Search results for: cross layer security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8791

Search results for: cross layer security

8641 From Plate to Self-Perception: Unravelling the Interplay Between Food Security and Self-Esteem Among Malaysian University Students

Authors: Amiraa Ali Mansor, Haslinda Abdullah, Angela Chan Nguk Fong, Norhaida Hanim Binti Ahmad Tajudin, Asnarulkhadi Abu Samah

Abstract:

Obesity has risen sharply over the past three decades, posing a grave public health concern globally. In Malaysia, it has also emerged as a significant health threat. While the second Sustainable Development Goal, "Zero Hunger", aims to ensure equitable access to nutritious food for all, a key challenge lies in addressing food insecurity. Food insecurity not only pertains to the quantity but also the quality of food, with both dimensions playing a pivotal role in health outcomes. To date, much of the research on food security has focused on household levels. There remains a research gap concerning university students, a population transitioning to independence from parental support and grappling with limited resources. This study seeks to bridge this gap by extending the Food Security Theory to incorporate the psychological dimension of self-esteem. Using a quantitative approach, data was collected from 452 public university students in Malaysia through a cross-sectional research design and a multi-stage cluster sampling technique. The anticipated findings will provide novel insights by linking food security with self-esteem. Such insights have implications for healthcare policy and the framing of preventive strategies against obesity. It is hoped that this research will not only contribute to the academic discourse on Food Security Theory but also serve as a foundation for refining national health policies and programs aimed at fostering a healthier lifestyle.

Keywords: obesity, food security, body image, self-esteem

Procedia PDF Downloads 63
8640 Resource Allocation Modeling and Simulation in Border Security Application

Authors: Kai Jin, Hua Li, Qing Song

Abstract:

Homeland security and border safety is an issue for any country. This paper takes the border security of US as an example to discuss the usage and efficiency of simulation tools in the homeland security application. In this study, available resources and different illegal infiltration parameters are defined, including their individual behavior and objective, in order to develop a model that describes border patrol system. A simulation model is created in Arena. This simulation model is used to study the dynamic activities in the border security. Possible factors that may affect the effectiveness of the border patrol system are proposed. Individual and factorial analysis of these factors is conducted and some suggestions are made.

Keywords: resource optimization, simulation, modeling, border security

Procedia PDF Downloads 503
8639 A Numerical Study on Electrophoresis of a Soft Particle with Charged Core Coated with Polyelectrolyte Layer

Authors: Partha Sarathi Majee, S. Bhattacharyya

Abstract:

Migration of a core-shell soft particle under the influence of an external electric field in an electrolyte solution is studied numerically. The soft particle is coated with a positively charged polyelectrolyte layer (PEL) and the rigid core is having a uniform surface charge density. The Darcy-Brinkman extended Navier-Stokes equations are solved for the motion of the ionized fluid, the non-linear Nernst-Planck equations for the ion transport and the Poisson equation for the electric potential. A pressure correction based iterative algorithm is adopted for numerical computations. The effects of convection on double layer polarization (DLP) and diffusion dominated counter ions penetration are investigated for a wide range of Debye layer thickness, PEL fixed surface charge density, and permeability of the PEL. Our results show that when the Debye layer is in order of the particle size, the DLP effect is significant and produces a reduction in electrophoretic mobility. However, the double layer polarization effect is negligible for a thin Debye layer or low permeable cases. The point of zero mobility and the existence of mobility reversal depending on the electrolyte concentration are also presented.

Keywords: debye length, double layer polarization, electrophoresis, mobility reversal, soft particle

Procedia PDF Downloads 336
8638 Preparation and Characterization of TiO₂-SiO₂ Composite Films on Plastics Using Aqueous Peroxotitanium Acid Solution

Authors: Ayu Minamizawa, Jae-Ho Kim, Susumu Yonezawa

Abstract:

