Search results for: electrical power system security
23320 Analysis of Silicon Controlled Rectifier-Based Electrostatic Discharge Protection Circuits with Electrical Characteristics for the 5V Power Clamp
Authors: Jun-Geol Park, Kyoung-Il Do, Min-Ju Kwon, Kyung-Hyun Park, Yong-Seo Koo
Abstract:
This paper analyzed the SCR (Silicon Controlled Rectifier)-based ESD (Electrostatic Discharge) protection circuits with the turn-on time characteristics. The structures are the LVTSCR (Low Voltage Triggered SCR), the ZTSCR (Zener Triggered SCR) and the PTSCR (P-Substrate Triggered SCR). The three structures are for the 5V power clamp. In general, the structures with the low trigger voltage structure can have the fast turn-on characteristics than other structures. All the ESD protection circuits have the low trigger voltage by using the N+ bridge region of LVTSCR, by using the zener diode structure of ZTSCR, by increasing the trigger current of PTSCR. The simulation for the comparison with the turn-on time was conducted by the Synopsys TCAD simulator. As the simulation results, the LVTSCR has the turn-on time of 2.8 ns, ZTSCR of 2.1 ns and the PTSCR of 2.4 ns. The HBM simulation results, however, show that the PTSCR is the more robust structure of 430K in HBM 8kV standard than 450K of LVTSCR and 495K of ZTSCR. Therefore the PTSCR is the most effective ESD protection circuit for the 5V power clamp.Keywords: ESD, SCR, turn-on time, trigger voltage, power clamp
Procedia PDF Downloads 34823319 An Attribute Based Access Control Model with POL Module for Dynamically Granting and Revoking Authorizations
Authors: Gang Liu, Huimin Song, Can Wang, Runnan Zhang, Lu Fang
Abstract:
Currently, resource sharing and system security are critical issues. This paper proposes a POL module composed of PRIV ILEGE attribute (PA), obligation and log which improves attribute based access control (ABAC) model in dynamically granting authorizations and revoking authorizations. The following describes the new model termed PABAC in terms of the POL module structure, attribute definitions, policy formulation and authorization architecture, which demonstrate the advantages of it. The POL module addresses the problems which are not predicted before and not described by access control policy. It can be one of the subject attributes or resource attributes according to the practical application, which enhances the flexibility of the model compared with ABAC. A scenario that illustrates how this model is applied to the real world is provided.Keywords: access control, attribute based access control, granting authorizations, privilege, revoking authorizations, system security
Procedia PDF Downloads 35923318 Improving Security by Using Secure Servers Communicating via Internet with Standalone Secure Software
Authors: Carlos Gonzalez
Abstract:
This paper describes the use of the Internet as a feature to enhance the security of our software that is going to be distributed/sold to users potentially all over the world. By placing in a secure server some of the features of the secure software, we increase the security of such software. The communication between the protected software and the secure server is done by a double lock algorithm. This paper also includes an analysis of intruders and describes possible responses to detect threats.Keywords: internet, secure software, threats, cryptography process
Procedia PDF Downloads 33323317 Geophysical Mapping of the Groundwater Aquifer System in Gode Area, Northeastern Hosanna, Ethiopia
Authors: Esubalew Yehualaw Melaku
Abstract:
In this study, two basic geophysical methods are applied for mapping the groundwater aquifer system in the Gode area along the Guder River, northeast of Hosanna town, near the western margin of the Central Main Ethiopian Rift. The main target of the study is to map the potential aquifer zone and investigate the groundwater potential for current and future development of the resource in the Gode area. The geophysical methods employed in this study include, Vertical Electrical Sounding (VES) and magnetic survey techniques. Electrical sounding was used to examine and map the depth to the potential aquifer zone of the groundwater and its distribution over the area. On the other hand, a magnetic survey was used to delineate contact between lithologic units and geological structures. The 2D magnetic modeling and the geoelectric sections are used for the identification of weak zones, which control the groundwater flow and storage system. The geophysical survey comprises of twelve VES readings collected by using a Schlumberger array along six profile lines and more than four hundred (400) magnetic readings at about 10m station intervals along four profiles and 20m along three random profiles. The study result revealed that the potential aquifer in the area is obtained at a depth range from 45m to 92m. This is the response of the highly weathered/ fractured ignimbrite and pumice layer with sandy soil, which is the main water-bearing horizon. Overall, in the neighborhood of four VES points, VES- 2, VES- 3, VES-10, and VES-11, shows good water-bearing zones in the study area.Keywords: vertical electrical sounding, magnetic survey, aquifer, groundwater potential
Procedia PDF Downloads 12823316 Tag Impersonation Attack on Ultra-lightweight Radio Frequency Identification Authentication Scheme (ESRAS)
Authors: Reham Al-Zahrani, Noura Aleisa
Abstract:
The proliferation of Radio Frequency Identification (RFID) technology has raised concerns about system security, particularly regarding tag impersonation attacks. Regarding RFID systems, an appropriate authentication protocol must resist active and passive attacks. A tag impersonation occurs when an adversary's tag is used to fool an authenticating reader into believing it is a legitimate tag. This paper analyzed the security of the efficient, secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS). Then, the paper presents a comprehensive analysis of the Efficient, Secure, and Practical Ultra-Lightweight RFID Authentication Scheme (ESRAS) in the context of radio frequency identification (RFID) systems that employed the Scyther tool to examine the protocol's security against a tag impersonation attack.Keywords: RFID, impersonation attack, authentication, ultra-lightweight protocols
Procedia PDF Downloads 6523315 Worst-Case Load Shedding in Electric Power Networks
Authors: Fu Lin
Abstract:
We consider the worst-case load-shedding problem in electric power networks where a number of transmission lines are to be taken out of service. The objective is to identify a prespecified number of line outages that lead to the maximum interruption of power generation and load at the transmission level, subject to the active power-flow model, the load and generation capacity of the buses, and the phase-angle limit across the transmission lines. For this nonlinear model with binary constraints, we show that all decision variables are separable except for the nonlinear power-flow equations. We develop an iterative decomposition algorithm, which converts the worst-case load shedding problem into a sequence of small subproblems. We show that the subproblems are either convex problems that can be solved efficiently or nonconvex problems that have closed-form solutions. Consequently, our approach is scalable for large networks. Furthermore, we prove the convergence of our algorithm to a critical point, and the objective value is guaranteed to decrease throughout the iterations. Numerical experiments with IEEE test cases demonstrate the effectiveness of the developed approach.Keywords: load shedding, power system, proximal alternating linearization method, vulnerability analysis
Procedia PDF Downloads 14023314 Ionic Polymer Actuators with Fast Response and High Power Density Based on Sulfonated Phthalocyanine/Sulfonated Polysulfone Composite Membrane
Authors: Taehoon Kwon, Hyeongrae Cho, Dirk Henkensmeier, Youngjong Kang, Chong Min Koo
Abstract:
Ionic polymer actuators have been of interest in the bio-inspired artificial muscle devices. However, the relatively slow response and low power density were the obstacles for practical applications. In this study, ionic polymer actuators are fabricated with ionic polymer composite membranes based on sulfonated poly(arylene ether sulfone) (SPAES) and copper(II) phthalocyanine tetrasulfonic acid (CuPCSA). CuPCSA is an organic filler with very high ion exchange capacity (IEC, 4.5 mmol H+/g) that can be homogeneously dispersed on the molecular scale into the SPAES membrane. SPAES/CuPCSA actuators show larger ionic conductivity, mechanical properties, bending deformation, exceptional faster response to electrical stimuli, and larger mechanical power density (3028 W m–3) than Nafion actuators. This outstanding actuation performance of SPAES/CuPCSA composite membrane actuators makes them attractive for next generation transducers with high power density, which are currently developed biomimetic devices such as endoscopic surgery.Keywords: actuation performance, composite membranes, ionic polymer actuators, organic filler
Procedia PDF Downloads 27823313 Implementation of MPPT Algorithm for Grid Connected PV Module with IC and P&O Method
Authors: Arvind Kumar, Manoj Kumar, Dattatraya H. Nagaraj, Amanpreet Singh, Jayanthi Prattapati
Abstract:
In recent years, the use of renewable energy resources instead of pollutant fossil fuels and other forms has increased. Photovoltaic generation is becoming increasingly important as a renewable resource since it does not cause in fuel costs, pollution, maintenance, and emitting noise compared with other alternatives used in power applications. In this paper, Perturb and Observe and Incremental Conductance methods are used to improve energy conversion efficiency under different environmental conditions. PI controllers are used to control easily DC-link voltage, active and reactive currents. The whole system is simulated under standard climatic conditions (1000 W/m2, 250C) in MATLAB and the irradiance is varied from 1000 W/m2 to 300 W/m2. The use of PI controller makes it easy to directly control the power of the grid connected PV system. Finally the validity of the system will be verified through the simulations in MATLAB/Simulink environment.Keywords: incremental conductance algorithm, modeling of PV panel, perturb and observe algorithm, photovoltaic system and simulation results
Procedia PDF Downloads 50923312 Electrical Characterization of Hg/n-bulk GaN Schottky Diode
Authors: B. Nabil, O. Zahir, R. Abdelaziz
Abstract:
We present the results of electrical characterizations current-voltage and capacity-voltage implementation of a method of making a Schottky diode on bulk gallium nitride doped n. We made temporary Schottky contact of Mercury (Hg) and an ohmic contact of silver (Ag), the electrical characterizations current-voltage (I-V) and capacitance-voltage (C-V) allows us to determine the difference parameters of our structure (Hg /n-GaN) as the barrier height (ΦB), the ideality factor (n), the series resistor (Rs), the voltage distribution (Vd), the doping of the substrate (Nd) and density of interface states (Nss).Keywords: Bulk Gallium nitride, electrical characterization, Schottky diode, series resistance, substrate doping
Procedia PDF Downloads 48523311 Alternative Futures for the Middle East
Authors: Dorsa Bakhshandehgeyazdi
Abstract:
This paper examines elective future of security in the Middle East trying to find a way that could take the district from a shaky past to a more secure future. Taking a gander at five situations about the eventual future of world legislative issues, in particular, globalization, fragmentation, conflict of civilizations, majority rule peace and the development of a security group, the paper contends that albeit every situation has its qualities (and in addition shortcomings), it is the situation that predicts the foundation of a security group that joins a more express thought for forming a more secure future for the Middle East.Keywords: Middle East, Globalization, Fragmentation, Conflict of civilizations, Majority rule peace, Development of a security group
Procedia PDF Downloads 29423310 Assessing EU-China Security Interests from Contradiction to Convergence
Authors: Julia Gurol
Abstract:
Why do we observe a shift towards convergence in EU-China security interests? While contradicting attitudes towards key principles of inter-state and region-to-state relations, including state sovereignty, territorial integrity, and intervention policies have ever since hindered EU-China inter-regional cooperation beyond the economic realm, collaboration in peace and security issues is now becoming a key pillar of European-Chinese relations. In addition, the Belt and Road Initiative as most ambitious Chinese foreign policy project explicitly touches upon several European foreign policy and security preferences. Based on these counterintuitive findings, this paper traces the process of convergence of Sino-European security interests. Drawing on qualitative text analysis of official Chinese and European policy papers and documents from the establishment of diplomatic relations in 1975 until today, it assesses the striking change over time. On this basis, the paper uses theories of neo-functionalism, inter-regionalism, and securitization and borrows from constructivist views in International Relations’ theory, to expound possible motives for the change in Chinese and respectively European preferences in the security realm. The results reveal interesting insights into the decisive factors and motives behind both countries’ foreign policies. The paper concludes with a discussion of further potential and difficulties of EU-China security cooperation.Keywords: belt and road initiative, China, European Union, foreign policy, neo-functionalism, security
Procedia PDF Downloads 28523309 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism
Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun
Abstract:
The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorismKeywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution
Procedia PDF Downloads 9623308 Effects of Carbon Black/Graphite Ratio for Electrical Conduction and Frictional Resistance of Nanocomposite Sol-Gel Coatings
Authors: Julien Acquadro, Sophie Noel, Frédéric Houze, Philippe Teste, Pascal Chretien, Clément Genet, Edouard Breniaux, Marie-Joël Menu, Florence Ansart, Marie Gressier
Abstract:
This paper presents the study results of the electrical and tribological properties of nanocomposite hybrid sol-gel coatings developed for industrial applications on electrical connector housings. The electrical properties of coatings are provided by conductive fillers. The coatings presented in this study are formulated with different types of conductive carbon fillers, in this case carbon black and graphite particles. The coatings are deposited on a high-phosphorous nickel substrate by a dip-coating process. The authors have investigated the effects of the carbon black/graphite ratio on the coating's electrical and tribological properties. Electrical characterizations with a 4-probe method and AFM measurements as well as tribological tests by micro-friction shed light on the role of the black carbon/graphite ratio on the final properties of the sol-gel nanocomposite coatings. This study shows that the amount of carbon black mainly drives the coatings' electrical conduction property, while graphite's lubrication properties bring interest to reduce the values of friction coefficients (at a contact pressure of 800 MPa). In the industrial field of electrical connectors, such coatings aim at replacing cadmium and chromium (VI) protection, as recommended by REACH (Registration, Evaluation and Authorization of Chemicals) and RoHS (Restriction of Hazardous Substances in electrical and electronic equipment) regulations (Annex XVII of REACH).Keywords: carbon conductive fillers, electrical conduction, sol-gel coatings, tribology
Procedia PDF Downloads 9123307 Assessing the Cumulative Impact of PM₂.₅ Emissions from Power Plants by Using the Hybrid Air Quality Model and Evaluating the Contributing Salient Factor in South Taiwan
Authors: Jackson Simon Lusagalika, Lai Hsin-Chih, Dai Yu-Tung
Abstract:
Particles with an aerodynamic diameter of 2.5 meters or less are referred to as "fine particulate matter" (PM₂.₅) are easily inhaled and can go deeper into the lungs than other particles in the atmosphere, where it may have detrimental health consequences. In this study, we use a hybrid model that combined CMAQ and AERMOD as well as initial meteorological fields from the Weather Research and Forecasting (WRF) model to study the impact of power plant PM₂.₅ emissions in South Taiwan since it frequently experiences higher PM₂.₅ levels. A specific date of March 3, 2022, was chosen as a result of a power outage that prompted the bulk of power plants to shut down. In some way, it is not conceivable anywhere in the world to turn off the power for the sole purpose of doing research. Therefore, this catastrophe involving a power outage and the shutdown of power plants offers a great occasion to evaluate the impact of air pollution driven by this power sector. As a result, four numerical experiments were conducted in the study using the Continuous Emission Data System (CEMS), assuming that the power plants continued to function normally after the power outage. The hybrid model results revealed that power plants have a minor impact in the study region. However, we examined the accumulation of PM₂.₅ in the study and discovered that once the vortex at 925hPa was established and moved to the north of Taiwan's coast, the study region experienced higher observed PM₂.₅ concentrations influenced by meteorological factors. This study recommends that decision-makers take into account not only control techniques, specifically emission reductions, but also the atmospheric and meteorological implications for future investigations.Keywords: PM₂.₅ concentration, powerplants, hybrid air quality model, CEMS, Vorticity
