Search results for: microwave security system
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 19356

Search results for: microwave security system

19236 Information Security Dilemma: Employees' Behaviour on Three-Dimensions to Failure

Authors: Dyana Zainudin, Atta Ur-Rahman, Thaier Hamed

Abstract:

This paper explains about human nature concept as to understand the significance of information security in employees’ mentality including leaders in an organisation. By studying on a theory concept of the latest Von Solms fourth waves, information security governance basically refers to the concept of a set of methods, techniques and tools that responsible for protecting resources of a computer system to ensure service availability, confidentiality and integrity of information. However, today’s information security dilemma relates to the acceptance of employees mentality. The major causes are a lack of communication and commitment. These types of management in an organisation are labelled as immoral/amoral management which effects on information security compliance. A recovery action is taken based on ‘learn a lesson from incident events’ rather than prevention. Therefore, the paper critically analysed the Von Solms fourth waves’ theory with current human events and its correlation by studying secondary data and also from qualitative analysis among employees in public sectors. ‘Three-dimensions to failure’ of information security dilemma are explained as deny, don’t know and don’t care. These three-dimensions are the most common vulnerable behaviour owned by employees. Therefore, by avoiding the three-dimensions to failure may improve the vulnerable behaviour of employees which is often related to immoral/amoral management.

Keywords: information security management system, information security behaviour, information security governance, information security culture

Procedia PDF Downloads 182
19235 Effect of Wind and Humidity on Microwave Links in North West Libya

Authors: M. S. Agha, A. M. Eshahiry, S. A. Aldabbar, Z. M. Alshahri

Abstract:

The propagation of microwave is affected by rain and dust particles causing signal attenuation and de-polarization. Computations of these effects require knowledge of the propagation characteristics of microwave and millimeter wave energy in the climate conditions of the studied region. This paper presents effect of wind and humidity on wireless communication such as microwave links in the North West region of Libya (Al-Khoms). The experimental procedure is done on three selected antennae towers (Nagaza station, Al-Khoms center station, Al-Khoms gateway station) for determining the attenuation loss per unit length and cross-polarization discrimination (XPD) change. Dust particles are collected along the region of the study, to measure the particle size distribution (PSD), calculate the concentration, and chemically analyze the contents, then the dielectric constant can be calculated. The results show that humidity and dust, antenna height and the visibility affect both attenuation and phase shift; in which, a few considerations must be taken into account in the communication power budget.

Keywords: : Attenuation, scattering, transmission loss.

Procedia PDF Downloads 194
19234 A Practice of Zero Trust Architecture in Financial Transactions

Authors: Liwen Wang, Yuting Chen, Tong Wu, Shaolei Hu

Abstract:

In order to enhance the security of critical financial infrastructure, this study carries out a transformation of the architecture of a financial trading terminal to a zero trust architecture (ZTA), constructs an active defense system for cybersecurity, improves the security level of trading services in the Internet environment, enhances the ability to prevent network attacks and unknown risks, and reduces the industry and security risks brought about by cybersecurity risks. This study introduces the SDP technology of ZTA, adapts and applies it to a financial trading terminal to achieve security optimization and fine-grained business grading control. The upgraded architecture of the trading terminal moves security protection forward to the user access layer, replaces VPN to optimize remote access, and significantly improves the security protection capability of Internet transactions. The study achieves 1. deep integration with the access control architecture of the transaction system; 2. no impact on the performance of terminals and gateways, and no perception of application system upgrades; 3. customized checklist and policy configuration; 4. introduction of industry-leading security technology such as single-packet authorization (SPA) and secondary authentication. This study carries out a successful application of ZTA in the field of financial trading and provides transformation ideas for other similar systems while improving the security level of financial transaction services in the Internet environment.

Keywords: zero trust, trading terminal, architecture, network security, cybersecurity

Procedia PDF Downloads 128
19233 Microwave Absorption Properties of Low Density Polyethelene-Cobalt Ferrite Nanocomposite

Authors: Reza Fazaeli, Reza Eslami-Farsani, Hamid Targhagh

Abstract:

Low density polyethylene (LDPE) nanocomposites with 3, 5 and 7 wt. % cobalt ferrite (CoFe2O4) nanopowder fabricated with extrusion mixing and followed up by hot press to reach compact samples. The transmission/reflection measurements were carried out with a network analyzer in the frequency range of 8-12 GHz. By increasing the percent of CoFe2O4 nanopowder, reflection loss (S11) increases, while transferring loss (S21) decreases. Reflectivity (R) calculations made using S11 and S21. Increase in percent of CoFe2O4 nanopowder up to 7 wt. % in composite leaded to higher reflectivity amount, and revealed that increasing the percent of CoFe2O4 nanopowder up to 7 wt. % leads to further microwave absorption in 8-12 GHz range.

