Search results for: electrical power system security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 24490

Search results for: electrical power system security

23260 An Examination of the Effects of Implantable Technologies on the Practices of Governmentality

Authors: Benn Van Den Ende

Abstract:

Over the last three decades, there has been an exponential increase in developments in implantable technologies such as the cardiac pacemaker, bionic prosthesis, and implantable chips. The effect of these technologies has been well researched in many areas. However, there is a lack of critical research in security studies. This paper will provide preliminary findings to an ongoing research project which aims to examine how implantable technologies effect the practices of governmentality in the context of security. It will do this by looking at the practices and techniques of governmentality along with different implantable technologies which increase, change or otherwise affect governmental practices. The preliminary research demonstrates that implantable technologies have a profound effect on the practices of governmentality, while also paving the way for further research into a potential ‘new’ form of governmentality in relation to these implantable technologies.

Keywords: critical security studies, governmentality, security theory, political theory, Foucault

Procedia PDF Downloads 189
23259 Generation and Diagnostics of Atmospheric Pressure Dielectric Barrier Discharge in Argon/Air

Authors: R. Shrestha, D. P. Subedi, R. B. Tyata, C. S. Wong,

Abstract:

In this paper, a technique for the determination of electron temperatures and electron densities in atmospheric pressure Argon/air discharge by the analysis of optical emission spectra (OES) is reported. The discharge was produced using a high voltage (0-20) kV power supply operating at a frequency of 27 kHz in parallel electrode system, with glass as dielectric. The dielectric layers covering the electrodes act as current limiters and prevent the transition to an arc discharge. Optical emission spectra in the range of (300nm-850nm) were recorded for the discharge with different inter electrode gap keeping electric field constant. Electron temperature (Te) and electron density (ne) are estimated from electrical and optical methods. Electron density was calculated using power balance method. The optical methods are related with line intensity ratio from the relative intensities of Ar-I and Ar-II lines in Argon plasma. The electron density calculated by using line intensity ratio method was compared with the electron density calculated by stark broadening method. The effect of dielectric thickness on plasma parameters (Te and ne) have also been studied and found that Te and ne increases as thickness of dielectric decrease for same inter electrode distance and applied voltage.

Keywords: electron density, electron temperature, optical emission spectra,

Procedia PDF Downloads 496
23258 Fast Robust Switching Control Scheme for PWR-Type Nuclear Power Plants

Authors: Piyush V. Surjagade, Jiamei Deng, Paul Doney, S. R. Shimjith, A. John Arul

Abstract:

In sophisticated and complex systems such as nuclear power plants, maintaining the system's stability in the presence of uncertainties and disturbances and obtaining a fast dynamic response are the most challenging problems. Thus, to ensure the satisfactory and safe operation of nuclear power plants, this work proposes a new fast, robust optimal switching control strategy for pressurized water reactor-type nuclear power plants. The proposed control strategy guarantees a substantial degree of robustness, fast dynamic response over the entire operational envelope, and optimal performance during the nominal operation of the plant. To improve the robustness, obtain a fast dynamic response, and make the system optimal, a bank of controllers is designed. Various controllers, like a baseline proportional-integral-derivative controller, an optimal linear quadratic Gaussian controller, and a robust adaptive L1 controller, are designed to perform distinct tasks in a specific situation. At any instant of time, the most suitable controller from the bank of controllers is selected using the switching logic unit that designates the controller by monitoring the health of the nuclear power plant or transients. The proposed switching control strategy optimizes the overall performance and increases operational safety and efficiency. Simulation studies have been performed considering various uncertainties and disturbances that demonstrate the applicability and effectiveness of the proposed switching control strategy over some conventional control techniques.

Keywords: switching control, robust control, optimal control, nuclear power control

Procedia PDF Downloads 134
23257 Easily Memorable Strong Password Generation and Retrieval

Authors: Shatadru Das, Natarajan Vijayarangan

Abstract:

In this paper, a system and method for generating and recovering an authorization code has been designed and analyzed. The system creates an authorization code by accepting a base-sentence from a user. Based on the characters present in this base-sentence, the system computes a base-sentence matrix. The system also generates a plurality of patterns. The user can either select the pattern from the multiple patterns suggested by the system or can create his/her own pattern. The system then performs multiplications between the base-sentence matrix and the selected pattern matrix at different stages in the path forward, for obtaining a strong authorization code. In case the user forgets the base sentence, the system has a provision to manage and retrieve 'forgotten authorization code'. This is done by fragmenting the base sentence into different matrices and storing the fragmented matrices into a repository after computing matrix multiplication with a security question-answer approach and with a secret key provided by the user.

