Search results for: physical layer wireless security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11128

Search results for: physical layer wireless security

10138 Implementation of Chlorine Monitoring and Supply System for Drinking Water Tanks

Authors: Ugur Fidan, Naim Karasekreter

Abstract:

Healthy and clean water should not contain disease-causing micro-organisms and toxic chemicals and must contain the necessary minerals in a balanced manner. Today, water resources have a limited and strategic importance, necessitating the management of water reserves. Water tanks meet the water needs of people and should be regularly chlorinated to prevent waterborne diseases. For this purpose, automatic chlorination systems placed in water tanks for killing bacteria. However, the regular operation of automatic chlorination systems depends on refilling the chlorine tank when it is empty. For this reason, there is a need for a stock control system, in which chlorine levels are regularly monitored and supplied. It has become imperative to take urgent measures against epidemics caused by the fact that most of our country is not aware of the end of chlorine. The aim of this work is to rehabilitate existing water tanks and to provide a method for a modern water storage system in which chlorination is digitally monitored by turning the newly established water tanks into a closed system. A sensor network structure using GSM/GPRS communication infrastructure has been developed in the study. The system consists of two basic units: hardware and software. The hardware includes a chlorine level sensor, an RFID interlock system for authorized personnel entry into water tank, a motion sensor for animals and other elements, and a camera system to ensure process safety. It transmits the data from the hardware sensors to the host server software via the TCP/IP protocol. The main server software processes the incoming data through the security algorithm and informs the relevant unit responsible (Security forces, Chlorine supply unit, Public health, Local Administrator) by e-mail and SMS. Since the software is developed base on the web, authorized personnel are also able to monitor drinking water tank and report data on the internet. When the findings and user feedback obtained as a result of the study are evaluated, it is shown that closed drinking water tanks are built with GRP type material, and continuous monitoring in digital environment is vital for sustainable health water supply for people.

Keywords: wireless sensor networks (WSN), monitoring, chlorine, water tank, security

Procedia PDF Downloads 139
10137 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 330
10136 Diversity for Safety and Security of Autonomous Vehicles against Accidental and Deliberate Faults

Authors: Anil Ranjitbhai Patel, Clement John Shaji, Peter Liggesmeyer

Abstract:

Safety and security of autonomous vehicles (AVs) is a growing concern, first, due to the increased number of safety-critical functions taken over by automotive embedded systems; second, due to the increased exposure of the software-intensive systems to potential attackers; third, due to dynamic interaction in an uncertain and unknown environment at runtime which results in changed functional and non-functional properties of the system. Frequently occurring environmental uncertainties, random component failures, and compromise security of the AVs might result in hazardous events, sometimes even in an accident, if left undetected. Beyond these technical issues, we argue that the safety and security of AVs against accidental and deliberate faults are poorly understood and rarely implemented. One possible way to overcome this is through a well-known diversity approach. As an effective approach to increase safety and security, diversity has been widely used in the aviation, railway, and aerospace industries. Thus, the paper proposes fault-tolerance by diversity model takes into consideration the mitigation of accidental and deliberate faults by application of structure and variant redundancy. The model can be used to design the AVs with various types of diversity in hardware and software-based multi-version system. The paper evaluates the presented approach by employing an example from adaptive cruise control, followed by discussing the case study with initial findings.

Keywords: autonomous vehicles, diversity, fault-tolerance, adaptive cruise control, safety, security

Procedia PDF Downloads 112
10135 Main Chaos-Based Image Encryption Algorithm

Authors: Ibtissem Talbi

Abstract:

During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.

Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich

Procedia PDF Downloads 671
10134 The Effects of Mobile Communication on the Nigerian Populace

Authors: Chapman Eze Nnadozie

Abstract:

Communication, the activity of conveying information, remains a vital resource for the growth and development of any given society. Mobile communication, popularly known as global system for mobile communication (GSM) is a globally accepted standard for digital cellular communication. GSM, which is a wireless technology, remains the fastest growing communication means worldwide. Indeed, mobile phones have become a critical business tool and part of everyday life in both developed and developing countries. This study examines the effects of mobile communication on the Nigerian populace. The methodology used in this study is the survey research method with the main data collection tool as questionnaires. The questionnaires were administered to a total of seventy respondents in five cities across the country, namely: Aba, Enugu, Bauchi, Makurdi, and Lagos. The result reveals that though there is some quality of service issues, mobile communication has very significant positive efforts on the economic and social development of the Nigerian populace.

