Search results for: physical layer wireless security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11128

Search results for: physical layer wireless security

9688 Innovative Power Engineering in a Selected Rural Commune

Authors: Pawel Sowa, Joachim Bargiel

Abstract:

This paper presents modern solutions of distributed generation in rural communities aiming at the improvement of energy and environmental security, as well as power supply reliability to important customers (e.g. health care, sensitive consumer required continuity). Distributed sources are mainly gas and biogas cogeneration units, as well as wind and photovoltaic sources. Some examples of their applications in a selected Silesian community are given.

Keywords: energy security, mini energy centres , power engineering, power supply reliability

Procedia PDF Downloads 285
9687 Facile Hydrothermal Synthesis of Hierarchical NiO/ZnCo₂O₄ Nanocomposite for High-Energy Supercapacitor Applications

Authors: Fayssal Ynineb, Toufik Hadjersi, Fatsah Moulai, Wafa Achour

Abstract:

Currently, tremendous attention has been paid to the rational design and synthesis of core/shell heterostructures for high-performance supercapacitors. In this study, the hierarchical NiO/ZnCo₂O₄ Core-Shell Nanorods Arrays were successfully deposited onto ITO substrate via a two-step hydrothermal and electrodeposition methods. The effect of the thin carbon layer between NiO and ZnCo₂O₄ in this multi-scale hierarchical structure was investigated. The selection of this structure was based on: (i) a high specific area of pseudo-capacitive NiO to maximize specific capacitance; (ii) an effective NiO-electrolyte interface to facilitate fast charging/discharging; and (iii) conducting carbon layer between ZnCo₂O₄ and NiO enhance the electric conductivity which reduces energy loss, and the corrosion protection of ZnCo₂O₄ in alkaline electrolyte. The obtained results indicate that hierarchical NiO/ZnCo₂O₄ present a high specific capacitance of 63 mF.cm⁻² at a current density of 0.05 mA.cm⁻² higher than that of pristine NiO and ZnCo₂O₄ of 6 and 3 mF.cm⁻², respectively. The carbon layer improves the electrical conductivity among NiO and ZnCo₂O₄ in the hierarchical NiO/C/ZnCo₂O₄ electrode. As well, the specific capacitance drastically increased to reach 125 mF.cm⁻². Moreover, this multi-scale hierarchical structure exhibits superior cycling stability with ~ 95.7 % capacitance retention after 65k cycles. These results indicate that the NiO/C/ZnCo₂O₄ nanocomposite material is an outstanding electrode material for supercapacitors.

Keywords: NiO/C/ZnCo₂O₄, specific capacitance, hydrothermal, supercapacitors

Procedia PDF Downloads 86
9686 Mathematical Properties of the Viscous Rotating Stratified Fluid Counting with Salinity and Heat Transfer in a Layer

Authors: A. Giniatoulline

Abstract:

A model of the mathematical fluid dynamics which describes the motion of a three-dimensional viscous rotating fluid in a homogeneous gravitational field with the consideration of the salinity and heat transfer is considered in a vertical finite layer. The model is a generalization of the linearized Navier-Stokes system with the addition of the Coriolis parameter and the equations for changeable density, salinity, and heat transfer. An explicit solution is constructed and the proof of the existence and uniqueness theorems is given. The localization and the structure of the spectrum of inner waves is also investigated. The results may be used, in particular, for constructing stable numerical algorithms for solutions of the considered models of fluid dynamics of the Atmosphere and the Ocean.

Keywords: Fourier transform, generalized solutions, Navier-Stokes equations, stratified fluid

Procedia PDF Downloads 233
9685 Secure Mobile E-Business Applications

Authors: Hala A. Alrumaih

Abstract:

It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy. One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly. Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.

Keywords: e-business, mobile applications, risk mitigations, security assurance

Procedia PDF Downloads 277
9684 Tag Impersonation Attack on Ultra-lightweight Radio Frequency Identification Authentication Scheme (ESRAS)

Authors: Reham Al-Zahrani, Noura Aleisa

Abstract:

The proliferation of Radio Frequency Identification (RFID) technology has raised concerns about system security, particularly regarding tag impersonation attacks. Regarding RFID systems, an appropriate authentication protocol must resist active and passive attacks. A tag impersonation occurs when an adversary's tag is used to fool an authenticating reader into believing it is a legitimate tag. This paper analyzed the security of the efficient, secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS). Then, the paper presents a comprehensive analysis of the Efficient, Secure, and Practical Ultra-Lightweight RFID Authentication Scheme (ESRAS) in the context of radio frequency identification (RFID) systems that employed the Scyther tool to examine the protocol's security against a tag impersonation attack.