Aqueous peroxotitanium acid solution was prepared by the reaction between H₂O₂ solution and TiO₂ fluorinated using F₂ gas. The coating of TiO₂/SiO₂ multilayer on the surface of polycarbonate (PC) resin was carried out step by step using the TEOS solution and aqueous peroxotitanium acid solution. We confirmed each formation of SiO₂ and TiO₂ layer by scanning electron microscopy and energy-dispersive X-ray spectroscopy, and x-ray photoelectron spectroscopy results. The formation of a TiO₂ thin layer on SiO₂ coated on polycarbonate (PC) was carried out at 120 ℃ and for 15 min ~ 3 h with aqueous peroxotitanium acid solution using a hydrothermal synthesis autoclave reactor. The morphology TiO₂ coating layer largely depended on the reaction time, as shown in the results of SEM-EDS analysis. Increasing the reaction times, the TiO₂ layer expanded uniformly. Moreover, the surface fluorination of the SiO₂ layer can promote the formation of the TiO₂ layer on the surface.

Keywords: aqueous peroxotitanium acid solution, photocatalytic activity, polycarbonate, surface fluorination

Procedia PDF Downloads 104
8637 Nonlinear Waves in Two-Layer Systems with Heat Release/Consumption at the Interface

Authors: Ilya Simanovskii

Abstract:

Nonlinear convective flows developed under the joint action of buoyant and thermo-capillary effects in a two-layer system with periodic boundary conditions on the lateral walls have been investigated. The influence of an interfacial heat release on oscillatory regimes has been studied. The computational regions with different lengths have been considered. It is shown that the development of oscillatory instability can lead to the appearance of different no steady flows.

Keywords: interface, instabilities, two-layer systems, bioinformatics, biomedicine

Procedia PDF Downloads 394
8636 SeCloudBPMN: A Lightweight Extension for BPMN Considering Security Threats in the Cloud

Authors: Somayeh Sobati Moghadam

Abstract:

Business processes are crucial for organizations and help businesses to evaluate and optimize their performance and processes against current and future-state business goals. Outsourcing business processes to the cloud becomes popular due to a wide varsity of benefits and cost-saving. However, cloud outsourcing raises enterprise data security concerns, which must be incorporated in Business Process Model and Notation (BPMN). This paper, presents SeCloudBPMN, a lightweight extension for BPMN which extends the BPMN to explicitly support the security threats in the cloud as an outsourcing environment. SeCloudBPMN helps business’s security experts to outsource business processes to the cloud considering different threats from inside and outside the cloud. In this way, appropriate security countermeasures could be considered to preserve data security in business processes outsourcing to the cloud.

Keywords: BPMN, security threats, cloud computing, business processes outsourcing, privacy

Procedia PDF Downloads 257
8635 Electrospun Alginate Nanofibers Containing Spirulina Extract Double-Layered with Polycaprolactone Nanofibers

Authors: Seon Yeong Byeon, Hwa Sung Shin

Abstract:

Nanofibrous sheets are of interest in the beauty industries due to the properties of moisturizing, adhesion to skin and delivery of nutrient materials. The benefit and function of the cosmetic products should not be considered without safety thus a non-toxic manufacturing process is ideal when fabricating the products. In this study, we have developed cosmetic patches consisting of alginate and Spirulina extract, a marine resource which has antibacterial and antioxidant effects, without addition of harmful cross-linkers. The patches obtained their structural stabilities by layer-upon-layer electrospinning of an alginate layer on a formerly spread polycaprolactone (PCL) layer instead of crosslinking method. The morphological characteristics, release of Spirulina extract, water absorption, skin adhesiveness and cytotoxicity of the double-layered patches were assessed. The image of scanning electron microscopy (SEM) showed that the addition of Spirulina extract has made the fiber diameter of alginate layers thinner. Impregnation of Spirulina extract increased their hydrophilicity, moisture absorption ability and skin adhesive ability. In addition, wetting the pre-dried patches resulted in releasing the Spirulina extract within 30 min. The patches were detected to have no cytotoxicity in the human keratinocyte cell-based MTT assay, but rather showed increased cell viability. All the results indicate the bioactive and hydro-adhesive double-layered patches have an excellent applicability to bioproducts for personal skin care in the trend of ‘A mask pack a day’.

