Search results for: cross layer security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8714

Search results for: cross layer security

8594 Polyethylenimine-Ethoxylated Dual Interfacial Layers for High-Efficient Quantum Dot Light-Emitting Diodes

Authors: Woosuk Lee

Abstract:

We controlled the electron injection rate in inverted quantum dot light-emitting diode (QLED) by inserting PEIE layer between ZnO electron transport layer(ETL) and quantum dots(QDs) layer and successfully demonstrated high efficiency of QLEDs. The inverted QLED has the layer structure of ITO(cathode)/ ZnO NPs/PEIE/QDs/PEIE/P-TPD/MoO3/Al(anode). The PEIE between poly-TPD hole transport layer (HTL) and quantum dot emitting layer protects QD EML during HTL coating process and improves the surface morphology. In addition, the hole injection barrier is reduced by upshifting the valence band maximum (VBM) of QDs. An additional layer of PEIE was introduced between ZnO and QD to balance charge within QD emissive layer in device, which serves as an effective electron blocking layer without changing device operating condition such as turn-on voltage and emissive spectra. As a result, the optimized QLED with 5nm PEIE shows a ~36% improved current efficiency and external quantum efficiency (EQE) compared to the QLED without PEIE.(maximum current efficiency, and EQE are achieved 70cd/A and 17.3%, respectively). In particular, the maximum brightness of the optimized QLED dramatically improved by a factor of 2.3 relative to the QLED without PEIE. The main reasons for these QLED performance improvement are due to the suppressing the leakage current across the device and well confined exciton by inserting PEIE layers.

Keywords: quantum dot light-emitting diodes, interfacial layer, charge-injection balance, suppressing QD charging

Procedia PDF Downloads 158
8593 Assessment of the Production System and Management Practices in Selected Layer Chicken Farms in Batangas, Philippines

Authors: Monette S. De Castro, Veneranda A. Magpantay, Christine B. Adiova, Mark D. Arboleda

Abstract:

One-hundred-layer chicken farmers were randomly selected and interviewed using structured questionnaires to assess the production system and management practices in layer chicken farms. The respondents belonged to the commercial scale operation. Results showed that the predominant rearing and housing systems were intensive/complete confinement and open-sided, while slatted was the common type of flooring used during the brood-grow period. Dekalb and Lohmann were the common chicken layer strains reared by farmers. The majority of commercial chicken layer farms preferred ready-to-lay (RTL) pullets as their replacement stocks. Selling was the easiest way for farmers to dispose of and utilize poultry manure, while veterinary waste and mortality were disposed of in pits. Biosecurity practices employed by the farmers conformed with the ASEAN Biosecurity Management Manual for Commercial Poultry Farming. Flies and odor were the major problems in most layer farms that are associated with their farm wastes. Therefore, the application of new technologies and husbandry practices through training and actual demonstrations could be implemented to further improve the layer chicken raising in the province.

Keywords: layer chicken farms, marketing, production system, waste management

Procedia PDF Downloads 41
8592 Different Cathode Buffer Layers in Organic Solar Cells

Authors: Radia Kamel

Abstract:

Considerable progress has been made in the development of bulk-heterojunction organic solar cells (OSCs) based on a blend of p-type and n-type organic semiconductors. To optimize the interfacial properties between the active layer and the electrode, a cathode buffer layer (CBL) is introduced. This layer can reduce the leakage current, increasing the open-circuit voltage and the fill factor while improving the OSC stability. In this work, the performance of PM6:Y6 OSC with 1-Chloronaphthalene as an additive is examined. To accomplish this, three CBLs PNDIT-F3N-Br, ZrAcac, and PDINO, are compared using the conventional configuration. The device with PNDIT-F3N-Br as CBL exhibits the highest power conversion efficiency of 16.04%. The results demonstrate that modifying the cathode buffer layer is crucial for achieving high-performance OSCs.

Keywords: bulk heterojunction, cathode buffer layer, efficiency, organic solar cells

Procedia PDF Downloads 140
8591 A Survey of Attacks and Security Requirements in Wireless Sensor Networks

Authors: Vishnu Pratap Singh Kirar

Abstract:

Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.

