Search results for: medical device security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7837

Search results for: medical device security

7177 Nigeria Energy Security: The Role of Solar Batteries

Authors: Ihugba Okezie A., Oguzie Emeka E.

Abstract:

Nigeria's renewable energy market is expanding due to increased environmental awareness, supportive government policies, and the need for energy diversification. This paper examines the role of solar batteries in enhancing Nigeria's energy security. With growing energy demands and frequent power outages, integrating solar batteries presents a viable solution to stabilize the energy supply. The study investigates the current state of solar battery technology in Nigeria, its economic and environmental benefits, and the challenges to implementation. Through a literature review, case studies, and stakeholder interviews, the paper provides a comprehensive analysis of solar batteries' contribution to a resilient energy future. Key players include Engie SA, TotalEnergies SE, Starsight Energy, Enel SpA, and North-South Power Co. Ltd. Challenges include high upfront costs, inadequate policies, weak infrastructure, and security risks. The paper recommends that the government should strengthen policies and incentives to encourage investments through tax breaks, subsidies, and financial incentives.

Keywords: renewable energy, solar batteries, energy security, Nigeria’s electricity generation, job creation

Procedia PDF Downloads 40
7176 Improved Performance of AlGaN/GaN HEMTs Using N₂/NH₃ Pretreatment before Passivation

Authors: Yifan Gao

Abstract:

Owing to the high breakdown field, high saturation drift velocity, 2DEG with high density and mobility and so on, AlGaN/GaN HEMTs have been widely used in high-frequency and high-power applications. To acquire a higher power often means higher breakdown voltage and higher drain current. Surface leakage current is usually the key issue affecting the breakdown voltage and power performance. In this work, we have performed in-situ N₂/NH₃ pretreatment before the passivation to suppress the surface leakage and achieve device performance enhancement. The AlGaN/GaN HEMT used in this work was grown on a 3-in. SiC substrate, whose epitaxial structure consists of a 3.5-nm GaN cap layer, a 25-nm Al₀.₂₅GaN barrier layer, a 1-nm AlN layer, a 400-nm i-GaN layer and a buffer layer. In order to analyze the mechanism for the N-based pretreatment, the details are measured by XPS analysis. It is found that the intensity of Ga-O bonds is decreasing and the intensity of Ga-N bonds is increasing, which means with the supplement of N, the dangling bonds on the surface are indeed reduced with the forming of Ga-N bonds, reducing the surface states. The surface states have a great influence on the leakage current, and improved surface states represent a better off-state of the device. After the N-based pretreatment, the breakdown voltage of the device with Lₛ𝒹=6 μm increased from 93V to 170V, which increased by 82.8%. Moreover, for HEMTs with Lₛ𝒹 of 6-μm, we can obtain a peak output power (Pout) of 12.79W/mm, power added efficiency (PAE) of 49.84% and a linear gain of 20.2 dB at 60V under 3.6GHz. Comparing the result with the reference 6-μm device, Pout is increased by 16.5%. Meanwhile, PAE and the linear gain also have a slight increase. The experimental results indicate that using N₂/NH₃ pretreatment before passivation is an attractive approach to achieving power performance enhancement.

Keywords: AlGaN/GaN HEMT, N-based pretreatment, output power, passivation

Procedia PDF Downloads 317
7175 Linkages between Climate Change, Agricultural Productivity, Food Security and Economic Growth

Authors: Jihène Khalifa

Abstract:

This study analyzed the relationships between Tunisia’s economic growth, food security, agricultural productivity, and climate change using the ARDL model for the period from 1990 to 2022. The ARDL model reveals a positive correlation between economic growth and lagged agricultural productivity. Additionally, the vector autoregressive (VAR) model highlights the beneficial impact of lagged agricultural productivity on economic growth and the negative effect of rainfall on economic growth. Granger causality analysis identifies unidirectional relationships from economic growth to agricultural productivity, crop production, food security, and temperature variations, as well as from temperature variations to crop production. Furthermore, a bidirectional causality is established between crop production and food security. The study underscores the impact of climate change on crop production and suggests the need for adaptive strategies to mitigate these climate effects.

Keywords: economic growth, climate change, agriculture, ARDL, Granger causality, VAR

Procedia PDF Downloads 31
7174 Contemplating Charge Transport by Modeling of DNA Nucleobases Based Nano Structures

Authors: Rajan Vohra, Ravinder Singh Sawhney, Kunwar Partap Singh

Abstract:

Electrical charge transport through two basic strands thymine and adenine of DNA have been investigated and analyzed using the jellium model approach. The FFT-2D computations have been performed for semi-empirical Extended Huckel Theory using atomistic tool kit to contemplate the charge transport metrics like current and conductance. The envisaged data is further evaluated in terms of transmission spectrum, HOMO-LUMO Gap and number of electrons. We have scrutinized the behavior of the devices in the range of -2V to 2V for a step size of 0.2V. We observe that both thymine and adenine can act as molecular devices when sandwiched between two gold probes. A prominent observation is a drop in HLGs of adenine and thymine when working as a device as compared to their intrinsic values and this is comparative more visible in case of adenine. The current in the thymine based device exhibit linear increase with voltage in spite of having low conductance. Further, the broader transmission peaks represent the strong coupling of electrodes to the scattering molecule (thymine). Moreover, the observed current in case of thymine is almost 3-4 times than that of observed for adenine. The NDR effect has been perceived in case of adenine based device for higher bias voltages and can be utilized in various future electronics applications.