Keywords: RFID, impersonation attack, authentication, ultra-lightweight protocols

Procedia PDF Downloads 47
9683 The Study of Heat and Mass Transfer for Ferrous Materials' Filtration Drying

Authors: Dmytro Symak

Abstract:

Drying is a complex technologic, thermal and energy process. Energy cost of drying processes in many cases is the most costly stage of production, and can be over 50% of total costs. As we know, in Ukraine over 85% of Portland cement is produced moist, and the finished product energy costs make up to almost 60%. During the wet cement production, energy costs make up over 5500 kJ / kg of clinker, while during the dry only 3100 kJ / kg, that is, switching to a dry Portland cement will allow result into double cutting energy costs. Therefore, to study raw materials drying process in the manufacture of Portland cement is very actual task. The fine ferrous materials drying (small pyrites, red mud, clay Kyoko) is recommended to do by filtration method, that is one of the most intense. The essence of filtration method drying lies in heat agent filtering through a stationary layer of wet material, which is located on the perforated partition, in the "layer-dispersed material - perforated partition." For the optimum drying purposes, it is necessary to establish the dependence of pressure loss in the layer of dispersed material, and the values of heat and mass transfer, depending on the speed of the gas flow filtering. In our research, the experimentally determined pressure loss in the layer of dispersed material was generalized based on dimensionless complexes in the form and coefficients of heat exchange. We also determined the relation between the coefficients of mass and heat transfer. As a result of theoretic and experimental investigations, it was possible to develop a methodology for calculating the optimal parameters for the thermal agent and the main parameters for the filtration drying installation. The comparison of calculated by known operating expenses methods for the process of small pyrites drying in a rotating drum and filtration method shows to save up to 618 kWh per 1,000 kg of dry material and 700 kWh during filtration drying clay.

Keywords: drying, cement, heat and mass transfer, filtration method

Procedia PDF Downloads 246
9682 Long Term Evolution Multiple-Input Multiple-Output Network in Unmanned Air Vehicles Platform

Authors: Ashagrie Getnet Flattie

Abstract:

Line-of-sight (LOS) information, data rates, good quality, and flexible network service are limited by the fact that, for the duration of any given connection, they experience severe variation in signal strength due to fading and path loss. Wireless system faces major challenges in achieving wide coverage and capacity without affecting the system performance and to access data everywhere, all the time. In this paper, the cell coverage and edge rate of different Multiple-input multiple-output (MIMO) schemes in 20 MHz Long Term Evolution (LTE) system under Unmanned Air Vehicles (UAV) platform are investigated. After some background on the enormous potential of UAV, MIMO, and LTE in wireless links, the paper highlights the presented system model which attempts to realize the various benefits of MIMO being incorporated into UAV platform. The performances of the three MIMO LTE schemes are compared with the performance of 4x4 MIMO LTE in UAV scheme carried out to evaluate the improvement in cell radius, BER, and data throughput of the system in different morphology. The results show that significant performance gains such as bit error rate (BER), data rate, and coverage can be achieved by using the presented scenario.

Keywords: LTE, MIMO, path loss, UAV

Procedia PDF Downloads 261
9681 Evaluation of Food Safety and Security Practices in Midday Meal Programmes in Rural Areas of Beed District

Authors: Nuzhat Sultana M. B.

Abstract:

Children are high-risk population in terms of food born illnesses. Food safety and security are the most important aspect of the success of midday meal programmes. Improper holding temperatures, cross-contamination and poor personal hygiene of food handlers are the main causes for the prevalence of pathogenic microbes in the food servicing areas. Two hundred and fifty preschool children in the age of 3 to 6 years from urban and rural anganwadies (pre school center) of Beed district were selected. Nutritional status of preschool children were assessed by anthropometrical and clinical measurement. The study assessed the food safety and security with the help of personal hygiene and other safety measures maintained by the food personnel working for midday meal programme, supplying mid meals to children in govt. anganwadies (pre school center). The hygiene level, sanitary condition and microbial quality of food and water, pathological health examination of food handlers were assessed with the help of checklist. A questionnaire was designed to evaluate knowledge, attitude, and practices of food handlers. Results of the study show that the nutritional and health status of rural and urban preschool children was very poor. Many of the food handlers were not aware of general knowledge and hygiene practices to be followed during food preparation areas. An intervention programme of education and importing training at workplaces has shown a positive impact on the outcome of safety and security practices and safe, hygienic practices of food handlers at workplace.

