Search results for: secure storage
1835 Physical and Microbiological Evaluation of Chitosan Films: Effect of Essential Oils and Storage
Authors: N. Valderrama, W. Albarracín, N. Algecira
Abstract:
It was studied the effect of the inclusion of thyme and rosemary essential oils into chitosan films, as well as the microbiological and physical properties when storing chitosan film with and without the mentioned inclusion. The film forming solution was prepared by dissolving chitosan (2%, w/v), polysorbate 80 (4% w/w CH) and glycerol (16% w/w CH) in aqueous lactic acid solutions (control). The thyme (TEO) and rosemary (REO) essential oils (EOs) were included 1:1 w/w (EOs:CH) on their combination 50/50 (TEO:REO). The films were stored at temperatures of 5, 20, 33°C and a relative humidity of 75% during four weeks. The films with essential oil inclusion did not show an antimicrobial activity against strains. This behavior could be explained because the chitosan only inhibits the growth of microorganisms in direct contact with the active sites. However, the inhibition capacity of TEO was higher than the REO and a synergic effect between TEO:REO was found for S. enteritidis strains in the chitosan solution. Some physical properties were modified by the inclusion of essential oils. The addition of essential oils does not affect the mechanical properties (tensile strength, elongation at break, puncture deformation), the water solubility, the swelling index nor the DSC behavior. However, the essential oil inclusion can significantly decrease the thickness, the moisture content, and the L* value of films whereas the b* value increased due to molecular interactions between the polymeric matrix, the loosing of the structure, and the chemical modifications. On the other hand, the temperature and time of storage changed some physical properties on the chitosan films. This could have occurred because of chemical changes, such as swelling in the presence of high humidity air and the reacetylation of amino groups. In the majority of cases, properties such as moisture content, tensile strength, elongation at break, puncture deformation, a*, b*, chrome, ΔE increased whereas water resistance, swelling index, L*, and hue angle decreased.Keywords: chitosan, food additives, modified films, polymers
Procedia PDF Downloads 3641834 A Tutorial on Network Security: Attacks and Controls
Authors: Belbahi Ahlam
Abstract:
With the phenomenal growth in the Internet, network security has become an integral part of computer and information security. In order to come up with measures that make networks more secure, it is important to learn about the vulnerabilities that could exist in a computer network and then have an understanding of the typical attacks that have been carried out in such networks. The first half of this paper will expose the readers to the classical network attacks that have exploited the typical vulnerabilities of computer networks in the past and solutions that have been adopted since then to prevent or reduce the chances of some of these attacks. The second half of the paper will expose the readers to the different network security controls including the network architecture, protocols, standards and software/ hardware tools that have been adopted in modern day computer networks.Keywords: network security, attacks and controls, computer and information, solutions
Procedia PDF Downloads 4541833 Luggage Handling System at World’s Largest Pilgrimage Center
Authors: Saddikuti Venkataramanaiah, N Ravichandran
Abstract:
The main focus of this paper is to highlight the challenges faced by the world’s largest pilgrimage center in providing free-of-cost luggage handling services to visiting pilgrims. The service was managed by a third-party agency selected based on a competitive bidding process. The third-party agency is responsible for providing timely, reliable, and secure services to the pilgrims. The methodology includes field visits and interaction with pilgrims, service providers, and other stakeholders of the system. Based on a detailed analysis of the information/data gathered, various innovations implemented and implications for policy making and sustainable service delivery were suggested.Keywords: luggage handling, sustainable, service delivery, third party logistics, innovation
Procedia PDF Downloads 881832 Investigation of the Stability and Spintronic Properties of NbrhgeX (X= Cr, Co, Mn, Fe, Ni) Using Density Functional Theory
Authors: Shittu Akinpelu, Issac Popoola
Abstract:
The compound NbRhGe has been predicted to be a semiconductor with excellent mechanical properties. It is an indirect band gap material. The potential of NbRhGe for non-volatile data storage via element addition is being studied using the Density Functional Theory (DFT). Preliminary results on the electronic and magnetic properties are suggestive for their application in spintronic.Keywords: half-metals, Heusler compound, semiconductor, spintronic
Procedia PDF Downloads 1681831 Ointment of Rosella Flower Petals Extract (Hibiscus sabdariffa): Pharmaceutical Preparations Formulation Development of Herbs for Antibacterial S. aureus
Authors: Muslihatus Syarifah
Abstract:
Introduction: Rosella flower petals can be used as an antibacterial because it contains alkaloids, flavonoids, phenolics, and terpenoids) for the . Bacteria activity is S. aureus can cause skin infections and pengobatanya most appropriate use of topical preparations. Ointment is a topical preparation comprising the active substance and ointment base. Not all the base matches the active substances or any type of disease. In this study using flavonoid active substances contained in rosella flower petals (Hibiscus sabdariffa) to be made ointment by testing a variety of different bases in order to obtain a suitable basis for the formulation of ointment extract rosella flower petals. Methods: Experimental research with research methods Post test control group design using the ointment is hydrocarbon sample, absorption, leached water and dissolved water. Then tested for bacteria S. aureus with different concentrations of 1%, 2%, 4%, 8%, 16, 32%. Data were analyzed using One Way ANOVA followed by Post Hoc test. Results: Ointment with a hydrocarbon base, absorption, leached water and dissolved water having no change in physical properties during storage. Base affect the physical properties of an ointment that adhesion, dispersive power and pH. The physical properties of the ointment with different concentrations produce different physical properties including adhesion, dispersive power and pH. The higher the concentration the higher dispersive power, but the smaller the adhesion and pH. Conclusion: Differences bases, storage time, the concentration of the extract can affect the physical properties of the ointment. Concentration of extract in the ointment extract rosella flower petals is 32%.Keywords: rosella, physical properties, ointments, antibacterial
Procedia PDF Downloads 3691830 Examining Microbial Decomposition, Carbon Cycling and Storage in Cefni Coastal Salt Marsh, Anglesey Island, Wales, United Kingdom
Authors: Dasat G. S., Christopher F. Tim, J. Dun C.