Keywords: nanocomposite, cobalt ferrite, low density polyethylene, microwave absorption

Procedia PDF Downloads 258
19232 A Data-Driven Approach for Studying the Washout Effects of Rain on Air Pollution

Authors: N. David, H. O. Gao

Abstract:

Air pollution is a serious environmental threat on a global scale and can cause harm to human health, morbidity and premature mortality. Reliable monitoring and control systems are therefore necessary to develop coping skills against the hazards associated with this phenomenon. However, existing environmental monitoring means often do not provide a sufficient response due to practical and technical limitations. Commercial microwave links that form the infrastructure for transmitting data between cell phone towers can be harnessed to map rain at high tempo-spatial resolution. Rainfall causes a decrease in the signal strength received by these wireless communication links allowing it to be used as a built-in sensor network to map the phenomenon. In this study, we point to the potential that lies in this system to indirectly monitor areas where air pollution is reduced. The relationship between pollutant wash-off and rainfall provides an opportunity to acquire important spatial information about air quality using existing cell-phone tower signals. Since the density of microwave communication networks is high relative to any dedicated sensor arrays, it could be possible to rely on this available observation tool for studying precipitation scavenging on air pollutants, for model needs and more.

Keywords: air pollution, commercial microwave links, rainfall, washout

Procedia PDF Downloads 90
19231 Ultrasound Assisted Extraction and Microwave Assisted Extraction of Carotenoids from Melon Shells

Authors: A. Brinda Lakshmi, J. Lakshmi Priya

Abstract:

Cantaloupes (muskmelon and watermelon) contain biologically active molecules such as carotenoids which are natural pigments used as food colorants and afford health benefits. ß-carotene is the major source of carotenoids present in muskmelon and watermelon shell. Carotenoids were extracted using Microwave assisted extraction (MAE) and Ultrasound assisted extraction (UAE) utilising organic lipophilic solvents such as acetone, methanol, and hexane. Extraction conditions feed-solvent ratio, microwave power, ultrasound frequency, temperature and particle size were varied and optimized. It was found that the yield of carotenoids was higher using UAE than MAE, and muskmelon had the highest yield of carotenoids when was ethanol used as a solvent for 0.5 mm particle size.

Keywords: carotenoids, extraction, muskmelon shell, watermelon shell

Procedia PDF Downloads 239
19230 Energy Conversion for Sewage Sludge by Microwave Heating Pyrolysis and Gasification

Authors: Young Nam Chun, Soo Hyuk Yun, Byeo Ri Jeong

Abstract:

The recent gradual increase in the energy demand is mostly met by fossil fuel, but the research on and development of new alternative energy sources is drawing much attention due to the limited fossil fuel supply and the greenhouse gas problem. Biomass is an eco-friendly renewable energy that can achieve carbon neutrality. The conversion of the biomass sludge wastes discharged from a wastewater treatment plant to clean energy is an important green energy technology in an eco-friendly way. In this NRF study, a new type of microwave thermal treatment was developed to apply the biomass-CCS technology to sludge wastes. For this, the microwave dielectric heating characteristics were examined to investigate the energy conversion mechanism for the combined drying-pyrolysis/gasification of the dewatered wet sludge. The carbon dioxide gasification was tested using the CO2 captured from the pre-combustion capture process. In addition, the results of the pyrolysis and gasification test with the wet sludge were analyzed to compare the microwave energy conversion results with the results of the use of the conventional heating method. Gas was the largest component of the product of both pyrolysis and gasification, followed by sludge char and tar. In pyrolysis, the main components of the producer gas were hydrogen and carbon monoxide, and there were some methane and hydrocarbons. In gasification, however, the amount of carbon monoxide was greater than that of hydrogen. In microwave gasification, a large amount of heavy tar was produced. The largest amount of benzene among light tar was produced in both pyrolysis and gasification. NH3 and HCN which are the precursors of NOx, generated as well. In microwave heating, the sludge char had a smooth surface, like that of glass, and in the conventional heating method with an electric furnace, deep cracks were observed in the sludge char. This indicates that the gas obtained from the microwave pyrolysis and gasification of wet sewage sludge can be used as fuel, but the heavy tar and NOx precursors in the gas must be treated. Sludge char can be used as solid fuel or as a tar reduction adsorbent in the process if necessary. This work supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIP) (No. 2015R1R1A2A2A03003044).