Keywords: easy authentication, key retrieval, memorable passwords, strong password generation

Procedia PDF Downloads 400
23256 Harnessing Entrepreneurial Opportunities for National Security

Authors: Itiola Kehinde Adeniran

Abstract:

This paper investigated the influence of harnessing entrepreneurial opportunities on the national security in Nigeria with a specific focus on the security situation of the post-amnesty programmes of the Federal Government in Ondo State. The self-administered structured questionnaire was employed to collect data from one hundred and twenty participants through purposive sampling method. Inferential statistics was used to analyze the data, specifically; ordinary least squares linear regression method was employed with the aid of statistical package for social science (SPSS) version 20 in order to determine the influence of independent variable (entrepreneurial opportunities) on dependent variable (national security). The result showed that business opportunities have a significant influence on the rate of criminal activities. The study also revealed that entrepreneurial opportunity creation and discovery as well as providing a model on how these entrepreneurial opportunities could be effectively and efficiently utilized jointly predict better national security, which counted for 69% variance of crime rate reduction. The paper, therefore, recommended that citizens should be encouraged to develop an interest in the skill-based activities in order to change their mindset towards self-employment which can motivate them in identify entrepreneurial opportunities.

Keywords: entrepreneurship, entrepreneurial opportunities, national security, unemployment

Procedia PDF Downloads 330
23255 Design and Analysis of a Combined Cooling, Heating and Power Plant for Maximum Operational Flexibility

Authors: Salah Hosseini, Hadi Ramezani, Bagher Shahbazi, Hossein Rabiei, Jafar Hooshmand, Hiwa Khaldi

Abstract:

Diversity of energy portfolio and fluctuation of urban energy demand establish the need for more operational flexibility of combined Cooling, Heat, and Power Plants. Currently, the most common way to achieve these specifications is the use of heat storage devices or wet operation of gas turbines. The current work addresses using variable extraction steam turbine in conjugation with a gas turbine inlet cooling system as an alternative way for enhancement of a CCHP cycle operating range. A thermodynamic model is developed and typical apartments building in PARDIS Technology Park (located at Tehran Province) is chosen as a case study. Due to the variable Heat demand and using excess chiller capacity for turbine inlet cooling purpose, the mentioned steam turbine and TIAC system provided an opportunity for flexible operation of the cycle and boosted the independence of the power and heat generation in the CCHP plant. It was found that the ratio of power to the heat of CCHP cycle varies from 12.6 to 2.4 depending on the City heating and cooling demands and ambient condition, which means a good independence between power and heat generation. Furthermore, selection of the TIAC design temperature is done based on the amount of ratio of power gain to TIAC coil surface area, it was found that for current cycle arrangement the TIAC design temperature of 15 C is most economical. All analysis is done based on the real data, gathered from the local weather station of the PARDIS site.

Keywords: CCHP plant, GTG, HRSG, STG, TIAC, operational flexibility, power to heat ratio

Procedia PDF Downloads 281
23254 Sunlight-Activated Graphene Heterostructure Transparent Cathodes for High-Performance Graphene/Si Schottky Junction Photovoltaics

Authors: Po-Sun Ho, Chun-Wei Chen

Abstract:

This work demonstrated a “sunlight-activated” graphene-heterostructure transparent electrode in which photogenerated charges from a light-absorbing material are transferred to graphene, resulting in the modulation of electrical properties of the graphene transparent electrode caused by a strong light–matter interaction at graphene-heterostructure interfaces. A photoactive graphene/TiOx-heterostructure transparent cathode was used to fabricate an n-graphene/p-Si Schottky junction solar cell, achieving a record-high power conversion efficiency (>10%). The photoactive graphene-heterostructure transparent electrode, which exhibits excellent tunable electrical properties under sunlight illumination, has great potential for use in the future development of graphene-based photovoltaics and optoelectronics.