Keywords: effect, mobile communication, populace, GSM, wireless technology, mobile phone

Procedia PDF Downloads 257
10133 Perceived Effect of Physical Exercise on Healthy Well-Being of Pregnant Women in Imo State

Authors: Roseline Chizoba Onuoha, Rose Ngozi Uzoka

Abstract:

This study aimed at investigating perceived effect of physical exercise on healthy well-being of pregnant mothers in Imo state. The study was guided by three research questions and three null hypotheses tested at 0.05 level of significance. The study was a quasi-experimental non-equivalent control group design involving pre and post tests. A sample of 92 pregnant women drawn from a total population of 922 registered pregnant women in ten randomly selected health centers in Imo State through multistage sampling technique was used. A 41 item structured instrument titled Physical Exercise Pregnancy Test (PEPT) was used for the study. The PEPT was validated by three experts from measurement and evaluation, educational psychology and health education. Crombach Alpha method was used to determine the reliability of Physical Exercise Pregnancy Test (PEPT) and reliability index of 0.82 was obtained. Mean and standard deviation were used to answer the research questions; while Analysis of Covariance (ANCOVA) was used in analyzing the hypotheses. Findings of the study revealed that physical exercise affects physical, social and emotional wellbeing scores of pregnant women. The study also indicated that intervention using physical exercise significantly enhanced healthy well-being scores of pregnant mothers who were exposed to physical exercise than those who received conventional health talks; Location has no significant interaction effect on the mean well-being scores of pregnant women via PEPT. Among recommendations made were that pregnant women should participate in physical exercise.

Keywords: educational psychology, Imo state, Physical exercise, pregnant women

Procedia PDF Downloads 121
10132 Factors Affecting the Mental and Physical Health of Nurses during the Outbreak of COVID-19: A Case Study of a Hospital in Mashhad

Authors: Ghorbanali Mohammadi

Abstract:

Background: Due to the widespread outbreak of the COVID-19 virus, a large number of people become infected with the disease every day and go to hospitals. The acute condition of this disease has caused the death of many people. Since all the stages of treatment for these people happen in the hospitals, nurses are at the forefront of the fight against this virus. This causes nurses to suffer from physical and mental health problems. Methods: Physical and mental problems in nurses were assessed using the Depression, Anxiety and Stress Scale (DASS-42) of Lovibond (1995) and the Nordic Questionnaire. Results: 90 nurses from emergency, intensive care, and coronary care units were examined, and a total of 180 questionnaires were collected and evaluated. It was found that 37.78%, 47.78%, and 21.11% of nurses have symptoms of depression, anxiety, and stress, respectively. 40% of the nurses had physical problems. In total, 65.17% of them were involved in one or more mental or physical illnesses. Conclusions: Of the three units surveyed, the nurses in intensive care, emergency room, and coronary care units worked more than ten hours a day. Examining the interaction of physical and mental health problems indicated that physical problems can aggravate mental problems.

Keywords: depression anxiety and stress scale of Lovibond, nordic questionnaire, mental health of nurses, physical health problems in nurses

Procedia PDF Downloads 104
10131 Leisure Time Physical Activity Patterns in Odisha, India

Authors: Shankar Ganesh, Rishee Patel, Vikram Dwivedi, Balakishore P., Deepak Chhabra, Anandhi Dakshinamoorthy, Parminder Kaur

Abstract:

Background: The World Health Organization has recommended a moderate intensity physical activity of 150 minutes, or 75 minutes vigorous-intensity physical activity per week to achieve optimal health benefits. It is not known if Indian public who indulge in leisure time physical exercises satisfy these recommendations. Methods: This study used a questionnaire to obtain data regarding demographic details, current engagement in leisure time physical activities, and dosages of these exercises from participants between 18-64 years of age. Results: Data was collected from a total of 390 participants (231 males and 159 females). 50.76% and 34.35% o of the participants reported exercising voluntarily and for health benefits respectively. Most participants (94.61%) indicated exercising without prescription. 55.38% and 12.82% of the participants under and above 38 years of age perform moderate to vigorous intensity exercises respectively. Conclusion: The over-all results of this study indicate that the participants’ choices of leisure time physical exercises are based on their personal choices and beliefs. The exercise intensities undertaken do not meet the global recommended intensities, especially in those above 38 years of age. Professionals and facilities to engage the public in the WHO recommended intensities of physical activity needs to be established.

Keywords: physical activity, exercise, India, sedentary

Procedia PDF Downloads 224
10130 Automatic API Regression Analyzer and Executor

Authors: Praveena Sridhar, Nihar Devathi, Parikshit Chakraborty

Abstract:

As the software product changes versions across releases, there are changes to the API’s and features and the upgrades become necessary. Hence, it becomes imperative to get the impact of upgrading the dependent components. This tool finds out API changes across two versions and their impact on other API’s followed by execution of the automated regression suites relevant to updates and their impacted areas. This tool has 4 layer architecture, each layer with its own unique pre-assigned capability which it does and sends the required information to next layer. This are the 4 layers. 1) Comparator: Compares the two versions of API. 2) Analyzer: Analyses the API doc and gives the modified class and its dependencies along with implemented interface details. 3) Impact Filter: Find the impact of the modified class on the other API methods. 4) Auto Executer: Based on the output given by Impact Filter, Executor will run the API regression Suite. Tool reads the java doc and extracts the required information of classes, interfaces and enumerations. The extracted information is saved into a data structure which shows the class details and its dependencies along with interfaces and enumerations that are listed in the java doc.