Keywords: microwave heating, pyrolysis gasification, precombustion CCS, sewage sludge, biomass energy

Procedia PDF Downloads 291
19229 Study of White Salted Noodles Air Dehydration Assisted by Microwave as Compared to Conventional Air Dried Process

Authors: Chiun-C. R. Wang, I-Yu Chiu

Abstract:

Drying is the most difficult and critical step to control in the dried salted noodles production. Microwave drying has the specific advantage of rapid and uniform heating due to the penetration of microwaves into the body of the product. Microwave-assisted facility offers a quick and energy saving method during food dehydration as compares to the conventional air-dried method for the noodle preparation. Recently, numerous studies in the rheological characteristics of pasta or spaghetti were carried out with microwave–assisted and conventional air driers and many agricultural products were dried successfully. There is very few research associated with the evaluation of physicochemical characteristics and cooking quality of microwave-assisted air dried salted noodles. The purposes of this study were to compare the difference between conventional air and microwave-assisted air drying method on the physicochemical properties and eating quality of rice bran noodles. Three different microwave power including 0.5 KW, 0.75 KW and 1.0 KW installing with 50℃ hot air were applied for dehydration of rice bran noodles in this study. Three proportion of rice bran ranging in 0-20% were incorporated into salted noodles processing. The appearance, optimum cooking time, cooking yield and losses, textural profiles analysis, and sensory evaluation of rice bran noodles were measured in this study. The results indicated that high power (1.0 KW) microwave facility caused partially burnt and porous on the surface of rice bran noodles. However, no significant difference of noodle was appeared on the surface of noodles between low power (0.5 KW) microwave-assisted salted noodles and control set. The optimum cooking time of noodles was decreased as higher power microwave was applied or higher proportion of rice bran was incorporated in the preparation of salted noodles. The higher proportion of rice bran (20%) or higher power of microwave-assisted dried noodles obtained the higher color intensity and the higher cooking losses as compared with conventional air dried noodles. Meanwhile, the higher power of microwave-assisted air dried noodles indicated the larger air cell inside the noodles and appeared little burnt stripe on the surface of noodles. The firmness of cooked rice bran noodles slightly decreased in the cooked noodles which were dried by high power microwave-assisted method. The shearing force, tensile strength, elasticity and texture profiles of cooked rice noodles decreased with the progress of the proportion of rice bran. The results of sensory evaluation indicated conventional dried noodles obtained the higher springiness, cohesiveness and overall acceptability of cooked noodles than high power (1.0 KW) microwave-assisted dried noodles. However, low power (0.5 KW) microwave-assisted dried noodles showed the comparable sensory attributes and acceptability with conventional dried noodles. Moreover, the sensory attributes including firmness, springiness, cohesiveness decreased, but stickiness increased with the increases of rice bran proportion in the salted noodles. These results inferred that incorporation of lower proportion of rice bran and lower power microwave-assisted dried noodles processing could produce faster cooking time and more acceptable quality of cooked noodles as compared to conventional dried noodles.

Keywords: white salted noodles, microwave-assisted air drying processing, cooking yield, appearance, texture profiles, scanning electrical microscopy, sensory evaluation

Procedia PDF Downloads 464
19228 An Eco-Friendly Preparations of Izonicotinamide Quaternary Salts in Deep Eutectic Solvents

Authors: Dajana Gašo-Sokač, Valentina Bušić

Abstract:

Deep eutectic solvents (DES) are liquids composed of two or three safe, inexpensive components, often interconnected by noncovalent hydrogen bonds which produce eutectic mixture whose melting point is lower than that of each component. No data in literature have been found on the quaternization reaction in DES. The use of DES have several advantages: they are environmentally benign and biodegradable, easy for purification and simple for preparation. An environmentally sustainable method for preparing quaternary salts of izonicotinamide and substituted 2-bromoacetophenones was demonstrated here using choline chloride-based DES. The quaternization reaction was carried out by three synthetic approaches: conventional method, microwave and ultrasonic irradiation. We showed that the highest yields were obtained by the microwave method.

Keywords: deep eutectic solvents, izonicotinamide salts, microwave synthesis, ultrasonic irradiation

Procedia PDF Downloads 107
19227 Preservation of Sensitive Biological Products: An Insight into Conventional and Upcoming Drying Techniques

Authors: Jannika Dombrowski, Sabine Ambros, Ulrich Kulozik

Abstract:

Several drying techniques are used to preserve sensitive substances such as probiotic lactic acid bacteria. With the aim to better understand differences between these processes, this work gives new insights into structural variations resulting from different preservation methods and their impact on product quality and storage stability. Industrially established methods (freeze drying, spray drying) were compared to upcoming vacuum, microwave-freeze, and microwave-vacuum drying. For freeze and microwave-freeze dried samples, survival and activity maintained 100%, whereas vacuum and microwave-vacuum dried cultures achieved 30-40% survival. Spray drying yielded in lowest viability. The results are directly related to temperature and oxygen content during drying. Interestingly, most storage stable products resulted from vacuum and microwave-vacuum drying due to denser product structures as determined by helium pycnometry and SEM images. Further, lower water adsorption velocities were responsible for lower inactivation rates. Concluding, resulting product structures as well as survival rates and storage stability mainly depend on the type of water removal instead of energy input. Microwave energy compared to conductive heating did not lead to significant differences regarding the examined factors. Correlations could be proven for three investigated microbial strains. The presentation will be completed by an overview on the energy efficiency of the presented methods.