Keywords: graphene, transparent electrode, graphene/Si Schottky junction, solar cells

Procedia PDF Downloads 312
23253 Defence Diplomacy and Collective Security in Africa: Case of Rwanda Defence Forces

Authors: Emmanuel Mugiraneza

Abstract:

Rwanda uses defence diplomacy to pursue international collective security through different mechanisms. This paper shows that with an intent of promoting international collective security, Rwanda has constituted its defense diplomacy policy in three standpoints. First, Rwanda has formed strategic cooperation alliances with state actors, regional and international Organizations that enables her to participate in and promote international collective peace, security and cooperation. Secondary, Rwanda uses defence diplomacy to foster cooperation in to pre-empt, minimize and neutralize potential triggers that would lead to the outbreak of international conflict. Thirdly, Rwanda implements defence diplomacy policy strategy through internationally recognized operational and tactical standards while dispelling hostilities, assisting the friendly nation’s forces and or building and maintaining public confidence and trust in the areas where Rwanda Defence Force deploys for peacekeeping missions in Sudan, South Sudan, Central African Republic and Mozambique for a counterterrorism mission.

Keywords: defence diplomacy, collective security, Rwanda, Peacekeeping

Procedia PDF Downloads 123
23252 Variable Shunt Reactors for Reactive Power Compensation of HV Subsea Cables

Authors: Saeed A. AlGhamdi, Nabil Habli, Vinoj Somasanran

Abstract:

This paper presents an application of 230 kV Variable Shunt Reactors (VSR) used to compensate reactive power of dual 90 KM subsea cables. VSR integrates an on-load tap changer (OLTC) that adjusts reactive power compensation to maintain acceptable bus voltages under variable load profile and network configuration. An automatic voltage regulator (AVR) or a power management system (PMS) that allows VSR rating to be changed in discrete steps typically controls the OLTC. Typical regulation range start as minimum as 20% up to 100% and are available for systems up to 550kV. The regulation speed is normally in the order of seconds per step and approximately a minute from maximum to minimum rating. VSR can be bus or line connected depending on line/cable length and compensation requirements. The flexible reactive compensation ranges achieved by recent VSR technologies have enabled newer facilities design to deploy line connected VSR through either disconnect switches, which saves space and cost, or through circuit breakers. Lines with VSR are typically energized with lower taps (reduced reactive compensation) to minimize or remove the presence of delayed zero crossing.

Keywords: power management, reactive power, subsea cables, variable shunt reactors

Procedia PDF Downloads 251
23251 The Importance of Fire Safety in Egypt

Authors: Omar Shakra

Abstract:

This paper contains a huge number of benefits that we can use it in several places and times in fire safety protection in the Middle East especially in Egypt . People here in Egypt did not consider the safety and fire protection as important as it is. But on the other hand, its very important for them to contain the fire systems and safety in every facility, the companies , hospitals , police stations , and even the super markets must use the fire system. It makes the facility safe to the visitors while they are using it.From my point of view as the owner Fire Safety Company called Deluge Egypt , i can say that not all of the companies use the fire system protection according to the high cost they prefer to build their company without the protection, and this is make the building totally unsafe to be used from the visitors or client.So, i am looking for new methods and technology to invest in Egypt, and this is through attending this Conference and let the audiences know more about the services i provide and [to let them know about the importance of the Fire Safety in Egypt. The Objectives of my research 1- The system that i used in my Company. 2- The benefits of the Fire System Protection. 3-The importance of the Fire System and safety. 4-The use of the new Technologies. 5-The hardships that i found while having new deals with new clients.

Keywords: fire, system, protection, fire hydrants, security, alarms

Procedia PDF Downloads 109
23250 Location Tracking of Human Using Mobile Robot and Wireless Sensor Networks

Authors: Muazzam A. Khan

Abstract:

In order to avoid dangerous environmental disasters, robots are being recognized as good entrants to step in as human rescuers. Robots has been gaining interest of many researchers in rescue matters especially which are furnished with advanced sensors. In distributed wireless robot system main objective for a rescue system is to track the location of the object continuously. This paper provides a novel idea to track and locate human in disaster area using stereo vision system and ZigBee technology. This system recursively predict and updates 3D coordinates in a robot coordinate camera system of a human which makes the system cost effective. This system is comprised of ZigBee network which has many advantages such as low power consumption, self-healing low data rates and low cost.