Keywords: food, health, preschool children, safety, security

Procedia PDF Downloads 187
9680 Channel Estimation Using Deep Learning for Reconfigurable Intelligent Surfaces-Assisted Millimeter Wave Systems

Authors: Ting Gao, Mingyue He

Abstract:

Reconfigurable intelligent surfaces (RISs) are expected to be an important part of next-generation wireless communication networks due to their potential to reduce the hardware cost and energy consumption of millimeter Wave (mmWave) massive multiple-input multiple-output (MIMO) technology. However, owing to the lack of signal processing abilities of the RIS, the perfect channel state information (CSI) in RIS-assisted communication systems is difficult to acquire. In this paper, the uplink channel estimation for mmWave systems with a hybrid active/passive RIS architecture is studied. Specifically, a deep learning-based estimation scheme is proposed to estimate the channel between the RIS and the user. In particular, the sparse structure of the mmWave channel is exploited to formulate the channel estimation as a sparse reconstruction problem. To this end, the proposed approach is derived to obtain the distribution of non-zero entries in a sparse channel. After that, the channel is reconstructed by utilizing the least-squares (LS) algorithm and compressed sensing (CS) theory. The simulation results demonstrate that the proposed channel estimation scheme is superior to existing solutions even in low signal-to-noise ratio (SNR) environments.

Keywords: channel estimation, reconfigurable intelligent surface, wireless communication, deep learning

Procedia PDF Downloads 125
9679 Geometrically Linear Symmetric Free Vibration Analysis of Sandwich Beam

Authors: Ibnorachid Zakaria, El Bikri Khalid, Benamar Rhali, Farah Abdoun

Abstract:

The aim of the present work is to study the linear free symmetric vibration of three-layer sandwich beam using the energy method. The zigzag model is used to describe the displacement field. The theoretical model is based on the top and bottom layers behave like Euler-Bernoulli beams while the core layer like a Timoshenko beam. Based on Hamilton’s principle, the governing equation of motion sandwich beam is obtained in order to calculate the linear frequency parameters for a clamped-clamped and simple supported-simple-supported beams. The effects of material properties and geometric parameters on the natural frequencies are also investigated.

Keywords: linear vibration, sandwich, shear deformation, Timoshenko zig-zag model

Procedia PDF Downloads 457
9678 Theoretical Literature Review on Lack of Cardiorespiratory Fitness and Its Effects on Children

Authors: E. Abdi

Abstract:

The purpose of this theoretical literature review is to study the relevant academic literature on lack of cardiorespiratory fitness and its effects on children. The total of thirty eight relevant documents were identified and considered for this review which nineteen of those were original research articles published in peer reviewed journals. The other nineteen articles were statistical documents. This document is structured to examine 4 effects in deficiency of cardiorespiratory fitness in school aged children: (a) obesity, (b) inadequate fitness level, (c) unhealthy life style, and (d) academics. The categories provide a theoretical framework for future studies. The results are broken down into 6 sections: (a) academics,( b) healthy life style, (c) low cost, (d) obesity, (e) Relative Age Effect (RAE), and (f) race/poverty. The study discusses that regular physical fitness assists children and adolescents to develop healthy physical activity behaviors which can be sustained throughout adult life. Conclusion suggests that advocacy for increasing physical activity and decreasing sedentary behaviors at school and home are necessary.

Keywords: cardiorespiratory, endurance, physical activity, physical fitness

Procedia PDF Downloads 418
9677 National Security Threat and Fear of Rising Islamic Extremism in Bangladesh due to Influx of Rohingya Refugees

Authors: Afsana Afsar Tuly

Abstract:

The Rohingyas are a group of minority Muslimsin Myanmar who witnessed series of persecution, violence, and torture from Burmese military since 1948. In 2017, around 700,000 Rohingyas fled to the neighboring country Bangladesh and took shelter as refugees after facing clashes with Myanmar security forces. The number increased to 1.8 million in 2020, creating one of the largest refugee crises of recent times. This research focuses on the vulnerability and poverty faced by Rohingyas in refugee camps and how thelack of long-term solution and silence from international communitycan pose national security threat and increasing Islamic extremism in Bangladesh. Islamic religious and terrorist groups have used the Rohingyas position as stateless people to influence them into speaking against the secular government of Bangladesh. There has been increasing crime rates and formation of different rebel groups in refugee camps, causing clashes with Bangladeshi police and authority. Human trafficking, illegal drug dealings, prostitution, and other illicit activities have continuously gone up in the southeastern part of Bangladesh. Some economic, social, and environmental factors are studied and analyzed to show the change in Bangladesh between 2017 and 2020.