Keywords: automation impact regression, java doc, executor, analyzer, layers

Procedia PDF Downloads 468
10129 The Influence of Contact Models on Discrete Element Modeling of the Ballast Layer Subjected to Cyclic Loading

Authors: Peyman Aela, Lu Zong, Guoqing Jing

Abstract:

Recently, there has been growing interest in numerical modeling of ballast railway tracks. A commonly used mechanistic modeling approach for ballast is the discrete element method (DEM). Up to now, the effects of the contact model on ballast particle behavior have not been precisely examined. In this regard, selecting the appropriate contact model is mainly associated with the particle characteristics and the loading condition. Since ballast is cohesionless material, different contact models, including the linear spring, Hertz-Mindlin, and Hysteretic models, could be used to calculate particle-particle or wall-particle contact forces. Moreover, the simulation of a dynamic test is vital to investigate the effect of damping parameters on the ballast deformation. In this study, ballast box tests were simulated by DEM to examine the influence of different contact models on the mechanical behavior of the ballast layer under cyclic loading. This paper shows how the contact model can affect the deformation and damping of a ballast layer subjected to cyclic loading in a ballast box.

Keywords: ballast, contact model, cyclic loading, DEM

Procedia PDF Downloads 173
10128 Investigation on Mesh Sensitivity of a Transient Model for Nozzle Clogging

Authors: H. Barati, M. Wu, A. Kharicha, A. Ludwig

Abstract:

A transient model for nozzle clogging has been developed and successfully validated against a laboratory experiment. Key steps of clogging are considered: transport of particles by turbulent flow towards the nozzle wall; interactions between fluid flow and nozzle wall, and the adhesion of the particle on the wall; the growth of the clog layer and its interaction with the flow. The current paper is to investigate the mesh (size and type) sensitivity of the model in both two and three dimensions. It is found that the algorithm for clog growth alone excluding the flow effect is insensitive to the mesh type and size, but the calculation including flow becomes sensitive to the mesh quality. The use of 2D meshes leads to overestimation of the clog growth because the 3D nature of flow in the boundary layer cannot be properly solved by 2D calculation. 3D simulation with tetrahedron mesh can also lead to an error estimation of the clog growth. A mesh-independent result can be achieved with hexahedral mesh, or at least with triangular prism (inflation layer) for near-wall regions.

Keywords: clogging, continuous casting, inclusion, simulation, submerged entry nozzle

Procedia PDF Downloads 267
10127 Balancing Security and Human Rights: A Comprehensive Approach to Security and Defense Policy

Authors: Babatunde Osabiya

Abstract:

Cybersecurity has emerged as a pressing policy problem in recent years, affecting individuals, businesses, and governments worldwide. This research paper aims to critically review the literature on cybersecurity policy and apply policy theory to propose a policy approach that balances the freedom to access and use technology with the human rights risks and threats posed by cyber. Drawing on various credible sources, the paper examines the scale and seriousness of cyber threats, highlighting the growing threat posed by cybercriminals, hackers, and nation-states. The paper also identifies the key challenges facing policymakers, including the need for more significant investment in cybersecurity research and development and the importance of balancing the benefits of technological innovation with the risks to privacy, security, and human rights. To address these challenges, the paper proposes a policy approach emphasizing investing in cybersecurity research and development to maintain a technological edge over potential adversaries. This approach also highlights the need for greater collaboration between government, industry, and civil society to develop effective cybersecurity policies and practices that protect the rights and freedoms of people while mitigating the risks posed by cyber threats. This paper will contribute to the growing body of literature on cybersecurity policy and offers a policy framework for addressing this critical policy challenge.

Keywords: security risk, legal framework, cyber security and policy, national security

Procedia PDF Downloads 77
10126 Microstructural Study of Mechanically Alloyed Powders and the Thin Films of Cufe Alloys

Authors: Mechri hanane, Azzaz Mohammed

Abstract:

Polycrystalline CuFe thin film was prepared by thermal evaporation process (Physical vapor deposition), using the nanocrystalline CuFe powder obtained by mechanical alloying After 24 h of milling elemental powders. The microscopic study of nanocrystalline powder and the thin film of Cu70Fe30 binary alloy were examined using transmission electron microscopy (TEM) and scanning electron microscope (SEM). The cross-sectional TEM images showed that the obtained CuFe layer was polycrystalline film of about 20 nm thick and composed of grains of different size ranging from 4 nm to 18 nm.