Keywords: stereo vision, segmentation, classification, human tracking, ZigBee module

Procedia PDF Downloads 494
23249 Proposed Anticipating Learning Classifier System for Cloud Intrusion Detection (ALCS-CID)

Authors: Wafa' Slaibi Alsharafat

Abstract:

Cloud computing is a modern approach in network environment. According to increased number of network users and online systems, there is a need to help these systems to be away from unauthorized resource access and detect any attempts for privacy contravention. For that purpose, Intrusion Detection System is an effective security mechanism to detect any attempts of attacks for cloud resources and their information. In this paper, Cloud Intrusion Detection System has been proposed in term of reducing or eliminating any attacks. This model concerns about achieving high detection rate after conducting a set of experiments using benchmarks dataset called KDD'99.

Keywords: IDS, cloud computing, anticipating classifier system, intrusion detection

Procedia PDF Downloads 474
23248 A Model Predictive Control Based Virtual Active Power Filter Using V2G Technology

Authors: Mahdi Zolfaghari, Seyed Hossein Hosseinian, Hossein Askarian Abyaneh, Mehrdad Abedi

Abstract:

This paper presents a virtual active power filter (VAPF) using vehicle to grid (V2G) technology to maintain power quality requirements. The optimal discrete operation of the power converter of electric vehicle (EV) is based on recognizing desired switching states using the model predictive control (MPC) algorithm. A fast dynamic response, lower total harmonic distortion (THD) and good reference tracking performance are realized through the presented control strategy. The simulation results using MATLAB/Simulink validate the effectiveness of the scheme in improving power quality as well as good dynamic response in power transferring capability.

Keywords: electric vehicle, model predictive control, power quality, V2G technology, virtual active power filter

Procedia PDF Downloads 430
23247 Proposal of a Model Supporting Decision-Making on Information Security Risk Treatment

Authors: Ritsuko Kawasaki, Takeshi Hiromatsu

Abstract:

Management is required to understand all information security risks within an organization, and to make decisions on which information security risks should be treated in what level by allocating how much amount of cost. However, such decision-making is not usually easy, because various measures for risk treatment must be selected with the suitable application levels. In addition, some measures may have objectives conflicting with each other. It also makes the selection difficult. Therefore, this paper provides a model which supports the selection of measures by applying multi-objective analysis to find an optimal solution. Additionally, a list of measures is also provided to make the selection easier and more effective without any leakage of measures.

Keywords: information security risk treatment, selection of risk measures, risk acceptance, multi-objective optimization

Procedia PDF Downloads 379
23246 The Influence of Disturbances Generated by Arc Furnaces on the Power Quality

Authors: Z. Olczykowski

Abstract:

The paper presents the impact of work on the electric arc furnace. Arc equipment is one of the largest receivers powered by the power system. Electric arc disturbances arising during melting process occurring in these furnaces are the cause of an abrupt change of the passive power of furnaces. Currents drawn by these devices undergo an abrupt change, which in turn cause voltage fluctuations and light flicker. The quantitative evaluation of the voltage fluctuations is now the basic criterion of assessment of an influence of unquiet receiver on the supplying net. The paper presents the method of determination of range of voltage fluctuations and light flicker at parallel operation of arc devices. The results of measurements of voltage fluctuations and light flicker indicators recorded in power supply networks of steelworks were presented, with different number of parallel arc devices. Measurements of energy quality parameters were aimed at verifying the proposed method in practice. It was also analyzed changes in other parameters of electricity: the content of higher harmonics, asymmetry, voltage dips.

Keywords: power quality, arc furnaces, propagation of voltage fluctuations, disturbances

Procedia PDF Downloads 138
23245 Future of Electric Power Generation Technologies: Environmental and Economic Comparison

Authors: Abdulrahman A. Bahaddad, Mohammed Beshir

Abstract:

The objective of this paper is to demonstrate and describe eight different types of power generation technologies and to understand the history and future trends of each technology. In addition, a comparative analysis between these technologies will be presented with respect to their cost analysis and associated performance.