Keywords: alginate, cosmetic patch, electrospun nanofiber, polycaprolactone, Spirulina extract

Procedia PDF Downloads 337
8634 Psychological Security and Its Relationship with Self-Esteem among Adolescent with Mild Intellectual Disability

Authors: Muneera Abdul Haleem Bukhari, Maryam I. Alshirawi, Elsayed S. Elkhamisi

Abstract:

This study aimed at understanding the relationship between psychological security and self-esteem among Adolescent with Mild Intellectual Disability, exploring the levels of psychological security and self-esteem, as well as determining the differences between genders in psychological security and self-esteem. The sample of the study contained (60) Adolescent with Mild Intellectual Disability, (34) males and (26) females who are enrolled in the Vocational and Social Rehabilitation Center and Hope Institute in the Kingdom of Bahrain. Their ages are between (15-23) years old. The Psychological Security Scale and self-Esteem Scale (prepared by James Battle) were used by the researcher. Results showed that levels of psychological security and self-esteem among Adolescents with Mild Intellectual Disability was above average; results also showed the order of the psychological security dimensions in the following manner (future outlook – mood - family security – social security) and the order of the dimensions of self-esteem in the following manner (social self-esteem – personal self-esteem – general self-esteem) among Adolescent with Mild Intellectual Disability; as for the differences between genders, the study showed that there was an increased level of psychological security among males. However, there was no difference in self-esteem between both sexes.

Keywords: psychological security, self-esteem, adolescent, intellectual disability, the Kingdom of Bahrain

Procedia PDF Downloads 381
8633 Multi-Band, Polarization Insensitive, Wide Angle Receptive Metamaterial Absorber for Microwave Applications

Authors: Lincy Stephen, N. Yogesh, G. Vasantharajan, V. Subramanian

Abstract:

This paper presents the design and simulation of a five band metamaterial absorber at microwave frequencies. The absorber unit cell consists of squares and strips arranged as the top layer and a metallic ground plane as the bottom layer on a dielectric substrate. Simulation results show five near perfect absorption bands at 3.15 GHz, 7.15 GHz, 11.12 GHz, 13.87 GHz, and 16.85 GHz with absorption magnitudes 99.68%, 99.05%, 96.98%, 98.36% and 99.44% respectively. Further, the proposed absorber exhibits polarization insensitivity and wide angle receptivity. The surface current analysis is presented to explain the mechanism of absorption in the structure. With these preferable features, the proposed absorber can be excellent choice for potential applications such as electromagnetic interference (EMI) shielding, radar cross section reduction.

Keywords: electromagnetic absorber, metamaterial, multi- band, polarization insensitive, wide angle receptive

Procedia PDF Downloads 331
8632 Mitigation of Interference in Satellite Communications Systems via a Cross-Layer Coding Technique

Authors: Mario A. Blanco, Nicholas Burkhardt

Abstract:

An important problem in satellite communication systems which operate in the Ka and EHF frequency bands consists of the overall degradation in link performance of mobile terminals due to various types of degradations in the link/channel, such as fading, blockage of the link to the satellite (especially in urban environments), intentional as well as other types of interference, etc. In this paper, we focus primarily on the interference problem, and we develop a very efficient and cost-effective solution based on the use of fountain codes. We first introduce a satellite communications (SATCOM) terminal uplink interference channel model that is classically used against communication systems that use spread-spectrum waveforms. We then consider the use of fountain codes, with focus on Raptor codes, as our main mitigation technique to combat the degradation in link/receiver performance due to the interference signal. The performance of the receiver is obtained in terms of average probability of bit and message error rate as a function of bit energy-to-noise density ratio, Eb/N0, and other parameters of interest, via a combination of analysis and computer simulations, and we show that the use of fountain codes is extremely effective in overcoming the effects of intentional interference on the performance of the receiver and associated communication links. We then show this technique can be extended to mitigate other types of SATCOM channel degradations, such as those caused by channel fading, shadowing, and hard-blockage of the uplink signal.