Keywords: drying techniques, energy efficiency, lactic acid bacteria, probiotics, survival rates, structure characterization

Procedia PDF Downloads 216
19226 Redefining State Security Using Gender: Case Study of the United States of America Post-Cold War

Authors: E. K. Linsenmayer

Abstract:

Traditional international relations theorists define state security, the principal national interest, as a state’s military force. However, many political theorists argue the current definition of security is not comprehensive and therefore, problematic. This paper argues that women’s physical security is not only linked but also necessary to achieve state security. In today’s unipolar political international system, the United States continues to accredit national security to its military. However, in one of the most militarized countries, women remain insecure. Through a case study method of the United States, this paper illuminates a necessary political prescription: the empowerment of women through an inside-out, feminist theoretical approach that makes state security attainable. The research through empirical testing, drawing from several databases, shows the positive effects of women’s physical security on state security. Women’s physical security is defined in terms of equal legal practices, health, education, and female representation in the government. State security is measured by the relative peace of a state, its involvement in conflict and a state’s relations with neighboring states. This paper shows that empowering women, 50% of the world’s population, is necessary for ending the current vicious circle of militarization, war, and insecurity. Without undoing gender power dynamics at the individual and societal level, security at all levels remains unattainable.

Keywords: gender inequality, politics, state security, women's security

Procedia PDF Downloads 183
19225 Microwave Dielectric Relaxation Study of Diethanolamine with Triethanolamine from 10 MHz-20 GHz

Authors: A. V. Patil

Abstract:

The microwave dielectric relaxation study of diethanolamine with triethanolamine binary mixture have been determined over the frequency range of 10 MHz to 20 GHz, at various temperatures using time domain reflectometry (TDR) method for 11 concentrations of the system. The present work reveals molecular interaction between same multi-functional groups [−OH and –NH2] of the alkanolamines (diethanolamine and triethanolamine) using different models such as Debye model, Excess model, and Kirkwood model. The dielectric parameters viz. static dielectric constant (ε0) and relaxation time (τ) have been obtained with Debye equation characterized by a single relaxation time without relaxation time distribution by the least squares fit method.

Keywords: diethanolamine, excess properties, kirkwood properties, time domain reflectometry, triethanolamine

Procedia PDF Downloads 274
19224 Green Chemical Processing in the Teaching Laboratory: A Convenient Solvent Free Microwave Extraction of Natural Products

Authors: Mohamed Amine Ferhat, Mohamed Nadjib Bouhatem, Farid Chemat

Abstract:

One of the principal aims of sustainable and green processing development remains the dissemination and teaching of green chemistry to both developed and developing nations. This paper describes one attempt to show that “north-south” collaborations yield innovative sustainable and green technologies which give major benefits for both nations. In this paper we present early results from a solvent free microwave extraction (SFME) of essential oils using fresh orange peel, a byproduct in the production of orange juice. SFME is performed at atmospheric pressure without added any solvent or water. SFME increases essential oil yield and eliminate wastewater treatment. The procedure is appropriate for the teaching laboratory, and allows the students to learn extraction, chromatographic and spectroscopic analysis skills, and are expose to dramatic visual example of rapid, sustainable and green extraction of essential oil, and are introduced to commercially successful sustainable and green chemical processing with microwave energy.

Keywords: essential oil, extraction, green processing, microwave

Procedia PDF Downloads 514
19223 Towards A New Maturity Model for Information System

Authors: Ossama Matrane

Abstract:

Information System has become a strategic lever for enterprises. It contributes effectively to align business processes on strategies of enterprises. It is regarded as an increase in productivity and effectiveness. So, many organizations are currently involved in implementing sustainable Information System. And, a large number of studies have been conducted the last decade in order to define the success factors of information system. Thus, many studies on maturity model have been carried out. Some of this study is referred to the maturity model of Information System. In this article, we report on development of maturity models specifically designed for information system. This model is built based on three components derived from Maturity Model for Information Security Management, OPM3 for Project Management Maturity Model and processes of COBIT for IT governance. Thus, our proposed model defines three maturity stages for corporate a strong Information System to support objectives of organizations. It provides a very practical structure with which to assess and improve Information System Implementation.