Keywords: nanomaterials, thin films, TEM, SEM

Procedia PDF Downloads 390
10125 Potentiostatic Growth of Hazenite Mineral Coating on AZ31 Magnesium Alloy in 0.1 M K₂HPO₄/0.1 M Na₂HPO₄ Solution

Authors: Liping Wu, Durga Bhakta Pokharel, Junhua Dong, Changgang Wang, Lin Zhao, Wei Ke, Nan Chen

Abstract:

Hazenite conversion coating was deposited on AZ31 Mg alloy in a deaerated phosphate solution containing 0.1 M K₂HPO₄ and 0.1 M Na₂HPO₄ (Na₀.₁K0₀.₁) with pH 9 at −0.8 V. The coating mechanism of hazenite was elucidated by in situ potentiostatic current decay, scanning electron microscopy (SEM), energy dispersive X-ray spectroscopy (EDS), X-ray diffraction (XRD), X-ray photoelectron spectroscopy (XPS), Fourier transform infrared spectroscopy (FT-IR), electron probe micro-analyzer (EPMA) and differential scanning calorimetry (DSC). The volume of H₂ evolved during potentiostatic polarization was measured by a gas collection apparatus. The degradation resistance of the hazenite coating was evaluated in simulated body fluid (SBF) at 37℃ by using potentiodynamic polarization (PDP). The results showed that amorphous Mg(OH)₂ was deposited first, followed by the transformation of Mg(OH)₂ to amorphous MgHPO₄, subsequently the conversion of MgHPO₄ to crystallized K-struvite (KMgPO₄·6H₂O), finally the crystallization of crystallized hazenite (NaKMg₂(PO₄)₂·14H₂O). The deposited coating was composed of four layers where the inner layer is comprised of Mg(OH)₂, the middle layer of Mg(OH)₂ and MgHPO₄, the top layer of Mg(OH)₂, MgHPO₄ and K-struvite, the topmost layer of Mg(OH)₂, MgHPO₄, K-struvite and hazenite (NaKMg₂(PO₄)₂·14H₂O). The PD results showed that the hazenite coating decreased the corrosion rate by two orders of magnitude.

Keywords: magnesium alloy, potentiostatic technique, hazenite, mineral conversion coating

Procedia PDF Downloads 163
10124 Design and Implementation Wireless System by Using Microcontrollers.Application for Drive Acquisition System with Multiple Sensors

Authors: H. Fekhar

Abstract:

Design and implementation acquisition system using radio frequency (RF) ASK module and micro controllers PIC is proposed in this work. The paper includes hardware and software design. The design tools are divided into two units , namely the sender MCU and receiver.The system was designed to measure temperatures of two furnaces and pressure pneumatic process. The wireless transmitter unit use the 433.95 MHz band directly interfaced to micro controller PIC18F4620. The sender unit consists of temperatures-pressure sensors , conditioning circuits , keypad GLCD display and RF module.Signal conditioner converts the output of the sensors into an electric quantity suitable for operation of the display and recording system.The measurements circuits are connected directly to 10 bits multiplexed A/D converter.The graphic liquid crystal display (GLCD) is used . The receiver (RF) module connected to a second microcontroller ,receive the signal via RF receiver , decode the Address/data and reproduces the original data . The strategy adopted for establishing communication between the sender MCU and receiver uses the specific protocol “Header, Address and data”.The communication protocol dealing with transmission and reception have been successfully implemented . Some experimental results are provided to demonstrate the effectiveness of the proposed wireless system. This embedded system track temperatures – pressure signal reasonably well with a small error.

Keywords: microcontrollers, sensors, graphic liquid cristal display, protocol, temperature, pressure

Procedia PDF Downloads 446
10123 Design of a New Architecture of IDS Called BiIDS (IDS Based on Two Principles of Detection)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security.In this paper we present different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection).

Keywords: intrusion detection, architectures, characteristic, tools, security

Procedia PDF Downloads 449
10122 Structural Evolution of Electrodeposited Ni Coating on Ti-6Al-4V Alloy during Heat Treatment

Authors: M. Abdoos, A. Amadeh, M. Adabi

Abstract:

In recent decades, the use of titanium and its alloys due to their high mechanical properties, light weight and their corrosion resistance has increased in military and industry applications. However, the poor surface properties can limit their widely usage. Many researches were carried out to improve their surface properties. The most effective technique is based on solid-state diffusion of elements that can form intermetallic compounds with the substrate. In the present work, inter-diffusion of nickel and titanium and formation of Ni-Ti intermetallic compounds in nickel-coated Ti-6Al-4V alloy have been studied. Initially, nickel was electrodeposited on the alloy using Watts bath at a current density of 20 mA/cm2 for 1 hour. The coated specimens were then heat treated in a tubular furnace under argon atmosphere at different temperatures near Ti β-transus to maximize the diffusion rate for various durations in order to improve the surface properties of the Ti-6Al-4V alloy. The effect of temperature and time on the thickness of diffusion layer and characteristics of intermetallic phases was studied by means of scanning electron microscope (SEM) equipped with energy dispersive X-ray spectrometer (EDS) and microhardness test. The results showed that a multilayer structure was formed after heat treatment: an outer layer of remaining nickel, an area of intermetallic layers with different compositions and solid solution of Ni-Ti. Three intermetallic layers was detected by EDS analysis, namely an outer layer with about 75 at.% Ni (Ni3Ti), an intermediate layer with 50 at.% Ni (NiTi) and finally an inner layer with 36 at.% Ni (NiTi2). It was also observed that the increase in time or temperature led to the formation of thicker intermetallic layers. Meanwhile, the microhardness of heat treated samples increased with formation of Ni-Ti intermetallics; however, its value depended on heat treatment parameters.

Keywords: heat treatment, microhardness, Ni coating, Ti-6Al-4V

Procedia PDF Downloads 424
10121 Reconstructability Analysis for Landslide Prediction

Authors: David Percy

Abstract:

Landslides are a geologic phenomenon that affects a large number of inhabited places and are constantly being monitored and studied for the prediction of future occurrences. Reconstructability analysis (RA) is a methodology for extracting informative models from large volumes of data that work exclusively with discrete data. While RA has been used in medical applications and social science extensively, we are introducing it to the spatial sciences through applications like landslide prediction. Since RA works exclusively with discrete data, such as soil classification or bedrock type, working with continuous data, such as porosity, requires that these data are binned for inclusion in the model. RA constructs models of the data which pick out the most informative elements, independent variables (IVs), from each layer that predict the dependent variable (DV), landslide occurrence. Each layer included in the model retains its classification data as a primary encoding of the data. Unlike other machine learning algorithms that force the data into one-hot encoding type of schemes, RA works directly with the data as it is encoded, with the exception of continuous data, which must be binned. The usual physical and derived layers are included in the model, and testing our results against other published methodologies, such as neural networks, yields accuracy that is similar but with the advantage of a completely transparent model. The results of an RA session with a data set are a report on every combination of variables and their probability of landslide events occurring. In this way, every combination of informative state combinations can be examined.

Keywords: reconstructability analysis, machine learning, landslides, raster analysis

Procedia PDF Downloads 47
10120 Anatomical, Light and Scanning Electron Microscopical Study of Ostrich (Struthio camelus) Integument

Authors: Samir El-Gendy, Doaa Zaghloul

Abstract:

The current study dealt with the gross and microscopic anatomy of the integument of male ostrich in addition to the histological features of different areas of skin by light and SEM. The ostrich skin is characterized by prominent feather follicles and bristles. The number of feather follicles was determined per cm2 in different regions. The integument of ostrich had many modifications which appeared as callosities and scales, nail and toe pads. They were sternal, pubic and Achilles tendon callosities. The vacuolated epidermal cells were seen mainly in the skin of legs and to a lesser extent in the skin of back and Achilles areas. Higher lipogenic potential was expressed by epidermis from glabrous areas of ostrich skin. The dermal papillae were found in the skin of feathered area of neck and back and this was not a common finding in bird's skin which may give resistance against shearing forces in these regions of ostrich skin. The thickness of the keratin layer of ostrich varied, being thick and characteristically loose in the skin at legs, very thin and wavy at neck, while at Achilles skin area, scale and toe pad were thick and more compact, with the thickest very dense and wavy keratin layer at the nail. The dermis consisted of superficial layer of dense irregular connective tissue characterized by presence of many vacuoles of different sizes just under the basal lamina of the epithelium of epidermis and deep layer of dense regular connective tissue. This result suggested presence of fat droplets in this layer which may be to overcome the lack of good barrier of cutaneous water loss in epidermis.

Keywords: ostrich, light microscopy, scanning electron microscopy, integument, skin modifications

Procedia PDF Downloads 224
10119 Two-Dimensional Nanostack Based On Chip Wiring

Authors: Nikhil Jain, Bin Yu

Abstract:

The material behavior of graphene, a single layer of carbon lattice, is extremely sensitive to its dielectric environment. We demonstrate improvement in electronic performance of graphene nanowire interconnects with full encapsulation by lattice-matching, chemically inert, 2D layered insulator hexagonal boron nitride (h-BN). A novel layer-based transfer technique is developed to construct the h-BN/MLG/h-BN heterostructures. The encapsulated graphene wires are characterized and compared with that on SiO2 or h-BN substrate without passivating h-BN layer. Significant improvements in maximum current-carrying density, breakdown threshold, and power density in encapsulated graphene wires are observed. These critical improvements are achieved without compromising the carrier transport characteristics in graphene. Furthermore, graphene wires exhibit electrical behavior less insensitive to ambient conditions, as compared with the non-passivated ones. Overall, h-BN/graphene/h-BN heterostructure presents a robust material platform towards the implementation of high-speed carbon-based interconnects.