Keywords: national security threat, islamic extremism, rohingya refugees, refugee studies, Bangladesh, myanmar

Procedia PDF Downloads 125
9676 The Potential of Walkability in Evoking People’s Perception of Place Identity

Authors: Ibrahim Shinbira

Abstract:

In urban design, much has been discussed on the significance of the physical qualities in creating the place identity; however, the role of walkability as a physical quality that can evokes people's perception of place identity has not been adequately explored. This paper is based on the part findings of a doctoral research examining place identity in the city centre of Misurata, Libya. A number of 176 questionnaire and 23 face-to-face interviews were conducted with residents of the city to investigate physical qualities of place identity that evoked resident's perception. The finding demonstrates that walkability within the city centre is strong and it influences the users’ perception on the place identity. These were regarded as very important in sustaining the socio-cultural values, enjoyment, options, vitality and comfort. The paper concludes by establishing that walkability has a substantial contribution to the place identity, therefore should be considered in the design of urban places specifically the redevelopment one.

Keywords: perception, walkability, physical environment, place identity, residents

Procedia PDF Downloads 608
9675 Failure Mechanisms in Zirconium Alloys during Wear and Corrosion

Authors: Bharat Kumar, Deepak Kumar, Vijay Chaudhry

Abstract:

Zirconium alloys are used as core components of nuclear reactors due to their high wear resistance, good corrosion properties, and good mechanical stability at high temperatures. Water flows inside the pressure tube through fuel claddings, which produces vibration of these core components and results in the wear of some components. Some components are subjected to the environment of coolant water containing LiOH which results in the corrosion of these components. The present work simulates some of these conditions to determine the failure mechanisms under these conditions and the effect of various parameters on them. Friction and wear experiments were performed varying the surrounding environment (room temperature, high temperature, and water submerged), duration, frequency, and displacement amplitude. Electrochemical corrosion experiments were performed by varying the concentration of LiOH in water. The worn and corroded surfaces were analyzed using scanning electron microscopy (SEM) to analyze the wear and corrosion mechanism and energy dispersive x-ray spectroscopy (EDS) and Raman spectroscopy to analyze the tribo-oxide layer formed during the wear and oxide layer formed during the corrosion. Wear increases with frequency and amplitude, and corrosion increases with LiOH concentration in water.

Keywords: zirconium alloys, wear, oxide layer, corrosion, EIS, linear polarization

Procedia PDF Downloads 48
9674 Cryptography Based Authentication Methods

Authors: Mohammad A. Alia, Abdelfatah Aref Tamimi, Omaima N. A. Al-Allaf

Abstract:

This paper reviews a comparison study on the most common used authentication methods. Some of these methods are actually based on cryptography. In this study, we show the main cryptographic services. Also, this study presents a specific discussion about authentication service, since the authentication service is classified into several categorizes according to their methods. However, this study gives more about the real life example for each of the authentication methods. It talks about the simplest authentication methods as well about the available biometric authentication methods such as voice, iris, fingerprint, and face authentication.

Keywords: information security, cryptography, system access control, authentication, network security

Procedia PDF Downloads 452
9673 Challenges of Teaching Physical Education to Students With Special Needs in Regular School Settings

Authors: Christine Okello

Abstract:

Physical Education (PE) curriculum provides school age students to explore issues that are likely to impact on health, safety, and well-being. The current curriculum includes the physical activity component, intended to improve physical fitness, social skills as well as building confidence. While this viewpoint is vital, there are challenges and stigma attached when specific issues are either ignored, inadequately addressed, or not seen to be important. The department stipulates that students attend a school that is closest to their home, to access available government transportation to and from school. Equivalently, parents of students with a disability decide where their children attend school. A choice between a regular classroom, mainstream Special Unit classroom, or a School for Specific Purposes (SSP). Parents who take their children to regular schools may be oblivious of the details of the curriculum. Physical Education outcomes does not stipulate the extent to which a student must perform or expected to perform. It is therefore due to the classroom teacher to adjust their teaching goals or outcomes to suit all students in their classroom. A student who can run a hundred meters race in 20 seconds may belong in the same classroom as a student in a wheelchair. While these students are challenged because of a lack of performance, teachers are challenged to effectively teach successful PE lessons, and on the other hand students without a disability may not be able to attain their optimum. This paper will identify areas of need, address the challenges, and explore a possible solution.

Keywords: special needs, disability, challenges, physical education

Procedia PDF Downloads 50
9672 Improving Security Features of Traditional Automated Teller Machines-Based Banking Services via Fingerprint Biometrics Scheme

Authors: Anthony I. Otuonye, Juliet N. Odii, Perpetual N. Ibe

Abstract:

The obvious challenges faced by most commercial bank customers while using the services of ATMs (Automated Teller Machines) across developing countries have triggered the need for an improved system with better security features. Current ATM systems are password-based, and research has proved the vulnerabilities of these systems to heinous attacks and manipulations. We have discovered by research that the security of current ATM-assisted banking services in most developing countries of the world is easily broken and maneuvered by fraudsters, majorly because it is quite difficult for these systems to identify an impostor with privileged access as against the authentic bank account owner. Again, PIN (Personal Identification Number) code passwords are easily guessed, just to mention a few of such obvious limitations of traditional ATM operations. In this research work also, we have developed a system of fingerprint biometrics with PIN code Authentication that seeks to improve the security features of traditional ATM installations as well as other Banking Services. The aim is to ensure better security at all ATM installations and raise the confidence of bank customers. It is hoped that our system will overcome most of the challenges of the current password-based ATM operation if properly applied. The researchers made use of the OOADM (Object-Oriented Analysis and Design Methodology), a software development methodology that assures proper system design using modern design diagrams. Implementation and coding were carried out using Visual Studio 2010 together with other software tools. Results obtained show a working system that provides two levels of security at the client’s side using a fingerprint biometric scheme combined with the existing 4-digit PIN code to guarantee the confidence of bank customers across developing countries.

Keywords: fingerprint biometrics, banking operations, verification, ATMs, PIN code

Procedia PDF Downloads 24
9671 Axiomatic Systems as an Alternative to Teach Physics

Authors: Liliana M. Marinelli, Cristina T. Varanese

Abstract:

In the last few years, students from higher education have difficulties in grasping mathematical concepts which support physical matters, especially those in the first years of this education. Classical Physics teaching turns to be complex when students are not able to make use of mathematical tools which lead to the conceptual structure of Physics. When derivation and integration rules are not used or developed in parallel with other disciplines, the physical meaning that we attempt to convey turns to be complicated. Due to this fact, it could be of great use to see the Classical Mechanics from an axiomatic approach, where the correspondence rules give physical meaning, if we expect students to understand concepts clearly and accurately. Using the Minkowski point of view adapted to a two-dimensional space and time where vectors, matrices, and straight lines (worked from an affine space) give mathematical and physical rigorosity even when it is more abstract. An interesting option would be to develop the disciplinary contents from an axiomatic version which embraces the Classical Mechanics as a particular case of Relativistic Mechanics. The observation about the increase in the difficulties stated by students in the first years of education allows this idea to grow as a possible option to improve performance and understanding of the concepts of this subject.

Keywords: axioms, classical physics, physical concepts, relativity

Procedia PDF Downloads 290
9670 The Optimal Irrigation in the Mitidja Plain

Authors: Gherbi Khadidja

Abstract:

In the Mediterranean region, water resources are limited and very unevenly distributed in space and time. The main objective of this project is the development of a wireless network for the management of water resources in northern Algeria, the Mitidja plain, which helps farmers to irrigate in the most optimized way and solve the problem of water shortage in the region. Therefore, we will develop an aid tool that can modernize and replace some traditional techniques, according to the real needs of the crops and according to the soil conditions as well as the climatic conditions (soil moisture, precipitation, characteristics of the unsaturated zone), These data are collected in real-time by sensors and analyzed by an algorithm and displayed on a mobile application and the website. The results are essential information and alerts with recommendations for action to farmers to ensure the sustainability of the agricultural sector under water shortage conditions. In the first part: We want to set up a wireless sensor network, for precise management of water resources, by presenting another type of equipment that allows us to measure the water content of the soil, such as the Watermark probe connected to the sensor via the acquisition card and an Arduino Uno, which allows collecting the captured data and then program them transmitted via a GSM module that will send these data to a web site and store them in a database for a later study. In a second part: We want to display the results on a website or a mobile application using the database to remotely manage our smart irrigation system, which allows the farmer to use this technology and offers the possibility to the growers to access remotely via wireless communication to see the field conditions and the irrigation operation, at home or at the office. The tool to be developed will be based on satellite imagery as regards land use and soil moisture. These tools will make it possible to follow the evolution of the needs of the cultures in time, but also to time, and also to predict the impact on water resources. According to the references consulted, if such a tool is used, it can reduce irrigation volumes by up to up to 40%, which represents more than 100 million m3 of savings per year for the Mitidja. This volume is equivalent to a medium-size dam.

Keywords: optimal irrigation, soil moisture, smart irrigation, water management

Procedia PDF Downloads 91
9669 Numerical Solution to Coupled Heat and Moisture Diffusion in Bio-Sourced Composite Materials

Authors: Mnasri Faiza, El Ganaoui Mohammed, Khelifa Mourad, Gabsi Slimane

Abstract:

The main objective of this paper is to describe the hydrothermal behavior through porous material of construction due to temperature gradient. The construction proposed a bi-layer structure which composed of two different materials. The first is a bio-sourced panel named IBS-AKU (inertia system building), the second is the Neopor material. This system (IBS-AKU Neopor) is developed by a Belgium company (Isohabitat). The study suggests a multi-layer structure of the IBS-AKU panel in one dimension. A numerical method was proposed afterwards, by using the finite element method and a refined mesh area to strong gradients. The evolution of temperature fields and the moisture content has been processed.