Abstract:
Salt marshes are known to sequester carbon dioxide from the atmosphere into the soil, but natural and anthropogenic activities could trigger the release of large quantities of centuries of buried carbon dioxide, methane and nitrous oxide (CO2, CH4 and N2O) which are the major greenhouse gases (GHGs) implicated with climate change. Therefore, this study investigated the biogeochemical activities by collecting soil samples from low, mid and high zones of the Cefni salt marsh, within the Maltreat estuary, on the island of Anglesey, north Wales, United Kingdom for a consortium of laboratory based experiments using standard operating protocols (POS) to quantify the soil organic matter contents and the rate of microbial decomposition and carbon storage at the Carbon Capture Laboratory of Bangor University Wales. Results of investigations reveals that the mid zone had 56.23% and 9.98% of soil water and soil organic matter (SOM) contents respectively higher than the low and high zones. Phenol oxidase activity (1193.53µmol dicq g-1 h-1) was highest at the low zone in comparison to the high and mid zones (867.60 and 608.74 µmol dicq g-1 h-1) respectively. Soil phenolic concentration was found to be highest in the mid zone (53.25 µg-1 g-1) when compared with those from the high (15.66 µg-1 g-1) and low (4.18 µg-1 g-1) zones respectively. Activities of hydrolase enzymes showed similar trend for the high and low zones and much lower activities in the mid zone. CO2 flux from the mid zone (6.79 ug g-1 h-1) was significantly greater than those from high (-2.29 ug g-1 h-1) and low (1.30 µg g-1 h-1) zones. Since salt marshes provide essential ecosystem services, their degradation or alteration in whatever form could compromise such ecosystem services and could convert them from net sinks into net sources with consequential effects to the global environment.Keywords: saltmarsh, decomposition, carbon cycling, enzymes
Procedia PDF Downloads 811829 Access Control System for Big Data Application
Authors: Winfred Okoe Addy, Jean Jacques Dominique Beraud
Abstract:
Access control systems (ACs) are some of the most important components in safety areas. Inaccuracies of regulatory frameworks make personal policies and remedies more appropriate than standard models or protocols. This problem is exacerbated by the increasing complexity of software, such as integrated Big Data (BD) software for controlling large volumes of encrypted data and resources embedded in a dedicated BD production system. This paper proposes a general access control strategy system for the diffusion of Big Data domains since it is crucial to secure the data provided to data consumers (DC). We presented a general access control circulation strategy for the Big Data domain by describing the benefit of using designated access control for BD units and performance and taking into consideration the need for BD and AC system. We then presented a generic of Big Data access control system to improve the dissemination of Big Data.Keywords: access control, security, Big Data, domain
Procedia PDF Downloads 1321828 Wheeled Robot Stable Braking Process under Asymmetric Traction Coefficients
Authors: Boguslaw Schreyer
Abstract:
During the wheeled robot’s braking process, the extra dynamic vertical forces act on all wheels: left, right, front or rear. Those forces are directed downward on the front wheels while directed upward on the rear wheels. In order to maximize the deceleration, therefore, minimize the braking time and braking distance, we need to calculate a correct torque distribution: the front braking torque should be increased, and rear torque should be decreased. At the same time, we need to provide better transversal stability. In a simple case of all adhesion coefficients being the same under all wheels, the torque distribution may secure the optimal (maximal) control of the robot braking process, securing the minimum braking distance and a minimum braking time. At the same time, the transversal stability is relatively good. At any time, we control the transversal acceleration. In the case of the transversal movement, we stop the braking process and re-apply braking torque after a defined period of time. If we correctly calculate the value of the torques, we may secure the traction coefficient under the front and rear wheels close to its maximum. Also, in order to provide an optimum braking control, we need to calculate the timing of the braking torque application and the timing of its release. The braking torques should be released shortly after the wheels passed a maximum traction coefficient (while a wheels’ slip increases) and applied again after the wheels pass a maximum of traction coefficient (while the slip decreases). The correct braking torque distribution secures the front and rear wheels, passing this maximum at the same time. It guarantees an optimum deceleration control, therefore, minimum braking time. In order to calculate a correct torque distribution, a control unit should receive the input signals of a rear torque value (which changes independently), the robot’s deceleration, and values of the vertical front and rear forces. In order to calculate the timing of torque application and torque release, more signals are needed: speed of the robot: angular speed, and angular deceleration of the wheels. In case of different adhesion coefficients under the left and right wheels, but the same under each pair of wheels- the same under right wheels and the same under left wheels, the Select-Low (SL) and select high (SH) methods are applied. The SL method is suggested if transversal stability is more important than braking efficiency. Often in the case of the robot, more important is braking efficiency; therefore, the SH method is applied with some control of the transversal stability. In the case that all adhesion coefficients are different under all wheels, the front-rear torque distribution is maintained as in all previous cases. However, the timing of the braking torque application and release is controlled by the rear wheels’ lowest adhesion coefficient. The Lagrange equations have been used to describe robot dynamics. Matlab has been used in order to simulate the process of wheeled robot braking, and in conclusion, the braking methods have been selected.Keywords: wheeled robots, braking, traction coefficient, asymmetric