Keywords: wireless sensor network (WSN), wireless network attacks, wireless network security, security requirements

Procedia PDF Downloads 461
8590 Design and Realization of Computer Network Security Perception Control System

Authors: El Miloudi Djelloul

Abstract:

Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.

Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)

Procedia PDF Downloads 416
8589 Human Security Providers in Fragile State under Asymmetric War Conditions

Authors: Luna Shamieh

Abstract:

Various players are part of the game in an asymmetric war, all making efforts to provide human security to their own adherents. Although a fragile state is not able to provide sufficient and comprehensive services, it still provides special services and security to the elite; the insurgents as well provide services and security to their associates. The humanitarian organisations, on the other hand, provide some fundamental elements of human security, but only in the regions, they are able to access when possible (if possible). The counterinsurgents (security forces of the state and intervention forces) operate within a narrow band defined by the vision of the responsibility to protect and the perspective of the resolution of the conflict through combat; hence, the possibility to provide human security is shaken at this end. This article examines how each player provides human security from the perspective of freedom from want in order to secure basic and strategic needs, freedom from fear through providing protection against all kinds of violence, and the freedom to live in dignity. It identifies a vicious cycle caused by the intervention of the different players causing a centrifugal force that may lead to disintegration of the nation under war.

Keywords: asymmetric war, counterinsurgency, fragile state, human security, insurgency

Procedia PDF Downloads 312
8588 Safeguarding the Cloud: The Crucial Role of Technical Project Managers in Security Management for Cloud Environments

Authors: Samuel Owoade, Zainab Idowu, Idris Ajibade, Abel Uzoka

Abstract:

Cloud computing adoption continues to soar, with 83% of enterprise workloads estimated to be in the cloud by 2022. However, this rapid migration raises security concerns, needing strong security management solutions to safeguard sensitive data and essential applications. This paper investigates the critical role of technical project managers in orchestrating security management initiatives for cloud environments, evaluating their responsibilities, challenges, and best practices for assuring the resilience and integrity of cloud infrastructures. Drawing from a comprehensive review of industry reports and interviews with cloud security experts, this research highlights the multifaceted landscape of security management in cloud environments. Despite the rapid adoption of cloud services, only 25% of organizations have matured their cloud security practices, indicating a pressing need for effective management strategies. This paper proposes a strategy framework adapted to the demands of technical project managers, outlining the important components of effective cloud security management. Notably, 76% of firms identify misconfiguration as a major source of cloud security incidents, underlining the significance of proactive risk assessment and constant monitoring. Furthermore, the study emphasizes the importance of technical project managers in facilitating cross-functional collaboration, bridging the gap between cybersecurity professionals, cloud architects, compliance officers, and IT operations teams. With 68% of firms seeing difficulties integrating security policies into their cloud systems, effective communication and collaboration are critical to success. Case studies from industry leaders illustrate the practical use of security management projects in cloud settings. These examples demonstrate the importance of technical project managers in using their expertise to address obstacles and generate meaningful outcomes, with 92% of firms reporting improved security practices after implementing proactive security management tactics. In conclusion, this research underscores the critical role of technical project managers in safeguarding cloud environments against evolving threats. By embracing their role as guardians of the cloud realm, project managers can mitigate risks, optimize resource utilization, and uphold the trust and integrity of cloud infrastructures in an era of digital transformation.

Keywords: cloud security, security management, technical project management, cybersecurity, cloud infrastructure, risk management, compliance

Procedia PDF Downloads 30
8587 Multi-Level Attentional Network for Aspect-Based Sentiment Analysis

Authors: Xinyuan Liu, Xiaojun Jing, Yuan He, Junsheng Mu

Abstract:

Aspect-based Sentiment Analysis (ABSA) has attracted much attention due to its capacity to determine the sentiment polarity of the certain aspect in a sentence. In previous works, great significance of the interaction between aspect and sentence has been exhibited in ABSA. In consequence, a Multi-Level Attentional Networks (MLAN) is proposed. MLAN consists of four parts: Embedding Layer, Encoding Layer, Multi-Level Attentional (MLA) Layers and Final Prediction Layer. Among these parts, MLA Layers including Aspect Level Attentional (ALA) Layer and Interactive Attentional (ILA) Layer is the innovation of MLAN, whose function is to focus on the important information and obtain multiple levels’ attentional weighted representation of aspect and sentence. In the experiments, MLAN is compared with classical TD-LSTM, MemNet, RAM, ATAE-LSTM, IAN, AOA, LCR-Rot and AEN-GloVe on SemEval 2014 Dataset. The experimental results show that MLAN outperforms those state-of-the-art models greatly. And in case study, the works of ALA Layer and ILA Layer have been proven to be effective and interpretable.

Keywords: deep learning, aspect-based sentiment analysis, attention, natural language processing

Procedia PDF Downloads 120
8586 Review of Cyber Security in Oil and Gas Industry with Cloud Computing Perspective: Taxonomy, Issues and Future Direction

Authors: Irfan Mohiuddin, Ahmad Al Mogren

Abstract:

In recent years, cloud computing has earned substantial attention in the Oil and Gas Industry and provides services in all the phases of the industry lifecycle. Oil and gas supply infrastructure, in particular, is more vulnerable to accidental, natural and intentional threats because of its widespread distribution. Numerous surveys have been conducted on cloud security and privacy. However, to the best of our knowledge, hardly any survey is carried out that reviews cyber security in all phases with a cloud computing perspective. Moreover, a distinctive classification is performed for all the cloud-based cyber security measures based on the cloud component in use. The classification approach will enable researchers to identify the required technique used to enhance the security in specific cloud components. Also, the limitation of each component will allow the researchers to design optimal algorithms. Lastly, future directions are given to point out the imminent challenges that can pave the way for researchers to further enhance the resilience to cyber security threats in the oil and gas industry.

Keywords: cyber security, cloud computing, safety and security, oil and gas industry, security threats, oil and gas pipelines

Procedia PDF Downloads 120
8585 Blockchain Security in MANETs

Authors: Nada Mouchfiq, Ahmed Habbani, Chaimae Benjbara

Abstract:

The security aspect of the IoT occupies a place of great importance especially after the evolution that has known this field lastly because it must take into account the transformations and the new applications .Blockchain is a new technology dedicated to the data sharing. However, this does not work the same way in the different systems with different operating principles. This article will discuss network security using the Blockchain to facilitate the sending of messages and information, enabling the use of new processes and enabling autonomous coordination of devices. To do this, we will discuss proposed solutions to ensure a high level of security in these networks in the work of other researchers. Finally, our article will propose a method of security more adapted to our needs as a team working in the ad hoc networks, this method is based on the principle of the Blockchain and that we named ”MPR Blockchain”.

Keywords: Ad hocs networks, blockchain, MPR, security

Procedia PDF Downloads 153
8584 Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya

Authors: Samuel Mwangi, Josephine K. Mule

Abstract:

Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities.

Keywords: facial recognition, access control, technology, learning

Procedia PDF Downloads 105
8583 Design a Network for Implementation a Hospital Information System

Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇

Abstract:

A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.

Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network

Procedia PDF Downloads 404
8582 Effective Layer-by-layer Chemical Grafting of a Reactive Oxazoline Polymer and MWCNTs onto Carbon Fibers for Enhancing Mechanical Properties of Composites using Polystyrene as a Model Thermoplastic Matrix

Authors: Ryoma Tokonami, Teruya Goto, Tatsuhiro Takahashi,

Abstract:

For enhancing the mechanical property ofcarbon fiber reinforced plastic (CFRP), the surface modification of carbon fiber (CF) by multi-walled carbon nanotube (MWCNT) has received considerable attention using direct MWCNT growth on CF with a catalysis, MWCNT electrophoresis, and layer-by-layer of MWCNT with reactive polymers, etc. Among above approaches, the layer-by-layer method is the simplest process, however, the amount of MWCNTs on CF is very little, resulting in the small amount of improvement of the mechanical property of the composite. The remaining amount of MWCNT on CF after melt mixing of CF (short fiber) with thermoplastic matrix polymer was not examined clearly in the former studies. The present research aims to propose an effective layer-by-layer chemical grafting of a highly reactive oxazoline polymer, which has not been used before, and MWCNTs onto CF using the highly reactivity of oxazoline and COOH on the surface of CF and MWCNTs.With layer-by-layer method, the first uniform chemically bonded mono molecular layer on carbon fiber was formed by chemical surface reaction of carbon fiber, a reactive oxazoline polymer solution between COOH of carbon fiber and oxazoline. The second chemically bonded uniform layer of MWCNTs on the first layer was prepared through the first layer coated carbon fiber in MWCNT dispersion solution by chemical reaction between oxazoline and COOH of MWCNTs. The quantitative analysis of MWCNTs on carbon fiber was performed, showing 0.44 wt.% of MWCNTs based on carbon fiber, which is much larger amount compared with the former studies in layer-by-layer method. In addition, MWCNTs were also observed uniform coating on carbon fiber by scanning electron micrograph (SEM). Carbon fiber composites were prepared by melting mixing using polystyrene (PS) as a thermoplastic matrix because of easy removal of PS by solvent for additional analysis, resulting the 20% of enhancement of tensile strength and modulus by tensile strength test. It was confirmed bySEM the layer-by-layer structure on carbon fibers were remained after the melt mixing by removing PS with a solvent. As a conclusion, the effectiveness for the enhancement of the mechanical properties of CF(short fiber)/PS composite using the highly reactive oxazoline polymer for the first layer and MWCNT for the second layer, which act as the physical anchor, was demonstrated.

Keywords: interface, layer-by-layer, multi walled carbon nanotubes (MWCNTs), oxazoline

Procedia PDF Downloads 177
8581 Experimental Analysis of Laminar Nanofluid Flow Convection

Authors: Mohammad R. Salimpour

Abstract:

In this study, we investigate experimental laminar forced convective heat transfer specifications of TiO2/water nanofluids through conduits with different cross sections. Ee check the effects of different parameters such as cross sectional shape, Reynolds number and concentration of nanoparticles in stable suspension on increasing convective heat transfer by designing and assembling of an experimental apparatus. The results demonstrate adding a little amount of nanoparticles to the base fluid, improves heat transfer behavior in conduits. Moreover, conduit with circular cross-section has better performance compared to the square and triangular cross sections. However, conduits with square and triangular cross sections have more relative heat transfer enhancement than conduit with circular cross section.

Keywords: nanofluid, cross-sectional shape, TiO2, convection

Procedia PDF Downloads 374
8580 Some Tips for Increasing Online Services Safety

Authors: Mohsen Rezaee

Abstract:

Although robust security softwares, including anti-viruses, anti-spywares, anti-spam and firewalls are amalgamated with new technologies such as safe zone, hybrid cloud, sand box and etc., and although it can be said that they have managed to prepare highest level of security against viruses, spywares and other malwares in 2012, in fact, hacker attacks to websites are increasingly becoming more and more complicated. Because of security matters developments it can be said it was expected to happen so. Here in this work we try to point out some functional and vital notes to enhance security on the web, enabling the user to browse safely in unlimited web world and to use virtual space securely.

Keywords: firewalls, security, web services, computer science

Procedia PDF Downloads 374
8579 An Architectural Model for APT Detection

Authors: Nam-Uk Kim, Sung-Hwan Kim, Tai-Myoung Chung

Abstract:

Typical security management systems are not suitable for detecting APT attack, because they cannot draw the big picture from trivial events of security solutions. Although SIEM solutions have security analysis engine for that, their security analysis mechanisms need to be verified in academic field. Although this paper proposes merely an architectural model for APT detection, we will keep studying on correlation analysis mechanism in the future.