Procedia PDF Downloads 7623306 Effects of the Amount of Static Stretching on the Knee Isokinetic Muscle Strength
Authors: Chungyu Chen, Hui-Ju Chang, Pei-Shan Guo, Huei-Ling Jhan, Yi-Ping Lin
Abstract:
The purpose of this study was to investigate the effect of the amount of acutely static stretching on muscular strength and power. There were 15 males, and 7 females recruited voluntarily as the participants in the study. The mean age, body height, and weight of participants were 23.4 ± 2.8 years old, 171.0 ± 7.2 cm, and 65.7 ± 8.7 kg, respectively. Participants were repeated to stretch hamstring muscles 2 or 6 30-s bouts randomly on a separate day spaced 5-7 days apart in a passive, static, sit-and-reach stretching exercise. Before and after acutely static stretching, the Biodex System 4 Pro was used to acquire the peak torque, power, total work, and range of motion for right knee under the loading of 180 deg/s. The 2 (test-retest) × 2 (number of stretches) repeated measures two-way analysis of variance were used to compare the parameters of muscular strength/power (α = .05). The results showed that the peak torque, power, and total work increased significantly after acutely passive static stretching (ps < .05) in flexor and extensor of knee. But there were no significant differences found between the 2 and 6 30-s bouts hamstring muscles stretching (ps > .05). It indicated that the performance of muscular strength and power in knee flexion and extension do not inhibit following the increase of amount of stretching.Keywords: knee, power, flexibility, strength
Procedia PDF Downloads 27923305 Modeling of a Concentrating Photovoltaic Module with and without Cooling System
Authors: Intissar Benrhouma, Marta Victoria, Ignacio Anton, Bechir Chaouachi
Abstract:
Concentrating photovoltaic systems CPV use optical elements, such as Fresnel lenses, to concentrate solar intensity. The concentrated solar energy is delivered to the solar cell from 20 to 100 W/cm². Some of this energy is converted to electricity, while the rest must be disposed of as a residual heat. Solar cells cooling should be a necessary part of CPV modeling because these systems allowed increasing the power received by the cell. This high power can rise the electrons’ potential causing the heating of the cell, which reduces the global module’s efficiency. This work consists of modeling a concentrating photovoltaic module with and without a cooling system. We have established a theoretical model based on energy balances carried out on a photovoltaic module using solar radiation concentration cells. Subsequently, we developed a calculation program on Matlab which allowed us to simulate the functioning of this module. The obtained results show that the addition of a cooling system to the module improves greatly the performance of our CPV system.Keywords: solar energy, photovoltaic, concentration, cooling, performance improvement
Procedia PDF Downloads 39823304 Introduce a New Model of Anomaly Detection in Computer Networks Using Artificial Immune Systems
Authors: Mehrshad Khosraviani, Faramarz Abbaspour Leyl Abadi
Abstract:
The fundamental component of the computer network of modern information society will be considered. These networks are connected to the network of the internet generally. Due to the fact that the primary purpose of the Internet is not designed for, in recent decades, none of these networks in many of the attacks has been very important. Today, for the provision of security, different security tools and systems, including intrusion detection systems are used in the network. A common diagnosis system based on artificial immunity, the designer, the Adhasaz Foundation has been evaluated. The idea of using artificial safety methods in the diagnosis of abnormalities in computer networks it has been stimulated in the direction of their specificity, there are safety systems are similar to the common needs of m, that is non-diagnostic. For example, such methods can be used to detect any abnormalities, a variety of attacks, being memory, learning ability, and Khodtnzimi method of artificial immune algorithm pointed out. Diagnosis of the common system of education offered in this paper using only the normal samples is required for network and any additional data about the type of attacks is not. In the proposed system of positive selection and negative selection processes, selection of samples to create a distinction between the colony of normal attack is used. Copa real data collection on the evaluation of ij indicates the proposed system in the false alarm rate is often low compared to other ir methods and the detection rate is in the variations.Keywords: artificial immune system, abnormality detection, intrusion detection, computer networks
Procedia PDF Downloads 35323303 Analyzing the Effect of Ambient Temperature and Loads Power Factor on Electric Generator Power Rating
Authors: Ahmed Elsebaay, Maged A. Abu Adma, Mahmoud Ramadan
Abstract:
This study presents a technique clarifying the effect of ambient air temperature and loads power factor changing from standard values on electric generator power rating. The study introduces an optimized technique for selecting the correct electric generator power rating for certain application and operating site ambient temperature. The de-rating factors due to the previous effects will be calculated to be applied on a generator to select its power rating accurately to avoid unsafe operation and save its lifetime. The information in this paper provides a simple, accurate, and general method for synchronous generator selection and eliminates common errors.Keywords: ambient temperature, de-rating factor, electric generator, power factor
Procedia PDF Downloads 35823302 The Power-Knowledge Relationship in the Italian Education System between the 19th and 20th Century
Authors: G. Iacoviello, A. Lazzini
Abstract:
This paper focuses on the development of the study of accounting in the Italian education system between the 19th and 20th centuries. It also focuses on the subsequent formation of a scientific and experimental forma mentis that would prepare students for administrative and managerial activities in industry, commerce and public administration. From a political perspective, the period was characterized by two dominant movements - liberalism (1861-1922) and fascism (1922-1945) - that deeply influenced accounting practices and the entire Italian education system. The materials used in the study include both primary and secondary sources. The primary sources used to inform this study are numerous original documents issued from 1890-1935 by the government and maintained in the Historical Archive of the State in Rome. The secondary sources have supported both the development of the theoretical framework and the definition of the historical context. This paper assigns to the educational system the role of cultural producer. Foucauldian analysis identifies the problem confronted by the critical intellectual in finding a way to deploy knowledge through a 'patient labour of investigation' that highlights the contingency and fragility of the circumstances that have shaped current practices and theories. Education can be considered a powerful and political process providing students with values, ideas, and models that they will subsequently use to discipline themselves, remaining as close to them as possible. It is impossible for power to be exercised without knowledge, just as it is impossible for knowledge not to engender power. The power-knowledge relationship can be usefully employed for explaining how power operates within society, how mechanisms of power affect everyday lives. Power is employed at all levels and through many dimensions including government. Schools exercise ‘epistemological power’ – a power to extract a knowledge of individuals from individuals. Because knowledge is a key element in the operation of power, the procedures applied to the formation and accumulation of knowledge cannot be considered neutral instruments for the presentation of the real. Consequently, the same institutions that produce and spread knowledge can be considered part of the ‘power-knowledge’ interrelation. Individuals have become both objects and subject in the development of knowledge. If education plays a fundamental role in shaping all aspects of communities in the same way, the structural changes resulting from economic, social and cultural development affect the educational systems. Analogously, the important changes related to social and economic development required legislative intervention to regulate the functioning of different areas in society. Knowledge can become a means of social control used by the government to manage populations. It can be argued that the evolution of Italy’s education systems is coherent with the idea that power and knowledge do not exist independently but instead are coterminous. This research aims to reduce such a gap by analysing the role of the state in the development of accounting education in Italy.Keywords: education system, government, knowledge, power
Procedia PDF Downloads 13923301 Integrating Blockchain and Internet of Things Platforms: An Empirical Study on Immunization Cold Chain
Authors: Fawzia Abujalala, Asma Elmangoush, Majdi Ashibani
Abstract:
The adoption of Blockchain technology introduces the possibility to decentralize cold chain systems. This adaptation enhances them to be more efficient, accessible, verifiable, and data security. Additionally, the Internet of Things (IoT) concept is considered as an added-value to various application domains. Cargo tracking and cold chain are a few to name. However, the security of the IoT transactions and integrated devices remains one of the key challenges to the IoT application’s success. Consequently, Blockchain technology and its consensus protocols have been used to solve many information security problems. In this paper, the researchers discussed the advantages of integrating Blockchain technology into IoT platform to improve security and provide an overview of existing literature on integrating Blockchain and IoT platforms. Then, presented the immunization cold chain solution as a use-case that could apply to any critical goods based on integrating hyperledger fabric platform and IoT platform.Keywords: blockchain, hyperledger fabric, internet of things, security, traceability
Procedia PDF Downloads 14923300 Shifting of Global Energy Security: A Comparative Analysis of Indonesia and China’s Renewable Energy Policies
Authors: Widhi Hanantyo Suryadinata
Abstract:
Efforts undertaken by Indonesia and China to shift the strategies and security of renewable energy on a global stage involve approaches through policy construction related to rare minerals processing or value-adding in Indonesia and manufacturing policies through the New Energy Vehicles (NEVs) policy in China. Both policies encompass several practical regulations and policies that can be utilized for the implementation of Indonesia and China's grand efforts and ideas. Policy development in Indonesia and China can be analyzed using a comparative analysis method, as well as employing a pyramid illustration to identify policy construction phases based on the real conditions of the domestic market and implemented policies. This approach also helps to identify the potential integration of policies needed to enhance the policy development phase of a country within the pyramid. It also emphasizes the significance of integration policy to redefine renewable energy strategy and security on the global stage.Keywords: global renewable energy security, global energy security, policy development, comparative analysis, shifting of global energy security, Indonesia, China
Procedia PDF Downloads 6923299 A Study of User Awareness and Attitudes Towards Civil-ID Authentication in Oman’s Electronic Services
Authors: Raya Al Khayari, Rasha Al Jassim, Muna Al Balushi, Fatma Al Moqbali, Said El Hajjar
Abstract:
This study utilizes linear regression analysis to investigate the correlation between user account passwords and the probability of civil ID exposure, offering statistical insights into civil ID security. The study employs multiple linear regression (MLR) analysis to further investigate the elements that influence consumers’ views of civil ID security. This aims to increase awareness and improve preventive measures. The results obtained from the MLR analysis provide a thorough comprehension and can guide specific educational and awareness campaigns aimed at promoting improved security procedures. In summary, the study’s results offer significant insights for improving existing security measures and developing more efficient tactics to reduce risks related to civil ID security in Oman. By identifying key factors that impact consumers’ perceptions, organizations can tailor their strategies to address vulnerabilities effectively. Additionally, the findings can inform policymakers on potential regulatory changes to enhance civil ID security in the country.Keywords: civil-id disclosure, awareness, linear regression, multiple regression
Procedia PDF Downloads 5723298 Investigation on Solar Thermoelectric Generator Using D-Mannitol/Multi-Walled Carbon Nanotubes Composite Phase Change Materials
Authors: Zihua Wu, Yueming He, Xiaoxiao Yu, Yuanyuan Wang, Huaqing Xie
Abstract:
The match of Solar thermoelectric generator (STEG) and phase change materials (PCM) can enhance the solar energy storage and reduce environmental impact from the day-and-night transformation and weather changes. This work utilizes D-mannitol (DM) matrix as the suitable PCM for coupling with thermoelectric generator to achieve the middle-temperature solar energy storage performance at 165℃-167℃. DM/MWCNT composite phase change materials prepared by ball milling not only can keep a high phase change enthalpy of DM material but also have great photo-thermal conversion efficiency of 82%. Based on the self-made storage device container, the effect of PCM thickness on the solar energy storage performance is further discussed and analyzed. The experimental results prove that PCM-STEG coupling system can output more electric energy than pure STEG system because PCM can decline the heat transfer and storage thermal energy to further generate the electric energy through thermal-to-electric conversion when the light is removed. The increase of PCM thickness can reduce the heat transfer and enhance thermal storage, and then the power generation performance of PCM-STEG coupling system can be improved. As the increase of light intensity, the output electric energy of the coupling system rises accordingly, and the maximum amount of electrical energy can reach by 113.85 J at 1.6 W/cm2. The study of the PCM-STEG coupling system has certain reference for the development of solar energy storage and application.Keywords: solar energy, solar thermoelectric generator, phase change materials, solar-to-electric energy, DM/MWCNT
Procedia PDF Downloads 7223297 Rethinking the Role of Small States in the Hybrid Era: Shifts in the Cypriot Foreign and Defence Policies, 2004-2019
Authors: Constantinos Adamides, Petros Petrikkos
Abstract:
In the era of growing hybrid threats, small states find themselves in need to re-evaluate existing foreign and defense policies. The pressure to establishing or maintain a status of a reliable partner in the community in which they belong to, vis-à-vis their multilateral relations with other organisations and entities, small states may need to shift their policies in the field to accommodate security needs that are not only pertinent to their security, but also to that of the organisations (bloc) in which they interact. Unlike potential shortcomings in a small state’s mainstream security and defence framework where the threat would be limited to the state itself, in more contemporary times with dominating hybrid threats, the small states’ security shortcomings may also become a security problem for the bloc in which these states belong to. An indicative example is small states like Cyprus and Malta, which belong and 'interact' in the European Union. As a result, the nature of hybrid threats can be utilised to hurt bigger states in a bloc by exploiting the small states’ vulnerabilities and security gaps. Inevitably, both the defensive and foreign policy collaborations of small states with bigger states have been and are constantly re-evaluated to tackle and prevent such problems. In essence, the goal of this ‘re-evaluation’ aims to achieve a twofold goal: The first is the small states’ quest to appear as a reliable