Keywords: adenine, DNA, extended Huckel, thymine, transmission spectra

Procedia PDF Downloads 155
7173 Flow-Induced Vibration Marine Current Energy Harvesting Using a Symmetrical Balanced Pair of Pivoted Cylinders

Authors: Brad Stappenbelt

Abstract:

The phenomenon of vortex-induced vibration (VIV) for elastically restrained cylindrical structures in cross-flows is relatively well investigated. The utility of this mechanism in harvesting energy from marine current and tidal flows is however arguably still in its infancy. With relatively few moving components, a flow-induced vibration-based energy conversion device augers low complexity compared to the commonly employed turbine design. Despite the interest in this concept, a practical device has yet to emerge. It is desirable for optimal system performance to design for a very low mass or mass moment of inertia ratio. The device operating range, in particular, is maximized below the vortex-induced vibration critical point where an infinite resonant response region is realized. An unfortunate consequence of this requirement is large buoyancy forces that need to be mitigated by gravity-based, suction-caisson or anchor mooring systems. The focus of this paper is the testing of a novel VIV marine current energy harvesting configuration that utilizes a symmetrical and balanced pair of horizontal pivoted cylinders. The results of several years of experimental investigation, utilizing the University of Wollongong fluid mechanics laboratory towing tank, are analyzed and presented. A reduced velocity test range of 0 to 60 was covered across a large array of device configurations. In particular, power take-off damping ratios spanning from 0.044 to critical damping were examined in order to determine the optimal conditions and hence the maximum device energy conversion efficiency. The experiments conducted revealed acceptable energy conversion efficiencies of around 16% and desirable low flow-speed operating ranges when compared to traditional turbine technology. The potentially out-of-phase spanwise VIV cells on each arm of the device synchronized naturally as no decrease in amplitude response and comparable energy conversion efficiencies to the single cylinder arrangement were observed. In addition to the spatial design benefits related to the horizontal device orientation, the main advantage demonstrated by the current symmetrical horizontal configuration is to allow large velocity range resonant response conditions without the excessive buoyancy. The novel configuration proposed shows clear promise in overcoming many of the practical implementation issues related to flow-induced vibration marine current energy harvesting.

Keywords: flow-induced vibration, vortex-induced vibration, energy harvesting, tidal energy

Procedia PDF Downloads 146
7172 Geometrical Based Unequal Droplet Splitting Using Microfluidic Y-Junction

Authors: Bahram Talebjedi, Amirmohammad Sattari, Ahmed Zoher Sihorwala, Mina Hoorfar

Abstract:

Among different droplet manipulations, controlled droplet-splitting is of great significance due to its ability to increase throughput and operational capability. Furthermore, unequal droplet-splitting can provide greater flexibility and a wider range of dilution factors. In this study, we developed two-dimensional, time-dependent complex fluid dynamics simulations to model droplet formation in a flow focusing device, followed by splitting in a Y-shaped junction with sub-channels of unequal widths. From the results obtained from the numerical study, we correlated the diameters of the droplets in the sub-channels to the Weber number, thereby demarcating the droplet splitting and non-splitting regimes.

Keywords: microfluidics, unequal droplet splitting, two phase flow, flow focusing device

Procedia PDF Downloads 167
7171 The Effect of Sustainable Land Management Technologies on Food Security of Farming Households in Kwara State, Nigeria

Authors: Shehu A. Salau, Robiu O. Aliu, Nofiu B. Nofiu

Abstract:

Nigeria is among countries of the world confronted with food insecurity problem. The agricultural production systems that produces food for the teaming population is not endurable. Attention is thus being given to alternative approaches of intensification such as the use of Sustainable Land Management (SLM) technologies. Thus, this study assessed the effect of SLM technologies on food security of farming households in Kwara State, Nigeria. A-three stage sampling technique was used to select a sample of 200 farming households for this study. Descriptive statistics, Shriar index, Likert scale, food security index and logistic regression were employed for the analysis. The result indicated that majority (41%) of the household heads were between the ages of 51 and 70 years with an average of 60.5 years. Food security index revealed that 35% and 65% of the households were food secure and food insecure respectively. The logistic regression showed that SLM technologies, estimated income, household size, gender and age of the household heads were the critical determinants of food security among farming households. The most effective coping strategies adopted by households geared towards lessening the effects of food insecurity are reduced quality of food consumed, employed off-farm jobs to raise household income and diversion of money budgeted for other uses to purchase foods. Governments should encourage the adoption and use of SLM technologies at all levels. Policies and strategies that reduce household size should be enthusiastically pursued to reduce food insecurity.

Keywords: agricultural practices, coping strategies, farming households, food security, SLM technologies, logistic regression

Procedia PDF Downloads 173
7170 Blood Flow Estimator of the Left Ventricular Assist Device Based in Look-Up-Table: In vitro Tests

Authors: Tarcisio F. Leao, Bruno Utiyama, Jeison Fonseca, Eduardo Bock, Aron Andrade

Abstract:

This work presents a blood flow estimator based in Look-Up-Table (LUT) for control of Left Ventricular Assist Device (LVAD). This device has been used as bridge to transplantation or as destination therapy to treat patients with heart failure (HF). Destination Therapy application requires a high performance LVAD; thus, a stable control is important to keep adequate interaction between heart and device. LVAD control provides an adequate cardiac output while sustaining an appropriate flow and pressure blood perfusion, also described as physiologic control. Because thrombus formation and system reliability reduction, sensors are not desirable to measure these variables (flow and pressure blood). To achieve this, control systems have been researched to estimate blood flow. LVAD used in the study is composed by blood centrifugal pump, control, and power supply. This technique used pump and actuator (motor) parameters of LVAD, such as speed and electric current. Estimator relates electromechanical torque (motor or actuator) and hydraulic power (blood pump) via LUT. An in vitro Mock Loop was used to evaluate deviations between blood flow estimated and actual. A solution with glycerin (50%) and water was used to simulate the blood viscosity with hematocrit 45%. Tests were carried out with variation hematocrit: 25%, 45% and 58% of hematocrit, or 40%, 50% and 60% of glycerin in water solution, respectively. Test with bovine blood was carried out (42% hematocrit). Mock Loop is composed: reservoir, tubes, pressure and flow sensors, and fluid (or blood), beyond LVAD. Estimator based in LUT is patented, number BR1020160068363, in Brazil. Mean deviation is 0.23 ± 0.07 L/min for mean flow estimated. Larger mean deviation was 0.5 L/min considering hematocrit variation. This estimator achieved deviation adequate for physiologic control implementation. Future works will evaluate flow estimation performance in control system of LVAD.