Keywords: advanced persistent threat, anomaly detection, data mining

Procedia PDF Downloads 502
8578 The Influence of the Concentration and Temperature on the Rheological Behavior of Carbonyl-Methylcellulose

Authors: Mohamed Rabhi, Kouider Halim Benrahou

Abstract:

The rheological properties of the carbonyl-methylcellulose (CMC), of different concentrations (25000, 50000, 60000, 80000 and 100000 ppm) and different temperatures were studied. We found that the rheological behavior of all CMC solutions presents a pseudo-plastic behavior, it follows the model of Ostwald-de Waele. The objective of this work is the modeling of flow by the CMC Cross model. The Cross model gives us the variation of the viscosity according to the shear rate. This model allowed us to adjust more clearly the rheological characteristics of CMC solutions. A comparison between the Cross model and the model of Ostwald was made. Cross the model fitting parameters were determined by a numerical simulation to make an approach between the experimental curve and those given by the two models. Our study has shown that the model of Cross, describes well the flow of "CMC" for low concentrations.

Keywords: CMC, rheological modeling, Ostwald model, cross model, viscosity

Procedia PDF Downloads 368
8577 Strategies to Synthesize Ambient Stable Ultrathin Ag Film Supported on Oxide Substrate

Authors: Allamula Ashok, Peela Lasya, Daljin Jacob, P. Muhammed Razi, Satyesh Kumar Yadav

Abstract:

We report zinc (Zn) as a seed layer material and a need for a specific disposition sequence to grow ultrathin silver (Ag) films on quartz (SiO₂). Ag films of thickness 4, 6, 8 and 10 nm were deposited by DC magnetron sputtering without and with Zn seed layer thickness of 1, 2 and 4 nm. The effect of Zn seed layer thickness and its annealing on the surface morphology, sheet resistance, and stability of ultrathin Ag films is investigated. We show that by increasing Zn seed layer thickness from 1 to 2 nm, there is a 5-order reduction in sheet resistance of 6 nm Ag films. We find that annealing of the seed layer is crucial to achieving stability of ultrathin Ag films. 6 nm Ag film with 2 nm Zn is unstable to 100 oC annealing, while the 6 nm Ag film with annealed 2 nm Zn seed layer is stable. 2 nm Zn seeded 8 nm Ag film maintained a constant sheet resistance of 7 Ω/□ for all 6 months of exposure to ambient conditions. Among the ultrathin film grown, 8nm Ag film with 2nm Zn seed layer had the best figure of merit with sheet resistance of 7 Ω/□, mean absolute surface roughness (Ra) ~1 nm, and optical transparency of 61 %. Such stable exposed ultrathin Ag films can find applications as catalysts, sensors, and transparent and conductive electrodes for solar cells, LEDs and plasmonic devices.

Keywords: ultrathin Ag films, magnetron sputtering, thermal stability, seed layer, exposed silver, zinc.

Procedia PDF Downloads 16
8576 A Study of the British Security Disembedding Mechanism from a Comparative Political Perspective: Centering on the Bosnia War and the Russian-Ukrainian War

Authors: Yuhong Li, Luyu Mao

Abstract:

Globalization has led to an increasingly interconnected international community and transmitted risks to every corner of the world through the chain of globalization. Security risks arising from international conflicts seem inescapable. Some countries have begun to build their capacity to deal with the globalization of security risks. They establish disembedding security mechanisms that transcend spatial or temporal boundaries and promote security cooperation with countries or regions that are not geographically close. This paper proposes four hypotheses of the phenomenon of "risks and security disembedding" in the post-Cold War international society and uses them to explain The United Kingdom’s behavior in the Bosnian War and the Russo-Ukrainian War. In the Bosnian War, confident in its own security and focused on maintaining European stability, The UK has therefore chosen to be cautious in its use of force in international frameworks such as the EU and to maintain a very limited intervention in Bosnia and Herzegovina's affairs. In contrast, the failure of the EU and NATO’s security mechanism in the Russo-Ukrainian war heightened Britain's anxiety, and the volatile international situation led it to show a strong tendency towards security disembedding, choosing to conclude security communities with extra-territorial states. Analysis suggests that security mechanisms are also the starting point of conflict and that countries will rely more on disembedding mechanisms to counteract the global security risks. The current mechanism of security disembedding occurs as a result of the global proliferation of security perceptions as a symbolic token and the recognition of an expert system of security mechanisms formed by states with similar security perceptions.