Keywords: heat transfer, moisture diffusion, porous media, composite IBS-AKU, simulation

Procedia PDF Downloads 492
9668 Hybrid Beam-Forming Techniques for 6G Terahertz Communication: Challenges

Authors: Mridula Korde

Abstract:

The terahertz band is the main pillar of 6G wireless communication system. It is difficult to meet the high data rate of 1Tbps by millimeter frequency support systems. The terahertz band suffers huge propagation loss limiting wireless distance. Terahertz band imposes ultra massive multiple input multiple output antenna (UM-MIMO) systems which produce high array gain with narrow beamforming. The conventional methods for MIMO beamforming are Analog and Digital beamforming. The fully digital beamforming methods utilize dedicated structure of DAC/ADC and RF chains. These structures increase hardware complexity and are power hungry. The analog beamforming structures utilize ADC/DAC with phase shifters with less hardware complexity but support less data rates. As a result, a hybrid beamforming method can be adapted for UM-MIMO systems. This paper will investigate challenges in hybrid beamforming architecture which will address the low spatial degrees of freedom (SDoF) limitation in Terahertz (THz) Communication. The flexible hardware connections are proposed, in order to switch the system in an adaptive manner so as to minimize the power requirements.

Keywords: 6G, terahertz communication, beamforming, challenges

Procedia PDF Downloads 10
9667 Governance, Risk Management, and Compliance Factors Influencing the Adoption of Cloud Computing in Australia

Authors: Tim Nedyalkov

Abstract:

A business decision to move to the cloud brings fundamental changes in how an organization develops and delivers its Information Technology solutions. The accelerated pace of digital transformation across businesses and government agencies increases the reliance on cloud-based services. They are collecting, managing, and retaining large amounts of data in cloud environments makes information security and data privacy protection essential. It becomes even more important to understand what key factors drive successful cloud adoption following the commencement of the Privacy Amendment Notifiable Data Breaches (NDB) Act 2017 in Australia as the regulatory changes impact many organizations and industries. This quantitative correlational research investigated the governance, risk management, and compliance factors contributing to cloud security success. The factors influence the adoption of cloud computing within an organizational context after the commencement of the NDB scheme. The results and findings demonstrated that corporate information security policies, data storage location, management understanding of data governance responsibilities, and regular compliance assessments are the factors influencing cloud computing adoption. The research has implications for organizations, future researchers, practitioners, policymakers, and cloud computing providers to meet the rapidly changing regulatory and compliance requirements.

Keywords: cloud compliance, cloud security, data governance, privacy protection

Procedia PDF Downloads 103
9666 Inhibition of Glutamate Carboxypeptidase Activity Protects Retinal Ganglionic Cell Death Induced by Ischemia-Reperfusion by Reducing the Astroglial Activation in Rat

Authors: Dugeree Otgongerel, Kyong Jin Cho, Yu-Han Kim, Sangmee Ahn Jo

Abstract:

Excessive activation of glutamate receptor is thought to be involved in retinal ganglion cell (RGC) death after ischemia- reperfusion damage. Glutamate carboxypeptidase II (GCPII) is an enzyme responsible for the synthesis of glutamate. Several studies showed that inhibition of GCPII prevents or reduces cellular damage in brain diseases. Thus, in this study, we examined the expression of GCPII in rat retina and the role of GCPII in acute high IOP ischemia-reperfusion damage of eye by using a GCPII inhibitor, 2-(phosphonomethyl) pentanedioic acid (2-PMPA). Animal model of ischemia-reperfusion was induced by raising the intraocular pressure for 60 min and followed by reperfusion for 3 days. Rats were randomly divided into four groups: either intra-vitreous injection of 2-PMPA (11 or 110 ng per eye) or PBS after ischemia-reperfusion, 2-PMPA treatment without ischemia-reperfusion and sham-operated normal control. GCPII immunoreactivity in normal rat retina was detected weakly in retinal nerve fiber layer (RNFL) and retinal ganglionic cell layer (RGL) and also inner plexiform layer (IPL) and outer plexiform layer (OPL) strongly where are co-stained with an anti-GFAP antibody, suggesting that GCPII is expressed mostly in Muller and astrocytes. Immunostaining with anti-BRN antibody showed that ischemia- reperfusion caused RGC death (31.5 %) and decreased retinal thickness in all layers of damaged retina, but the treatment of 2-PMPA twice at 0 and 48 hour after reperfusion blocked these retinal damages. GCPII level in RNFL layer was enhanced after ischemia-reperfusion but was blocked by PMPA treatment. This result was confirmed by western blot analysis showing that the level of GCPII protein after ischemia- reperfusion increased by 2.2- fold compared to control, but this increase was blocked almost completely by 110 ng PMPA treatment. Interestingly, GFAP immunoreactivity in the retina after ischemia- reperfusion followed by treatment with PMPA showed similar pattern to GCPII, increase after ischemia-reperfusion but reduction to the normal level by PMPA treatment. Our data demonstrate that increase of GCPII protein level after ischemia-reperfusion injury is likely to cause glial activation and/or retinal cell death which are mediated by glutamate, and GCPII inhibitors may be useful in treatment of retinal disorders in which glutamate excitotoxicity is pathogenic.