Keywords: blood pump, flow estimator, left ventricular assist device, look-up-table

Procedia PDF Downloads 186
7169 Effect of National Sovereignty of Non-Citizens Human Rights Standards: Mediterranean Irregular Immigrants Case

Authors: Azin Karami, Bahareh Heydari

Abstract:

There is a difference between national sovereignty ( national security guarantee) and human rights standards (human security guarantee). Under the pretext of providing security for the majority, Governments violate human rights standards and lead to populism. This paper illustrates despite the human rights standards of non-citizens, they mostly confront different practical and social realities. (a large gap between the reality and the truth). This paper has focused on one of vulnerable irregular non-citizens immigrants from Mediterranean . In addition, it has considered challenges of the basic and primary human rights standards of this group. It shows how government policies affect the flow of irregular immigration. This paper is based upon UN data about Mediterranean immigrants and polls answered by 68 people who intended to migrate from Mediterranean (28 female and 40 male people, the average age of 30 to 40). The model is supposed to be a convenient one to present objective, real evidence of irregular immigrants and discusses the challenges that this group of immigrants confront them .This paper shows clear concept of immigrants.

Keywords: human rights, human security, national sovereignty, irregular immigrants

Procedia PDF Downloads 183
7168 Secure Automatic Key SMS Encryption Scheme Using Hybrid Cryptosystem: An Approach for One Time Password Security Enhancement

Authors: Pratama R. Yunia, Firmansyah, I., Ariani, Ulfa R. Maharani, Fikri M. Al

Abstract:

Nowadays, notwithstanding that the role of SMS as a means of communication has been largely replaced by online applications such as WhatsApp, Telegram, and others, the fact that SMS is still used for certain and important communication needs is indisputable. Among them is for sending one time password (OTP) as an authentication media for various online applications ranging from chatting, shopping to online banking applications. However, the usage of SMS does not pretty much guarantee the security of transmitted messages. As a matter of fact, the transmitted messages between BTS is still in the form of plaintext, making it extremely vulnerable to eavesdropping, especially if the message is confidential, for instance, the OTP. One solution to overcome this problem is to use an SMS application which provides security services for each transmitted message. Responding to this problem, in this study, an automatic key SMS encryption scheme was designed as a means to secure SMS communication. The proposed scheme allows SMS sending, which is automatically encrypted with keys that are constantly changing (automatic key update), automatic key exchange, and automatic key generation. In terms of the security method, the proposed scheme applies cryptographic techniques with a hybrid cryptosystem mechanism. Proofing the proposed scheme, a client to client SMS encryption application was developed using Java platform with AES-256 as encryption algorithm, RSA-768 as public and private key generator and SHA-256 for message hashing function. The result of this study is a secure automatic key SMS encryption scheme using hybrid cryptosystem which can guarantee the security of every transmitted message, so as to become a reliable solution in sending confidential messages through SMS although it still has weaknesses in terms of processing time.

Keywords: encryption scheme, hybrid cryptosystem, one time password, SMS security

Procedia PDF Downloads 128
7167 Climbing up to Safety and Security: The Facilitation of an NGO Awareness Culture

Authors: Mirad Böhm, Diede De Kok

Abstract:

It goes without saying that for many NGOs a high level of safety and security are crucial issues, which often necessitates the support of military personnel to varying degrees. The relationship between military and NGO personnel is usually a difficult one and while there has been progress, clashes naturally still occur owing to different interpretations of mission objectives amongst many other challenges. NGOs tend to view safety and security as necessary steps towards their goal instead of fundamental pillars of their core ‘business’. The military perspective, however, considers them primary objectives; thus, frequently creating a different vision of how joint operations should be conducted. This paper will argue that internalizing safety and security into the NGO organizational culture is compelling in order to ensure a more effective cooperation with military partners and, ultimately, to achieve their goals. This can be accomplished through a change in perception of safety and security concepts as a fixed and major point on the everyday agenda. Nowadays, there are several training programmes on offer addressing such issues but they primarily focus on the individual level. True internalization of these concepts should reach further by encompassing a wide range of NGO activities, beginning with daily proceedings in office facilities far from conflict zones including logistical and administrative tasks such as budgeting, and leading all the way to actual and potentially hazardous missions in the field. In order to effectuate this change, a tool is required to help NGOs realize, firstly, how they perceive and define safety and security, and secondly, how they can adjust this perception to their benefit. The ‘safety culture ladder’ is a concept that suggests what organizations can and should do to advance their safety. While usually applied to private industrial scenarios, this work will present the concept as a useful instrument to visualize and facilitate the internalization process NGOs ought to go through. The ‘ladder’ allows them to become more aware of the level of their safety and security measures, and moreover, cautions them to take these measures proactively rather than reactively. This in turn will contribute to a rapprochement between military and NGO priority setting in regard to what constitutes a safe working environment.