Keywords: conventional power generation, economic analysis, environmental impact, renewable energy power generation

Procedia PDF Downloads 134
23244 Potential Micro Hydro at Irrigation Canal in the Gorontalo Province and Modeling Setling Basin for Reduction of Sedimentation Effect

Authors: Arifin Matoka, Nadjamuddin Harun, Salama Manjang, M. Arsyad Thaha

Abstract:

Along irrigation canals in certain areas falling water level height is have potential for micro hydro power plant (MHP), which generally MHP potential valley away from society consumer of electricity and needed a long conductor cable, so that with the MHP Irrigation is ideal are typical with an Open Flume type turbines. This study is divided into two phases research phase of the potential power that exist in irrigation channels at the Gorontalo Province and stages solution sedimentation effects. The total power generated in the irrigation channel of the results of this study at 781.83 Kw, it is quite significant for the 1737 rural households on average consumes 450 watt per household. In the field of observation, sedimentation lifting effect on the quality of electric power, at which time the turbid sediment concentrations occur significant voltage fluctuations causing damage to some household electrical appliances such as electronic equipment and lighting. This problem is solution by modeling the sedimentation tub (setling basin) to reduce sedimentation thus olso can reduce the regulation load control equipment which can minimize the cost of investment and maintenance.

Keywords: irrigation canals, microhydro powerplant, sedimentation, Gorontalo Province

Procedia PDF Downloads 581
23243 Effect of Non-Invasive Electrical Stimulation on Partial Hearing Loss: Pilot Study

Authors: Geetanjali Saggar

Abstract:

Background: Partial hearing loss is the inability to hear effectively as a normal hearing individual whose hearing threshold is 20 dB or better in both ears. Individuals with partial hearing loss may benefit from non-invasive electrical stimulation as a method of therapy and possible intervention. Objective: The project aims to assess and relate the efficacy of electrical stimulation on individuals with partial hearing loss. The study's goal was to evaluate the different sorts of non-invasive electrical stimulation in tinnitus and hearing loss in order to build the framework for future research. Method: In this pilot study, a total of five patients of age group above 50 years were selected with partial hearing loss. The electrical modality of Repetitive Transcranial Magnetic Stimulation (RTMS) was used among the patients and was evaluated using gold questionnaires- HHIA and APHAB for hearing at intervals of 0-7-14 days. The statistical data was analyzed by SPSS software-16. Results: There were not much significant changes in the hearing of the patients when non-invasive electrical modality was applied as an intervention in the partial hearing loss condition. However, there was minimal change in the daily functioning of the patient with the application of intervention. Conclusion: This study concluded that non-invasive electrical stimulation had minimal to no effect on the partial hearing of the patients.

Keywords: non-invasive, hearing loss, transcranial magnetic stimulation, partial deafness, transcranial direct current stimulation, tinnitus

Procedia PDF Downloads 11
23242 Comparative Study for Power Systems Transient Stability Improvement Using SFCL ,SVC,TCBR

Authors: Sabir Messalti, Ahmed Gherbi, Ahmed Bouchlaghem

Abstract:

This paper presents comparative study for power systems transient stability improvement using three FACTS devices: the SVC(Static Var Compensator), the Thyristor Control Breaking Resistor (TCBR) and superconducting fault current limiter (SFCL)The transient stability is assessed by the criterion of relative rotor angles. Critical Clearing Time (CCT) is used as an index for evaluated transient stability. The present study is tested on the WSCC3 nine-bus system in the case of three-phase short circuit fault on one transmission line.

Keywords: SVC, TCBR, SFCL, power systems transient stability improvement

Procedia PDF Downloads 650
23241 Analysis of Transformer Reactive Power Fluctuations during Adverse Space Weather

Authors: Patience Muchini, Electdom Matandiroya, Emmanuel Mashonjowa

Abstract:

A ground-end manifestation of space weather phenomena is known as geomagnetically induced currents (GICs). GICs flow along the electric power transmission cables connecting the transformers and between the grounding points of power transformers during significant geomagnetic storms. Geomagnetically induced currents have been studied in other regions and have been noted to affect the power grid network. In Zimbabwe, grid failures have been experienced, but it is yet to be proven if these failures have been due to GICs. The purpose of this paper is to characterize geomagnetically induced currents with a power grid network. This paper analyses data collected, which is geomagnetic data, which includes the Kp index, DST index, and the G-Scale from geomagnetic storms and also analyses power grid data, which includes reactive power, relay tripping, and alarms from high voltage substations and then correlates the data. This research analysis was first theoretically analyzed by studying geomagnetic parameters and then experimented upon. To correlate, MATLAB was used as the basic software to analyze the data. Latitudes of the substations were also brought into scrutiny to note if they were an impact due to the location as low latitudes areas like most parts of Zimbabwe, there are less severe geomagnetic variations. Based on theoretical and graphical analysis, it has been proven that there is a slight relationship between power system failures and GICs. Further analyses can be done by implementing measuring instruments to measure any currents in the grounding of high-voltage transformers when geomagnetic storms occur. Mitigation measures can then be developed to minimize the susceptibility of the power network to GICs.

Keywords: adverse space weather, DST index, geomagnetically induced currents, KP index, reactive power

Procedia PDF Downloads 114
23240 Providing Security to Private Cloud Using Advanced Encryption Standard Algorithm

Authors: Annapureddy Srikant Reddy, Atthanti Mahendra, Samala Chinni Krishna, N. Neelima

Abstract:

In our present world, we are generating a lot of data and we, need a specific device to store all these data. Generally, we store data in pen drives, hard drives, etc. Sometimes we may loss the data due to the corruption of devices. To overcome all these issues, we implemented a cloud space for storing the data, and it provides more security to the data. We can access the data with just using the internet from anywhere in the world. We implemented all these with the java using Net beans IDE. Once user uploads the data, he does not have any rights to change the data. Users uploaded files are stored in the cloud with the file name as system time and the directory will be created with some random words. Cloud accepts the data only if the size of the file is less than 2MB.

Keywords: cloud space, AES, FTP, NetBeans IDE

Procedia PDF Downloads 206
23239 Optimization of Hybrid off Grid Energy Station

Authors: Yehya Abdellatif, Iyad M. Muslih, Azzah Alkhalailah, Abdallah Muslih

Abstract:

Hybrid Optimization Model for Electric Renewable (HOMER) software was utilized to find the optimum design of a hybrid off-Grid system, by choosing the optimal solution depending on the cost analysis of energy based on different capacity shortage percentages. A complete study for the site conditions and load profile was done to optimize the design and implementation of a hybrid off-grid power station. In addition, the solution takes into consecration the ambient temperature effect on the efficiency of the power generation and the economical aspects of selection depending on real market price. From the analysis of the HOMER model results, the optimum hybrid power station was suggested, based on wind speed, and solar conditions. The optimization function objective is to minimize the Net Price Cost (NPC) and the Cost of Energy (COE) with zero and 10 percentage of capacity shortage.

Keywords: energy modeling, HOMER, off-grid system, optimization

Procedia PDF Downloads 563
23238 Optimal Capacitor Placement in Distribution Using Cuckoo Optimization Algorithm

Authors: Ali Ravangard, S. Mohammadi

Abstract:

Shunt Capacitors have several uses in the electric power systems. They are utilized as sources of reactive power by connecting them in line-to-neutral. Electric utilities have also connected capacitors in series with long lines in order to reduce its impedance. This is particularly common in the transmission level, where the lines have length in several hundreds of kilometers. However, this post will generally discuss shunt capacitors. In distribution systems, shunt capacitors are used to reduce power losses, to improve voltage profile, and to increase the maximum flow through cables and transformers. This paper presents a new method to determine the optimal locations and economical sizing of fixed and/or switched shunt capacitors with a view to power losses reduction and voltage stability enhancement. For solving the problem, a new enhanced cuckoo optimization algorithm is presented.The proposed method is tested on distribution test system and the results show that the algorithm suitable for practical implementation on real systems with any size.