partner within the bloc, while the second is to avoid being the weakest security link in the bloc’s defence against hybrid threats. Indeed, the hybrid arena is a security area where they can excel in the bloc, despite the potential and expected conventional military deficiencies. This new environment prompts us to think security from the perspective of small states differently and in relation to their role as members or big organisations. The paper focuses on the case of Cyprus following its accession to the European Union and examines how a country that has had a very focused security orientation –not least due to its ongoing security problems– altered its foreign and defence policies within the European Union to ensure compliance with the rest of the bloc, while at the same time maximizing its role as a security player. Specifically, it examines the methods through which the country shifted its policies as well as the challenges and opportunities that emerged from these security shifts.Keywords: Cyprus, defence, foreign policy, hybrid threats, ontological security, small states
Procedia PDF Downloads 13623296 To Investigate the Effects of Potassium Ion Doping and Oxygen Vacancies in Thin-Film Transistors of Gallium Oxide-Indium Oxide on Their Electrical
Authors: Peihao Huang, Chun Zhao
Abstract:
Thin-film transistors(TFTs) have the advantages of low power consumption, short reaction time, and have high research value in the field of semiconductors, based on this reason, people have focused on gallium oxide-indium oxide thin-film transistors, a relatively common thin-film transistor, elaborated and analyzed his production process, "aqueous solution method", explained the purpose of each step of operation, and finally explored the influence of potassium ions doped in the channel layer on the electrical properties of the device, as well as the effect of oxygen vacancies on its switching ratio and memory, and summarized the conclusions.Keywords: aqueous solution, oxygen vacancies, switch ratio, thin-film transistor(TFT)
Procedia PDF Downloads 11523295 A Study on Abnormal Behavior Detection in BYOD Environment
Authors: Dongwan Kang, Joohyung Oh, Chaetae Im
Abstract:
Advancement of communication technologies and smart devices in the recent times is leading to changes into the integrated wired and wireless communication environments. Since early days, businesses had started introducing environments for mobile device application to their operations in order to improve productivity (efficiency) and the closed corporate environment gradually shifted to an open structure. Recently, individual user's interest in working environment using mobile devices has increased and a new corporate working environment under the concept of BYOD is drawing attention. BYOD (bring your own device) is a concept where individuals bring in and use their own devices in business activities. Through BYOD, businesses can anticipate improved productivity (efficiency) and also a reduction in the cost of purchasing devices. However, as a result of security threats caused by frequent loss and theft of personal devices and corporate data leaks due to low security, companies are reluctant about adopting BYOD system. In addition, without considerations to diverse devices and connection environments, there are limitations in detecting abnormal behaviors such as information leaks which use the existing network-based security equipment. This study suggests a method to detect abnormal behaviors according to individual behavioral patterns, rather than the existing signature-based malicious behavior detection and discusses applications of this method in BYOD environment.Keywords: BYOD, security, anomaly behavior detection, security equipment, communication technologies
Procedia PDF Downloads 32423294 Microbioreactor System for Cell Behavior Analysis Focused on Nerve Tissue Engineering
Authors: Yusser Olguín, Diego Benavente, Fernando Dorta, Nicole Orellana, Cristian Acevedo
Abstract:
One of the greatest challenges of tissue engineering is the generation of materials in which the highest possible number of conditions can be incorporated to stimulate the proliferation and differentiation of cells, which will be transformed together with the material into new functional tissue. In this sense, considering the properties of microfluidics and its relationship with cellular micro-environments, the possibility of controlling flow patterns and the ability to design diverse patterns in the chips, a microfluidic cell culture system can be established as a means for the evaluation of the effect of different parameters in a controlled and precise manner. Specifically in relation to the study and development of alternatives in peripheral nervous tissue engineering, it is necessary to consider different physical and chemical neurotrophic stimuli that promote cell growth and differentiation. Chemical stimuli include certain vitamins, glucocorticoids, gangliosides, and growth factors, while physical stimuli include topological stimuli, mechanical forces of the cellular environment and electrical stimulation. In this context, the present investigation shows the results of cell stimulation in a microbioreactor using electrical and chemical stimuli, where the differentiation of PC12 cells as a neuronal model is evidenced by neurite expression, dependent on the stimuli and their combination. The results were analysed with a multi-factor statistical approach, showing several relationships and dependencies between different parameters. Chip design, operating parameters and concentrations of neurotrophic chemical factors were found to be preponderant, based on the characteristics of the electrical stimuli.Keywords: microfluidics, nerve tissue engineering, microbioreactor, electrical stimuli