Keywords: NGO-military cooperation, organisational culture, safety and security awareness, safety culture ladder

Procedia PDF Downloads 331
7166 Movable Airfoil Arm (MAA) and Ducting Effect to Increase the Efficiency of a Helical Turbine

Authors: Abdi Ismail, Zain Amarta, Riza Rifaldy Argaputra

Abstract:

The Helical Turbine has the highest efficiency in comparison with the other hydrokinetic turbines. However, the potential of the Helical Turbine efficiency can be further improved so that the kinetic energy of a water current can be converted into mechanical energy as much as possible. This paper explains the effects by adding a Movable Airfoil Arm (MAA) and ducting on a Helical Turbine. The first research conducted an analysis of the efficiency comparison between a Plate Arm Helical Turbine (PAHT) versus a Movable Arm Helical Turbine Airfoil (MAAHT) at various water current velocities. The first step is manufacturing a PAHT and MAAHT. The PAHT and MAAHT has these specifications (as a fixed variable): 80 cm in diameter, a height of 88 cm, 3 blades, NACA 0018 blade profile, a 10 cm blade chord and a 60o inclination angle. The MAAHT uses a NACA 0012 airfoil arm that can move downward 20o, the PAHT uses a 5 mm plate arm. At the current velocity of 0.8, 0.85 and 0.9 m/s, the PAHT respectively generates a mechanical power of 92, 117 and 91 watts (a consecutive efficiency of 16%, 17% and 11%). At the same current velocity variation, the MAAHT respectively generates 74, 60 and 43 watts (a consecutive efficiency of 13%, 9% and 5%). Therefore, PAHT has a better performance than the MAAHT. Using analysis from CFD (Computational Fluid Dynamics), the drag force of MAA is greater than the one generated by the plate arm. By using CFD analysis, the drag force that occurs on the MAA is more dominant than the lift force, therefore the MAA can be called a drag device, whereas the lift force that occurs on the helical blade is more dominant than the drag force, therefore it can be called a lift device. Thus, the lift device cannot be combined with the drag device, because the drag device will become a hindrance to the lift device rotation. The second research conducted an analysis of the efficiency comparison between a Ducted Helical Turbine (DHT) versus a Helical Turbine (HT) through experimental studies. The first step is manufacturing the DHT and HT. The Helical turbine specifications (as a fixed variable) are: 40 cm in diameter, a height of 88 cm, 3 blades, NACA 0018 blade profile, 10 cm blade chord and a 60o inclination angle. At the current speed of 0.7, 0.8, 0.9 and 1.1 m/s, the HT respectively generates a mechanical power of 72, 85, 93 and 98 watts (a consecutive efficiency of 38%, 30%, 23% and 13%). At the same current speed variation, the DHT generates a mechanical power of 82, 98, 110 and 134 watts (a consecutive efficiency of 43%, 34%, 27% and 18%), respectively. The usage of ducting causes the water current speed around the turbine to increase.

Keywords: hydrokinetic turbine, helical turbine, movable airfoil arm, ducting

Procedia PDF Downloads 371
7165 Hysteresis in Sustainable Two-layer Circular Tube under a Lateral Compression Load

Authors: Ami Nomura, Ken Imanishi, Etsuko Ueda, Tadahiro Wada, Shinichi Enoki

Abstract:

Recently, there have been a lot of earthquakes in Japan. It is necessary to promote seismic isolation devices for buildings. The devices have been hardly diffused in attached houses, because the devices are very expensive. We should develop a low-cost seismic isolation device for detached houses. We suggested a new seismic isolation device which uses a two-layer circular tube as a unit. If hysteresis is produced in the two-layer circular tube under lateral compression load, we think that the two-layer circular tube can have energy absorbing capacity. It is necessary to contact the outer layer and the inner layer to produce hysteresis. We have previously reported how the inner layer comes in contact with the outer layer from a perspective of analysis used mechanics of materials. We have clarified that the inner layer comes in contact with the outer layer under a lateral compression load. In this paper, we explored contact area between the outer layer and the inner layer under a lateral compression load by using FEA. We think that changing the inner layer’s thickness is effective in increase the contact area. In order to change the inner layer’s thickness, we changed the shape of the inner layer. As a result, the contact area changes depending on the inner layer’s thickness. Additionally, we experimented to check whether hysteresis occurs in fact. As a consequence, we can reveal hysteresis in the two-layer circular tube under the condition.

Keywords: contact area, energy absorbing capacity, hysteresis, seismic isolation device

Procedia PDF Downloads 295
7164 A New Type Safety-Door for Earthquake Disaster Prevention: Part I

Authors: Daniel Y. Abebe, Jaehyouk Choi

Abstract:

From the past earthquake events, many people get hurt at the exit while they are trying to go out of the buildings because of the exit doors are unable to be opened. The door is not opened because it deviates from its the original position. The aim of this research is to develop and evaluate a new type safety door that keeps the door frame in its original position or keeps its edge angles perpendicular during and post-earthquake. The proposed door is composed of three components: outer frame joined to the wall, inner frame (door frame) and circular hollow section connected to the inner and outer frame which is used as seismic energy dissipating device.