Procedia PDF Downloads 1641827 Comparative Electrochemical Studies of Enzyme-Based and Enzyme-less Graphene Oxide-Based Nanocomposite as Glucose Biosensor
Authors: Chetna Tyagi. G. B. V. S. Lakshmi, Ambuj Tripathi, D. K. Avasthi
Abstract:
Graphene oxide provides a good host matrix for preparing nanocomposites due to the different functional groups attached to its edges and planes. Being biocompatible, it is used in therapeutic applications. As enzyme-based biosensor requires complicated enzyme purification procedure, high fabrication cost and special storage conditions, we need enzyme-less biosensors for use even in a harsh environment like high temperature, varying pH, etc. In this work, we have prepared both enzyme-based and enzyme-less graphene oxide-based biosensors for glucose detection using glucose-oxidase as enzyme and gold nanoparticles, respectively. These samples were characterized using X-ray diffraction, UV-visible spectroscopy, scanning electron microscopy, and transmission electron microscopy to confirm the successful synthesis of the working electrodes. Electrochemical measurements were performed for both the working electrodes using a 3-electrode electrochemical cell. Cyclic voltammetry curves showed the homogeneous transfer of electron on the electrodes in the scan range between -0.2V to 0.6V. The sensing measurements were performed using differential pulse voltammetry for the glucose concentration varying from 0.01 mM to 20 mM, and sensing was improved towards glucose in the presence of gold nanoparticles. Gold nanoparticles in graphene oxide nanocomposite played an important role in sensing glucose in the absence of enzyme, glucose oxidase, as evident from these measurements. The selectivity was tested by measuring the current response of the working electrode towards glucose in the presence of the other common interfering agents like cholesterol, ascorbic acid, citric acid, and urea. The enzyme-less working electrode also showed storage stability for up to 15 weeks, making it a suitable glucose biosensor.Keywords: electrochemical, enzyme-less, glucose, gold nanoparticles, graphene oxide, nanocomposite
Procedia PDF Downloads 1401826 Corporate Law and Its View Point of Locking in Capital
Authors: Saad Saeed Althiabi
Abstract:
This paper discusses the corporate positioning and how it became popular as a way to systematize production because of the unique manner in which incorporation legalized organizers to secure financial capital through locking it in. The power to lock in capital comes from the fact that a corporate exists as a separate legal entity, whose survival and governance are separated from any of its participants. The law essentially creates a different legal person when a corporation is created. Although this idea has been played down in the legal learning of the last decades in favor of the view that a corporation is purely something through which natural persons interrelate, recent legal research has begun to reassess the importance of entity status. Entity status, under the law and the related separation of governance from input of financial capital through the configuration of a corporation, sanctioned corporate participants to do somewhat more than connect in a series of business transactions.Keywords: corporate law, entity status, locking in capital, financial capital
Procedia PDF Downloads 5531825 The Female Jihad: A Case Study of Jamaah Islamiyah’s Women in Indonesia
Authors: Milda Istiqomah
Abstract:
The current trends demonstrate that the number of women involved in terrorism is steadily increasing. There are at least two types of roles that women assume in terrorism; the ‘visible role’ and ‘invisible role’. Both roles are very important to the sustainability of terrorism and terrorist organizations. The findings of this paper are based on the analysis of multiple case study from two terrorism verdicts in Indonesia, media reports and academic journals. This paper argues that women in Jemaah Islamiyah (JI) play an important role in both categories. They are involved in this organization by marital and kinship linkages which aim to secure the networks and regenerate the Jihadi ideology within JI. Finally, this paper states that the role of women in JI is significant due to its importance in delivering the idea of Jihad to younger generations.Keywords: terrorism, women, jihadi movement, case study
Procedia PDF Downloads 1241824 Oriented Strandboard-GEOGYPTM Undelayment, a Novel Composite Flooring System
Authors: B. Noruziaan, A. Shvarzman, R. Leahy
Abstract:
An innovative flooring underlayment was produced and tested. The composite system is made of common OSB boards and a layer of eco-friendly non-cement gypsum based material (GeoGypTM). It was found that the shear bond between the two materials is sufficient to secure the composite interaction between the two. The very high compressive strength and relatively high tensile strength of the non-cement based component together with its high modulus of elasticity provides enough strength and stiffness for the composite product to cover wider spacing between the joists. The initial findings of this study indicate that with joist spacing as wide as 800 mm, the flooring system provides enough strength without compromising the serviceability requirements of the building codes.Keywords: Composite, floor deck, gypsum based, lumber joist, non-cement, oriented strandboard, shear bond
Procedia PDF Downloads 4191823 Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure
Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh
Abstract:
Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.Keywords: anonymity, authentication, Internet of Things, lightweight, un-traceability
Procedia PDF Downloads 2871822 Secure Network Coding-Based Named Data Network Mutual Anonymity Transfer Protocol
Authors: Tao Feng, Fei Xing, Ye Lu, Jun Li Fang
Abstract:
NDN is a kind of future Internet architecture. Due to the NDN design introduces four privacy challenges,Many research institutions began to care about the privacy issues of naming data network(NDN).In this paper, we are in view of the major NDN’s privacy issues to investigate privacy protection,then put forwards more effectively anonymous transfer policy for NDN.Firstly,based on mutual anonymity communication for MP2P networks,we propose NDN mutual anonymity protocol.Secondly,we add interest package authentication mechanism in the protocol and encrypt the coding coefficient, security of this protocol is improved by this way.Finally, we proof the proposed anonymous transfer protocol security and anonymity.Keywords: NDN, mutual anonymity, anonymous routing, network coding, authentication mechanism
Procedia PDF Downloads 4501821 Distributed Cyber Physical Secure Framework for DC Microgrids: DC Ship Power System Applications
Authors: Grace karimi Muriithi, Behnaz Papari, Ali Arsalan, Christopher Shannon Edrington
Abstract:
Complexity and nonlinearity of the control system design is increasing for DC microgrid applications when the cyber concept associated with the technology constraints will added to the picture. Controllers’ functionality during the critical operation mode is required to guaranteed specifically for a high profile applications such as NAVY DC ship power system (SPS) as an small-scaled DC microgrid. Thus, SPS is susceptible to cyber-attacks and, accordingly, can provide the disastrous effects. In this study, a machine learning (ML) approach is demonstrated to offer the promising performance of SPS for developing an effective and robust functionality over attacks time. Simulation results analysis demonstrate that the proposed method can improve the controllability successfully.Keywords: controlability, cyber attacks, distribute control, machine learning
Procedia PDF Downloads 1131820 A Secure Survey against Black Hole Attack in MANET
Authors: G. Usha, S. Kannimuthu, K. Mahalakshmi
Abstract:
Mobile Adhoc Network (MANET) is one of the most promising technologies that have applications ranging from various portable devices to military networks. MANET has no fixed infrastructure and the security of such network is a big concern. Therefore, in order to operate MANET’s securely, the misbehavior and intrusions should be detected before the attackers affect the network communication. In this article, we make a comprehensive survey against black hole attack that is a serious threat against MANET that exploits the routing behavior of the MANET. We have given broad survey solutions that detect black hole attacks in MANET. This is achieved by analyzing the techniques involved in detecting the attacks in each scheme. Furthermore, we examine about the challenges to the researchers for constructing an in-depth solution against black hole attack.Keywords: AODV, cross layer security, mobile Adhoc network (MANET), packet delivery ratio, single layer security
Procedia PDF Downloads 4061819 Enriching the Effects of Art Therapy Intervention: Reflecting upon Artworks Produced during Intervention to Restructure Adolescent’s Art Expression of Feelings and Emotions
Authors: L. K. Akila
Abstract:
Art activities can fund as a clinical support tool (CST) between interventions in Art Therapy to direct the client back towards better outcome goals. In the present study, during free art sessions, researcher examined the possibilities of motivating the adolescent group to involve in art making process by reflecting upon art intervention administered. Results show that adolescents’ reflecting upon their art works generated during the intervention; could change their perceptions and cognitions to improve their positive approach by restructuring their art expressions. Consequently, such reflections triggered and improved their emotions, feelings and ideas, and produced secure attachment between family, peers and teachers. By the end of interference, transformations experienced were effective more upon depression, self-image, and self-efficacy, and to a certain extent on aggressive patterns represented.Keywords: adolescent, adolescent psychology, aggression, art, art therapy, cognition, depression, emotion, self-image
Procedia PDF Downloads 2591818 Comparison of Oven and Microwave Drying on Phenolic Contents and Antioxidant Activities of Red Delicious and Golden Delicious Apples
Authors: Gulcin Yildiz, Gokcen Izli
Abstract:
Drying (dehydration) is the process of removing water from food in order to preserve the food. Drying is one of the oldest methods known for the preservation of agricultural products such as fruits and vegetables. Drying of agricultural products enhances their storage life, minimizes losses during storage, and save shipping and transportation costs. Apples are considered excellent candidates for drying. The objective of this research was to investigate the effects of microwave and oven processing on the quality of selected apple products. Red delicious and golden delicious apples were washed, peeled, and sliced. Drying experiments were performed in an oven at 50, 75 and 100 °C and in a microwave at 140 W and 210 W. Quality attributes such as color, total phenolic content and antioxidant capacity of dried samples with different methods were compared with the fresh sample. A Minolta CR-300 Chroma Meter was used to examine color changes in the apples. Total phenolic content was determined using the Folin-Ciocalteu reagent. The free radical scavenging activity of the extract was determined using 1,1-diphenyl-2-picrylhydrazyl (DPPH). It was found that the phenolic contents and antioxidant capacities of dried samples under all drying conditions were decreased compared to the fresh samples. The phenolic contents of microwave dried samples at 140 W and 210 W for both red and golden delicious apples were higher than those of the oven drying at 50, 75 and 100 °C. Similarly, the antioxidant activities of microwave dried samples at 140 W and 210 W were higher than those of the oven drying at 50, 75 and 100 °C for both types of apples. All color parameters (L*, a*, b*) were changed significantly depending on the drying methods and temperatures. The closest color values to the fresh sample were found for the microwave dried samples at 140 W. Microwave drying was proven to be more effective than oven drying.Keywords: antioxidant capacity, color, golden delicious, microwave, red delicious, total phenolic content
Procedia PDF Downloads 2341817 Enhanced Visual Sharing Method for Medical Image Security
Authors: Kalaivani Pachiappan, Sabari Annaji, Nithya Jayakumar
Abstract:
In recent years, Information security has emerged as foremost challenges in many fields. Especially in medical information systems security is a major issue, in handling reports such as patients’ diagnosis and medical images. These sensitive data require confidentiality for transmission purposes. Image sharing is a secure and fault-tolerant method for protecting digital images, which can use the cryptography techniques to reduce the information loss. In this paper, visual sharing method is proposed which embeds the patient’s details into a medical image. Then the medical image can be divided into numerous shared images and protected by various users. The original patient details and medical image can be retrieved by gathering the shared images.Keywords: information security, medical images, cryptography, visual sharing
Procedia PDF Downloads 4131816 Monitoring of Sustainability of Decorated Confectionary Product 'Moskva Cake' in Order to Define the Expiration Date
Authors: Radovan Cobanovic, Milica Rankov-Sicar
Abstract:
The fresh cake is in the group of perishable food which cannot be kept a long period of time. The study of sustainability has been done in order to extend the shelf-life of the product which was 10 days. According to the plan of sustainability, it was defined that 5 samples had to be stored for 20 days at max +8°C and analyzed every 5th day from the day of reception until the 20th day. The shelf life of cake has expired during the study of sustainability in the period between 10th and 20th day of analyses. Cake samples were subjected to sensory analysis (appearance, odor, taste, color, aroma) and bacteriological analysis (Listeria monocytogenes, Salmonella spp. and Enterobacteriaceae) according to Serbian state regulation. All analysis were tested according to ISO methodology: sensory analysis ISO 6658, Listeria monocytogenes ISO 11290-1, Salmonella spp ISO 6579, and Enterobacteriaceae ISO 21258-2. Analyses showed that after ten days of storage at a temperature defined by the manufacturers and within the product's shelf life, the cake did not have any noticeable changes in sensory characteristics. Smell and taste are unaffected there was no presence of strange smell or taste. As far as microbiological analyses are concerned, neither one pathogen was detected and number of Enterobacteriaceae was at level less than 102 cfu/g. After expiry of shelf life in a period of 15th and 20th day of storage, the sensory analysis showed the presence of strange sour-milky smell and rancid taste. Concerning microbiological analyses, there still were not positive results for pathogen microorganisms but the number of Enterobacteriaceae was at level more than 103cfu/g. Reviewing the results of sensory analysis indicates that it is not recommended to extend the shelf-life of the product comparing to the already defined shelf-life because occurred changes may adversely affect the consumer desire for the choice of this product.Keywords: confectionary product, extension of shelf life, sensory and microbiological analyses, sustainability
Procedia PDF Downloads 2401815 Hybrid Renewable Power Systems
Authors: Salman Al-Alyani
Abstract:
In line with the Kingdom’s Vision 2030, the Saudi Green initiative was announced aimed at reducing carbon emissions by more than 4% of the global contribution. The initiative included plans to generate 50% of its energy from renewables by 2030. The geographical location of Saudi Arabia makes it among the best countries in terms of solar irradiation and has good wind resources in many areas across the Kingdom. Saudi Arabia is a wide country and has many remote locations where it is not economically feasible to connect those loads to the national grid. With the improvement of battery innovation and reduction in cost, different renewable technologies (primarily wind and solar) can be integrated to meet the need for energy in a more effective and cost-effective way. Saudi Arabia is famous for high solar irradiations in which solar power generation can extend up to six (6) hours per day (25% capacity factor) in some locations. However, the net present value (NPV) falls down to negative in some locations due to distance and high installation costs. Wind generation in Saudi Arabia is a promising technology. Hybrid renewable generation will increase the net present value and lower the payback time due to additional energy generated by wind. The infrastructure of the power system can be capitalized to contain solar generation and wind generation feeding the inverter, controller, and load. Storage systems can be added to support the hours that have an absence of wind or solar energy. Also, the smart controller that can help integrate various renewable technologies primarily wind and solar, to meet demand considering load characteristics. It could be scalable for grid or off-grid applications. The objective of this paper is to study the feasibility of introducing a hybrid renewable system in remote locations and the concept for the development of a smart controller.Keywords: battery storage systems, hybrid power generation, solar energy, wind energy
Procedia PDF Downloads 1771814 Viability Analysis of a Centralized Hydrogen Generation Plant for Use in Oil Refining Industry
Authors: C. Fúnez Guerra, B. Nieto Calderón, M. Jaén Caparrós, L. Reyes-Bozo, A. Godoy-Faúndez, E. Vyhmeister
Abstract:
The global energy system is experiencing a change of scenery. Unstable energy markets, an increasing focus on climate change and its sustainable development is forcing businesses to pursue new solutions in order to ensure future economic growth. This has led to the interest in using hydrogen as an energy carrier in transportation and industrial applications. As an energy carrier, hydrogen is accessible and holds a high gravimetric energy density. Abundant in hydrocarbons, hydrogen can play an important role in the shift towards low-emission fossil value chains. By combining hydrogen production by natural gas reforming with carbon capture and storage, the overall CO2 emissions are significantly reduced. In addition, the flexibility of hydrogen as an energy storage makes it applicable as a stabilizer in the renewable energy mix. The recent development in hydrogen fuel cells is also raising the expectations for a hydrogen powered transportation sector. Hydrogen value chains exist to a large extent in the industry today. The global hydrogen consumption was approximately 50 million tonnes (7.2 EJ) in 2013, where refineries, ammonia, methanol production and metal processing were main consumers. Natural gas reforming produced 48% of this hydrogen, but without carbon capture and storage (CCS). The total emissions from the production reached 500 million tonnes of CO2, hence alternative production methods with lower emissions will be necessary in future value chains. Hydrogen from electrolysis is used for a wide range of industrial chemical reactions for many years. Possibly, the earliest use was for the production of ammonia-based fertilisers by Norsk Hydro, with a test reactor set up in Notodden, Norway, in 1927. This application also claims one of the world’s largest electrolyser installations, at Sable Chemicals in Zimbabwe. Its array of 28 electrolysers consumes 80 MW per hour, producing around 21,000 Nm3/h of hydrogen. These electrolysers can compete if cheap sources of electricity are available and natural gas for steam reforming is relatively expensive. Because electrolysis of water produces oxygen as a by-product, a system of Autothermal Reforming (ATR) utilizing this oxygen has been analyzed. Replacing the air separation unit with electrolysers produces the required amount of oxygen to the ATR as well as additional hydrogen. The aim of this paper is to evaluate the technical and economic potential of large-scale production of hydrogen for oil refining industry. Sensitivity analysis of parameters such as investment costs, plant operating hours, electricity price and sale price of hydrogen and oxygen are performed.Keywords: autothermal reforming, electrolyser, hydrogen, natural gas, steam methane reforming
Procedia PDF Downloads 2101813 Symmetric Arabic Language Encryption Technique Based on Modified Playfair Algorithm
Authors: Fairouz Beggas
Abstract:
Due to the large number of exchanges in the networks, the security of communications is essential. Most ways of keeping communication secure rely on encryption. In this work, a symmetric encryption technique is offered to encrypt and decrypt simple Arabic scripts based on a multi-level security. A proposed technique uses an idea of Playfair encryption with a larger table size and an additional layer of encryption to ensure more security. The idea of the proposed algorithm aims to generate a dynamic table that depends on a secret key. The same secret key is also used to create other secret keys to over-encrypt the plaintext in three steps. The obtained results show that the proposed algorithm is faster in terms of encryption/decryption speed and can resist to many types of attacks.Keywords: arabic data, encryption, playfair, symmetric algorithm
Procedia PDF Downloads 861812 Deterministic and Stochastic Modeling of a Micro-Grid Management for Optimal Power Self-Consumption
