learning for either modeling data directly or as a transitional step to form an indeterminate probability density function. The algorithms or models Linear Discriminant Analysis and Naive Bayes Classifier have been used for classification of the odor of cashews. Linear Discriminant Analysis is a method used in data classification, pattern recognition, and machine learning to discover a linear combination of features that typifies or divides two or more classes of objects or procedures. The Naive Bayes algorithm is a classification approach base on Bayes rule and a set of qualified independence theory. Naive Bayes classifiers are highly scalable, requiring a number of restraints linear in the number of variables (features/predictors) in a learning predicament. The main recompenses of using the generative models are generally a Generative Models make stronger assumptions about the data, specifically, about the distribution of predictors given the response variables. The Electronic instrument which is used for artificial odor sensing and classification is an electronic nose. This device is designed to imitate the anthropological sense of odor by providing an analysis of individual chemicals or chemical mixtures. The experimental results have been evaluated in the form of the performance measures i.e. are accuracy, precision and recall. The investigational results have proven that the overall performance of the Linear Discriminant Analysis was better in assessment to the Naive Bayes Classifier on cashew dataset.Keywords: odor classification, generative models, naive bayes, linear discriminant analysis
Procedia PDF Downloads 3901705 Pioneer Synthesis and Characterization of Boron Containing Hard Materials
Authors: Gülşah Çelik Gül, Figen Kurtuluş
Abstract:
The first laboratory synthesis of hard materials such as diamond proceeded to attack of developing materials with high hardness to compete diamond. Boron rich solids are good candidates owing to their short interatomic bond lengths and strong covalent character. Boron containing hard material was synthesized by modified-microwave method under nitrogen atmosphere by using a fuel (glycine or urea), amorphous boron and/or boric acid in appropriate molar ratio. Characterizations were done by x-ray diffraction (XRD), fourier transform infrared (FTIR) spectroscopy, scanning electron microscopy/energy dispersive analyze (SEM/EDS), thermo gravimetric/differantial thermal analysis (TG/DTA).Keywords: boron containing materials, hard materials, microwave synthesis, powder X-ray diffraction
Procedia PDF Downloads 5931704 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey
Authors: Maleh Yassine, Ezzati Abdellah
Abstract:
Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS
Procedia PDF Downloads 3871703 Identification of Information War in Lithuania
Authors: Vitalijus Leibenka
Abstract:
After 2014 the world of Russia’s actions in annexing Crimea has seen a hybrid war that has helped Russia achieve its goals. The world and NATO nations have pointed out that hybrid action can help achieve not only military but also economic and political goals. One of the weapons of action in hybrid warfare is information warfare tools, the use of which helps to carry out actions in the context of hybrid warfare as a whole. In addition, information war tools can be used alone, over time and for long-term purposes. Although forms of information war, such as propaganda and disinformation, have been used in the past, in old conflicts and wars, new forms of information war have emerged as a result of technological development, making the dissemination of information faster and more efficient. The world understands that information is becoming a weapon, but not everyone understands that both information war and information warfare differ in their essence and full content. In addition, the damage and impact of the use of information war, which may have worse consequences than a brief military conflict, is underestimated. Lithuania is also facing various interpretations of the information war. Some believe that the information attack is an information war and the understanding of the information war is limited to a false message in the press. Others, however, deepen and explain the essence of the information war. Society has formed in such a way that not all people are able to assess the threats of information war, to separate information war from information attack. Recently, the Lithuanian government has been taking measures in the context of the information war, making decisions that allow the development of the activities of the state and state institutions in order to create defense mechanisms in the information war. However, this is happening rather slowly and incompletely. Every military conflict, related to Lithuania in one way or another, forces Lithuanian politicians to take up the theme of information warfare again. As a result, a national cyber security center is being set up, and Russian channels spreading lies are banned. However, there is no consistent development and continuous improvement of action against information threats. Although a sufficiently influential part of society (not a political part) helps to stop the spread of obscure information by creating social projects such as “Demaskuok” and “Laikykis ten su Andriumi tapinu”, it goes without saying that it will not become a key tool in the fight against information threats. Therefore, in order to achieve clean dissemination of information in Lithuania, full-fledged and substantial political decisions are necessary, the adoption of which would change the public perception of the information war, its damage, impact and actions that would allow to combat the spread. Political decisions should cover the educational, military, economic and political areas, which are one of the main and most important in the state, which would allow to fundamentally change the situation against the background of information war.Keywords: information war, information warfare, hybrid war, hybrid warfare, NATO, Lithuania, Russia
Procedia PDF Downloads 631702 Use of Hierarchical Temporal Memory Algorithm in Heart Attack Detection