Keywords: safety-door, earthquake disaster, low yield point steel, passive energy dissipating device, FE analysis

Procedia PDF Downloads 526
7163 MSG Image Encryption Based on AES and RSA Algorithms "MSG Image Security"

Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad

Abstract:

In this paper, we propose a new encryption system for security issues meteorological images from Meteosat Second Generation (MSG), which generates 12 images every 15 minutes. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every 15 minutes that will be used to encrypt each frame of the MSG meteorological basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, satellite MSG, encryption, decryption, key, correlation

Procedia PDF Downloads 383
7162 The Research of Reliability of MEMS Device under Thermal Shock Test in Space Mission

Authors: Liu Ziyu, Gao Yongfeng, Li Muhua, Zhao Jiahao, Meng Song

Abstract:

The effect of thermal shock on the operation of micro electromechanical systems (MEMS) were examined. All MEMS device were tested before and after three different conditions of thermal shock (from -55℃ to 85℃, from -65℃ to 125℃, from -65℃ to 200℃). The micro lens showed no changes after thermal shock, which shows that the design of the micro lens can be well adapted to the application environment in the space. The design of the micro mirror can be well adapted to the space application environment. The micro-magnetometer, RF MEMS switch and the micro accelerometer exhibited degradation and parameter drift after thermal shock, potential mechanical was proposed.

Keywords: MEMS, thermal shock test, reliability, space environment

Procedia PDF Downloads 590
7161 How to Applicate Knowledge Management in Security Environment within the Scope of Optimum Balance Model

Authors: Hakan Erol, Altan Elibol, Ömer Eryılmaz, Mehmet Şimşek

Abstract:

Organizations aim to manage information in a most possible effective way for sustainment and development. In doing so, they apply various procedures and methods. The very same situation is valid for each service of Armed Forces. During long-lasting endeavors such as shaping and maintaining security environment, supporting and securing peace, knowledge management is a crucial asset. Optimum Balance Model aims to promote the system from a decisive point to a higher decisive point. In this context, this paper analyses the application of optimum balance model to knowledge management in Armed Forces and tries to find answer to the question how Optimum Balance Model is integrated in knowledge management.

Keywords: optimum balance model, knowledge management, security environment, supporting peace

Procedia PDF Downloads 398
7160 Use of a Novel Intermittent Compression Shoe in Reducing Lower Limb Venous Stasis

Authors: Hansraj Riteesh Bookun, Cassandra Monique Hidajat

Abstract:

This pilot study investigated the efficacy of a newly designed shoe which will act as an intermittent pneumatic compression device to augment venous flow in the lower limb. The aim was to assess the degree with which a wearable intermittent compression device can increase the venous flow in the popliteal vein. Background: Deep venous thrombosis and chronic venous insufficiency are relatively common problems with significant morbidity and mortality. While mechanical and chemical thromboprophylaxis measures are in place in hospital environments (in the form of TED stockings, intermittent pneumatic compression devices, analgesia, antiplatelet and anticoagulant agents), there are limited options in a community setting. Additionally, many individuals are poorly tolerant of graduated compression stockings due to the difficulty in putting them on, their constant tightness and increased associated discomfort in warm weather. These factors may hinder the management of their chronic venous insufficiency. Method: The device is lightweight, easy to wear and comfortable, with a self-contained power source. It features a Bluetooth transmitter and can be controlled with a smartphone. It is externally almost indistinguishable from a normal shoe. During activation, two bladders are inflated -one overlying the metatarsal heads and the second at the pedal arch. The resulting cyclical increase in pressure squeezes blood into the deep venous system. This will decrease periods of stasis and potentially reduce the risk of deep venous thrombosis. The shoe was fitted to 2 healthy participants and the peak systolic velocity of flow in the popliteal vein was measured during and prior to intermittent compression phases. Assessments of total flow volume were also performed. All haemodynamic assessments were performed with ultrasound by a licensed sonographer. Results: Mean peak systolic velocity of 3.5 cm/s with standard deviation of 1.3 cm/s were obtained. There was a three fold increase in mean peak systolic velocity and five fold increase in total flow volume. Conclusion: The device augments venous flow in the leg significantly. This may contribute to lowered thromboembolic risk during periods of prolonged travel or immobility. This device may also serve as an adjunct in the treatment of chronic venous insufficiency. The study will be replicated on a larger scale in a multi—centre trial.

Keywords: venous, intermittent compression, shoe, wearable device

Procedia PDF Downloads 194
7159 A Secure Survey against Black Hole Attack in MANET

Authors: G. Usha, S. Kannimuthu, K. Mahalakshmi

Abstract:

Mobile Adhoc Network (MANET) is one of the most promising technologies that have applications ranging from various portable devices to military networks. MANET has no fixed infrastructure and the security of such network is a big concern. Therefore, in order to operate MANET’s securely, the misbehavior and intrusions should be detected before the attackers affect the network communication. In this article, we make a comprehensive survey against black hole attack that is a serious threat against MANET that exploits the routing behavior of the MANET. We have given broad survey solutions that detect black hole attacks in MANET. This is achieved by analyzing the techniques involved in detecting the attacks in each scheme. Furthermore, we examine about the challenges to the researchers for constructing an in-depth solution against black hole attack.

Keywords: AODV, cross layer security, mobile Adhoc network (MANET), packet delivery ratio, single layer security

Procedia PDF Downloads 406
7158 Synthesis of Pyrimidine-Based Polymers Consist of 2-{4-[4,6-Bis-(4-Hexyl-Thiophen-2-yl)-Pyrimidin-2-yl]-Phenyl}-Thiazolo[5,4-B]Pyridine with Deep HOMO Level for Photovoltaics

Authors: Hyehyeon Lee, Jiwon Yu, Juwon Kim, Raquel Kristina Leoni Tumiar, Taewon Kim, Juae Kim, Hongsuk Suh

Abstract:

Photovoltaics, which have many advantages in cost, easy processing, and light-weight, have attracted attention. We synthesized pyrimidine-based conjugated polymers with 2-{4-[4,6-bis-(4-hexyl-thiophen-2-yl)-pyrimidin-2-yl]-phenyl}-thiazolo[5,4-b]pyridine (pPTP) which have an ability of powerful electron withdrawing and introduced into the PSCs. By Stille polymerization, we designed the conjugated polymers, pPTPBDT-12, pPTPBDT-EH, pPTPBDTT-EH and pPTPTTI. The HOMO energy levels of four polymers (pPTPBDT-12, pPTPBDT-EH, pPTPBDTT-EH and pPTPTTI) were at -5.61 ~ -5.89 eV, their LUMO (Lowest Unoccupied Molecular Orbital) energy levels were at -3.95 ~ -4.09 eV. The device including pPTPBDT-12 and PC71BM (1:2) indicated a V_oc of 0.67 V, a J_sc of 1.33 mA/cm², and a fill factor (FF) of 0.25, giving a power conversion efficiency (PCE) of 0.23%. The device including pPTPBDT-EH and PC71BM (1:2) indicated a V_oc of 0.72 V, a J_sc of 2.56 mA/cm², and a fill factor (FF) of 0.30, giving a power conversion efficiency of 0.56%. The device including pPTPBDTT-EH and PC71BM (1:2) indicated a V_oc of 0.72 V, a J_sc of 3.61 mA/cm², and a fill factor (FF) of 0.29, giving a power conversion efficiency of 0.74%. The device including pPTPTTI and PC71BM (1:2) indicated a V_oc of 0.83 V, a J_sc of 4.41 mA/cm², and a fill factor (FF) of 0.31, giving a power conversion efficiency of 1.13%. Therefore, pPTPBDT-12, pPTPBDT-EH, pPTPBDTT-EH, and pPTPTTI were synthesized by Stille polymerization. And We find one of the best efficiency for these polymers, called pPTPTTI. Their optical properties were measured and the results show that pyrimidine-based polymers especially like pPTPTTI have a great promise to act as the donor of the active layer.

Keywords: polymer solar cells, pyrimidine-based polymers, photovoltaics, conjugated polymer

Procedia PDF Downloads 198
7157 Democracy and Security Challenge in Nigeria, 1999, Till Date

Authors: Abdulsalami M. Deji

Abstract:

Prolonged military incursion in Nigeria politics which favored the oligarchy brought agitation for democratic rule it exacerbated ethnicity integration of minority for fear of domination. The advent of democracy ushered in new breath of life to Nigerians from the shackle of military oppression to democratic governance. Democratic rule became a mirage as a result of prevalent insecurity in Nigeria; effort to bring lasting peace to all sections of the country had not yielded positive result till date. In the process of struggling for democracy among ethnic groups in Nigeria, they had instituted various militia groups defending the interest of their identity due to unequal distribution of wealth by military junta. When democracy came on board, these various militia groups became demons hunting democratic institutions. Quest by the successful government to find lasting solution has proved abortive. The security of politics which guaranteed stability is not visible in Nigeria, what we have now is politics of security. The unrest in Nigeria today has cripple socio-political and economy of the nation; the growth of economy favored elites without meaningful impact on the common man. This paper focus on the effects of democracy on Nigerians and, how security under democratic rule has hindered dividends of democracy since 1999-till date and way forward. The source is strictly base on secondary source from textbook, newspapers, internet, and journals.

Keywords: democracy, interest, militia, security

Procedia PDF Downloads 335
7156 Nitrogen Doping Effect on Enhancement of Electrochemical Performance of a Carbon Nanotube Based Microsupercapacitor

Authors: Behnoush Dousti, Ye Choi, Gil S. Lee

Abstract:

Microsupercapacitors (MScs) are known as the future of miniaturized energy sources that can be coupled to a battery to deliver stable and constant energy to microelectronics. Among all their counterparts, electrochemical microsupercapacitor have drawn the most research attention due to their higher power density and long cycle life. Designing the microstructure and choosing the electroactive materials are two significant factors that greatly affect the performance of the device. Here, we report successful fabrication and characterization of a microsupercapacitor with interdigitated structure based on Carbon nanotube sheets (CNT sheet). Novel structure of highly aligned CNT sheet as the electrode materials which also offers excellent conductivity and large surface area along with doping with nitrogen, enabled us to develop a device with serval order of magnitude higher electrochemical performance than the pristine CNT in aqueous electrolyte including high specific capacitance and rate capabilities and excellent cycle life over 10000 cycles. Geometric parameters such as finger width and gap size were also studied and it was shown the device performance is much depended on them. Results of this study confirms the potential of CNT sheet for future energy storage devices.

Keywords: carbon nanotube, energy storage systems, microsupercapacitor, nitrogen doping

Procedia PDF Downloads 132
7155 FEDBD Plasma, A Promising Approach for Skin Rejuvenation

Authors: P. Charipoor, M. Khani, H. Mahmoudi, E. Ghasemi, P. Akbartehrani, B. Shokri

Abstract:

Cold air plasma could have a variety of effects on cells and living organisms and also shows good results in medical and cosmetic cases. Herein, plasma floating electrode dielectric barrier discharge (FEDBD) plasma was designed for mouse skin rejuvenation purposes. It is safe and easy to use in clinics, laboratories, and homes. The effects of this device were investigated on mouse skin. Vitamin C ointment in combination with plasma was also used as a new method to improve FEDBD results. In this study, 20 Wistar rats were evaluated in four groups. The first group received high-dose plasma, the second group received moderate-dose plasma (with vitamin C cream), the third group received low-dose plasma (with vitamin C cream) for 6 minutes, and the fourth group received only vitamin C cream. This process was done 3 times a week for 4 weeks. Skin temperature was monitored to evaluate the thermal effect of plasma. The presence of reactive species was also demonstrated using optical spectroscopy. Mechanical assays were performed to evaluate the effect of plasma and vitamin C on the mechanical strength of the tissue, which showed a positive effect of plasma on the treated tissue compared to the control group. Using pathological and biometric skin tests, an increase in collagen levels, epidermal thickness, and an increase in fibroblasts was observed in rat skin, as well as increased skin elasticity. This study showed the positive effect of using the FEDBD plasma device on the effective parameters in skin rejuvenation.

