Search results for: secure sockets layer/transport layer security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7340

Search results for: secure sockets layer/transport layer security

6530 Spatial Variability of Environmental Parameters and Its Relationship with an Environmental Injustice on the Bike Paths of Santiago, Chile

Authors: Alicia Muñoz, Pedro Oyola, Cristian Henriquez

Abstract:

Pollution in Santiago de Chile has a spatial variability due to different factors, including meteorological parameters and emission sources. Socioenvironmental aspects are also significant for pollution in the canopy layer since it influences the type of edification, vegetal mass proportion and other environmental conditions. This study analyzes spatially urban pollution in Santiago, specifically, from the bike path perspective. Bike paths are located in high traffic zones, as consequence, users are constantly exposed to urban pollution. Measurements were made at the higher polluted hour, three days a week, including three transit regimes, on the most polluted month of the year. The environmental parameters are fine particulate matter (Model 8520, DustTrak Aerosol Monitor, TSI), temperature and relative humidity; it was also considerate urban parameters as sky view factor and vegetal mass. Identification of an environmental injustice will be achieved with a spatial modeling, including all urban factors and environmental mediations with an economic index of population.

Keywords: canopy layer, environmental injustice, spatial modeling, urban pollution

Procedia PDF Downloads 231
6529 Optimizing the Location of Parking Areas Adapted for Dangerous Goods in the European Road Transport Network

Authors: María Dolores Caro, Eugenio M. Fedriani, Ángel F. Tenorio

Abstract:

The transportation of dangerous goods by lorries throughout Europe must be done by using the roads conforming the European Road Transport Network. In this network, there are several parking areas where lorry drivers can park to rest according to the regulations. According to the "European Agreement concerning the International Carriage of Dangerous Goods by Road", parking areas where lorries transporting dangerous goods can park to rest, must follow several security stipulations to keep safe the rest of road users. At this respect, these lorries must be parked in adapted areas with strict and permanent surveillance measures. Moreover, drivers must satisfy several restrictions about resting and driving time. Under these facts, one may expect that there exist enough parking areas for the transport of this type of goods in order to obey the regulations prescribed by the European Union and its member countries. However, the already-existing parking areas are not sufficient to cover all the stops required by drivers transporting dangerous goods. Our main goal is, starting from the already-existing parking areas and the loading-and-unloading location, to provide an optimal answer to the following question: how many additional parking areas must be built and where must they be located to assure that lorry drivers can transport dangerous goods following all the stipulations about security and safety for their stops? The sense of the word “optimal” is due to the fact that we give a global solution for the location of parking areas throughout the whole European Road Transport Network, adjusting the number of additional areas to be as lower as possible. To do so, we have modeled the problem using graph theory since we are working with a road network. As nodes, we have considered the locations of each already-existing parking area, each loading-and-unloading area each road bifurcation. Each road connecting two nodes is considered as an edge in the graph whose weight corresponds to the distance between both nodes in the edge. By applying a new efficient algorithm, we have found the additional nodes for the network representing the new parking areas adapted for dangerous goods, under the fact that the distance between two parking areas must be less than or equal to 400 km.

Keywords: trans-european transport network, dangerous goods, parking areas, graph-based modeling

Procedia PDF Downloads 280
6528 Synthesis of Flower-Like Silver Nanoarchitectures in Special Shapes and Their Applications in Surface-Enhanced Raman Scattering

Authors: Radka Králová, Libor Kvítek, Václav Ranc, Aleš Panáček, Radek Zbořil

Abstract:

Surface–Enhanced Raman Scattering (SERS) is an optical spectroscopic technique with very good potential for sensitive detection of substances. In this research, active substrates with high enhancement were provided. Novel silver particles (nanostructures) with high roughened, flower–like morphology were prepared by reduction of cation complex [Ag(NH3)2]+ in presence of sodium borohydride as reducing agent and stabilized polyacrylic acid. The products were characterized by UV/VIS absorption spectrophotometry. Special shapes of silver particles were determined by scanning electron microscopy (SEM) and transmission electron spectroscopy (TEM). Dispersions of this particle were put on fixed substrate to producing suitable layer for SERS. Adenine was applied as basic substance whose effect of enhancement on the layer of silver nanostructures was studied. By comparison with our work, the important influence of stabilizers, polyacrylic acid with various molecular weight and concentration, on the transfer of particles and formation of new structure was confirmed.