Authors: Tesnim Charrad, Kaouther Nouira, Ahmed Ferchichi
Abstract:
In order to reduce the number of deaths due to heart problems, we propose the use of Hierarchical Temporal Memory Algorithm (HTM) which is a real time anomaly detection algorithm. HTM is a cortical learning algorithm based on neocortex used for anomaly detection. In other words, it is based on a conceptual theory of how the human brain can work. It is powerful in predicting unusual patterns, anomaly detection and classification. In this paper, HTM have been implemented and tested on ECG datasets in order to detect cardiac anomalies. Experiments showed good performance in terms of specificity, sensitivity and execution time.Keywords: cardiac anomalies, ECG, HTM, real time anomaly detection
Procedia PDF Downloads 2311701 Designing Electronic Kanban in Assembly Line Tailboom at XYZ Corp to Reducing Lead Time
Authors: Nadhifah A. Nugraha, Dida D. Damayanti, Widia Juliani
Abstract:
Airplanes manufacturing is growing along with the increasing demand from consumers. The helicopter's tail called Tailboom is a product of the helicopter division at XYZ Corp, where the Tailboom assembly line is a pull system. Based on observations of existing conditions that occur at XYZ Corp, production is still unable to meet the demands of consumers; lead time occurs greater than the plan agreed upon by the consumers. In the assembly process, each work station experiences a lack of parts and components needed to assemble components. This happens because of the delay in getting the required part information, and there is no warning about the availability of parts needed, it makes some parts unavailable in assembly warehouse. The lack of parts and components from the previous work station causes the assembly process to stop, and the assembly line also stops at the next station. In its completion, the production time was late and not on the schedule. In resolving these problems, the controlling process is needed, which is controlling the assembly line to get all components and subassembly in the right amount and at the right time. This study applies one of Just In Time tools, namely Kanban and automation, should be added as efficiently and effectively communication line becomes electronic Kanban. The problem can be solved by reducing non-value added time, such as waiting time and idle time. The proposed results of controlling the assembly line of Tailboom result in a smooth assembly line without waiting, reduced lead time, and achieving production time according to the schedule agreed with the consumers.Keywords: kanban, e-Kanban, lead time, pull system
Procedia PDF Downloads 1161700 Methods for Mitigating Corrosion Caused by Biogenic Sulfuric Acid in Sewerage Systems: State of the Art Review
Authors: M. Cortés, E. Vera, M. Avella
Abstract:
Corrosion is an imminent process in nature, which affects all types of materials. In sewerage systems, the corrosion process caused by microorganisms, also known as biogenic sulfuric acid attack, has been studied. This affects the structural integrity of the concrete drainage pipes and the sewage treatment plants. This article is a review of research which focuses on the study of how to reduce the production of hydrogen sulfide, how to improve the resistance of concrete through the use of additives and the implementation of antimicrobial techniques to reduce bacterial growth.Keywords: bactericides, biogenic sulfuric acid, corrosion, concrete, hydrogen sulphide, nano materials, zeolites
Procedia PDF Downloads 4441699 Assessment of E-Readiness in Libraries of Public Sector Universities Khyber Pakhtunkhwa-Pakistan
Authors: Saeed Ullah Jan
Abstract:
This study has examined the e-readiness in libraries of public sector universities in Khyber Pakhtunkhwa. Efforts were made to evaluate the availability of human resources, electronic infrastructure, and network services and programs in the public sector university libraries. The population of the study was the twenty-seven public sector university libraries of Khyber Pakhtunkhwa. A quantitative approach was adopted, and a questionnaire-based survey was conducted to collect data from the librarian/in charge of public sector university libraries. The collected data were analyzed using Statistical Package for Social Sciences version 22 (SPSS). The mean score of the knowledge component interpreted magnitudes below three which indicates that the respondents are poorly or moderately satisfied regards knowledge of libraries. The satisfaction level of the respondents about the other components, such as electronic infrastructure, network services and programs, and enhancers of the networked world, was rated as average or below. The study suggested that major aspects of existing public-sector university libraries require significant transformation. For this purpose, the government should provide all the required resources and facilities to meet the population's informational and recreational demands. The Information Communication Technology (ICT) infrastructure of public university libraries needs improvement in terms of the availability of computer equipment, databases, network servers, multimedia projectors, digital cameras, uninterruptible power supply, scanners, and backup devices such as hard discs and Digital Video Disc/Compact Disc.Keywords: ICT-libraries, e-readiness-libraries, e-readiness-university libraries, e-readiness-Pakistan
Procedia PDF Downloads 891698 Phone Number Spoofing Attack in VoLTE 4G
Authors: Joo-Hyung Oh
Abstract:
The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on all-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. And in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.Keywords: LTE, 4G, VoLTE, phone number spoofing
Procedia PDF Downloads 4331697 A Robust Hybrid Blind Digital Image Watermarking System Using Discrete Wavelet Transform and Contourlet Transform
Authors: Nidal F. Shilbayeh, Belal AbuHaija, Zainab N. Al-Qudsy
Abstract:
In this paper, a hybrid blind digital watermarking system using Discrete Wavelet Transform (DWT) and Contourlet Transform (CT) has been implemented and tested. The implemented combined digital watermarking system has been tested against five common types of image attacks. The performance evaluation shows improved results in terms of imperceptibility, robustness, and high tolerance against these attacks; accordingly, the system is very effective and applicable.Keywords: discrete wavelet transform (DWT), contourlet transform (CT), digital image watermarking, copyright protection, geometric attack
Procedia PDF Downloads 3961696 Simscape Library for Large-Signal Physical Network Modeling of Inertial Microelectromechanical Devices
Authors: S. Srinivasan, E. Cretu
Abstract:
The information flow (e.g. block-diagram or signal flow graph) paradigm for the design and simulation of Microelectromechanical (MEMS)-based systems allows to model MEMS devices using causal transfer functions easily, and interface them with electronic subsystems for fast system-level explorations of design alternatives and optimization. Nevertheless, the physical bi-directional coupling between different energy domains is not easily captured in causal signal flow modeling. Moreover, models of fundamental components acting as building blocks (e.g. gap-varying MEMS capacitor structures) depend not only on the component, but also on the specific excitation mode (e.g. voltage or charge-actuation). In contrast, the energy flow modeling paradigm in terms of generalized across-through variables offers an acausal perspective, separating clearly the physical model from the boundary conditions. This promotes reusability and the use of primitive physical models for assembling MEMS devices from primitive structures, based on the interconnection topology in generalized circuits. The physical modeling capabilities of Simscape have been used in the present work in order to develop a MEMS library containing parameterized fundamental building blocks (area and gap-varying MEMS capacitors, nonlinear springs, displacement stoppers, etc.) for the design, simulation and optimization of MEMS inertial sensors. The models capture both the nonlinear electromechanical interactions and geometrical nonlinearities and can be used for both small and large signal analyses, including the numerical computation of pull-in voltages (stability loss). Simscape behavioral modeling language was used for the implementation of reduced-order macro models, that present the advantage of a seamless interface with Simulink blocks, for creating hybrid information/energy flow system models. Test bench simulations of the library models compare favorably with both analytical results and with more in-depth finite element simulations performed in ANSYS. Separate MEMS-electronic integration tests were done on closed-loop MEMS accelerometers, where Simscape was used for modeling the MEMS device and Simulink for the electronic subsystem.Keywords: across-through variables, electromechanical coupling, energy flow, information flow, Matlab/Simulink, MEMS, nonlinear, pull-in instability, reduced order macro models, Simscape
Procedia PDF Downloads 1371695 Tuning the Emission Colour of Phenothiazine by Introduction of Withdrawing Electron Groups
Authors: Andrei Bejan, Luminita Marin, Dalila Belei
Abstract:
Phenothiazine with electron-rich nitrogen and sulfur heteroatoms has a high electron-donating ability which promotes a good conjugation and therefore low band-gap with consequences upon charge carrier mobility improving and shifting of light emission in visible domain. Moreover, its non-planar butterfly conformation inhibits molecular aggregation and thus preserves quite well the fluorescence quantum yield in solid state compared to solution. Therefore phenothiazine and its derivatives are promising hole transport materials for use in organic electronic and optoelectronic devices as light emitting diodes, photovoltaic cells, integrated circuit sensors or driving circuits for large area display devices. The objective of this paper was to obtain a series of new phenothiazine derivatives by introduction of different electron withdrawing substituents as formyl, carboxyl and cyanoacryl units in order to create a push pull system which has potential to improve the electronic and optical properties. Bromine atom was used as electrono-donor moiety to extend furthermore the existing conjugation. The understudy compounds were structural characterized by FTIR and 1H-NMR spectroscopy and single crystal X-ray diffraction. Besides, the single crystal X-ray diffraction brought information regarding the supramolecular architecture of the compounds. Photophysical properties were monitored by UV-vis and photoluminescence spectroscopy, while the electrochemical behavior was established by cyclic voltammetry. The absorption maxima of the studied compounds vary in a large range (322-455 nm), reflecting the different electronic delocalization degree, depending by the substituent nature. In a similar manner, the emission spectra reveal different color of emitted light, a red shift being evident for the groups with higher electron withdrawing ability. The emitted light is pure and saturated for the compounds containing strong withdrawing formyl or cyanoacryl units and reach the highest quantum yield of 71% for the compound containing bromine and cyanoacrilic units. Electrochemical study show reversible oxidative and reduction processes for all the compounds and a close correlation of the HOMO-LUMO band gap with substituent nature. All these findings suggest the obtained compounds as promising materials for optoelectronic devices.Keywords: electrochemical properties, phenothiazine derivatives, photoluminescence, quantum yield
Procedia PDF Downloads 3301694 Secure Data Sharing of Electronic Health Records With Blockchain
Authors: Kenneth Harper
Abstract:
The secure sharing of Electronic Health Records (EHRs) is a critical challenge in modern healthcare, demanding solutions to enhance interoperability, privacy, and data integrity. Traditional standards like Health Information Exchange (HIE) and HL7 have made significant strides in facilitating data exchange between healthcare entities. However, these approaches rely on centralized architectures that are often vulnerable to data breaches, lack sufficient privacy measures, and have scalability issues. This paper proposes a framework for secure, decentralized sharing of EHRs using blockchain technology, cryptographic tokens, and Non-Fungible Tokens (NFTs). The blockchain's immutable ledger, decentralized control, and inherent security mechanisms are leveraged to improve transparency, accountability, and auditability in healthcare data exchanges. Furthermore, we introduce the concept of tokenizing patient data through NFTs, creating unique digital identifiers for each record, which allows for granular data access controls and proof of data ownership. These NFTs can also be employed to grant access to authorized parties, establishing a secure and transparent data sharing model that empowers both healthcare providers and patients. The proposed approach addresses common privacy concerns by employing privacy-preserving techniques such as zero-knowledge proofs (ZKPs) and homomorphic encryption to ensure that sensitive patient information can be shared without exposing the actual content of the data. This ensures compliance with regulations like HIPAA and GDPR. Additionally, the integration of Fast Healthcare Interoperability Resources (FHIR) with blockchain technology allows for enhanced interoperability, enabling healthcare organizations to exchange data seamlessly and securely across various systems while maintaining data governance and regulatory compliance. Through real-world case studies and simulations, this paper demonstrates how blockchain-based EHR sharing can reduce operational costs, improve patient outcomes, and enhance the security and privacy of healthcare data. This decentralized framework holds great potential for revolutionizing healthcare information exchange, providing a transparent, scalable, and secure method for managing patient data in a highly regulated environment.Keywords: blockchain, electronic health records (ehrs), fast healthcare interoperability resources (fhir), health information exchange (hie), hl7, interoperability, non-fungible tokens (nfts), privacy-preserving techniques, tokens, secure data sharing,
Procedia PDF Downloads 231693 Pt Decorated Functionalized Acetylene Black as Efficient Cathode Material for Li Air Battery and Fuel Cell Applications
Authors: Rajashekar Badam, Vedarajan Raman, Noriyoshi Matsumi
Abstract:
Efficiency of energy converting and storage systems like fuel cells and Li-Air battery principally depended on oxygen reduction reaction (ORR) which occurs at cathode. As the kinetics of the ORR is very slow, it becomes the rate determining step. Exploring carbon substrates for enhancing the dispersion and activity of the metal catalyst and commercially viable simple preparation method is a very crucial area of research in the field of energy materials. Hence, many researchers made large number of carbon-based ORR materials today. But, there are hardly few studies on the effect of interaction between Pt-carbon and carbon-electrolyte on activity. In this work, we have prepared functionalized carbon-based Pt catalyst (Pt-FAB) with enhanced interfacial properties that lead to efficient ORR catalysis. The present work deals with a single-pot method to exfoliate and functionalized acetylene black with enhanced interaction with Pt as well as electrolyte. Acetylene black was functionalized and exfoliated using a facile single pot acid treatment method. The resulted FAB was further decorated with Pt-nano particles (Pt-np). The TEM images of Pt-FAB with uniformly decorated Pt-np of ~3 nm. Further, XPS studies of Pt 4f peak revealed that Pt0 peak was shifted by 0.4 eV in Pt-FAB compared to binding energy of typical Pt⁰ found in Pt/C. The shift can be ascribed to the modulation of electronic state and strong electronic interaction of Pt with carbon. Modulated electronic structure of Pt and strong electronic interaction of Pt with FAB enhances the catalytic activity and durability respectively. To understand the electrode electrolyte interface, electrochemical impedance spectroscopy was carried out. These measurements revealed that the charge transfer resistance of electrode to electrolyte for Pt-FAB is 10 times smaller than that of conventional Pt/C. The interaction with electrolyte helps reduce the interface boundaries, which in turn affects the overall catalytic performance of the electrode. Cyclic voltammetric measurements in 0.1M HClO₄ aq. at a potential scan rate of 50 mVs-1 was employed to evaluate electrochemical surface area (ECSA) of Pt. ECSA of Pt-FAB was found to be as high as 67.2 m²g⁻¹. The three-electrode system showed very high ORR catalytic activity. Mass activity at 0.9 V vs. RHE showed 460 A/g which is much higher than the DOE target values for the year 2020. Further, it showed enhanced performance by showing 723 mW/cm² of highest power density and 1006 mA/cm² of current density at 0.6 V in fuel cell single cell type configuration and 1030 mAhg⁻¹ of rechargeable capacity in Li air battery application. The higher catalytic activity can be ascribed to the improved interaction of FAB with Pt and electrolyte. The aforementioned results evince that Pt-FAB will be a promising cathode material for efficient ORR with significant cyclability for its application in fuel cells and Li-Air batteries. In conclusion, a disordered material was prepared from AB and was systematically characterized. The extremely high ORR activity and ease of preparation make it competent for replacing commercially available ORR materials.Keywords: functionalized acetylene black, oxygen reduction reaction, fuel cells, Functionalized battery
Procedia PDF Downloads 1091692 Interlayer Interaction Arising from Lone Pairs in s-Orbitals in 2D Materials
Authors: Yuan Yan
Abstract:
Interlayer interactions or hybridization in van der Waals (vdW) heterostructures of two-dimensional (2D) materials significantly influence their physical characteristics, including layer-dependent electronic and vibrational structures, magic-angle superconductivity, interlayer antiferromagnetism, and interlayer excitons. These interactions are sensitive to a set of interdependent and externally tunable parameters. To fully exploit the potential of these materials, it is crucial to understand the physical origins of interlayer interaction and hybridization. Traditional theories often attribute these interactions to the sharing of electrons via p orbital lone pairs or π electrons, based on the octet rule, which posits that p electrons are the primary occupants of the outermost atomic shells, except in hydrogen. However, our study challenges this prevailing belief. Through geometry-based analysis, we conducted a high-throughput screening of the Materials Project database and identified 1,623 layered materials. By examining the atomic structure and bonding characteristics of surface atoms, we demonstrate that s-orbital lone pairs can also drive interlayer interactions in two-dimensional materials. Using density functional theory, we further analyzed charge distribution and electronic localization. The crystal field and inert pair effect induce a Stark-like phenomenon, leading to energy level splitting and the formation of directional electron clouds. This allows these electrons to directly participate in the hybridization of interlayer wavefunctions without forming chemical bonds. it findings expand the understanding of interlayer interactions, revealing new mechanisms that govern these properties and providing a theoretical foundation for manipulating interlayer phenomena in 2D materials.Keywords: interlayer interaction, nanomaterials, 2D materials, van der waals, heterostructures
Procedia PDF Downloads 181691 Normal Coordinate Analysis, Molecular Structure, Vibrational, Electronic Spectra, and NMR Investigation of 4-Amino-3-Phenyl-1H-1,2,4-Triazole-5(4H)-Thione by Ab Initio HF and DFT Method
Authors: Khaled Bahgat
Abstract:
In the present work, the characterization of 4-Amino-3-phenyl-1H-1,2,4-triazole-5(4H)-thione (APTT) molecule was carried out by quantum chemical method and vibrational spectral techniques. The FT-IR (4000–400 cm_1) and FT-Raman (4000–100 cm_1) spectra of APTT were recorded in solid phase. The UV–Vis absorption spectrum of the APTT was recorded in the range of 200–400 nm. The molecular geometry, harmonic vibrational frequencies and bonding features of APTT in the ground state have been calculated by HF and DFT methods using 6-311++G(d,p) basis set. The complete vibrational frequency assignments were made by normal coordinate analysis (NCA) following the scaled quantum mechanical force field methodology (SQMF). The molecular stability and bond strength were investigated by applying the natural bond orbital analysis (NBO) and natural localized molecular orbital (NLMO) analysis. The electronic properties, such as excitation energies, absorption wavelength, HOMO and LUMO energies were performed by time depended DFT (TD-DFT) approach. The 1H and 13C nuclear magnetic resonance chemical shift of the molecule were calculated using the gauge-including atomic orbital (GIAO) method and compared with experimental results. Finally, the calculation results were analyzed to simulate infrared, FT-Raman and UV spectra of the title compound which shows better agreement with observed spectra.Keywords: 4-amino-3-phenyl-1H-1, 2, 4-triazole-5(4H)-thione, vibrational assignments, normal coordinate analysis, quantum mechanical calculations
Procedia PDF Downloads 4731690 Improvement of Energy Efficiency and Cost Management for Household Refrigerators Under Different Climate Classes and Examination of Effect of VIP Ageing and Usage of Electronic Expansion Valve Technology
Authors: Yesim Guzel, Mert Akbiyik
Abstract:
Energy consumption (EC) and costs due to the usage of refrigerators are increasing continuously. This creates a disadvantage not only on the budget of customers but also to global warming. This study aims to decrease EC and cost due to refrigerator EC all around the world. Research about the effect of climate classes on industrial cabinets, supermarket refrigerators or room air conditioning systems can be found in open literature; however, to the best of authors' knowledge, there is no study that includes the effect of climate classes, vacuum insulation panels (VIP) and polyurethane (PU) aging, and electronic expansion valve (EEV) technology for home refrigerators. For this purpose, 4 configurations are examined for household refrigerators for ST (subtropical) and T (tropical) climates. The aging of VIP and PU and the annual interest rate of electricity cost (%5) are considered to obtain more accurate results in calculations. Heat gain (Q), EC, and CO₂ emission are calculated. Config. 1, 2, 3 and 4 are with NO VIP, FULL VIP, NO VIP+ EEV, and FULL VIP+EEV, respectively. As a result, it is observed that Q for Config. 1 and 2 increase as Temp increases. Moreover, from ST to T climates, for all the configurations, EC increases. Additionally, the payback period (t) is based on reference cabinet Config. 1 is calculated. It is considered that annual electricity cost as constant for every climate. When ts are compared with Config. 1 for both climates, it is seen that the minimum t of 2 years is Config. 3. This study shows not only is EEV a better alternative option than VIPs. Hence, EEVs are way cheaper than VIPs and have shorter t, but it also allows us to compare Ec, Q, CO₂ emissions, and cost.Keywords: energy, thermodynamics, ageing, VIP, polyurethane, expansion valve, EEV, PU, climate, refrigerating, cooling, efficiency
Procedia PDF Downloads 491689 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels
Authors: Sartaj Singh, Amar Singh, Ashok Sharma, Sandeep Kaur
Abstract:
With upcoming threats in a digital world, we need to work continuously in the area of security in all aspects, from hardware to software as well as data modelling. The rise in social media activities and hunger for data by various entities leads to cybercrime and more attack on the privacy and security of persons. Cryptography has always been employed to avoid access to important data by using many processes. Symmetric key and asymmetric key cryptography have been used for keeping data secrets at rest as well in transmission mode. Various cryptosystems have evolved from time to time to make the data more secure. In this research article, we are studying various cryptosystems in asymmetric cryptography and their application with usefulness, and much emphasis is given to Elliptic curve cryptography involving algebraic mathematics.Keywords: cryptography, symmetric key cryptography, asymmetric key cryptography