Keywords: glutamate carboxypepptidase II, glutamate excitotoxicity, ischemia-reperfusion, retinal ganglion cell

Procedia PDF Downloads 327
9665 Bonding Characteristics Between FRP and Concrete Substrates

Authors: Houssam A. Toutanji, Meng Han

Abstract:

This study focuses on the development of a fracture mechanics based-model that predicts the debonding behavior of FRP strengthened RC beams. In this study, a database includes 351 concrete prisms bonded with FRP plates tested in single and double shear were prepared. The existing fracture-mechanics-based models are applied to this database. Unfortunately the properties of adhesive layer, especially a soft adhesive layer, used on the specimens in the existing studies were not always able to found. Thus, the new model’s proposal was based on fifteen newly conducted pullout tests and twenty four data selected from two independent existing studies with the application of a soft adhesive layers and the availability of adhesive properties.

Keywords: carbon fiber composite materials, interface response, fracture characteristics, maximum shear stress, ultimate transferable load

Procedia PDF Downloads 246
9664 The Nexus between Climate Change and Criminality: The Nigerian Experience

Authors: Dagaci Aliyu Manbe, Anthony Abah Ebonyi

Abstract:

The increase in global temperatures is worsened by frequent natural events and human activities. Climate change has taken a prominent space in the global discourse on crime and criminality. Compared to when the subject centred around the discussion on the depletion of the ozone layer and global warming, today, the narrative revolves around the implications of changes in weather and climatic conditions in relations to violent crimes or conflict that traverse vast social, economic, and political spaces in different countries. Global warming and climate change refer to an increase in average global temperatures in the Earth’s near-surface air and oceans, which occurs due to human activities such as deforestation and the burning of fossil fuel such as gas flaring. The trend is projected to continue, if unchecked. This paper seeks to explore the nexus between climate change and criminality in Nigeria. It further examines the main ecological changes that predispose conflict dynamics of security threats factored by climate change to peaceful co-existence in Nigeria. It concludes with some recommendations on the way forward.

Keywords: conflict, climate change, criminality, global warning, peace

Procedia PDF Downloads 157
9663 Intrusion Detection in Cloud Computing Using Machine Learning

Authors: Faiza Babur Khan, Sohail Asghar

Abstract:

With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.

Keywords: cloud security, threats, machine learning, random forest, classification

Procedia PDF Downloads 308
9662 A Virtual Grid Based Energy Efficient Data Gathering Scheme for Heterogeneous Sensor Networks

Authors: Siddhartha Chauhan, Nitin Kumar Kotania

Abstract:

Traditional Wireless Sensor Networks (WSNs) generally use static sinks to collect data from the sensor nodes via multiple forwarding. Therefore, network suffers with some problems like long message relay time, bottle neck problem which reduces the performance of the network. Many approaches have been proposed to prevent this problem with the help of mobile sink to collect the data from the sensor nodes, but these approaches still suffer from the buffer overflow problem due to limited memory size of sensor nodes. This paper proposes an energy efficient scheme for data gathering which overcomes the buffer overflow problem. The proposed scheme creates virtual grid structure of heterogeneous nodes. Scheme has been designed for sensor nodes having variable sensing rate. Every node finds out its buffer overflow time and on the basis of this cluster heads are elected. A controlled traversing approach is used by the proposed scheme in order to transmit data to sink. The effectiveness of the proposed scheme is verified by simulation.

Keywords: buffer overflow problem, mobile sink, virtual grid, wireless sensor networks

Procedia PDF Downloads 368
9661 Information Visualization Methods Applied to Nanostructured Biosensors

Authors: Osvaldo N. Oliveira Jr.