Keywords: capacitor placement, power losses, voltage stability, radial distribution systems

Procedia PDF Downloads 377
23237 A Framework for Secure Information Flow Analysis in Web Applications

Authors: Ralph Adaimy, Wassim El-Hajj, Ghassen Ben Brahim, Hazem Hajj, Haidar Safa

Abstract:

Huge amounts of data and personal information are being sent to and retrieved from web applications on daily basis. Every application has its own confidentiality and integrity policies. Violating these policies can have broad negative impact on the involved company’s financial status, while enforcing them is very hard even for the developers with good security background. In this paper, we propose a framework that enforces security-by-construction in web applications. Minimal developer effort is required, in a sense that the developer only needs to annotate database attributes by a security class. The web application code is then converted into an intermediary representation, called Extended Program Dependence Graph (EPDG). Using the EPDG, the provided annotations are propagated to the application code and run against generic security enforcement rules that were carefully designed to detect insecure information flows as early as they occur. As a result, any violation in the data’s confidentiality or integrity policies is reported. As a proof of concept, two PHP web applications, Hotel Reservation and Auction, were used for testing and validation. The proposed system was able to catch all the existing insecure information flows at their source. Moreover and to highlight the simplicity of the suggested approaches vs. existing approaches, two professional web developers assessed the annotation tasks needed in the presented case studies and provided a very positive feedback on the simplicity of the annotation task.

Keywords: web applications security, secure information flow, program dependence graph, database annotation

Procedia PDF Downloads 471
23236 Radical Islam and Transnational Security: West Africa and the Asia Pacific in View

Authors: Olumide A. Fafore, Khondlo Mtshali

Abstract:

The beginning of the 21st century saw the emergence of new and global threats to national and transnational security in West Africa and the Asia Pacific regions as a result of the spread of jihadist terrorism across borders, a manifestation of the rise of radical Islam. Extremist and armed Islamic movements influenced by Salafism, the Jihad in Afghanistan and the Muslim Brotherhood are prevalent in Northern Nigeria, Niger, Cameroon, Mali, Chad, Pakistan, Afghanistan, and India. Carrying out attacks across borders, including assassinations, murders, armed robberies, and kidnapping, assisted by open and porous borders and large flow of illegal immigrants across borders. This paper examines the effect of Radical Islam on Transnational security through a review of past literature and the social and security consequences on the people of the regions. Our findings indicate that the activities of armed Islamic movements such as Boko Haram, Ansaru and Al-Qaeda are having a negative impact on the economy, development, and security of the states and people of West Africa and the Asia Pacific. It stresses the importance of regional, transnational and international cooperation, as these threats to national and transnational security can no longer be solved in a national or regional framework.

Keywords: Islamic movements, jihadist terrorism, radical Islam, transnational security

Procedia PDF Downloads 163
23235 Northern Ghana’s Sustainable Food Systems: Evaluating the Impact of International Development

Authors: Maxwell Ladogo Abilla

Abstract:

As evidence from the 2007–2008 and 2010 global food and financial crises revealed that food systems were under stress, the idea of sustainable food systems rose to prominence in the discussion of food security. The idea suggests moving away from a conception of food security that emphasizes production in favor of one that is more socially and environmentally conscious and interested in tackling a wide range of issues that have rendered the food system dysfunctional. This study evaluates the efforts made by international development organizations to increase food security in the area, taking into account the persistence of poverty and food insecurity in northern Ghana, utilizing the idea of sustainable food systems as the evaluation criterion. The study used triangulation to address the research questions by combining qualitative interview data with documentary analysis. To better comprehend the concept of sustainability, a variety of discourses and concepts are used, which results in the development of eight doable objectives for attaining sustainable food systems. The study finds that the food system in northern Ghana is unsustainable because of three kinds of barriers, with the practical objectives of developing sustainable food systems serving as the assessment criteria (natural, cultural and economic, and institutional). According to an evaluation of the World Food Programme's development support in northern Ghana, regional challenges to attaining sustainable food systems continue to be unaddressed by global development initiatives. Due to institutional constraints, WFP's interventions fell short of their promise. By demonstrating the need for development partners to enhance institutional efficiency and coordination, enable marginalized communities to access their rights, and prioritize agricultural irrigation in the area, the study makes a contribution to development policy and practice in northern Ghana.

Keywords: sustainable, food security, development, institutional

Procedia PDF Downloads 90
23234 Electrical Performance Analysis of Single Junction Amorphous Silicon Solar (a-Si:H) Modules Using IV Tracer (PVPM)

Authors: Gilbert Omorodion Osayemwenre, Edson Meyer, R. T. Taziwa

Abstract:

The electrical analysis of single junction amorphous silicon solar modules is carried out using outdoor monitoring technique. Like crystalline silicon PV modules, the electrical characterisation and performance of single junction amorphous silicon modules are best described by its current-voltage (IV) characteristic. However, IV curve has a direct dependence on the type of PV technology and material properties used. The analysis reveals discrepancies in the modules performance parameter even though they are of similar technology. The aim of this work is to compare the electrical performance output of each module, using electrical parameters with the aid of PVPM 100040C IV tracer. These results demonstrated the relevance of standardising the performance parameter for effective degradation analysis of a-Si:H.