Authors: D. Calogine, O. Chau, S. Dotti, O. Ramiarinjanahary, P. Rasoavonjy, F. Tovondahiniriko
Abstract:
Mafate is a natural circus in the north-western part of Reunion Island, without an electrical grid and road network. A micro-grid concept is being experimented in this area, composed of a photovoltaic production combined with electrochemical batteries, in order to meet the local population for self-consumption of electricity demands. This work develops a discrete model as well as a stochastic model in order to reach an optimal equilibrium between production and consumptions for a cluster of houses. The management of the energy power leads to a large linearized programming system, where the time interval of interest is 24 hours The experimental data are solar production, storage energy, and the parameters of the different electrical devices and batteries. The unknown variables to evaluate are the consumptions of the various electrical services, the energy drawn from and stored in the batteries, and the inhabitants’ planning wishes. The objective is to fit the solar production to the electrical consumption of the inhabitants, with an optimal use of the energies in the batteries by satisfying as widely as possible the users' planning requirements. In the discrete model, the different parameters and solutions of the linear programming system are deterministic scalars. Whereas in the stochastic approach, the data parameters and the linear programming solutions become random variables, then the distributions of which could be imposed or established by estimation from samples of real observations or from samples of optimal discrete equilibrium solutions.Keywords: photovoltaic production, power consumption, battery storage resources, random variables, stochastic modeling, estimations of probability distributions, mixed integer linear programming, smart micro-grid, self-consumption of electricity.
Procedia PDF Downloads 1091811 Strategic Workplace Security: The Role of Malware and the Threat of Internal Vulnerability
Authors: Modesta E. Ezema, Christopher C. Ezema, Christian C. Ugwu, Udoka F. Eze, Florence M. Babalola
Abstract:
Some employees knowingly or unknowingly contribute to loss of data and also expose data to threat in the process of getting their jobs done. Many organizations today are faced with the challenges of how to secure their data as cyber criminals constantly devise new ways of attacking the organization’s secret data. However, this paper enlists the latest strategies that must be put in place in order to protect these important data from being attacked in a collaborative work place. It also introduces us to Advanced Persistent Threats (APTs) and how it works. The empirical study was conducted to collect data from the employee in data centers on how data could be protected from malicious codes and cyber criminals and their responses are highly considered to help checkmate the activities of malicious code and cyber criminals in our work places.Keywords: data, employee, malware, work place
Procedia PDF Downloads 3821810 Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve
Authors: Eun-Jun Yoon
Abstract:
Deniable authentication protocol is a new security authentication mechanism which can enable a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. In 2013, Kar proposed a secure ID-based deniable authentication protocol whose security is based on computational infeasibility of solving Elliptic Curve Diffie-Hellman Problem (ECDHP). Kar claimed that the proposed protocol achieves properties of deniable authentication, mutual authentication, and message confidentiality. However, this paper points out that Kar's protocol still suffers from sender spoofing attack and message modification attack unlike its claims.Keywords: deniable authentication, elliptic curve cryptography, Diffie-Hellman problem, cryptanalysis
Procedia PDF Downloads 3291809 Modeling Geogenic Groundwater Contamination Risk with the Groundwater Assessment Platform (GAP)
Authors: Joel Podgorski, Manouchehr Amini, Annette Johnson, Michael Berg
Abstract:
One-third of the world’s population relies on groundwater for its drinking water. Natural geogenic arsenic and fluoride contaminate ~10% of wells. Prolonged exposure to high levels of arsenic can result in various internal cancers, while high levels of fluoride are responsible for the development of dental and crippling skeletal fluorosis. In poor urban and rural settings, the provision of drinking water free of geogenic contamination can be a major challenge. In order to efficiently apply limited resources in the testing of wells, water resource managers need to know where geogenically contaminated groundwater is likely to occur. The Groundwater Assessment Platform (GAP) fulfills this need by providing state-of-the-art global arsenic and fluoride contamination hazard maps as well as enabling users to create their own groundwater quality models. The global risk models were produced by logistic regression of arsenic and fluoride measurements using predictor variables of various soil, geological and climate parameters. The maps display the probability of encountering concentrations of arsenic or fluoride exceeding the World Health Organization’s (WHO) stipulated concentration limits of 10 µg/L or 1.5 mg/L, respectively. In addition to a reconsideration of the relevant geochemical settings, these second-generation maps represent a great improvement over the previous risk maps due to a significant increase in data quantity and resolution. For example, there is a 10-fold increase in the number of measured data points, and the resolution of predictor