Keywords: plasma, skin rejuvenation, collagen, epidermal thickness

Procedia PDF Downloads 258
7154 Tensile Strength of Asphalt Concrete Due to Moisture Conditioning

Authors: R. Islam, Rafiqul A. Tarefder

Abstract:

This study investigates the effect of moisture conditioning on the Indirect Tensile Strength (ITS) of asphalt concrete. As a first step, cylindrical samples of 100 mm diameter and 50 mm thick were prepared using a Superpave gyratory compactor. Next, the samples were conditioned using Moisture Induced Susceptibility Test (MIST) device at different numbers of moisture conditioning cycles. In the MIST device, samples are subjected water pressure through the sample pores cyclically. The MIST conditioned samples were tested for ITS. Results show that the ITS does not change significantly with MIST conditioning at the specific pressure and cycles adopted in this study.

Keywords: asphalt concrete, tensile strength, moisture, laboratory test

Procedia PDF Downloads 381
7153 Applications of Multi-Path Futures Analyses for Homeland Security Assessments

Authors: John Hardy

Abstract:

A range of future-oriented intelligence techniques is commonly used by states to assess their national security and develop strategies to detect and manage threats, to develop and sustain capabilities, and to recover from attacks and disasters. Although homeland security organizations use future's intelligence tools to generate scenarios and simulations which inform their planning, there have been relatively few studies of the methods available or their applications for homeland security purposes. This study presents an assessment of one category of strategic intelligence techniques, termed Multi-Path Futures Analyses (MPFA), and how it can be applied to three distinct tasks for the purpose of analyzing homeland security issues. Within this study, MPFA are categorized as a suite of analytic techniques which can include effects-based operations principles, general morphological analysis, multi-path mapping, and multi-criteria decision analysis techniques. These techniques generate multiple pathways to potential futures and thereby generate insight into the relative influence of individual drivers of change, the desirability of particular combinations of pathways, and the kinds of capabilities which may be required to influence or mitigate certain outcomes. The study assessed eighteen uses of MPFA for homeland security purposes and found that there are five key applications of MPFA which add significant value to analysis. The first application is generating measures of success and associated progress indicators for strategic planning. The second application is identifying homeland security vulnerabilities and relationships between individual drivers of vulnerability which may amplify or dampen their effects. The third application is selecting appropriate resources and methods of action to influence individual drivers. The fourth application is prioritizing and optimizing path selection preferences and decisions. The fifth application is informing capability development and procurement decisions to build and sustain homeland security organizations. Each of these applications provides a unique perspective of a homeland security issue by comparing a range of potential future outcomes at a set number of intervals and by contrasting the relative resource requirements, opportunity costs, and effectiveness measures of alternative courses of action. These findings indicate that MPFA enhances analysts’ ability to generate tangible measures of success, identify vulnerabilities, select effective courses of action, prioritize future pathway preferences, and contribute to ongoing capability development in homeland security assessments.

Keywords: homeland security, intelligence, national security, operational design, strategic intelligence, strategic planning

Procedia PDF Downloads 139
7152 Immobilizing Quorum Sensing Inhibitors on Biomaterial Surfaces

Authors: Aditi Taunk, George Iskander, Kitty Ka Kit Ho, Mark Willcox, Naresh Kumar

Abstract:

Bacterial infections on biomaterial implants and medical devices accounts for 60-70% of all hospital acquired infections (HAIs). Treatment or removal of these infected devices results in high patient mortality and morbidity along with increased hospital expenses. In addition, with no effective strategies currently available and rapid development of antibacterial resistance has made device-related infections extremely difficult to treat. Therefore, in this project we have developed biomaterial surfaces using antibacterial compounds that inhibit biofilm formation by interfering with the bacterial communication mechanism known as quorum sensing (QS). This study focuses on covalent attachment of potent quorum sensing (QS) inhibiting compounds, halogenated furanones (FUs) and dihydropyrrol-2-ones (DHPs), onto glass surfaces. The FUs were attached by photoactivating the azide groups on the surface, and the acid functionalized DHPs were immobilized on amine surface via EDC/NHS coupling. The modified surfaces were tested in vitro against pathogenic organisms such as Staphylococcus aureus and Pseudomonas aeruginosa using confocal laser scanning microscopy (CLSM). Successful attachment of compounds on the substrates was confirmed by X-ray photoelectron spectroscopy (XPS) and contact angle measurements. The antibacterial efficacy was assessed, and significant reduction in bacterial adhesion and biofilm formation was observed on the FU and DHP coated surfaces. The activity of the coating was dependent upon the type of substituent present on the phenyl group of the DHP compound. For example, the ortho-fluorophenyl DHP (DHP-2) exhibited 79% reduction in bacterial adhesion against S. aureus and para-fluorophenyl DHP (DHP-3) exhibited 70% reduction against P. aeruginosa. The results were found to be comparable to DHP coated surfaces prepared in earlier study via Michael addition reaction. FUs and DHPs were able to retain their in vitro antibacterial efficacy after covalent attachment via azide chemistry. This approach is a promising strategy to develop efficient antibacterial biomaterials to reduce device related infections.