Keywords: information system, maturity models, information security management, OPM3, IT governance

Procedia PDF Downloads 419
19222 Human Development as an Integral Part of Human Security within the Responsibility to Rebuild

Authors: Themistoklis Tzimas

Abstract:

The proposed paper focuses on a triangular relationship, between human security, human development and responsibility to rebuild. This relationship constitutes the innovative contribution to the debate about human security. Human security constitutes a generic and legally binding notion, which orientates from an integrated approach the UN Charter principles and of the collective security system. Such an approach brings at the forefront of international law and of international relations not only states but non- state actors as well. Several doctrines attempt to implement the fore-mentioned approach among which the Responsibility to Protect- hereinafter R2P- doctrine and its aspect of Responsibility to Rebuild- hereinafter R2R. In this sense, R2P in general and R2R are supposed to be guided by human security imperatives. Human security because of its human- centered approach encompasses as an integral part of it, human development. Human development constitutes part of the backbone of human security, since it deals with the social and economic root- causes of the threats, which human security attempts to confront. In this sense, doctrines which orientate from human security, such as R2P and its R2R aspect should also take into account human development imperatives, in order to improve their efficiency. On the contrary though, R2R is more often linked with market- orientated policies, which are often imposed under transitional authorities, regardless of local needs. The implementation of such policies can be identified as a cause for striking failures in the framework of R2R. In addition it is a misinterpretation of the essence of human security and subsequently of R2P as well. The findings of the article, on the basis of the fore-mentioned argument is that a change must take place from a market- orientated misinterpretation of R2R to an approach attempting to implement human development doctrines, since the latter lie at the heart of human security and can be proven more effective in dealing with the root- causes of conflicts. Methodologically, the article begins with an examination of human security and of its binding nature on the basis of its orientation from the UN Charter. It also examines its significance in the framework of the collective security system. Then, follows the analysis of why and how human development constitutes an integral part of human security. At the next part it is proven that R2P in general and R2R more specifically constitute or should constitute an attempt to implement human security doctrines within the collective security system. Having built this triangular relationship it is argued that human development is proven to be the most suitable notion, so that the spirit of human security and the scopes of R2P are successfully implemented.

Keywords: human security, un charter, responsibility to protect, responsibility to rebuild, human development

Procedia PDF Downloads 255
19221 A Study of the British Security Disembedding Mechanism from a Comparative Political Perspective: Centering on the Bosnia War and the Russian-Ukrainian War

Authors: Yuhong Li, Luyu Mao

Abstract:

Globalization has led to an increasingly interconnected international community and transmitted risks to every corner of the world through the chain of globalization. Security risks arising from international conflicts seem inescapable. Some countries have begun to build their capacity to deal with the globalization of security risks. They establish disembedding security mechanisms that transcend spatial or temporal boundaries and promote security cooperation with countries or regions that are not geographically close. This paper proposes four hypotheses of the phenomenon of "risks and security disembedding" in the post-Cold War international society and uses them to explain The United Kingdom’s behavior in the Bosnian War and the Russo-Ukrainian War. In the Bosnian War, confident in its own security and focused on maintaining European stability, The UK has therefore chosen to be cautious in its use of force in international frameworks such as the EU and to maintain a very limited intervention in Bosnia and Herzegovina's affairs. In contrast, the failure of the EU and NATO’s security mechanism in the Russo-Ukrainian war heightened Britain's anxiety, and the volatile international situation led it to show a strong tendency towards security disembedding, choosing to conclude security communities with extra-territorial states. Analysis suggests that security mechanisms are also the starting point of conflict and that countries will rely more on disembedding mechanisms to counteract the global security risks. The current mechanism of security disembedding occurs as a result of the global proliferation of security perceptions as a symbolic token and the recognition of an expert system of security mechanisms formed by states with similar security perceptions.

Keywords: disembedding mechanism, bosnia war, the russian-ukrainian war, british security strategy

Procedia PDF Downloads 56
19220 Breast Cancer Sensing and Imaging Utilized Printed Ultra Wide Band Spherical Sensor Array

Authors: Elyas Palantei, Dewiani, Farid Armin, Ardiansyah

Abstract:

High precision of printed microwave sensor utilized for sensing and monitoring the potential breast cancer existed in women breast tissue was optimally computed. The single element of UWB printed sensor that successfully modeled through several numerical optimizations was multiple fabricated and incorporated with woman bra to form the spherical sensors array. One sample of UWB microwave sensor obtained through the numerical computation and optimization was chosen to be fabricated. In overall, the spherical sensors array consists of twelve stair patch structures, and each element was individually measured to characterize its electrical properties, especially the return loss parameter. The comparison of S11 profiles of all UWB sensor elements is discussed. The constructed UWB sensor is well verified using HFSS programming, CST programming, and experimental measurement. Numerically, both HFSS and CST confirmed the potential operation bandwidth of UWB sensor is more or less 4.5 GHz. However, the measured bandwidth provided is about 1.2 GHz due to the technical difficulties existed during the manufacturing step. The configuration of UWB microwave sensing and monitoring system implemented consists of 12 element UWB printed sensors, vector network analyzer (VNA) to perform as the transceiver and signal processing part, the PC Desktop/Laptop acting as the image processing and displaying unit. In practice, all the reflected power collected from whole surface of artificial breast model are grouped into several numbers of pixel color classes positioned on the corresponding row and column (pixel number). The total number of power pixels applied in 2D-imaging process was specified to 100 pixels (or the power distribution pixels dimension 10x10). This was determined by considering the total area of breast phantom of average Asian women breast size and synchronizing with the single UWB sensor physical dimension. The interesting microwave imaging results were plotted and together with some technical problems arisen on developing the breast sensing and monitoring system are examined in the paper.