Keywords: metals, nanostructures, chemical reduction, Raman spectroscopy, optical properties

Procedia PDF Downloads 371
6527 A Smart Visitors’ Notification System with Automatic Secure Door Lock Using Mobile Communication Technology

Authors: Rabail Shafique Satti, Sidra Ejaz, Madiha Arshad, Marwa Khalid, Sadia Majeed

Abstract:

The paper presents the development of an automated security system to automate the entry of visitors, providing more flexibility of managing their record and securing homes or workplaces. Face recognition is part of this system to authenticate the visitors. A cost effective and SMS based door security module has been developed and integrated with the GSM network and made part of this system to allow communication between system and owner. This system functions in real time as when the visitor’s arrived it will detect and recognizes his face and on the result of face recognition process it will open the door for authorized visitors or notifies and allows the owner’s to take further action in case of unauthorized visitor. The proposed system is developed and it is successfully ensuring security, managing records and operating gate without physical interaction of owner.

Keywords: SMS, e-mail, GSM modem, authenticate, face recognition, authorized

Procedia PDF Downloads 789
6526 Effect of Eddy Irrigant Activation on Cleanliness of the Root Canal Wall during Pulpectomy of Primary Teeth

Authors: Rasha Sharaf, Nehal Sharaf

Abstract:

Pulpectomy of primary teeth aims to remove the necrotic pulp tissue from the infected root canal and clean the root canal walls from any remnant of pulp tissue. Different irrigant activation systems have been recently used, and one of these devices is the Eddy which helps in removal of smear layer and improves the intimate contact between the filling material and the root canal wall. Aim: To evaluate the efficacy of Eddy in cleanliness of the root canal during pulpectomy of primary teeth. Materials and methods: 45 freshly extracted primary anterior teeth were divided into 3 equal groups, in the 1st group sodium hypochlorite only was used during pulpectomy, in the 2nd group irrigation using sodium hypochlorite with file agitation was performed and in the 3rd group sodium hypochlorite was used with Eddy for irrigant activation. All samples were sectioned longitudinally and scanned using scanning electron microscope to evaluate the cleanliness of the root canals. Results: It was found that Eddy showed high efficacy in removal of smear layer during pulpectomy of primary teeth.

Keywords: Eddy, irrigant activation, irrigation, pulpectomy

Procedia PDF Downloads 152
6525 An Analytical Wall Function for 2-D Shock Wave/Turbulent Boundary Layer Interactions

Authors: X. Wang, T. J. Craft, H. Iacovides

Abstract:

When handling the near-wall regions of turbulent flows, it is necessary to account for the viscous effects which are important over the thin near-wall layers. Low-Reynolds- number turbulence models do this by including explicit viscous and also damping terms which become active in the near-wall regions, and using very fine near-wall grids to properly resolve the steep gradients present. In order to overcome the cost associated with the low-Re turbulence models, a more advanced wall function approach has been implemented within OpenFoam and tested together with a standard log-law based wall function in the prediction of flows which involve 2-D shock wave/turbulent boundary layer interactions (SWTBLIs). On the whole, from the calculation of the impinging shock interaction, the three turbulence modelling strategies, the Lauder-Sharma k-ε model with Yap correction (LS), the high-Re k-ε model with standard wall function (SWF) and analytical wall function (AWF), display good predictions of wall-pressure. However, the SWF approach tends to underestimate the tendency of the flow to separate as a result of the SWTBLI. The analytical wall function, on the other hand, is able to reproduce the shock-induced flow separation and returns predictions similar to those of the low-Re model, using a much coarser mesh.

Keywords: SWTBLIs, skin-friction, turbulence modeling, wall function

Procedia PDF Downloads 346
6524 A Computational Study of the Electron Transport in HgCdTe Bulk Semiconductor

Authors: N. Dahbi, M. Daoudi

Abstract:

This paper deals with the use of computational method based on Monte Carlo simulation in order to investigate the transport phenomena of the electron in HgCdTe narrow band gap semiconductor. Via this method we can evaluate the time dependence of the transport parameters: velocity, energy and mobility of electrons through matter (HgCdTe).

Keywords: Monte Carlo, transport parameters, HgCdTe, computational mechanics

Procedia PDF Downloads 475
6523 Gender Recognition with Deep Belief Networks

Authors: Xiaoqi Jia, Qing Zhu, Hao Zhang, Su Yang

Abstract:

A gender recognition system is able to tell the gender of the given person through a few of frontal facial images. An effective gender recognition approach enables to improve the performance of many other applications, including security monitoring, human-computer interaction, image or video retrieval and so on. In this paper, we present an effective method for gender classification task in frontal facial images based on deep belief networks (DBNs), which can pre-train model and improve accuracy a little bit. Our experiments have shown that the pre-training method with DBNs for gender classification task is feasible and achieves a little improvement of accuracy on FERET and CAS-PEAL-R1 facial datasets.