Keywords: disembedding mechanism, bosnia war, the russian-ukrainian war, british security strategy

Procedia PDF Downloads 59
8575 Thin-Layer Drying Characteristics and Modelling of Instant Coffee Solution

Authors: Apolinar Picado, Ronald Solís, Rafael Gamero

Abstract:

The thin-layer drying characteristics of instant coffee solution were investigated in a laboratory tunnel dryer. Drying experiments were carried out at three temperatures (80, 100 and 120 °C) and an air velocity of 1.2 m/s. Drying experimental data obtained are fitted to six (6) thin-layer drying models using the non-linear least squares regression analysis. The acceptability of the thin-layer drying model has been based on a value of the correlation coefficient that should be close to one, and low values for root mean square error (RMSE) and chi-square (x²). According to this evaluation, the most suitable model for describing drying process of thin-layer instant coffee solution is the Page model. Further, the effective moisture diffusivity and the activation energy were computed employing the drying experimental data. The effective moisture diffusivity values varied from 1.6133 × 10⁻⁹ to 1.6224 × 10⁻⁹ m²/s over the temperature range studied and the activation energy was estimated to be 162.62 J/mol.

Keywords: activation energy, diffusivity, instant coffee, thin-layer models

Procedia PDF Downloads 235
8574 The Impact of Human Resources Management on the Job Security of Self-Initiated Expatriates after the Brexit

Authors: Yllka Hysaj, Ylberina Hysaj Arifi

Abstract:

Recently, with BREXIT taking place, organizations and employees have been affected in the way of job and employment security. Career-oriented human resources management (HRM) practices are likely to facilitate self-initiated expatriates’ adjustment to the host country. This was related to the career security (job security and employment security), which were missing in their home country and seemed to be important elements to adjust to the host country. The aim of this study is to assess whether the perception of career security by Frances self-initiated expatriates (SIEs) have changed in the wake of the referendum result. Quantitative research method will be used, and the data will be collected through electronic questionnaires. Data will be analyzed through Statistical Package for the Social Sciences (SPSS). The study variables will include an adjustment to the host country, HRM practices, employability, and job security. Predicted results consist that career-oriented HRM practices are positively related to the adjustment to the host country, employability, and job security. However, with Brexit, there might be a negative relationship between career-oriented HRM practices and job security.

Keywords: migration, self-initiated expatriates, Brexit, job security

Procedia PDF Downloads 144
8573 Fabrication and Characterization of PPy/rGO|PPy/ZnO Composite with Varying Zno Concentration as Anode for Fuel Cell Applications

Authors: Bryan D. Llenarizas, Maria Carla F. Manzano

Abstract:

The rapid growth of electricity demand has led to a pursuit of alternative energy sources with high power output and not harmful to the environment. The fuel cell is a device that generates electricity via chemical reactions between the fuel and oxidant. Fuel cells have been known for decades, but the development of high-power output and durability was still one of the drawbacks of this energy source. This study investigates the potential of layer-by-layer composite for fuel cell applications. A two-electrode electrochemical cell was used for the galvanostatic electrochemical deposition method to fabricate a Polypyrrole/rGO|Polypyrrole/ZnO layer-by-layer composite material for fuel cell applications. In the synthesis, the first layer comprised 0.1M pyrrole monomer and 1mg of rGO, while the second layer had 0.1M pyrrole monomer and variations of ZnO concentration ranging from 0.08M up to 0.12M. A constant current density of 8mA/cm² was applied for 1 hour in fabricating each layer. Scanning electron microscopy (SEM) for the fabricated LBL material shows a globular surface with white spots. These white spots are the ZnO particles confirmed by energy-dispersive X-ray spectroscopy, indicating a successful deposition of the second layer onto the first layer. The observed surface morphology was consistent for each variation of ZnO concentrations. AC measurements were conducted to obtain the AC resistance of the fabricated film. Results show a decrease in AC resistance as the concentration of ZnO increases.