Keywords: two-dimensional nanosheet, graphene, hexagonal boron nitride, heterostructure, interconnects

Procedia PDF Downloads 434
10118 Effective Strategies Migrants Adopted to Improve Food Security in a Regional Area of Australia

Authors: Joanne Sin Wei Yeoh, Quynh Lê, Daniel R. Terry, Rosa Mc Manamey

Abstract:

Food security is a global issue and one of the concerns in Australia, particularly in regional and rural areas. Despite Australia’s current ability to produce enough food to feed more than its current population, evidence has been accumulating over the last decade to demonstrate many Australians struggle to feed themselves, including immigrants from cultural and linguistically diverse (CALD) backgrounds. This study aims to identify the acculturation strategies used by migrants to enhance their approach to food security in Tasmania. The study employed a mixed methods approach that used both questionnaires and semi-structured interviews with migrants living in Tasmania. Descriptive and inferential statistics was used to analyse data collected from questionnaire, whereas, thematic analysis was employed to analyse the interview data. Migrants (n=301) completed the questionnaire with a response rate of 50.2% and 33 follow-up interviews were conducted. We found that majority of the migrants (70.0%) replaced food ingredients and went without the food they could not buy from shops with similar ingredients. Support and advice from friends were effective ways to improve their food access. Additionally, length of stays in Tasmania and region of origin were significantly associated with the ways migrants dealing with food security. The interview results revealed that migrants managed to adapt to the new food culture by using different acculturation strategies, including access food ingredients from other country; adjusting or adapting; home gardening and access to technology. In addition, social and cultural capitals were also treated as vital roles in improving migrants’ food security. To summarize, migrants employed different strategies for food security while acculturating into the new environment. Our findings could become the guidelines for migrants and relevant government or private sectors that address food security.

Keywords: food security, migrants, strategies, inferential statistics

Procedia PDF Downloads 506
10117 The Duty of Application and Connection Providers Regarding the Supply of Internet Protocol by Court Order in Brazil to Determine Authorship of Acts Practiced on the Internet

Authors: João Pedro Albino, Ana Cláudia Pires Ferreira de Lima

Abstract:

Humanity has undergone a transformation from the physical to the virtual world, generating an enormous amount of data on the world wide web, known as big data. Many facts that occur in the physical world or in the digital world are proven through records made on the internet, such as digital photographs, posts on social media, contract acceptances by digital platforms, email, banking, and messaging applications, among others. These data recorded on the internet have been used as evidence in judicial proceedings. The identification of internet users is essential for the security of legal relationships. This research was carried out on scientific articles and materials from courses and lectures, with an analysis of Brazilian legislation and some judicial decisions on the request of static data from logs and Internet Protocols (IPs) from application and connection providers. In this article, we will address the determination of authorship of data processing on the internet by obtaining the IP address and the appropriate judicial procedure for this purpose under Brazilian law.

Keywords: IP address, digital forensics, big data, data analytics, information and communication technology

Procedia PDF Downloads 107
10116 Lipopolysaccharide Induced Avian Innate Immune Expression in Heterophils

Authors: Rohita Gupta, G. S. Brah, R. Verma, C. S. Mukhopadhayay

Abstract:

Although chicken strains show differences in susceptibility to a number of diseases, the underlying immunological basis is yet to be elucidated. In the present study, heterophils were subjected to LPS stimulation and total RNA extraction, further differential gene expression was studied in broiler, layer and indigenous Aseel strain by Real Time RT-PCR at different time periods before and after induction. The expression of the 14 AvBDs and chTLR 1, 2, 3, 4, 5, 7, 15 and 21 was detectable in heterophils. The expression level of most of the AvBDs significantly increased (P<0.05) 3 hours post in vitro lipopolysaccharide challenge. Higher expression level and stronger activation of most AvBDs, NFkB-1 and IRF-3 in heterophils was observed, with the stimulation of LPS in layer compared to broiler, and in Aseel compared to both layer and broiler. This investigation will allow more refined interpretation of immuno-genetic basis of the variable disease resistance/susceptibility in divergent stock of chicken including indigenous breed. Moreover this study will be helpful in formulation of strategy for isolation of antimicrobial peptides from heterophils.

Keywords: differential expression, heterophils, cytokines, defensin, TLR

Procedia PDF Downloads 595
10115 Preparation and Study of Pluronic F127 Monolayers at Air-Water Interface

Authors: Neha Kanodia, M. Kamil

Abstract:

Properties of mono layers of Pluronic F127 at air/water interface have been investigated by using Langmuir trough method. Pluronic F127 is a triblock copolymer of poly (ethyleneoxide) (PEO groups)– poly (propylene oxide) (PO groups)–poly(ethylene oxide) (PEO groups). Surface pressure versus mean molecular area isotherms is studied. The isotherm of the mono layer showed the characteristics of a pancake-to-brush transition upon compression of the mono layer. The effect of adding surfactant (SDS) to polymer and the effect of increasing loading on polymer was also studied. The effect of repeated compression and expansion cycle (or hysteresis curve) is investigated to know about stability of the film formed. Static elasticity of mono layer gives information about molecular arrangement, phase structure and phase transition.