Keywords: gender recognition, beep belief net-works, semi-supervised learning, greedy-layer wise RBMs

Procedia PDF Downloads 453
6522 Role of SiOx Interlayer on Lead Oxide Electrodeposited on Stainless Steel for Promoting Electrochemical Treatment of Wastewater Containing Textile Dye

Authors: Hanene Akrout, Ines Elaissaoui, Sabrina Grassini, Daniele Fulginiti, Latifa Bousselmi

Abstract:

The main objective of this work is to investigate the efficiency of depollution power related to PbO₂ layer deposited onto a stainless steel (SS) substrate with SiOx as interlayer. The elaborated electrode was used as anode for anodic oxidation of wastewater containing Amaranth dye, as recalcitrant organic pollutant model. SiOx interlayer was performed using Plasma Enhanced Chemical Vapor Deposition ‘PECVD’ in plasma fed with argon, oxygen, and tetraethoxysilane (TEOS, Si precursor) in different ratios, onto the SS substrate. PbO₂ layer was produced by pulsed electrodeposition on SS/SiOx. The morphological of different surfaces are depicted with Field Emission Scanning Electron Microscope (FESEM) and the composition of the lead oxide layer was investigated by X-Ray Diffractometry (XRD). The results showed that the SiOx interlayer with more rich oxygen content improved better the nucleation of β-PbO₂ form. Electrochemical Impedance Spectroscopy (EIS) measurements undertaken on different interfaces (at optimized conditions) revealed a decrease of Rfilm while CPE film increases for SiOx interlayer, characterized by a more inorganic nature and deposited in a plasma fed by higher O2-to-TEOS ratios. Quantitative determinations of the Amaranth dye degradation rate were performed in terms of colour and COD removals, reaching a 95% and an 80% respectively removal at pH = 2 in 300 min. Results proved the improvement of the degradation wastewater containing the amaranth dye. During the electrolysis, the Amaranth dye solution was sampled at 30 min intervals and analyzed by ‘High-performance Liquid Chromatography’ HPLC. The gradual degradation of the Amaranth dye confirmed by the decrease in UV absorption using the SS/SiOx(20:20:1)/PbO₂ anode, the reaction exhibited an apparent first-order kinetic for electrolysis time of 5 hours, with an initial rate constant of about 0.02 min⁻¹.

Keywords: electrochemical treatment, PbO₂ anodes, COD removal, plasma

Procedia PDF Downloads 193
6521 The Benefits of Security Culture for Improving Physical Protection Systems at Detection and Radiation Measurement Laboratory

Authors: Ari S. Prabowo, Nia Febriyanti, Haryono B. Santosa

Abstract:

Security function that is called as Physical Protection Systems (PPS) has functions to detect, delay and response. Physical Protection Systems (PPS) in Detection and Radiation Measurement Laboratory needs to be improved continually by using internal resources. The nuclear security culture provides some potentials to support this research. The study starts by identifying the security function’s weaknesses and its strengths of security culture as a purpose. Secondly, the strengths of security culture are implemented in the laboratory management. Finally, a simulation was done to measure its effectiveness. Some changes were happened in laboratory personnel behaviors and procedures. All became more prudent. The results showed a good influence of nuclear security culture in laboratory security functions.

Keywords: laboratory, physical protection system, security culture, security function

Procedia PDF Downloads 185
6520 Stability Analysis of Three-Dimensional Flow and Heat Transfer over a Permeable Shrinking Surface in a Cu-Water Nanofluid

Authors: Roslinda Nazar, Amin Noor, Khamisah Jafar, Ioan Pop

Abstract:

In this paper, the steady laminar three-dimensional boundary layer flow and heat transfer of a copper (Cu)-water nanofluid in the vicinity of a permeable shrinking flat surface in an otherwise quiescent fluid is studied. The nanofluid mathematical model in which the effect of the nanoparticle volume fraction is taken into account is considered. The governing nonlinear partial differential equations are transformed into a system of nonlinear ordinary differential equations using a similarity transformation which is then solved numerically using the function bvp4c from Matlab. Dual solutions (upper and lower branch solutions) are found for the similarity boundary layer equations for a certain range of the suction parameter. A stability analysis has been performed to show which branch solutions are stable and physically realizable. The numerical results for the skin friction coefficient and the local Nusselt number as well as the velocity and temperature profiles are obtained, presented and discussed in detail for a range of various governing parameters.