Procedia PDF Downloads 1241688 Mg and MgN₃ Cluster in Diamond: Quantum Mechanical Studies
Authors: T. S. Almutairi, Paul May, Neil Allan
Abstract:
The geometrical, electronic and magnetic properties of the neutral Mg center and MgN₃ cluster in diamond have been studied theoretically in detail by means of an HSE06 Hamiltonian that includes a fraction of the exact exchange term; this is important for a satisfactory picture of the electronic states of open-shell systems. Another batch of the calculations by GGA functionals have also been included for comparison, and these support the results from HSE06. The local perturbations in the lattice by introduced Mg defect are restricted in the first and second shell of atoms before eliminated. The formation energy calculated with HSE06 and GGA of single Mg agrees with the previous result. We found the triplet state with C₃ᵥ is the ground state of Mg center with energy lower than the singlet with C₂ᵥ by ~ 0.1 eV. The recent experimental ZPL (557.4 nm) of Mg center in diamond has been discussed in the view of present work. The analysis of the band-structure of the MgN₃ cluster confirms that the MgN₃ defect introduces a shallow donor level in the gap lying within the conduction band edge. This observation is supported by the EMM that produces n-type levels shallower than the P donor level. The formation energy of MgN₂ calculated from a 2NV defect (~ 3.6 eV) is a promising value from which to engineer MgN₃ defects inside the diamond. Ion-implantation followed by heating to about 1200-1600°C might induce migration of N related defects to the localized Mg center. Temperature control is needed for this process to restore the damage and ensure the mobilities of V and N, which demands a more precise experimental study.Keywords: empirical marker method, generalised gradient approximation, Heyd–Scuseria–Ernzerhof screened hybrid functional, zero phono line
Procedia PDF Downloads 1161687 The Role of Technology in Managing Election Logistics and Preventing Fraud in Nigeria and Uganda: A Comparative Analysis
Authors: Sifiso Vilakazi, Lerato Mzenzi
Abstract:
The incorporation of technology has brought about a considerable evolution in election management, providing answers to persistent issues with fraud, inefficiency, and logistical complexity. The paper offers a comparative review of the effects of technology advancements on election logistics and fraud prevention in Uganda and Nigeria. Both nations have embraced technology such as digital fraud prevention systems, biometric voter registration, and electronic results transmission while having different political environments and electoral problems. Nevertheless, these innovations' varied results raise important concerns about how technology can enhance vote integrity. For improved transparency and lower voter fraud, the Independent National Electoral Commission (INEC) of Nigeria has deployed electronic voting machines, biometric voter identification, and the INEC Result Viewing (IReV) portal. Despite these developments, technological setbacks and logistical difficulties, particularly during the 2023 elections, uncovered weaknesses that stoked distrust and electoral conflicts by exposing flaws, including device breakdowns, insufficient cybersecurity protections, and transmission delays in results. Comparably, Uganda has used electronic result transmission technologies and biometric voter verification since 2016 to increase election efficiency and combat ballot stuffing and impersonation. Nevertheless, problems, including remote logistical challenges and internet outages during the 2021 elections, have reduced the efficacy of these tools. This paper maintains that while technology might reduce election-related stress and potentially reduce fraud, its efficacy depends on several variables, such as political will, public confidence, and infrastructure. Furthermore, it draws attention to the necessity of more robust legislative frameworks, ongoing investments in cybersecurity, and implementation plans that are customized to the particular difficulties presented by each nation's voting system locally. The results imply that although technology can help Ugandan and Nigerian election management, it cannot guarantee electoral integrity and must be used in conjunction with more extensive institutional changes. Through providing insights into how African nations might use technological advancements to improve democratic governance while addressing context-specific problems, the research adds to the expanding body of literature on the use of technology in election management.Keywords: elections, Nigeria, Uganda, Africa, management, innovation
Procedia PDF Downloads 101686 Phone Number Spoofing Attack in VoLTE
Authors: Joo-Hyung Oh, Sekwon Kim, Myoungsun Noh, Chaetae Im
Abstract:
The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on All-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. Moreover, in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.Keywords: LTE, 4G, VoLTE, phone number spoofing
Procedia PDF Downloads 5241685 Quantification of E-Waste: A Case Study in Federal University of Espírito Santo, Brazil
Authors: Andressa S. T. Gomes, Luiza A. Souza, Luciana H. Yamane, Renato R. Siman
Abstract:
The segregation of waste of electrical and electronic equipment (WEEE) in the generating source, its characterization (quali-quantitative) and identification of origin, besides being integral parts of classification reports, are crucial steps to the success of its integrated management. The aim of this paper was to count WEEE generation at the Federal University of Espírito Santo (UFES), Brazil, as well as to define sources, temporary storage sites, main transportations routes and destinations, the most generated WEEE and its recycling potential. Quantification of WEEE generated at the University in the years between 2010 and 2015 was performed using data analysis provided by UFES’s sector of assets management. EEE and WEEE flow in the campuses information were obtained through questionnaires applied to the University workers. It was recorded 6028 WEEEs units of data processing equipment disposed by the university between 2010 and 2015. Among these waste, the most generated were CRT screens, desktops, keyboards and printers. Furthermore, it was observed that these WEEEs are temporarily stored in inappropriate places at the University campuses. In general, these WEEE units are donated to NGOs of the city, or sold through auctions (2010 and 2013). As for recycling potential, from the primary processing and further sale of printed circuit boards (PCB) from the computers, the amount collected could reach U$ 27,839.23. The results highlight the importance of a WEEE management policy at the University.Keywords: solid waste, waste of electrical and electronic equipment, waste management, institutional solid waste generation
Procedia PDF Downloads 2601684 Exploring Influence Range of Tainan City Using Electronic Toll Collection Big Data
Authors: Chen Chou, Feng-Tyan Lin
Abstract:
Big Data has been attracted a lot of attentions in many fields for analyzing research issues based on a large number of maternal data. Electronic Toll Collection (ETC) is one of Intelligent Transportation System (ITS) applications in Taiwan, used to record starting point, end point, distance and travel time of vehicle on the national freeway. This study, taking advantage of ETC big data, combined with urban planning theory, attempts to explore various phenomena of inter-city transportation activities. ETC, one of government's open data, is numerous, complete and quick-update. One may recall that living area has been delimited with location, population, area and subjective consciousness. However, these factors cannot appropriately reflect what people’s movement path is in daily life. In this study, the concept of "Living Area" is replaced by "Influence Range" to show dynamic and variation with time and purposes of activities. This study uses data mining with Python and Excel, and visualizes the number of trips with GIS to explore influence range of Tainan city and the purpose of trips, and discuss living area delimited in current. It dialogues between the concepts of "Central Place Theory" and "Living Area", presents the new point of view, integrates the application of big data, urban planning and transportation. The finding will be valuable for resource allocation and land apportionment of spatial planning.Keywords: Big Data, ITS, influence range, living area, central place theory, visualization
Procedia PDF Downloads 2791683 Graphene Based Electronic Device
Authors: Ali Safari, Pejman Hosseiniun, Iman Rahbari, MohamadReza Kalhor
Abstract:
The semiconductor industry is placing an increased emphasis on emerging materials and devices that may provide improved performance, or provide novel functionality for devices. Recently, graphene, as a true two-dimensional carbon material, has shown fascinating applications in electronics. In this paper detailed discussions are introduced for possible applications of grapheme Transistor in RF and digital devices.Keywords: graphene, GFET, RF, digital
Procedia PDF Downloads 3611682 Development of a Self-Retractable Front Spoilers Suitable for Indian Road Conditions to Reduce Aerodynamic Drag
Authors: G. Sivaraj, K. M. Parammasivam, R. Veeramanikandan, S. Nithish
Abstract:
Reduction of ground clearance or (ride height) is a vital factor in minimizing aerodynamic drag force and improving vehicle performance. But in India, minimization of ground clearance is limited because of the road conditions. Due to this problem, reduction of aerodynamic drag and performance are not fully improved. In this view, this paper deals with the development of self-retractable front spoilers which are most suitable for Indian road conditions. These retractable spoilers are fitted in the front portion of the car and in speed below 60 km/hr these spoilers are in retracted positions. But, when the car crosses a speed above 60 km/hr, using electronic circuit the spoilers are activated. Thus, using this technique aerodynamic performance can be improved at a speed above 60 km/hr. Also, when the car speed is reduced below the 60 km/hr mark, the front spoiler are retracted which makes it as a normal car. This is because, in Indian roads, speed breakers are installed to cut off speed at particular places. Thus, in these circumstances there are chances of damaging front spoilers. Since, when the driver sees the speed breaker, he will automatically apply break to prevent damage, at this time using electronic circuit the front spoiler is retracted. However, accidentally when the driver fails to apply brakes there are chances for the front spoilers to get a hit. But as the front spoilers are made of Kevlar composite, it can withstand high impact loads and using a spring mechanism the spoilers are retracted immediately. By using CFD analysis and low-speed wind tunnel testing drag coefficient of the 1:10 scaled car model with and without self-retractable spoilers are calculated and validated. Also, using wind tunnel, proper working of self-retractable at car speed below and above 60 km/hr are validated.Keywords: aerodynamic drag, CFD analysis, kevlar composite, self-retractable spoilers, wind tunnel
Procedia PDF Downloads 3421681 Three-Dimensional Vibration Characteristics of Piezoelectric Semi-Spherical Shell
Authors: Yu-Hsi Huang, Ying-Der Tsai
Abstract:
Piezoelectric circular plates can provide out-of-plane vibrational displacements on low frequency and in-plane vibrational displacements on high frequency. Piezoelectric semi-spherical shell, which is double-curvature structure, can induce three-dimensional vibrational displacements over a large frequency range. In this study, three-dimensional vibrational characteristics of piezoelectric semi-spherical shells with free boundary conditions are investigated using three experimental methods and finite element numerical modeling. For the experimental measurements, amplitude-fluctuation electronic speckle pattern interferometry (AF-ESPI) is used to obtain resonant frequencies and radial and azimuthal mode shapes. This optical technique utilizes a full-field and non-contact optical system that measures both the natural frequency and corresponding vibration mode shape simultaneously in real time. The second experimental technique used, laser displacement meter is a point-wise displacement measurement method that determines the resonant frequencies of the piezoelectric shell. An impedance analyzer is used to determine the in-plane resonant frequencies of the piezoelectric semi-spherical shell. The experimental results of the resonant frequencies and mode shapes for the piezoelectric shell are verified with the result from finite element analysis. Excellent agreement between the experimental measurements and numerical calculation is presented on the three-dimensional vibrational characteristics of the piezoelectric semi-spherical shell.Keywords: piezoelectric semi-spherical shell, mode shape, resonant frequency, electronic speckle pattern interferometry, radial vibration, azimuthal vibration
Procedia PDF Downloads 2341680 Incorporating Lexical-Semantic Knowledge into Convolutional Neural Network Framework for Pediatric Disease Diagnosis
Authors: Xiaocong Liu, Huazhen Wang, Ting He, Xiaozheng Li, Weihan Zhang, Jian Chen
Abstract:
The utilization of electronic medical record (EMR) data to establish the disease diagnosis model has become an important research content of biomedical informatics. Deep learning can automatically extract features from the massive data, which brings about breakthroughs in the study of EMR data. The challenge is that deep learning lacks semantic knowledge, which leads to impracticability in medical science. This research proposes a method of incorporating lexical-semantic knowledge from abundant entities into a convolutional neural network (CNN) framework for pediatric disease diagnosis. Firstly, medical terms are vectorized into Lexical Semantic Vectors (LSV), which are concatenated with the embedded word vectors of word2vec to enrich the feature representation. Secondly, the semantic distribution of medical terms serves as Semantic Decision Guide (SDG) for the optimization of deep learning models. The study evaluate the performance of LSV-SDG-CNN model on four kinds of Chinese EMR datasets. Additionally, CNN, LSV-CNN, and SDG-CNN are designed as baseline models for comparison. The experimental results show that LSV-SDG-CNN model outperforms baseline models on four kinds of Chinese EMR datasets. The best configuration of the model yielded an F1 score of 86.20%. The results clearly demonstrate that CNN has been effectively guided and optimized by lexical-semantic knowledge, and LSV-SDG-CNN model improves the disease classification accuracy with a clear margin.Keywords: convolutional neural network, electronic medical record, feature representation, lexical semantics, semantic decision
Procedia PDF Downloads 1261679 Evaluation of Corrosion Caused by Biogenic Sulfuric Acid (BSA) on the Concrete Structures of Sewerage Systems: Chemical Tests
Authors: M. Cortés, E. Vera, O. Rojas
Abstract:
The research studies of the kinetics of the corrosion process that attacks concrete and occurs within sewerage systems agree on the amount of variables that interfere in the process. This study aims to check the impact of the pH levels of the corrosive environment and the concrete surface, the concentrations of chemical sulfuric acid, and in turn, measure the resistance of concrete to this attack under controlled laboratory conditions; it also aims to contribute to the development of further research related to the topic, in order to compare the impact of biogenic sulfuric acid and chemical sulfuric acid involvement on concrete structures, especially in scenarios such as sewerage systems.Keywords: acid sulfuric, concrete, corrosion, biogenic
Procedia PDF Downloads 3811678 Establish a Company in Turkey for Foreigners
Authors: Mucahit Unal, Ibrahim Arslan
Abstract:
The New Turkish Commercial Code (TCC) No. 6102 was published in the Official Gazette on February 14, 2011. As stated in the New Turkish Commercial Code No. 6102 and Law No. 6103 on Validity and Application of the Turkish Commercial Code, TCC came into effect on July 1, 2012. The basic purpose of the TCC is to form corporate governance coherent with the international standards; to provide transparency in company management; to adjust the Turkish Commercial Code rules with European Union legislations and to simplify establishing a company for foreigner investors to move investments to Turkish market. In this context according to TCC, joint stock companies and limited liability companies can establish with only one single shareholder; the one single shareholder can be foreigner; all board of director members can be foreigner, also all shareholders and board of director members can be non-resident foreigners. Additionally, TCC does not require physical participation to the general shareholders and board members meetings. TCC allows that the general shareholders and board members meetings can hold in an electronic form and resolution of these meetings may also be approved via electronic signatures. Through this amendment, foreign investors no longer have to deal with red tapes. This amendment also means the TCC prevents foreign companies from incurring unnecessary travel expenses. In accordance with all this amendments about TCC, to invest in Turkish market is easy, simple and transparent for foreigner investors and also investors can establish a company in Turkey, irrespective of nationality or place of residence. This article aims to analyze ‘Establish a Company in Turkey for Foreigners’ and inform investors about investing (especially establishing a company) in the Turkish market.Keywords: establish a company, foreigner investors, invest in Turkish market, Turkish commercial code
Procedia PDF Downloads 264