Procedia PDF Downloads 8523293 Solar and Wind Energy Potential Study of Lower Sindh, Pakistan for Power Generation
Authors: M. Akhlaque Ahmed, Sidra A. Shaikh, Maliha A. Siddiqui
Abstract:
Global and diffuse solar radiation on horizontal surface of Lower Sindh, namely Karachi, Hyderabad, Nawabshah were carried out using sunshine hour data of the area to assess the feasibility of solar energy utilization for power generation in Sindh province. The results obtained show a large variation in the direct and diffuse component of solar radiation in summer and winter months in Lower Sindh (50% direct and 50% diffuse for Karachi and Hyderabad). In Nawabshah area, the contribution of diffuse solar radiation is low during the monsoon months, July and August. The KT value of Nawabshah indicates a clear sky throughout almost the entire year. The percentage of diffuse radiation does not exceed more than 20%. In Nawabshah, the appearance of cloud is rare even during the monsoon months. The estimated values indicate that Nawabshah has high solar potential, whereas Karachi and Hyderabad have low solar potential. During the monsoon months the Lower part of Sindh can utilize the hybrid system with wind power. Near Karachi and Hyderabad, the wind speed ranges between 6.2 m/sec to 6.9 m/sec. A wind corridor exists near Karachi, Hyderabad, Gharo, Keti Bander and Shah Bander. The short fall of solar can be compensated by wind because in the monsoon months of July and August, wind speeds are higher in the Lower region of Sindh.Keywords: hybrid power system, lower Sindh, power generation, solar and wind energy potential
Procedia PDF Downloads 25223292 Heat Sink Optimization for a High Power Wearable Thermoelectric Module
Authors: Zohreh Soleimani, Sally Salome Shahzad, Stamatis Zoras
Abstract:
As a result of current energy and environmental issues, the human body is known as one of the promising candidate for converting wasted heat to electricity (Seebeck effect). Thermoelectric generator (TEG) is one of the most prevalent means of harvesting body heat and converting that to eco-friendly electrical power. However, the uneven distribution of the body heat and its curvature geometry restrict harvesting adequate amount of energy. To perfectly transform the heat radiated by the body into power, the most direct solution is conforming the thermoelectric generators (TEG) with the arbitrary surface of the body and increase the temperature difference across the thermoelectric legs. Due to this, a computational survey through COMSOL Multiphysics is presented in this paper with the main focus on the impact of integrating a flexible wearable TEG with a corrugated shaped heat sink on the module power output. To eliminate external parameters (temperature, air flow, humidity), the simulations are conducted within indoor thermal level and when the wearer is stationary. The full thermoelectric characterization of the proposed TEG fabricated by a wavy shape heat sink has been computed leading to a maximum power output of 25µW/cm2 at a temperature gradient nearly 13°C. It is noteworthy that for the flexibility of the proposed TEG and heat sink, the applicability and efficiency of the module stay high even on the curved surfaces of the body. As a consequence, the results demonstrate the superiority of such a TEG to the most state of the art counterparts fabricated with no heat sink and offer a new train of thought for the development of self-sustained and unobtrusive wearable power suppliers which generate energy from low grade dissipated heat from the body.Keywords: device simulation, flexible thermoelectric module, heat sink, human body heat
Procedia PDF Downloads 15123291 Blockchain-Based Decentralized Architecture for Secure Medical Records Management
Authors: Saeed M. Alshahrani
Abstract:
This research integrated blockchain technology to reform medical records management in healthcare informatics. It was aimed at resolving the limitations of centralized systems by establishing a secure, decentralized, and user-centric platform. The system was architected with a sophisticated three-tiered structure, integrating advanced cryptographic methodologies, consensus algorithms, and the Fast Healthcare Interoperability Resources (HL7 FHIR) standard to ensure data security, transaction validity, and semantic interoperability. The research has profound implications for healthcare delivery, patient care, legal compliance, operational efficiency, and academic advancements in blockchain technology and healthcare IT sectors. The methodology adapted in this research comprises of Preliminary Feasibility Study, Literature Review, Design and Development, Cryptographic Algorithm Integration, Modeling the data and testing the system. The research employed a permissioned blockchain with a Practical Byzantine Fault Tolerance (PBFT) consensus algorithm and Ethereum-based smart contracts. It integrated advanced cryptographic algorithms, role-based access control, multi-factor authentication, and RESTful APIs to ensure security, regulate access, authenticate user identities, and facilitate seamless data exchange between the blockchain and legacy healthcare systems. The research contributed to the development of a secure, interoperable, and decentralized system for managing medical records, addressing the limitations of the centralized systems that were in place. Future work will delve into optimizing the system further, exploring additional blockchain use cases in healthcare, and expanding the adoption of the system globally, contributing to the evolution of global healthcare practices and policies.Keywords: healthcare informatics, blockchain, medical records management, decentralized architecture, data security, cryptographic algorithms
Procedia PDF Downloads 55