Keywords: UWB sensor, UWB microwave imaging, spherical array, breast cancer monitoring, 2D-medical imaging

Procedia PDF Downloads 168
19219 Microwave Transmission through Metamaterial Based on Permalloy Flakes under Magnetic Resonance and Antiresonance Conditions

Authors: Anatoly B. Rinkevich, Eugeny A. Kuznetsov, Yuri I. Ryabkov

Abstract:

Transmission of electromagnetic waves through a plate of metamaterial based on permalloy flakes and reflection from the plate is investigated. The metamaterial is prepared of permalloy flakes sized from few to 50μ placed into epoxy-amine matrix. Two series of metamaterial samples are under study with the volume portion of permalloy particles 15% and 30%. There is no direct electrical contact between permalloy particles. Microwave measurements have been carried out at frequencies of 12 to 30 GHz in magnetic fields up to 12 kOe. Sharp decrease of transmitted wave is observed under ferromagnetic resonance condition caused by absorption. Under magnetic antiresonance condition, in opposite, maximum of reflection coefficient is observed at frequencies exceeding 30 GHz. For example, for metamaterial sample with the volume portion of permalloy of 30%, the variation of reflection coefficient in magnetic field reaches 300%. These high variations are of interest to develop magnetic field driven microwave devices. Magnetic field variations of refractive index are also estimated.

Keywords: ferromagnetic resonance, magnetic antiresonance, microwave metamaterials, permalloy flakes, transmission and reflection coefficients

Procedia PDF Downloads 122
19218 Securing Web Servers by the Intrusion Detection System (IDS)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security. We present in this paper different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection) for securing web servers and applications by the Intrusion Detection System (IDS).

Keywords: intrusion detection, architectures, characteristic, tools, security, web server

Procedia PDF Downloads 389
19217 Modification of Polymer Composite Based on Electromagnetic Radiation

Authors: Ananta R. Adhikari

Abstract:

In today's era, polymer composite utilization has witnessed a significant increase across various fronts of material science advancement. Despite the development of many highly sophisticated technologies aimed at modifying polymer composites, there persists a quest for a technology that is straightforward, energy-efficient, easily controllable, cost-effective, time-saving, and environmentally friendly. Microwave technology has emerged as a major technique in material synthesis and modification due to its unique characteristics such as rapid, selective, uniform heating, and, particularly, direct heating based on molecular interaction. This study will be about the utilization of microwave energy as an alternative technique for material processing. Specifically, we will explore ongoing research conducted in our laboratory, focusing on its applications in the medical field.

Keywords: polymer composites, material processing, microstructure, microwave radiation

Procedia PDF Downloads 19
19216 A Novel Unconditionally Secure and Lightweight Bipartite Key Agreement Protocol

Authors: Jun Liu

Abstract:

This paper introduces a new bipartite key agreement (2PKA) protocol which provides unconditionally security and lightweight. The unconditional security is stemmed from the known impossibility of distinguishing a particular solution from all possible solutions of an underdetermined system of equations. The indistinguishability prevents an adversary from inferring to the common secret-key even with the access to an unlimited amount of computing capability. This new 2PKA protocol is also lightweight because that the calculation of a common secret-key only makes use of simple modular arithmetic. This information-theoretic 2PKA scheme provides the desired features of Key Confirmation (KC), Session Key (SK) security, Know-Key (KK) security, protection of individual privacy, and uniformly distributed value of a common key under prime modulus.

Keywords: bipartite key agreement, information-theoretic cryptography, perfect security, lightweight

Procedia PDF Downloads 33
19215 Multi-Band Frequency Conversion Scheme with Multi-Phase Shift Based on Optical Frequency Comb

Authors: Tao Lin, Shanghong Zhao, Yufu Yin, Zihang Zhu, Wei Jiang, Xuan Li, Qiurong Zheng

Abstract:

A simple operated, stable and compact multi-band frequency conversion and multi-phase shift is proposed to satisfy the demands of multi-band communication and radar phase array system. The dual polarization quadrature phase shift keying (DP-QPSK) modulator is employed to support the LO sideband and the optical frequency comb simultaneously. Meanwhile, the fiber is also used to introduce different phase shifts to different sidebands. The simulation result shows that by controlling the DC bias voltages and a C band microwave signal with frequency of 4.5 GHz can be simultaneously converted into other signals that cover from C band to K band with multiple phases. It also verifies that the multi-band and multi-phase frequency conversion system can be stably performed based on current manufacturing art and can well cope with the DC drifting. It should be noted that the phase shift of the converted signal also partly depends of the length of the optical fiber.