Keywords: anode, composite material, electropolymerization, fuel cell, galvanostatic, polypyrrole

Procedia PDF Downloads 48
8572 The Application of the Security Audit Method on the Selected Objects of Critical Infrastructure

Authors: Michaela Vašková

Abstract:

The paper is focused on the application of the security audit method on the selected objects of the critical infrastructure. The emphasis is put on security audit method to find gaps in the critical infrastructure security. The theoretical part describes objects of the critical infrastructure. The practical part describes using the security audit method. The main emphasis was put on the protection of the critical infrastructure in the Czech Republic.

Keywords: crisis management, critical infrastructure, object of critical infrastructure, security audit, extraordinary event

Procedia PDF Downloads 406
8571 Redefining State Security Using Gender: Case Study of the United States of America Post-Cold War

Authors: E. K. Linsenmayer

Abstract:

Traditional international relations theorists define state security, the principal national interest, as a state’s military force. However, many political theorists argue the current definition of security is not comprehensive and therefore, problematic. This paper argues that women’s physical security is not only linked but also necessary to achieve state security. In today’s unipolar political international system, the United States continues to accredit national security to its military. However, in one of the most militarized countries, women remain insecure. Through a case study method of the United States, this paper illuminates a necessary political prescription: the empowerment of women through an inside-out, feminist theoretical approach that makes state security attainable. The research through empirical testing, drawing from several databases, shows the positive effects of women’s physical security on state security. Women’s physical security is defined in terms of equal legal practices, health, education, and female representation in the government. State security is measured by the relative peace of a state, its involvement in conflict and a state’s relations with neighboring states. This paper shows that empowering women, 50% of the world’s population, is necessary for ending the current vicious circle of militarization, war, and insecurity. Without undoing gender power dynamics at the individual and societal level, security at all levels remains unattainable.

Keywords: gender inequality, politics, state security, women's security

Procedia PDF Downloads 184
8570 Secrecy Analysis in Downlink Cellular Networks in the Presence of D2D Pairs and Hardware Impairment

Authors: Mahdi Rahimi, Mohammad Mahdi Mojahedian, Mohammad Reza Aref

Abstract:

In this paper, a cellular communication scenario with a transmitter and an authorized user is considered to analyze its secrecy in the face of eavesdroppers and the interferences propagated unintentionally through the communication network. It is also assumed that some D2D pairs and eavesdroppers are randomly located in the cell. Assuming hardware impairment, perfect connection probability is analytically calculated, and upper bound is provided for the secrecy outage probability. In addition, a method based on random activation of D2Ds is proposed to improve network security. Finally, the analytical results are verified by simulations.

Keywords: physical layer security, stochastic geometry, device-to-device, hardware impairment

Procedia PDF Downloads 152
8569 Effects of Eggs Storage Period and Layer Hen Age on Eggs Hatchability and Weight of Broilers of Breed Ross

Authors: Alipanah Masoud, Sheihkei Iman

Abstract:

One day old chicken quality has great deal of contributions in increasing daily weight gain as well as economical productivity of broilers production. On the other hand, eggs are kept in different times in layer hens flocks and subsequently are transported to incubation units. In order to evaluate effects of two factors layer hen age and storage period of eggs on one day old broilers weight gain during feeding, eggs for layer hen gathered on 32 weeks old (young hen) and 74 weeks old (older ones) were used. Storage period for samples was set as 1 and 9 days. Data were analysed in completely randomized design in four replicates by software SAS. Results indicated that one day old broiler chickens from young had less weight gain, although they exhibited higher weight gain during next weeks. At the same time, there was no difference between chickens from eggs stored for nine days and those from stored for one day.