Keywords: surface-pressure, mean molecular area isotherms, hysteresis, static elasticity

Procedia PDF Downloads 430
10114 Improving Digital Data Security Awareness among Teacher Candidates with Digital Storytelling Technique

Authors: Veysel Çelik, Aynur Aker, Ebru Güç

Abstract:

Developments in information and communication technologies have increased both the speed of producing information and the speed of accessing new information. Accordingly, the daily lives of individuals have started to change. New concepts such as e-mail, e-government, e-school, e-signature have emerged. For this reason, prospective teachers who will be future teachers or school administrators are expected to have a high awareness of digital data security. The aim of this study is to reveal the effect of the digital storytelling technique on the data security awareness of pre-service teachers of computer and instructional technology education departments. For this purpose, participants were selected based on the principle of volunteering among third-grade students studying at the Computer and Instructional Technologies Department of the Faculty of Education at Siirt University. In the research, the pretest/posttest half experimental research model, one of the experimental research models, was used. In this framework, a 6-week lesson plan on digital data security awareness was prepared in accordance with the digital narration technique. Students in the experimental group formed groups of 3-6 people among themselves. The groups were asked to prepare short videos or animations for digital data security awareness. The completed videos were watched and evaluated together with prospective teachers during the evaluation process, which lasted approximately 2 hours. In the research, both quantitative and qualitative data collection tools were used by using the digital data security awareness scale and the semi-structured interview form consisting of open-ended questions developed by the researchers. According to the data obtained, it was seen that the digital storytelling technique was effective in creating data security awareness and creating permanent behavior changes for computer and instructional technology students.

Keywords: digital storytelling, self-regulation, digital data security, teacher candidates, self-efficacy

Procedia PDF Downloads 112
10113 Magnetoelastically Induced Perpendicular Magnetic Anisotropy and Perpendicular Exchange Bias of CoO/CoPt Multilayer Films

Authors: Guo Lei, Wang Yue, Nakamura Yoshio, Shi Ji

Abstract:

Recently, perpendicular exchange bias (PEB) is introduced as an active topic attracting continuous efforts. Since its discovery, extrinsic control of PEB has been proposed, due to its scientific significance in spintronic devices and potential application in high density magnetic random access memory with perpendicular magnetic tunneling junction (p-MTJ). To our knowledge, the researches aiming to controlling PEB so far are focused mainly on enhancing the interfacial exchange coupling by adjusting the FM/AFM interface roughness, or optimizing the crystalline structures of FM or AFM layer by employing different seed layers. In present work, the effects of magnetoelastically induced PMA on PEB have been explored in [CoO5nm/CoPt5nm]5 multilayer films. We find the PMA strength of FM layer also plays an important role on PEB at the FM/AFM interface and it is effective to control PEB of [CoO5nm/CoPt5nm]5 multilayer films by changing the magnetoelastically induced PMA of CoPt layer. [CoO5nm/CoPt5nm]5 multilayer films were deposited by magnetron sputtering on fused quartz substrate at room temperature, then annealed at 100°C, 250°C, 300°C and 375°C for 3h, respectively. XRD results reveal that all the samples are well crystallized with preferred fcc CoPt (111) orientation. The continuous multilayer structure with sharp component transition at the CoO5nm/CoPt5nm interface are identified clearly by transmission electron microscopy (TEM), x-ray reflectivity (XRR) and atomic force microscope (AFM). CoPt layer in-plane tensile stress is calculated by sin2φ method, and we find it increases gradually upon annealing from 0.99 GPa (as-deposited) up to 3.02 GPa (300oC-annealed). As to the magnetic property, significant enhancement of PMA is achieved in [CoO5nm/CoPt5nm]5 multilayer films after annealing due to the increase of CoPt layer in-plane tensile stress. With the enhancement of magnetoelastically induced PMA, great improvement of PEB is also achieved in [CoO5nm/CoPt5nm]5 multilayer films, which increases from 130 Oe (as-deposited) up to 1060 Oe (300oC-annealed), showing the same change tendency as PMA and the strong correlation with CoPt layer in-plane tensile stress. We consider it is the increase of CoPt layer in-plane tensile stress that leads to the enhancement of PMA, and thus the enhancement of magnetoelastically induced PMA results in the improvement of PEB in [CoO5nm/CoPt5nm]5 multilayer films.