Keywords: antibacterial biomaterials, biomedical device-related infections, quorum sensing, surface functionalization

Procedia PDF Downloads 268
7151 Partnering with Stakeholders to Secure Digitization of Water

Authors: Sindhu Govardhan, Kenneth G. Crowther

Abstract:

Modernisation of the water sector is leading to increased connectivity and integration of emerging technologies with traditional ones, leading to new security risks. The convergence of Information Technology (IT) with Operation Technology (OT) results in solutions that are spread across larger geographic areas, increasingly consist of interconnected Industrial Internet of Things (IIOT) devices and software, rely on the integration of legacy with modern technologies, use of complex supply chain components leading to complex architectures and communication paths. The result is that multiple parties collectively own and operate these emergent technologies, threat actors find new paths to exploit, and traditional cybersecurity controls are inadequate. Our approach is to explicitly identify and draw data flows that cross trust boundaries between owners and operators of various aspects of these emerging and interconnected technologies. On these data flows, we layer potential attack vectors to create a frame of reference for evaluating possible risks against connected technologies. Finally, we identify where existing controls, mitigations, and other remediations exist across industry partners (e.g., suppliers, product vendors, integrators, water utilities, and regulators). From these, we are able to understand potential gaps in security, the roles in the supply chain that are most likely to effectively remediate those security gaps, and test cases to evaluate and strengthen security across these partners. This informs a “shared responsibility” solution that recognises that security is multi-layered and requires collaboration to be successful. This shared responsibility security framework improves visibility, understanding, and control across the entire supply chain, and particularly for those water utilities that are accountable for safe and continuous operations.

Keywords: cyber security, shared responsibility, IIOT, threat modelling

Procedia PDF Downloads 77
7150 Study on Hysteresis in Sustainable Two-Layer Circular Tube under a Lateral Compression Load

Authors: Ami Nomura, Ken Imanishi, Yukinori Taniguchi, Etsuko Ueda, Tadahiro Wada, Shinichi Enoki

Abstract:

Recently, there have been a lot of earthquakes in Japan. It is necessary to promote seismic isolation devices for buildings. The devices have been hardly diffused in attached houses, because the devices are very expensive. We should develop a low-cost seismic isolation device for detached houses. We suggested a new seismic isolation device which uses a two-layer circular tube as a unit. If hysteresis is produced in the two-layer circular tube under lateral compression load, we think that the two-layer circular tube can have energy absorbing capacity. It is necessary to contact the outer layer and the inner layer to produce hysteresis. We have previously reported how the inner layer comes in contact with the outer layer from a perspective of analysis used mechanics of materials. We have clarified that the inner layer comes in contact with the outer layer under a lateral compression load. In this paper, we explored contact area between the outer layer and the inner layer under a lateral compression load by using FEA. We think that changing the inner layer’s thickness is effective in increase the contact area. In order to change the inner layer’s thickness, we changed the shape of the inner layer. As a result, the contact area changes depending on the inner layer’s thickness. Additionally, we experimented to check whether hysteresis occurs in fact. As a consequence, we can reveal hysteresis in the two-layer circular tube under the condition.

Keywords: contact area, energy absorbing capacity, hysteresis, seismic isolation device

Procedia PDF Downloads 361
7149 The Utility and the Consequences of Counter Terrorism Financing

Authors: Fatemah Alzubairi

Abstract:

Terrorism financing is a theme that dramatically evolved post-9/11. Supra-national bodies, above all UN Security Council and the Financial Action Task Form (FATF), have established an executive-like mechanism, which allows blacklisting individuals and groups, freezing their funds, and restricting their travel, all of which have become part of states’ anti-terrorism frameworks. A number of problems arise from building counter-terrorism measures on the foundation of a vague definition of terrorism. This paper examines the utility and consequences of counter-terrorism financing with considering the lack of an international definition of terrorism. The main problem with national and international anti-terrorism legislation is the lack of a clear objective definition of terrorism. Most, if not all, national laws are broad and vague. Determining what terrorism remains the crucial underpinning of any successful discussion of counter-terrorism, and of the future success of counter-terrorist measures. This paper focuses on the legal and political consequences of equalizing the treatment of violent terrorist crimes, such as bombing, with non-violent terrorism-related crimes, such as funding terrorist groups. While both sorts of acts requires criminalization, treating them equally risks wrongfully or unfairly condemning innocent people who have associated with “terrorists” but are not involved in terrorist activities. This paper examines whether global obligations to counter terrorism financing focus on controlling terrorist groups more than terrorist activities. It also examines the utility of the obligations adopted by the UN Security Council and FATF, and whether they serve global security; or whether the utility is largely restricted to Western security, with little attention paid to the unique needs and demands of other regions.

Keywords: counter-terrorism, definition of terrorism, FATF, security, terrorism financing, UN Security Council

Procedia PDF Downloads 324
7148 Symmetric Arabic Language Encryption Technique Based on Modified Playfair Algorithm

Authors: Fairouz Beggas

Abstract:

Due to the large number of exchanges in the networks, the security of communications is essential. Most ways of keeping communication secure rely on encryption. In this work, a symmetric encryption technique is offered to encrypt and decrypt simple Arabic scripts based on a multi-level security. A proposed technique uses an idea of Playfair encryption with a larger table size and an additional layer of encryption to ensure more security. The idea of the proposed algorithm aims to generate a dynamic table that depends on a secret key. The same secret key is also used to create other secret keys to over-encrypt the plaintext in three steps. The obtained results show that the proposed algorithm is faster in terms of encryption/decryption speed and can resist to many types of attacks.

Keywords: arabic data, encryption, playfair, symmetric algorithm

Procedia PDF Downloads 89