Keywords: SATCOM, interference mitigation, fountain codes, turbo codes, cross-layer

Procedia PDF Downloads 349
8631 Personal Variables and Students’ Perception of School Security in Secondary Schools in Calabar Municipality, Cross River State, Nigeria

Authors: James Bassey Ejue, Dorn Cklaimz Enamhe, Helen Francis Ejue

Abstract:

The study examined the influence of personal variables such as sex, type of school, and parental socio-economic status on secondary school students’ perception of school security. To guide the study, three null hypotheses were formulated. The research design adopted was the survey design, and a 20-item instrument was constructed and validated by the researchers through a test-retest procedure. The sample size for the study comprised 2,198 students made up of male and female students selected through a stratified random sampling technique. This was drawn from a study population of 21,988, made up of 12,635 students and 9353 students from public and private secondary schools, respectively. Data were analyzed using an independent t-test statistical tool. The findings showed that female students were more fearful in their perception of school security; the students in private schools perceived school to be more insecure than those in public schools; and the students from high parental socio-economic status are more associated with the perception of school as insecure than the ones from low parental socio-economic status. Based on these findings, it was recommended that, among others, more reassuring measures be put in place to check school security for females, for those in private schools, and for those from high parental socio-economic status. School counsellors should also be guided accordingly in designing intervention strategies.

Keywords: personal variables, students, perception, school security

Procedia PDF Downloads 61
8630 A Flagship Framework with Feet of Clay: Operational and Structural Challenges of the African Peace and Security Architecture

Authors: Wiriranai Brilliant Masara

Abstract:

The African Peace and Security Architecture is widely celebrated and revered as a paragon of the will to address peace and security challenges in Africa. However, like any other institution, it is embedded with operational and institutional challenges that prevent it from effectively carrying out its mandate and turning goals into achieved results. The article examines the fundamental flaws and weaknesses of the African Peace and Security Architecture by focusing on its institutions, norms, instruments, and its relationship to Africa’s Regional Economic Communities. Therefore, the article reviews the flaws of the five elements of the African Peace and Security Architecture which are the Peace and Security Council, Panel of the Wise, Continental Early Warning System, African Standby Force, and Peace Fund.

Keywords: African Union, African Peace and Security Architecture, peace and security council, continental early warning system, African Standby Force, Panel of the Wise, Peace Fund

Procedia PDF Downloads 125
8629 Competitive Intelligence within the Maritime Security Intelligence

Authors: Dicky R. Munaf, Ayu Bulan Tisna

Abstract:

Competitive intelligence (business intelligence) is the process of observing the external environment which often conducted by many organizations to get the relevant information which will be used to create the organization policy, whereas, security intelligence is related to the function of the officers who have the duties to protect the country and its people from every criminal actions that might harm the national and individual security. Therefore, the intelligence dimension of maritime security is associated with all the intelligence activities including the subject and the object that connected to the maritime issues. The concept of intelligence business regarding the maritime security perspective is the efforts to protect the maritime security using the analysis of economic movements as the basic strategic plan. Clearly, a weak maritime security will cause high operational cost to all the economic activities which uses the sea as its media. Thus, it affects the competitiveness of a country compared to the other countries that are able to maintain the maritime law enforcement and secure their marine territory. So, the intelligence business within the security intelligence is important to conduct as the beginning process of the identification against the opponent strategy that might happen in the present or in the future. Thereby, the scenario of the potential impact of all the illegal maritime activities, as well as the strategy in preventing the opponent maneuver can be made.

Keywords: competitive intelligence, maritime security intelligence, intelligent systems, information technology

Procedia PDF Downloads 491
8628 The Interpretation of World Order by Epistemic Communities in Security Studies

Authors: Gabriel A. Orozco

Abstract:

The purpose of this article is to make an approach to the Security Studies, exposing their theories and concepts to understand the role that have had in the interpretation of the changes and continuities of the world order and their impact on policies or decision-making facing the problems of the 21st century. The aim is to build a bridge between the security studies as a subfield and the meaning that has been given to the world order. The idea of epistemic communities serves as a methodological proposal about the different programs of research in security studies, showing their influence in the realities of States, intergovernmental organizations and transnational forces, moving to implement, perpetuate and project a vision of the world order.