Keywords: microwave photonics, multi-band frequency conversion, multi-phase shift, conversion efficiency

Procedia PDF Downloads 225
19214 Effect of Laminating Sequence of MWCNTs and Fe₂O₃ Filled Nanocomposites on Emi Shielding Effectiveness

Authors: Javeria Ahmad, Ayesha Maryam, Zahid Rizwan, Nadeem Nasir, Yasir Nawab, Hafiz Shehbaz Ahmad

Abstract:

Mitigation of electromagnetic interference (EMI) through thin, lightweight, and cost-effective materials is critical for electronic appliances as well as human health. The present research work discusses the design of composites that are suitable to minimize EMI through various stacking sequences. The carbon fibers reinforced composite structures impregnated with dielectric (MWCNTs) and magnetic nanofillers (Fe₂O₃) were developed to investigate their microwave absorption properties. The composite structure comprising a single type of nanofillers, each of MWCNTs & Fe₂O₃, was developed, and then their layers were stacked over each other with various stacking sequences to investigate the best stacking sequence, which presents good microwave absorption characteristics. A vector network analyzer (VNA) was used to analyze the microwave absorption properties of these developed composite structures. The composite structures impregnated with the layers of a dielectric nanofiller and sandwiched between the layers of a magnetic nanofiller show the highest EMI shielding value of 59 dB and a dielectric conductivity of 35 S/cm in the frequency range of 0.1 to 13.6 GHz. The results also demonstrate that the microwave absorption properties of the developed composite structures were dominant over reflection properties. The absence of an external peak in X-ray diffraction (XRD), marked the purity of the added nanofillers.

Keywords: nanocomposites, microwave absorption, EMI shielding, skin depth, reflection loss

Procedia PDF Downloads 27
19213 Enhancing Internet of Things Security: A Blockchain-Based Approach for Preventing Spoofing Attacks

Authors: Salha Abdullah Ali Al-Shamrani, Maha Muhammad Dhaher Aljuhani, Eman Ali Ahmed Aldhaheri

Abstract:

With the proliferation of Internet of Things (IoT) devices in various industries, there has been a concurrent rise in security vulnerabilities, particularly spoofing attacks. This study explores the potential of blockchain technology in enhancing the security of IoT systems and mitigating these attacks. Blockchain's decentralized and immutable ledger offers significant promise for improving data integrity, transaction transparency, and tamper-proofing. This research develops and implements a blockchain-based IoT architecture and a reference network to simulate real-world scenarios and evaluate a blockchain-integrated intrusion detection system. Performance measures including time delay, security, and resource utilization are used to assess the system's effectiveness, comparing it to conventional IoT networks without blockchain. The results provide valuable insights into the practicality and efficacy of employing blockchain as a security mechanism, shedding light on the trade-offs between speed and security in blockchain deployment for IoT. The study concludes that despite minor increases in time consumption, the security benefits of incorporating blockchain technology into IoT systems outweigh potential drawbacks, demonstrating a significant potential for blockchain in bolstering IoT security.

Keywords: internet of things, spoofing, IoT, access control, blockchain, raspberry pi

Procedia PDF Downloads 39
19212 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 151
19211 Enhancing Metaverse Security: A Multi-Factor Authentication Scheme

Authors: R. Chinnaiyaprabhu, S. Bharanidharan, V. Dharsana, Rajalavanya

Abstract:

The concept of the Metaverse represents a potential evolution in the realm of cyberspace. In the early stages of Web 2.0, we observed a proliferation of online pseudonyms or 'nyms,' which increased the prevalence of fake accounts and made it challenging to establish unique online identities for various roles. However, in the era of Web 3.0, particularly in the context of the Metaverse, an individual's digital identity is intrinsically linked to their real-world identity. Consequently, actions taken in the Metaverse can carry significant consequences in the physical world. In light of these considerations, we propose the development of an innovative authentication system known as 'Metasec.' This system is designed to enhance security for digital assets, online identities, avatars, and user accounts within the Metaverse. Notably, Metasec operates as a password less authentication solution, relying on a multifaceted approach to security, encompassing device attestation, facial recognition, and pattern-based security keys.