Keywords: perpendicular exchange bias, magnetoelastically induced perpendicular magnetic anisotropy, CoO5nm/CoPt5nm]5 multilayer film with in-plane stress, perpendicular magnetic tunneling junction

Procedia PDF Downloads 450
10112 MEMS based Vibration Energy Harvesting: An overview

Authors: Gaurav Prabhudesai, Shaurya Kaushal, Pulkit Dubey, B. D. Pant

Abstract:

The current race of miniaturization of circuits, systems, modules and networks has resulted in portable and mobile wireless systems having tremendous capabilities with small volume and weight. The power drivers or the power pack, electrically driving these modules have also reduced in proportion. Normally, the power packs in these mobile or fixed systems are batteries, rechargeable or non-rechargeable, which need regular replacement or recharging. Another approach to power these modules is to utilize the ambient energy available for electrical driving to make the system self-sustained. The current paper presents an overview of the different MEMS (Micro-Electro-Mechanical Systems) based techniques used for the harvesting of vibration energy to electrically drive a WSN (wireless sensor network) or a mobile module. This kind of system would have enormous applications, the most significant one, may be in cell phones.

Keywords: energy harvesting, WSN, MEMS, piezoelectrics

Procedia PDF Downloads 485
10111 Application of the Shallow Seismic Refraction Technique to Characterize the Foundation Rocks at the Proposed Tushka New City Site, South Egypt

Authors: Abdelnasser Mohamed, R. Fat-Helbary, H. El Khashab, K. EL Faragawy

Abstract:

Tushka New City is one of the proposed new cities in South Egypt. It is located in the eastern part of the western Desert of Egypt between latitude 22.878º and 22.909º N and longitude 31.525º and 31.635º E, about 60 kilometers far from Abu Simble City. The main target of the present study is the investigation of the shallow subsurface structure conditions and the dynamic characteristics of subsurface rocks using the shallow seismic refraction technique. Forty seismic profiles were conducted to calculate the P- and S-waves velocity at the study area. P- and SH-waves velocities can be used to obtain the geotechnical parameters and also SH-wave can be used to study the vibration characteristics of the near surface layers, which are important for earthquakes resistant structure design. The output results of the current study indicated that the P-waves velocity ranged from 450 to 1800 m/sec and from 1550 to 3000 m/sec for the surface and bedrock layer respectively. The SH-waves velocity ranged from 300 to 1100 m/sec and from 1000 to 1800 m/sec for the surface and bedrock layer respectively. The thickness of the surface layer and the depth to the bedrock layer were determined along each profile. The bulk density ρ of soil layers that used in this study was calculated for all layers at each profile in the study area. In conclusion, the area is mainly composed of compacted sandstone with high wave velocities, which is considered as a good foundation rock. The south western part of the study area has minimum values of the computed P- and SH-waves velocities, minimum values of the bulk density and the maximum value of the mean thickness of the surface layer.

Keywords: seismic refraction, Tushak new city, P-waves, SH-waves

Procedia PDF Downloads 372
10110 Depletion Layer Parameters of Al-MoO3-P-CdTe-Al MOS Structures

Authors: A. C. Sarmah

Abstract:

The Al-MoO3-P-CdTe-Al MOS sandwich structures were fabricated by vacuum deposition method on cleaned glass substrates. Capacitance versus voltage measurements were performed at different frequencies and sweep rates of applied voltages for oxide and semiconductor films of different thicknesses. In the negative voltage region of the C-V curve a high differential capacitance of the semiconductor was observed and at high frequencies (<10 kHz) the transition from accumulation to depletion and further to deep depletion was observed as the voltage was swept from negative to positive. A study have been undertaken to determine the value of acceptor density and some depletion layer parameters such as depletion layer capacitance, depletion width, impurity concentration, flat band voltage, Debye length, flat band capacitance, diffusion or built-in-potential, space charge per unit area etc. These were determined from C-V measurements for different oxide and semiconductor thicknesses.

Keywords: debye length, depletion width, flat band capacitance, impurity concentration

Procedia PDF Downloads 441
10109 Attitude of Beef Cattle Farmers toward Biosecurity Practices

Authors: Veronica Sri Lestari, Sitti Nurani Sirajuddin, Kasmiyati Kasim

Abstract:

The purpose of this research was to know the attitude of beef cattle farmers toward bio security practices. This research was conducted in Barru regency, South Sulawesi province, Indonesia, in 2014. Thirty beef cattle farmers were selected through random sampling. Primary and secondary data were collected through report, observation and deep interview by using questionnaire. Bio security practices consisted of 35 questions. Every answer of the question was scored based on three categories: score 1 (not important), score 2 (important) and 3 (very important). The results of this research showed that the attitude of beef cattle farmers toward bio security practices was categorized as important.

Keywords: attitude, beef cattle, biosecurity, farmers

Procedia PDF Downloads 279