Keywords: security studies, epistemic communities, international, relations

Procedia PDF Downloads 257
8627 Characterizing Surface Machining-Induced Local Deformation Using Electron Backscatter Diffraction

Authors: Wenqian Zhang, Xuelin Wang, Yujin Hu, Siyang Wang

Abstract:

The subsurface layer of a component plays a significant role in its service performance. Any surface mechanical process during fabrication can introduce a deformed layer near the surface, which can be related to the microstructure alteration and strain hardening, and affects the mechanical properties and corrosion resistance of the material. However, there exists a great difficulty in determining the subsurface deformation induced by surface machining. In this study, electron backscatter diffraction (EBSD) was used to study the deformed layer of surface milled 316 stainless steel. The microstructure change was displayed by the EBSD maps and characterized by misorientation variation. The results revealed that the surface milling resulted in heavily nonuniform deformations in the subsurface layer and even in individual grains. The direction of the predominant grain deformation was about 30-60 deg to the machined surface. Moreover, a local deformation rate (LDR) was proposed to quantitatively evaluate the local deformation degree. Both of the average and maximum LDRs were utilized to characterize the deformation trend along the depth direction. It was revealed that the LDR had a strong correlation with the development of grain and sub-grain boundaries. In this work, a scan step size of 1.2 μm was chosen for the EBSD measurement. A LDR higher than 18 deg/μm indicated a newly developed grain boundary, while a LDR ranged from 2.4 to 18 deg/μm implied the generation of a sub-grain boundary. And a lower LDR than 2.4 deg/μm could only introduce a slighter deformation and no sub-grain boundary was produced. According to the LDR analysis with the evolution of grain or sub grain boundaries, the deformed layer could be classified into four zones: grain broken layer, seriously deformed layer, slightly deformed layer and non-deformed layer.

Keywords: surface machining, EBSD, subsurface layer, local deformation

Procedia PDF Downloads 323
8626 The Two Layers of Food Safety and GMOs in the Hungarian Agricultural Law

Authors: Gergely Horváth

Abstract:

The study presents the complexity of food safety dividing it into two layers. Beyond the basic layer of requirements, there is a more demanding higher level linked with quality and purity aspects. It would be important to give special prominence to both layers, given that massive illnesses are caused by foods even though officially licensed. Then the study discusses an exciting safety challenge stemming from the risks of genetically modified organisms (GMOs). Furthermore, it features legal case examples that illustrate how certain liability questions are solved or not yet decided in connection with the production of genetically modified crops. In addition, a special kind of land grabbing, more precisely land grabbing from non-GMO farming systems can also be noticed as well as a new phenomenon eroding food sovereignty. Coexistence, the state where organic, conventional, and GM farming systems are standing alongside each other is an unsuitable experiment that cannot be successful, because of biophysical reasons (such as cross-pollination). Agricultural and environmental lawyers both try to find the optimal solution. Agri-environmental measures are introduced as a special subfield of law maintaining also food safety. The important steps of agri-environmental legislation are aiming at the protection of natural values, the environmental media and strengthening food safety as well, practically the quality of agricultural products intended for human consumption. The major findings of the study focus on searching for the appropriate approach capable of solving the security and safety problems of food production. The most interesting concepts of the Hungarian national and EU food law legislation are analyzed in more detail with descriptive, analytic and comparative methods.

Keywords: food law, food safety, food security, GMO, Genetically Modified Organisms, agri-environmental measures

Procedia PDF Downloads 427
8625 Implications of Private Military Security Companies on Stewardship of the Profession of Arms

Authors: Kevin Krupski

Abstract:

Private Military Security Companies have grown to become a major force contributor to nations in military operations. Scholars have debated the implications of this in relation to control and efficiency related to the privatization of violence, but there has been little discussion on how these companies affect the profession of arms. Specifically, this paper seeks to address how the privatization of violence influences the military’s stewardship, whether private military security companies are capable of stewardship of the military profession, and whether there are aspects of stewardship of the military profession that private military security companies are capable of emulating. This paper reviews literature on stewardship, the relationship of the military to the state, and private military security companies in order to identify overlap between uniformed military services and the private sector. Then, it offers a typology for determining under what conditions an organization would act as a steward. Ultimately, there are insufficient reasons for private military security companies to act as stewards of the profession of arms.