Keywords: heat transfer, nanofluid, shrinking surface, stability analysis, three-dimensional flow

Procedia PDF Downloads 287
6519 Investigation of Lead and Zinc Oxide Deposits Using Geological and Geophysical Techniques at Oshiri Province in Onicha Local Government Area of Ebonyi State Located Within Southeastern Part of Nigeria, West Africa

Authors: Amaechi O. Azi, Uche D. Aluge, Lim H. San, Godwin A. Agbo

Abstract:

This paper is centered on the investigation of mineral deposits in selected locations in Oshiri province in Ebonyi State. Mineral deposits contribute immensely to the economic growth of a society. In researching lead and zinc oxide-bearing sites at Oshiri, geological and geophysical research technique was employed. Petrozenith, Earth Resistivity Meter, and Schlumberger setup were selected to examine the electrical characteristics of the subsurface. To determine the apparent resistivity of the subsurface, five soundings were taken, and the field data were processed using WinResist software. The mudstone, lead-shale, shale-granite, and lateritic topsoil were the four geoelectric strata that were found. The third layer, which corresponds to the shale-lead lithology, has a resistivity value between 211.9 m to 807.7 m at a depth of 25 m. Due to its resistivity levels and geological trend, this layer makes an excellent signature for lead-zinc occurrence. This zone is expected to house deposits of lead and zinc oxide in commercial quantity.

Keywords: Schlumberger, current, resistivity, lithology

Procedia PDF Downloads 76
6518 Examples of Techniques and Algorithms Used in Wlan Security

Authors: Vahid Bairami Rad

Abstract:

Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.

Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security

Procedia PDF Downloads 569
6517 Application of Rapid Prototyping to Create Additive Prototype Using Computer System

Authors: Meftah O. Bashir, Fatma A. Karkory

Abstract:

Rapid prototyping is a new group of manufacturing processes, which allows fabrication of physical of any complexity using a layer by layer deposition technique directly from a computer system. The rapid prototyping process greatly reduces the time and cost necessary to bring a new product to market. The prototypes made by these systems are used in a range of industrial application including design evaluation, verification, testing, and as patterns for casting processes. These processes employ a variety of materials and mechanisms to build up the layers to build the part. The present work was to build a FDM prototyping machine that could control the X-Y motion and material deposition, to generate two-dimensional and three-dimensional complex shapes. This study focused on the deposition of wax material. This work was to find out the properties of the wax materials used in this work in order to enable better control of the FDM process. This study will look at the integration of a computer controlled electro-mechanical system with the traditional FDM additive prototyping process. The characteristics of the wax were also analysed in order to optimize the model production process. These included wax phase change temperature, wax viscosity and wax droplet shape during processing.

Keywords: rapid prototyping, wax, manufacturing processes, shape

Procedia PDF Downloads 464
6516 Secure Mobile E-Business Applications

Authors: Hala A. Alrumaih

Abstract:

It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy. One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly. Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.

Keywords: e-business, mobile applications, risk mitigations, security assurance

Procedia PDF Downloads 295
6515 Blockchain Solutions for IoT Challenges: Overview

Authors: Amir Ali Fatoorchi

Abstract:

Regardless of the advantage of LoT devices, they have limitations like storage, compute, and security problems. In recent years, a lot of Blockchain-based research in IoT published and presented. In this paper, we present the Security issues of LoT. IoT has three levels of security issues: Low-level, Intermediate-level, and High-level. We survey and compare blockchain-based solutions for high-level security issues and show how the underlying technology of bitcoin and Ethereum could solve IoT problems.

Keywords: Blockchain, security, data security, IoT

Procedia PDF Downloads 210
6514 Correlation between Defect Suppression and Biosensing Capability of Hydrothermally Grown ZnO Nanorods

Authors: Mayoorika Shukla, Pramila Jakhar, Tejendra Dixit, I. A. Palani, Vipul Singh

Abstract:

Biosensors are analytical devices with wide range of applications in biological, chemical, environmental and clinical analysis. It comprises of bio-recognition layer which has biomolecules (enzymes, antibodies, DNA, etc.) immobilized over it for detection of analyte and transducer which converts the biological signal into the electrical signal. The performance of biosensor primarily the depends on the bio-recognition layer and therefore it has to be chosen wisely. In this regard, nanostructures of metal oxides such as ZnO, SnO2, V2O5, and TiO2, etc. have been explored extensively as bio-recognition layer. Recently, ZnO has the attracted attention of researchers due to its unique properties like high iso-electric point, biocompatibility, stability, high electron mobility and high electron binding energy, etc. Although there have been many reports on usage of ZnO as bio-recognition layer but to the authors’ knowledge, none has ever observed correlation between optical properties like defect suppression and biosensing capability of the sensor. Here, ZnO nanorods (ZNR) have been synthesized by a low cost, simple and low-temperature hydrothermal growth process, over Platinum (Pt) coated glass substrate. The ZNR have been synthesized in two steps viz. initially a seed layer was coated over substrate (Pt coated glass) followed by immersion of it into nutrient solution of Zinc nitrate and Hexamethylenetetramine (HMTA) with in situ addition of KMnO4. The addition of KMnO4 was observed to have a profound effect over the growth rate anisotropy of ZnO nanostructures. Clustered and powdery growth of ZnO was observed without addition of KMnO4, although by addition of it during the growth, uniform and crystalline ZNR were found to be grown over the substrate. Moreover, the same has resulted in suppression of defects as observed by Normalized Photoluminescence (PL) spectra since KMnO4 is a strong oxidizing agent which provides an oxygen rich growth environment. Further, to explore the correlation between defect suppression and biosensing capability of the ZNR Glucose oxidase (Gox) was immobilized over it, using physical adsorption technique followed by drop casting of nafion. Here the main objective of the work was to analyze effect of defect suppression over biosensing capability, and therefore Gox has been chosen as model enzyme, and electrochemical amperometric glucose detection was performed. The incorporation of KMnO4 during growth has resulted in variation of optical and charge transfer properties of ZNR which in turn were observed to have deep impact on biosensor figure of merits. The sensitivity of biosensor was found to increase by 12-18 times, due to variations introduced by addition of KMnO4 during growth. The amperometric detection of glucose in continuously stirred buffer solution was performed. Interestingly, defect suppression has been observed to contribute towards the improvement of biosensor performance. The detailed mechanism of growth of ZNR along with the overall influence of defect suppression on the sensing capabilities of the resulting enzymatic electrochemical biosensor and different figure of merits of the biosensor (Glass/Pt/ZNR/Gox/Nafion) will be discussed during the conference.

Keywords: biosensors, defects, KMnO4, ZnO nanorods

Procedia PDF Downloads 282
6513 Detection of Keypoint in Press-Fit Curve Based on Convolutional Neural Network

Authors: Shoujia Fang, Guoqing Ding, Xin Chen

Abstract:

The quality of press-fit assembly is closely related to reliability and safety of product. The paper proposed a keypoint detection method based on convolutional neural network to improve the accuracy of keypoint detection in press-fit curve. It would provide an auxiliary basis for judging quality of press-fit assembly. The press-fit curve is a curve of press-fit force and displacement. Both force data and distance data are time-series data. Therefore, one-dimensional convolutional neural network is used to process the press-fit curve. After the obtained press-fit data is filtered, the multi-layer one-dimensional convolutional neural network is used to perform the automatic learning of press-fit curve features, and then sent to the multi-layer perceptron to finally output keypoint of the curve. We used the data of press-fit assembly equipment in the actual production process to train CNN model, and we used different data from the same equipment to evaluate the performance of detection. Compared with the existing research result, the performance of detection was significantly improved. This method can provide a reliable basis for the judgment of press-fit quality.

Keywords: keypoint detection, curve feature, convolutional neural network, press-fit assembly

Procedia PDF Downloads 230
6512 The Ideal for Building Reservior Under the Ground in Mekong Delta in Vietnam

Authors: Huu Hue Van

Abstract:

The Mekong Delta is the region in southwestern Vietnam where the Mekong River approaches and flow into the sea through a network of distributaries. The Climate Change Research Institute at University of Can Tho, in studying the possible consequences of climate change, has predicted that, many provinces in the Mekong Delta will be flooded by the year 2030. The Mekong Delta lacks fresh water in the dry season. Being served for daily life, industry and agriculture in the dry season, the water is mainly taken from layers of soil contained water under the ground (aquifers) depleted water; the water level in aquifers have decreased. Previously, the Mekong Delta can withstand two bad scenarios in the future: 1) The Mekong Delta will be submerged into the sea again: Due to subsidence of the ground (over-exploitation of groundwater), subsidence of constructions because of the low groundwater level (10 years ago, some of constructions were built on the foundation of Melaleuca poles planted in Mekong Delta, Melaleuca poles have to stay in saturated soil layer fully, if not, they decay easyly; due to the top of Melaleuca poles are higher than the groundwater level, the top of Melaleuca poles will decay and cause subsidence); erosion the river banks (because of the hydroelectric dams in the upstream of the Mekong River is blocking the flow, reducing the concentration of suspended substances in the flow caused erosion the river banks) and the delta will be flooded because of sea level rise (climate change). 2) The Mekong Delta will be deserted: People will migrate to other places to make a living because of no planting due to alum capillary (In Mekong Delta, there is a layer of alum soil under the ground, the elevation of groundwater level is lower than the the elevation of layer of alum soil, alum will be capillary to the arable soil layer); there is no fresh water for cultivation and daily life (because of saline intrusion and groundwater depletion in the aquifers below). Mekong Delta currently has about seven aquifers below with a total depth about 500 m. The water mainly has exploited in the middle - upper Pleistocene aquifer (qp2-3). The major cause of two bad scenarios in the future is over-exploitation of water in aquifers. Therefore, studying and building water reservoirs in seven aquifers will solve many pressing problems such as preventing subsidence, providing water for the whole delta, especially in coastal provinces, favorable to nature, saving land ( if we build the water lake on the surface of the delta, we will need a lot of land), pollution limitation (because when building some hydraulic structures for preventing the salt instrutions and for storing water in the lake on the surface, we cause polluted in the lake)..., It is necessary to build a reservoir under the ground in aquifers in the Mekong Delta. The super-sized reservoir will contribute to the existence and development of the Mekong Delta.