Abstract:

The control of molecular architecture inherent in some experimental methods to produce nanostructured films has had great impact on devices of various types, including sensors and biosensors. The self-assembly monolayers (SAMs) and the electrostatic layer-by-layer (LbL) techniques, for example, are now routinely used to produce tailored architectures for biosensing where biomolecules are immobilized with long-lasting preserved activity. Enzymes, antigens, antibodies, peptides and many other molecules serve as the molecular recognition elements for detecting an equally wide variety of analytes. The principles of detection are also varied, including electrochemical methods, fluorescence spectroscopy and impedance spectroscopy. In this presentation an overview will be provided of biosensors made with nanostructured films to detect antibodies associated with tropical diseases and HIV, in addition to detection of analytes of medical interest such as cholesterol and triglycerides. Because large amounts of data are generated in the biosensing experiments, use has been made of computational and statistical methods to optimize performance. Multidimensional projection techniques such as Sammon´s mapping have been shown more efficient than traditional multivariate statistical analysis in identifying small concentrations of anti-HIV antibodies and for distinguishing between blood serum samples of animals infected with two tropical diseases, namely Chagas´ disease and Leishmaniasis. Optimization of biosensing may include a combination of another information visualization method, the Parallel Coordinate technique, with artificial intelligence methods in order to identify the most suitable frequencies for reaching higher sensitivity using impedance spectroscopy. Also discussed will be the possible convergence of technologies, through which machine learning and other computational methods may be used to treat data from biosensors within an expert system for clinical diagnosis.

Keywords: clinical diagnosis, information visualization, nanostructured films, layer-by-layer technique

Procedia PDF Downloads 317
9660 Blockchain’s Feasibility in Military Data Networks

Authors: Brenden M. Shutt, Lubjana Beshaj, Paul L. Goethals, Ambrose Kam

Abstract:

Communication security is of particular interest to military data networks. A relatively novel approach to network security is blockchain, a cryptographically secured distribution ledger with a decentralized consensus mechanism for data transaction processing. Recent advances in blockchain technology have proposed new techniques for both data validation and trust management, as well as different frameworks for managing dataflow. The purpose of this work is to test the feasibility of different blockchain architectures as applied to military command and control networks. Various architectures are tested through discrete-event simulation and the feasibility is determined based upon a blockchain design’s ability to maintain long-term stable performance at industry standards of throughput, network latency, and security. This work proposes a consortium blockchain architecture with a computationally inexpensive consensus mechanism, one that leverages a Proof-of-Identity (PoI) concept and a reputation management mechanism.

Keywords: blockchain, consensus mechanism, discrete-event simulation, fog computing

Procedia PDF Downloads 122
9659 Mechanical and Material Characterization on the High Nitrogen Supersaturated Tool Steels for Die-Technology

Authors: Tatsuhiko Aizawa, Hiroshi Morita

Abstract:

The tool steels such as SKD11 and SKH51 have been utilized as punch and die substrates for cold stamping, forging, and fine blanking processes. The heat-treated SKD11 punches with the hardness of 700 HV wrought well in the stamping of SPCC, normal steel plates, and non-ferrous alloy such as a brass sheet. However, they suffered from severe damage in the fine blanking process of smaller holes than 1.5 mm in diameter. Under the high aspect ratio of punch length to diameter, an elastoplastic bucking of slender punches occurred on the production line. The heat-treated punches had a risk of chipping at their edges. To be free from those damages, the blanking punch must have sufficient rigidity and strength at the same time. In the present paper, the small-hole blanking punch with a dual toughness structure was proposed to provide a solution to this engineering issue in production. The low-temperature plasma nitriding process was utilized to form the nitrogen supersaturated thick layer into the original SKD11 punch. Through the plasma nitriding at 673 K for 14.4 ks, the nitrogen supersaturated layer, with the thickness of 50 μm and without nitride precipitates, was formed as a high nitrogen steel (HNS) layer surrounding the original SKD11 punch. In this two-zone structured SKD11 punch, the surface hardness increased from 700 HV for the heat-treated SKD11 to 1400 HV. This outer high nitrogen SKD11 (HN-SKD11) layer had a homogeneous nitrogen solute depth profile with a nitrogen solute content plateau of 4 mass% till the border between the outer HN-SKD11 layer and the original SKD11 matrix. When stamping the brass sheet with the thickness of 1 mm by using this dually toughened SKD11 punch, the punch life was extended from 500 K shots to 10000 K shots to attain a much more stable production line to yield the brass American snaps. Furthermore, with the aid of the masking technique, the punch side surface layer with the thickness of 50 μm was modified by this high nitrogen super-saturation process to have a stripe structure where the un-nitrided SKD11 and the HN-SKD11 layers were alternatively aligned from the punch head to the punch bottom. This flexible structuring promoted the mechanical integrity of total rigidity and toughness as a punch with an extremely small diameter.

Keywords: high nitrogen supersaturation, semi-dry cold stamping, solid solution hardening, tool steel dies, low temperature nitriding, dual toughness structure, extremely small diameter punch

Procedia PDF Downloads 78