Keywords: egg, chicken, hatchability, layer

Procedia PDF Downloads 392
8568 A Numerical Study on Electrophoresis of a Soft Particle with Charged Core Coated with Polyelectrolyte Layer

Authors: Partha Sarathi Majee, S. Bhattacharyya

Abstract:

Migration of a core-shell soft particle under the influence of an external electric field in an electrolyte solution is studied numerically. The soft particle is coated with a positively charged polyelectrolyte layer (PEL) and the rigid core is having a uniform surface charge density. The Darcy-Brinkman extended Navier-Stokes equations are solved for the motion of the ionized fluid, the non-linear Nernst-Planck equations for the ion transport and the Poisson equation for the electric potential. A pressure correction based iterative algorithm is adopted for numerical computations. The effects of convection on double layer polarization (DLP) and diffusion dominated counter ions penetration are investigated for a wide range of Debye layer thickness, PEL fixed surface charge density, and permeability of the PEL. Our results show that when the Debye layer is in order of the particle size, the DLP effect is significant and produces a reduction in electrophoretic mobility. However, the double layer polarization effect is negligible for a thin Debye layer or low permeable cases. The point of zero mobility and the existence of mobility reversal depending on the electrolyte concentration are also presented.

Keywords: debye length, double layer polarization, electrophoresis, mobility reversal, soft particle

Procedia PDF Downloads 324
8567 English Title Adaptive Comparison of Outdoor and Indoor Social Security in Damaged Area and New Residential Complex with Two-Way Anova Case Study: Qasr-Al-Dasht and Moalem District in Shiraz

Authors: Homa Parmoon, Narges Hamzeh

Abstract:

Since today's urban spaces are disposed towards behavioral disorders and lack of security, both qualitative and quantitative aspects of security especially social and physical security are considered as basic necessities in urban planning. This research focused on the variable of place of living, examined social security in the old and new textures, and investigated the amount of residents’ social security in Shiraz including safety, financial, emotional and moral security. To this end, two neighborhoods in region 1 of Shiraz- Qasr-Al-Dasht (old texture) and Moalem (new texture)- were examined through a comparative study of 60 samples lived in two neighborhoods. Data were gathered through two-way ANOVA between the variables of residential context and internal and external security. This analysis represents the significance or insignificance of the model as well as the individual effects of each independent variable on the dependent variable. It was tested by ANCOVA and F-test. Research findings indicated place of living has a significant effect on families’ social security. The safety, financial, emotional, and moral security also represented a great impact on social security. As a result, it can be concluded that social security changes with the changing in place of living.

Keywords: social security, damaged area, two-way ANOVA, Shiraz

Procedia PDF Downloads 121
8566 Preparation and Characterization of TiO₂-SiO₂ Composite Films on Plastics Using Aqueous Peroxotitanium Acid Solution

Authors: Ayu Minamizawa, Jae-Ho Kim, Susumu Yonezawa

Abstract:

Aqueous peroxotitanium acid solution was prepared by the reaction between H₂O₂ solution and TiO₂ fluorinated using F₂ gas. The coating of TiO₂/SiO₂ multilayer on the surface of polycarbonate (PC) resin was carried out step by step using the TEOS solution and aqueous peroxotitanium acid solution. We confirmed each formation of SiO₂ and TiO₂ layer by scanning electron microscopy and energy-dispersive X-ray spectroscopy, and x-ray photoelectron spectroscopy results. The formation of a TiO₂ thin layer on SiO₂ coated on polycarbonate (PC) was carried out at 120 ℃ and for 15 min ~ 3 h with aqueous peroxotitanium acid solution using a hydrothermal synthesis autoclave reactor. The morphology TiO₂ coating layer largely depended on the reaction time, as shown in the results of SEM-EDS analysis. Increasing the reaction times, the TiO₂ layer expanded uniformly. Moreover, the surface fluorination of the SiO₂ layer can promote the formation of the TiO₂ layer on the surface.

Keywords: aqueous peroxotitanium acid solution, photocatalytic activity, polycarbonate, surface fluorination

Procedia PDF Downloads 96
8565 Reform of the Law Relating to Personal Property Security

Authors: Ji Lian Yap

Abstract:

This paper will critically consider developments in 2014 in relation to the law relating to security over personal property in Hong Kong. The rules governing the registration of charges under the Hong Kong Companies Ordinance will be examined. Case law relating to personal property security will also be discussed. The transplantation of the floating charge into China’s Property Law will also be considered.

Keywords: personal property, security law, reform of the law, law

Procedia PDF Downloads 402