variables is generally 60 times greater. These same predictor variable datasets are available on the GAP platform for visualization as well as for use with a modeling tool. The latter requires that users upload their own concentration measurements and select the predictor variables that they wish to incorporate in their models. In addition, users can upload additional predictor variable datasets either as features or coverages. Such models can represent an improvement over the global models already supplied, since (a) users may be able to use their own, more detailed datasets of measured concentrations and (b) the various processes leading to arsenic and fluoride groundwater contamination can be isolated more effectively on a smaller scale, thereby resulting in a more accurate model. All maps, including user-created risk models, can be downloaded as PDFs. There is also the option to share data in a secure environment as well as the possibility to collaborate in a secure environment through the creation of communities. In summary, GAP provides users with the means to reliably and efficiently produce models specific to their region of interest by making available the latest datasets of predictor variables along with the necessary modeling infrastructure.Keywords: arsenic, fluoride, groundwater contamination, logistic regression
Procedia PDF Downloads 3461808 Achieving Better Security by Using Nonlinear Cellular Automata as a Cryptographic Primitive
Authors: Swapan Maiti, Dipanwita Roy Chowdhury
Abstract:
Nonlinear functions are essential in different cryptoprimitives as they play an important role on the security of the cipher designs. Rule 30 was identified as a powerful nonlinear function for cryptographic applications. However, an attack (MS attack) was mounted against Rule 30 Cellular Automata (CA). Nonlinear rules as well as maximum period CA increase randomness property. In this work, nonlinear rules of maximum period nonlinear hybrid CA (M-NHCA) are studied and it is shown to be a better crypto-primitive than Rule 30 CA. It has also been analysed that the M-NHCA with single nonlinearity injection proposed in the literature is vulnerable against MS attack, whereas M-NHCA with multiple nonlinearity injections provide maximum length cycle as well as better cryptographic primitives and they are also secure against MS attack.Keywords: cellular automata, maximum period nonlinear CA, Meier and Staffelbach attack, nonlinear functions
Procedia PDF Downloads 3091807 Evaluating the Water Balance of Sokoto Basement Complex to Address Water Security Challenges
Authors: Murtala Gada Abubakar, Aliyu T. Umar
Abstract:
A substantial part of Nigeria is part of semi-arid areas of the world, underlain by basement complex (hard) rocks which are very poor in both transmission and storage of appreciable quantity of water. Recently, a growing attention is being paid on the need to develop water resources in these areas largely due to concerns about increasing droughts and the need to maintain water security challenges. While there is ample body of knowledge that captures the hydrological behaviours of the sedimentary part, reported research which unambiguously illustrates water distribution in the basement complex of the Sokoto basin remains sparse. Considering the growing need to meet the water requirements of those living in this region necessitated the call for accurate water balance estimations that can inform a sustainable planning and development to address water security challenges for the area. To meet this task, a one-dimensional soil water balance model was developed and utilised to assess the state of water distribution within the Sokoto basin basement complex using measured meteorological variables and information about different landscapes within the complex. The model simulated the soil water storage and rates of input and output of water in response to climate and irrigation where applicable using data from 2001 to 2010 inclusive. The results revealed areas within the Sokoto basin basement complex that are rich and deficient in groundwater resource. The high potential areas identified includes the fadama, the fractured rocks and the cultivated lands, while the low potential areas are the sealed surfaces and non-fractured rocks. This study concludes that the modelling approach is a useful tool for assessing the hydrological behaviour and for better understanding the water resource availability within a basement complex.Keywords: basement complex, hydrological processes, Sokoto Basin, water security
Procedia PDF Downloads 3171806 Periodically Forced Oscillator with Noisy Chaotic Dynamics
Authors: Adedayo Oke Adelakun
Abstract:
The chaotic dynamics of periodically forced oscillators with smooth potential has been extensively investigated via theoretical, numerical and experimental simulations. With the advent of the study of chaotic dynamics by means of method of multiple time scale analysis, Melnikov theory, bifurcation diagram, Poincare's map, bifurcation diagrams and Lyapunov exponents, it has become necessary to seek for a better understanding of nonlinear oscillator with noisy term. In this paper, we examine the influence of noise on complex dynamical behaviour of periodically forced F6 - Duffing oscillator for specific choice of noisy parameters. The inclusion of noisy term improves the dynamical behaviour of the oscillator which may have wider application in secure communication than smooth potential.Keywords: hierarchical structure, periodically forced oscillator, noisy parameters, dynamical behaviour, F6 - duffing oscillator
Procedia PDF Downloads 323