Keywords: PVPM 100040C IV tracer, SolarWatt part, single junction amorphous silicon module (a-Si:H), Staebler-Wronski (S-W) degradation effect

Procedia PDF Downloads 320
23233 Lanthanum Strontium Titanate Based Anode Materials for Intermediate Temperature Solid Oxide Fuel Cells

Authors: A. Saurabh Singh, B. Raghvendra, C. Prabhakar Singh

Abstract:

Solid Oxide Fuel Cells (SOFCs) are one of the most attractive electrochemical energy conversion systems, as these devices present a clean energy production, thus promising high efficiencies and low environmental impact. The electrodes are the main components that decisively control the performance of a SOFC. Conventional, anode materials (like Ni-YSZ) are operates at very high temperature. Therefore, cost-effective materials which operate at relatively lower temperatures are still required. In present study, we have synthesized La doped Strontium Titanate via solid state reaction route. The structural, microstructural and density of the pellet have been investigated employing XRD, SEM and Archimedes Principle, respectively. The electrical conductivity of the systems has been determined by impedance spectroscopy techniques. The electrical conductivity of the Lanthanum Strontium Titanate (LST) has been found to be higher than the composite Ni-YSZ system at 700 °C.

Keywords: IT-SOFC, LST, Lanthanum Strontium Titanate, electrical conductivity

Procedia PDF Downloads 386
23232 Towards an Enhanced Compartmental Model for Profiling Malware Dynamics

Authors: Jessemyn Modiini, Timothy Lynar, Elena Sitnikova

Abstract:

We present a novel enhanced compartmental model for malware spread analysis in cyber security. This paper applies cyber security data features to epidemiological compartmental models to model the infectious potential of malware. Compartmental models are most efficient for calculating the infectious potential of a disease. In this paper, we discuss and profile epidemiologically relevant data features from a Domain Name System (DNS) dataset. We then apply these features to epidemiological compartmental models to network traffic features. This paper demonstrates how epidemiological principles can be applied to the novel analysis of key cybersecurity behaviours and trends and provides insight into threat modelling above that of kill-chain analysis. In applying deterministic compartmental models to a cyber security use case, the authors analyse the deficiencies and provide an enhanced stochastic model for cyber epidemiology. This enhanced compartmental model (SUEICRN model) is contrasted with the traditional SEIR model to demonstrate its efficacy.

Keywords: cybersecurity, epidemiology, cyber epidemiology, malware

Procedia PDF Downloads 107
23231 Design and Fabrication of a Programmable Stiffness-Sensitive Gripper for Object Handling

Authors: Mehdi Modabberifar, Sanaz Jabary, Mojtaba Ghodsi

Abstract:

Stiffness sensing is an important issue in medical diagnostic, robotics surgery, safe handling, and safe grasping of objects in production lines. Detecting and obtaining the characteristics in dwelling lumps embedded in a soft tissue and safe removing and handling of detected lumps is needed in surgery. Also in industry, grasping and handling an object without damaging in a place where it is not possible to access a human operator is very important. In this paper, a method for object handling is presented. It is based on the use of an intelligent gripper to detect the object stiffness and then setting a programmable force for grasping the object to move it. The main components of this system includes sensors (sensors for measuring force and displacement), electrical (electrical and electronic circuits, tactile data processing and force control system), mechanical (gripper mechanism and driving system for the gripper) and the display unit. The system uses a rotary potentiometer for measuring gripper displacement. A microcontroller using the feedback received by the load cell, mounted on the finger of the gripper, calculates the amount of stiffness, and then commands the gripper motor to apply a certain force on the object. Results of Experiments on some samples with different stiffness show that the gripper works successfully. The gripper can be used in haptic interfaces or robotic systems used for object handling.

Keywords: gripper, haptic, stiffness, robotic

Procedia PDF Downloads 358