Keywords: aquifers, aquifers storage, groundwater, land subsidence, underground reservoir

Procedia PDF Downloads 85
6511 Advanced Simulation and Enhancement for Distributed and Energy Efficient Scheduling for IEEE802.11s Wireless Enhanced Distributed Channel Access Networks

Authors: Fisayo G. Ojo, Shamala K. Subramaniam, Zuriati Ahmad Zukarnain

Abstract:

As technology is advancing and wireless applications are becoming dependable sources, while the physical layer of the applications are been embedded into tiny layer, so the more the problem on energy efficiency and consumption. This paper reviews works done in recent years in wireless applications and distributed computing, we discovered that applications are becoming dependable, and resource allocation sharing with other applications in distributed computing. Applications embedded in distributed system are suffering from power stability and efficiency. In the reviews, we also prove that discrete event simulation has been left behind untouched and not been adapted into distributed system as a simulation technique in scheduling of each event that took place in the development of distributed computing applications. We shed more lights on some researcher proposed techniques and results in our reviews to prove the unsatisfactory results, and to show that more work still have to be done on issues of energy efficiency in wireless applications, and congestion in distributed computing.

Keywords: discrete event simulation (DES), distributed computing, energy efficiency (EE), internet of things (IOT), quality of service (QOS), user equipment (UE), wireless mesh network (WMN), wireless sensor network (wsn), worldwide interoperability for microwave access x (WiMAX)

Procedia PDF Downloads 192
6510 An Assessment on Awareness of Public Transport Policies for Persons with Disabilities in Three South-West Nigerian States

Authors: Julius A. Ademokoya, Grace C. Ilori

Abstract:

Extreme public transport difficulty for persons with disabilities (PWDs) has always been one of the challenges which these individuals experience on a daily basis in Nigeria. Private and public transport vehicles are not disability- friendly. Operators of public transport are often very intolerant of PWDs' conditions. Indeed, many Nigerians believe it is luxury for PWDs to engage in public transport. They are rarely expected to be seen in public much less going to places via public transport means. Initiatives by a few Nigerian states to develop and implement public transport policies for PWDs, therefore, were a huge relief for them and some concerned Nigerians. A few years ago, three southwest Nigerian states (Lagos, Ondo, and Ekiti) came up with some legislative welfare provisions (including transport programmes) for PWDs. This study, therefore, sought to ascertain levels of awareness and implementation of public policies among the PWDs and those expected to implement the policies. The study adopted a mixed method research. Findings across the three states showed that: (1) awareness of public policies among PWDs is low and (2) a considerable scope of the policies is not yet implemented. Recommendations are, therefore, made on how to improve on awareness and implementation of transport policies for PWDs in three south-west Nigerian states.

Keywords: awareness, disability rights, implementation persons with disability, transport policies

Procedia PDF Downloads 178
6509 A Unified Approach for Naval Telecommunication Architectures

Authors: Y. Lacroix, J.-F. Malbranque

Abstract:

We present a chronological evolution for naval telecommunication networks. We distinguish periods: with or without multiplexers, with switch systems, with federative systems, with medium switching, and with medium switching with wireless networks. This highlights the introduction of new layers and technology in the architecture. These architectures are presented using layer models of transmission, in a unified way, which enables us to integrate pre-existing models. A ship of a naval fleet has internal communications (i.e. applications' networks of the edge) and external communications (i.e. the use of the means of transmission between edges). We propose architectures, deduced from the layer model, which are the point of convergence between the networks on board and the HF, UHF radio, and satellite resources. This modelling allows to consider end-to-end naval communications, and in a more global way, that is from the user on board towards the user on shore, including transmission and networks on the shore side. The new architectures need take care of quality of services for end-to-end communications, the more remote control develops a lot and will do so in the future. Naval telecommunications will be more and more complex and will use more and more advanced technologies, it will thus be necessary to establish clear global communication schemes to grant consistency of the architectures. Our latest model has been implemented in a military naval situation, and serves as the basic architecture for the RIFAN2 network.