Keywords: metaverse, multifactor authentication, security, facial recognition, patten password

Procedia PDF Downloads 39
19210 Protein Stabilized Foam Structures as Protective Carrier Systems during Microwave Drying of Probiotics

Authors: Jannika Dombrowski, Sabine Ambros, Ulrich Kulozik

Abstract:

Due to the increasing popularity of healthy products, probiotics are still of rising importance in food manufacturing. With the aim to amplify the field of probiotic application to non-chilled products, the cultures have to be preserved by drying. Microwave drying has proved to be a suitable technique to achieve relatively high survival rates, resulting from drying at gentle temperatures, among others. However, diffusion limitation due to compaction of cell suspension during drying can prolong drying times as well as deteriorate product properties (grindability, rehydration performance). Therefore, we aimed to embed probiotics in an aerated matrix of whey proteins (surfactants) and di-/polysaccharides (foam stabilization, probiotic protection) during drying. As a result of the manifold increased inner surface of the cell suspension, drying performance was enhanced significantly as compared to non-foamed suspensions. This work comprises investigations on suitable foam matrices, being stable under vacuum (variation of protein concentration, type and concentration of di-/polysaccharide) as well as development of an applicable microwave drying process in terms of microwave power, chamber pressure and maximum product temperatures. Performed analyses included foam characteristics (overrun, drainage, firmness, bubble sizes), and properties of the dried cultures (survival, activity). In addition, efficiency of the drying process was evaluated.

Keywords: foam structure, microwave drying, polysaccharides, probiotics

Procedia PDF Downloads 238
19209 A Secure Digital Signature Scheme with Fault Tolerance Based on the Improved RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. In this paper, we propose a secure and efficient digital signature scheme with fault tolerance based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains three prime numbers and overcome several attacks possible on RSA. By using the Chinese Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption side and it provides high security also.

Keywords: digital signature, fault tolerance, RSA, security analysis

Procedia PDF Downloads 452
19208 Production of Hydrophilic PVC Surfaces with Microwave Treatment for its Separation from Mixed Plastics by Froth Floatation

Authors: Srinivasa Reddy Mallampati, Chi-Hyeon Lee, Nguyen Thanh Truc, Byeong-Kyu Lee

Abstract:

Organic polymeric materials (plastics) are widely used in our daily life and various industrial fields. The separation of waste plastics is important for its feedstock and mechanical recycling. One of the major problems in incineration for thermal recycling or heat melting for material recycling is the polyvinyl chloride (PVC) contained in waste plastics. This is due to the production of hydrogen chloride, chlorine gas, dioxins, and furans originated from PVC. Therefore, the separation of PVC from waste plastics is necessary before recycling. The separation of heavy polymers (PVC 1.42, PMMA 1.12, PC 1.22 and PET 1.27 g/cm3 ) from light ones (PE and PP 0.99 g/cm3) can be achieved on the basis of their density. However it is difficult to separate PVC from other heavy polymers basis of density. There are no simple and inexpensive techniques to separate PVC from others. If hydrophobic the PVC surface is selectively changed into hydrophilic, where other polymers still have hydrophobic surface, flotation process can separate PVC from others. In the present study, the selective surface hydrophilization of polyvinyl chloride (PVC) by microwave treatment after alkaline/acid washing and with activated carbon was studied as the pre-treatment of its separation by the following froth flotation. In presence of activated carbon as absorbent, the microwave treatment could selectively increase the hydrophilicity of the PVC surface (i.e. PVC contact angle decreased about 19o) among other plastics mixture. At this stage, 100% PVC separation from other plastics could be achieved by the combination of the pre- microwave treatment with activated carbon and the following froth floatation. The hydrophilization of PVC by surface analysis would be due to the hydrophilic groups produced by microwave treatment with activated carbon. The effect of optimum condition and detailed mechanism onto separation efficiency in the froth floatation was also investigated.

Keywords: Hydrophilic, PVC, contact angle, additive, microwave, froth floatation, waste plastics

Procedia PDF Downloads 601
19207 Modified RSA in Mobile Communication

Authors: Nagaratna Rajur, J. D. Mallapur, Y. B. Kirankumar

Abstract:

The security in mobile communication is very different from the internet or telecommunication, because of its poor user interface and limited processing capacity, as well as combination of complex network protocols. Hence, it poses a challenge for less memory usage and low computation speed based security system. Security involves all the activities that are undertaken to protect the value and on-going usability of assets and the integrity and continuity of operations. An effective network security strategies requires identifying threats and then choosing the most effective set of tools to combat them. Cryptography is a simple and efficient way to provide security in communication. RSA is an asymmetric key approach that is highly reliable and widely used in internet communication. However, it has not been efficiently implemented in mobile communication due its computational complexity and large memory utilization. The proposed algorithm modifies the current RSA to be useful in mobile communication by reducing its computational complexity and memory utilization.

Keywords: M-RSA, sensor networks, sensor applications, security

Procedia PDF Downloads 321