Keywords: stewardship, military profession, civil-military, security

Procedia PDF Downloads 237
8624 The Role of Cryptocurrency in Cross-Border Payments: A Case Study of Bangladesh

Authors: Mohammad Abdul Matin

Abstract:

This research paper aims to investigate the use of cryptocurrency in facilitating cross-border payments, with a specific focus on the case of Bangladesh. With thousands of Bangladeshi living abroad, the demand for efficient and cost-effective remittance channels is high. This paper will examine the current challenges in cross-border payments for Bangladeshi expatriates and explore the potential benefits and barriers to the adoption of cryptocurrency as a solution. Through a combination of literature review, qualitative interviews, and data analysis, the research will provide valuable insights into the opportunities and risks associated with using cryptocurrency for cross-border payments in Bangladesh.

Keywords: cryptocurrency, cross-border payments, Bangladesh, remittance, expatriates

Procedia PDF Downloads 15
8623 A Comparative Study on Electrical Characteristics of Au/n-SiC structure, with and Without Zn-Doped PVA Interfacial Layer at Room Temperature

Authors: M. H. Aldahrob, A. Kokce, S. Altindal, H. E. Lapa

Abstract:

In order to obtain the detailed information about the effect of (Zn-doped PVA) interfacial layer, surface states (Nss) and series resistance (Rs) on electrical characteristics, both Au/n- type 4H-SiC (MS) with and without (Zn doped PVA) interfacial layer were fabricated to compare. The main electrical parameters of them were investigated using forward and reverse bias current-voltage (I-V), capacitance-voltage (C-V) and conductance –voltage (G/W –V) measurements were performed at room temperature. Experimental results show that the value of ideality factor (n), zero –bias barrier height (ΦBo), Rs, rectifier rate (RR=IF/IR) and the density of Nss are strong functions interfacial layer and applied bias voltage. The energy distribution profile of Nss was obtained from forward bias I-V data by taking into account voltage dependent effective BH (ΦBo) and ideality factor (n(V)). Voltage dependent profile of Rs was also obtained both by using Ohm’s law and Nicollian and Brew methods. The other main diode parameters such as the concentration of doping donor atom (ND), Fermi energy level (EF).BH (ΦBo), depletion layer with (WD) were obtained by using the intercept and slope of the reverse bias C-2 vs V plots. It was found that (Zn-doped PVA) interfacial layer lead to a quite decrease in the values Nss, Rs and leakage current and increase in shunt resistance (Rsh) and RR. Therefore, we can say that the use of thin (Zn-doped PVA) interfacial layer can quite improved the performance of MS structure.

Keywords: interfacial polymer layer, thickness dependence, electric and dielectric properties, series resistance, interface state

Procedia PDF Downloads 240
8622 Unified Theory of the Security Dilemma: Geography, MAD and Democracy

Authors: Arash Heydarian Pashakhanlou

Abstract:

The security dilemma is one of the key concepts in International Relations (IR), and the numerous engagements with it have created a great deal of confusion regarding its essence. That is why this article seeks to dissect the security dilemma and rebuild it from its foundational core. In doing so, the present study highlights that the security dilemma requires interaction among actors that seek to protect themselves from other's capacity for harm under the condition of uncertainty to operate. In this constellation, actors are confronted with the dilemma of motives, power, and action, which they seek to resolve by acquiring information regarding their opponents. The relationship between the parties is shaped by the harm-uncertainty index (HUI) consisting of geographical distance, MAD, and joint democracy that determines the intensity of the security dilemma. These elements define the unified theory of the security dilemma (UTSD) developed here. UTSD challenges the prevailing view that the security dilemma is a unidimensional paradoxical concept, regulated by the offense-defense balance and differentiation that only occurs in anarchic settings with tragic outcomes and is equivalent to the spiral model.

Keywords: security dilemma, revisionism, status quo, anarchy, uncertainty, tragedy, spiral, deterrence

Procedia PDF Downloads 221
8621 Testing Ammonia Borane for Multilayer Aprons in Nuclear Medicine as a Promising Non-toxic, Lightweight, Hydrogen Rich Material and to Enhance the Efficiency of Aprons for Workers Who Deal with Neutrons Radiation in Nuclear Medicine

Authors: Wed Othman Alghamdi

Abstract:

The current study aims to find a non-toxic, low density, hydrogen-rich material that can be used in aprons without causing health issues for nuclear medical workers that could hinder their work and negatively affect patients. Five samples were tested in terms of fast neutron removal cross-section(C21H25ClO5, C2H4, LiH,H3NBH3,MgH2) mathematically using computer program called Phy-x/PSD it is a computer program designed to calculate the fast neutron removal cross section, and it was obtained that ammonia borane (𝐻3𝑁𝐵𝐻3) with a density of 0.78 (g/ cm3) ,And it containment of the three most important elements that play a major role in protection shields, which are (hydrogen, boron, nitrogen), Hydrogen works as a moderator that slows neutrons and turn them into thermal neutrons, boron and nitrogen both have the largest neutron absorption cross section. Ammonia borane has the highest fast neutron removal cross-section with the value of (0.122959317985393cm-1) and the least for polyethylene (𝐶2𝐻4) with the value of (0.0838038707225853 cm-1) which made the ammonia borane a better candidate than polyethylene and other compounds that have been tasted in previous research for multi-layer aprons in nuclear medicine, and may approve a proper protection against the hazard radiations that its produced in nuclear medicine filed by several ways, due to it is low density and non-toxicity.

Keywords: aprons, radiation, non-toxic, nuclear medicine, neutrons

Procedia PDF Downloads 54
8620 Product Development of Standard Multi-Layer Sweet (Khanom- Chan) Recipe to Healthy for Thai Dessert

Authors: Tidarat Sanphom

Abstract:

Aim of this research is to development of Standard Layer pudding (Khanom-Chan) recipe to healthy Thai dessert. The objective are to study about standard recipe in multi-layer sweet. It was found that the appropriate recipe in multi-layer sweet, was consisted of rice starch 56 grams, tapioca starch 172 grams, arrowroot flour 98 grams, mung been-flour 16 grams, coconut milk 774 grams, fine sugar 374 grams, pandan leaf juice 47 grams and oil 5 grams.Then the researcher studied about the ratio of rice-berries flour to rice starch in multi-layer sweet at level of 30:70, 50:50, and only rice-berry flour 100 percentage. Result sensory evaluation, it was found the ratio of rice-berry flour to rice starch 30:70 had well score. The result of multi-layer sweet with rice-berry flour reduced sugar 20, 40 and 60 percentage found that 20 percentage had well score. Calculated total calories and calories from fat in Sweet layer cake with rice-berry flour reduced sugar 20 percentage had 250.04 kcal and 65.16 kcal.

Keywords: multi-layer sweet (Khanom-Chan), rice-berry flour, leaf juice, desert

Procedia PDF Downloads 415
8619 Nonlinear Static Analysis of Laminated Composite Hollow Beams with Super-Elliptic Cross-Sections

Authors: G. Akgun, I. Algul, H. Kurtaran

Abstract:

In this paper geometrically nonlinear static behavior of laminated composite hollow super-elliptic beams is investigated using generalized differential quadrature method. Super-elliptic beam can have both oval and elliptic cross-sections by adjusting parameters in super-ellipse formulation (also known as Lamé curves). Equilibrium equations of super-elliptic beam are obtained using the virtual work principle. Geometric nonlinearity is taken into account using von-Kármán nonlinear strain-displacement relations. Spatial derivatives in strains are expressed with the generalized differential quadrature method. Transverse shear effect is considered through the first-order shear deformation theory. Static equilibrium equations are solved using Newton-Raphson method. Several composite super-elliptic beam problems are solved with the proposed method. Effects of layer orientations of composite material, boundary conditions, ovality and ellipticity on bending behavior are investigated.

Keywords: generalized differential quadrature, geometric nonlinearity, laminated composite, super-elliptic cross-section

Procedia PDF Downloads 283
8618 Effect of Interlayer Coupling in Co/Al2O3/Co

Authors: Niru Chowdhury, Subhankar Bedanta, Alexander Weber, Thomas Brueckel

Abstract:

We show the effect of interlayer coupling on magnetization reversal in purely dipolar coupled magnetic multilayers. Longitudinal magneto-optic Kerr microscopy (LMOKE) has been performed on [Co(10nm)/Al2O3(t)/Co(10nm)] for various thicknesses of Al2O3(t). We will show that inter-layer coupling interactions lead to layer-by-layer reversal in the magnetic multilayers. Also transverse component of magnetization was observed for higher thickness of the spacer layer.