Keywords: equilibrium beach profile, eastern tombolo of Giens, potential function, erosion

Procedia PDF Downloads 291
6508 Influence of Electrode Assembly on Catalytic Activation and Deactivation of a PT Film Immobilized H+ Conducting Solid Electrolyte in Electrocatalytic Reduction Reactions

Authors: M. A. Hasnat, M. Amirul Islam, M. A. Rashed, Jamil. Safwan, M. Mahabubul Alam

Abstract:

Symmetric (Cu–Pt|Nafion|Pt–Cu) and asymmetric(Pt|Nafion|Pt–Cu) assemblies were fabricated to study the nitrate reduction processes at the cathode. The electrocatalytic nitrate reduction reactions were performed in these assemblies in order to investigate the prerequisite for the enhanced catalytic activity, electrochemical cell durability as well as preferable product selectivity resulting from the reduction of nitrate at the cathode. It has been observed for the symmetric assembly that Cu particles were oxidized on the anode surface under an applied potential and the resulting copper ions migrated to the cathode surface through the Nafion membrane, which deposited as copper oxide on the cathode surface. The formation of this copper oxide covering layer on the Pt–Cu cathode surface is attributed as the reason for the deactivation of the cathode that governed the reduced nitrate reduction along with increasing nitrite selectivity. These problems were addressed and resolved with the asymmetric design of the electrocatalytic reactor, where enhanced hydrogen evolution activates the surface by eroding the CuO over layer as well as speeding up the slow rate determining hydrogenation reactions.

Keywords: membrane, nitrate, electrocatalysis, voltammetry, electrolysis

Procedia PDF Downloads 268
6507 A Comparison between the Results of Hormuz Strait Wave Simulations Using WAVEWATCH-III and MIKE21-SW and Satellite Altimetry Observations

Authors: Fatemeh Sadat Sharifi

Abstract:

In the present study, the capabilities of WAVEWATCH-III and MIKE21-SW for predicting the characteristics of wind waves in Hormuz Strait are evaluated. The GFS wind data (Global Forecast System) were derived. The bathymetry of gride with 2 arc-minute resolution, also were extracted from the ETOPO1. WAVEWATCH-III findings illustrate more valid prediction of wave features comparing to the MIKE-21 SW in deep water. Apparently, in shallow area, the MIKE-21 provides more uniformities with altimetry measurements. This may be due to the merits of the unstructured grid which are used in MIKE-21, leading to better representations of the coastal area. The findings on the direction of waves generated by wind in the modeling area indicate that in some regions, despite the increase in wind speed, significant wave height stays nearly unchanged. This is fundamental because of swift changes in wind track over the Strait of Hormuz. After discussing wind-induced waves in the region, the impact of instability of the surface layer on wave growth has been considered. For this purpose, the average monthly mean air temperature has been used. The results in cold months, when the surface layer is unstable, indicates an acceptable increase in the accuracy of prediction of the indicator wave height.

Keywords: numerical modeling, WAVEWATCH-III, Strait of Hormuz, MIKE21-SW

Procedia PDF Downloads 207
6506 Nonlinear Impact Responses for a Damped Frame Supported by Nonlinear Springs with Hysteresis Using Fast FEA

Authors: T. Yamaguchi, M. Watanabe, M. Sasajima, C. Yuan, S. Maruyama, T. B. Ibrahim, H. Tomita

Abstract:

This paper deals with nonlinear vibration analysis using finite element method for frame structures consisting of elastic and viscoelastic damping layers supported by multiple nonlinear concentrated springs with hysteresis damping. The frame is supported by four nonlinear concentrated springs near the four corners. The restoring forces of the springs have cubic non-linearity and linear component of the nonlinear springs has complex quantity to represent linear hysteresis damping. The damping layer of the frame structures has complex modulus of elasticity. Further, the discretized equations in physical coordinate are transformed into the nonlinear ordinary coupled differential equations using normal coordinate corresponding to linear natural modes. Comparing shares of strain energy of the elastic frame, the damping layer and the springs, we evaluate the influences of the damping couplings on the linear and nonlinear impact responses. We also investigate influences of damping changed by stiffness of the elastic frame on the nonlinear coupling in the damped impact responses.

Keywords: dynamic response, nonlinear impact response, finite element analysis, numerical analysis

Procedia PDF Downloads 434
6505 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

Authors: N. Nalini, Bhanu Prakash Gopularam

Abstract:

The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.

Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping

Procedia PDF Downloads 384
6504 Agile Supply Chains and Its Dependency on Air Transport Mode: A Case Study in Amazon

Authors: Fabiana Lucena Oliveira, Aristides da Rocha Oliveira Junior

Abstract:

This article discusses the dependence on air transport mode of agile supply chains. The agile supply chains are the result of the analysis of the uncertainty supply chain model, which ranks the supply chain, according to the respective product. Thus, understanding the Uncertainty Model and life cycle of products considered standard and innovative is critical to understanding these. The innovative character in the intersection of supply chains arising from the uncertainty model with its most appropriate transport mode. Consider here the variables availability, security and freight as determinants for choosing these modes. Therefore, the research problem is: How agile supply chains maintains logistics competitiveness, as these are dependent on air transport mode? A case study in Manaus Industrial Pole (MIP), an agglomeration model that includes six hundred industries from different backgrounds and billings, located in the Brazilian Amazon. The sample of companies surveyed include those companies whose products are classified in agile supply chains , as innovative and therefore live with the variable uncertainty in the demand for inputs or the supply of finished products. The results confirm the hypothesis that the dependency level of air transport mode is greater than fifty percent. It follows then, that maintain agile supply chain away from suppliers base is expensive (1) , and continuity analysis needs to be remade on each twenty four months (2) , consider that additional freight, handling and storage as members of the logistics costs (3) , and the comparison with the upcoming agile supply chains the world need to consider the location effect (4).

Keywords: uncertainty model, air transport mode, competitiveness, logistics

Procedia PDF Downloads 511
6503 Public Transport Analysis and Introducing of Bus Rapid Transit (BRT) System in Kabul City

Authors: Ramin Mirzada

Abstract:

This research investigates the valuation of public transport importance in decreasing congestion and in introduction of bus rapid transit in Kabul city. The main concern and main problem of the Kabul city public transport is traffic congestion. When buses and trams are stuck in traffic jams, it is clear that they fall behind from the schedule and this cause lots of problem for Kabul residence. In this research, the main attention has been given to improve current public transport in Kabul city which Public transport has large share almost 50% share among all mode. The main purpose of this research is to improve public transport system, to examine the demand and the supply of public transport in Kabul city, and to improve public transport system by introducing Bus rapid transit (BRT) system in Kabul city. The data which is used in this research is gathered by Transport Ministry, Kabul Municipality and Japan Cooperation Agency in Afghanistan (JICA). Urban transportation modeling system (UTMS) which is also known as traditional four-step modeling is used as the methodology of this research. The outcome of this research shows that by improving public transport which is local bus system mostly congestion problem of Kabul city become solve, and for those lanes which has the high demand and has more congestion, it is needed to introduce bus rapid transit system.

Keywords: transportation, planning, public transport, bus rapid transit, Kabul, Afghanistan

Procedia PDF Downloads 487
6502 Analysis of the CO2 Emissions of Public Passenger Transport in Tianjin City of China

Authors: Tao Zhao, Xianshuo Xu

Abstract:

Low-carbon public passenger transport is an important part of low carbon city. The CO2 emissions of public passenger transport in Tianjin from 1995 to 2010 are estimated with IPCC CO2 counting method, which shows that the total CO2 emissions of Tianjin public passenger transport have gradually become stable at 1,425.1 thousand tons. And then the CO2 emissions of the buses, taxies, and rail transits are calculated respectively. A CO2 emission of 829.9 thousand tons makes taxies become the largest CO2 emissions source among the public passenger transport in Tianjin. Combining with passenger volume, this paper analyzes the CO2 emissions proportion of the buses, taxies, and rail transits compare the passenger transport rate with the proportion of CO2 emissions, as well as the CO2 emissions change of per 10,000 people. The passenger volume proportion of bus among the three public means of transport is 72.62% which is much higher than its CO2 emissions proportion of 36.01%, with the minimum number of CO2 emissions per 10,000 people of 4.90 tons. The countermeasures to reduce CO2 emissions of public passenger transport in Tianjin are to develop rail transit, update vehicles and use alternative fuel vehicles.

Keywords: public passenger transport, carbon emissions, countermeasures, China

Procedia PDF Downloads 429
6501 Impact of Process Parameters on Tensile Strength of Fused Deposition Modeling Printed Crisscross Poylactic Acid

Authors: Shilpesh R. Rajpurohit, Harshit K. Dave

Abstract:

Additive manufacturing gains the popularity in recent times, due to its capability to create prototype as well functional as end use product directly from CAD data without any specific requirement of tooling. Fused deposition modeling (FDM) is one of the widely used additive manufacturing techniques that are used to create functional end use part of polymer that is comparable with the injection-molded parts. FDM printed part has an application in various fields such as automobile, aerospace, medical, electronic, etc. However, application of FDM part is greatly affected by poor mechanical properties. Proper selection of the process parameter could enhance the mechanical performance of the printed part. In the present study, experimental investigation has been carried out to study the behavior of the mechanical performance of the printed part with respect to process variables. Three process variables viz. raster angle, raster width and layer height have been varied to understand its effect on tensile strength. Further, effect of process variables on fractured surface has been also investigated.

Keywords: 3D Printing, fused deposition modeling, layer height, raster angle, raster width, tensile strength

Procedia PDF Downloads 197