Keywords: Interlayer coupling, Magnetic domains, Magneto – Optic Kerr effect microscopy, Magnetization reversal, Magnetic thin film

Procedia PDF Downloads 390
8617 The Impact of Adopting Cross Breed Dairy Cows on Households’ Income and Food Security in the Case of Dejen Woreda, Amhara Region, Ethiopia

Authors: Misganaw Chere Siferih

Abstract:

This study assessed the impact of crossbreed dairy cows on household income and food security. The study area is found in Dejen Woreda, East Gojam Zone, and Amhara region of Ethiopia. Random sampling technique was used to obtain a sample of 80 crossbreed dairy cow owners and 176 indigenous dairy cow owners. The study employed food consumption score analytical framework to measure food security status of the household. No Statistical significant mean difference is found between crossbreed owners and indigenous owners. Logistic regression was employed to investigate crossbreed dairy cow adoption determinants , the result indicates that gender, education, labor number, land size cultivated, dairy cooperatives membership, net income and food security status of the household are statistically significant independent variables, which explained the binary dependent variable, crossbreed dairy cow adoption. Propensity score matching (PSM) was employed to analyze the impact of crossbreed dairy cow owners on farmers’ income and food security. The average net income of crossbreed dairy cow owners was found to be significantly higher than indigenous dairy cow owners. Estimates of average treatment effect of the treated (ATT) indicated that crossbreed dairy cow is able to impact households’ net income by 42%, 38.5%, 30.8% and 44.5% higher in kernel, radius, nearest neighborhood and stratification matching algorithms respectively as compared to indigenous dairy cow owners. However, estimates of average treatment of the treated (ATT) suggest that being an owner of crossbreed dairy cow is not able to affect food security significantly. Thus, crossbreed dairy cow enables farmers to increase income but not their food security in the study area. Finally, the study recommended establishing dairy cooperatives and advice farmers to become a member of them, attention to promoting the impact of crossbreed dairy cows and promotion of nutrition focus projects.

Keywords: crossbreed dairy cow, net income, food security, propensity score matching

Procedia PDF Downloads 40
8616 Fire Safety Engineering of Wood Dust Layer or Cloud

Authors: Marzena Półka, Bożena Kukfisz

Abstract:

This paper presents an analysis of dust explosion hazards in the process industries. It includes selected testing method of dust explosibility and presentation two of them according to experimental standards used by Department of Combustion and Fire Theory in The Main School of Fire Service in Warsaw. In the article are presented values of maximum acceptable surface temperature (MAST) of machines operating in the presence of dust cloud and chosen dust layer with thickness of 5 and 12,5mm. The comparative analysis, points to the conclusion that the value of the minimum ignition temperature of the layer (MITL) and the minimum ignition temperature of dust cloud (MTCD) depends on the granularity of the substance. Increasing the thickness of the dust layer reduces minimum ignition temperature of dust layer. Increasing the thickness of dust at the same time extends the flameless combustion and delays the ignition.

Keywords: fire safety engineering, industrial hazards, minimum ignition temperature, wood dust

Procedia PDF Downloads 306
8615 Cybersecurity and Governance for Humanitarian Work: An Approach for Addressing Security Risks

Authors: Rossouw De Bruin, Sebastiaan H. Von Solms

Abstract:

The state of national security is an evolving concern. Companies, organizations, governments, states and individuals are aware of the security of their information and their assets however, they may not always be aware of the risks present. These risks are not only limited to non-existence of security procedures. Existing security can be severely flawed, especially if there is non-conformance towards policies, practices and procedures. When looking at humanitarian actions, we can easily identify these flaws. Unfortunately, humanitarian aid has to compete with factors from within the states, countries and continents they are working in. Furthermore, as technology improves, so does our connectivity to the internet and the way in which we use the internet. However, there are times when security is overlooked and humanitarian agencies are some of the agencies that do not always take security into consideration. The purpose of this paper will be to introduce the importance of cybersecurity and cybersecurity governance with respect to humanitarian work. We will also introduce and briefly discuss a model that can be used by humanitarian agencies to assess, manage and maintain their cybersecurity efforts.

Keywords: humanities, cybersecurity, cybersecurity governance, maturity, cybersecurity maturity, maturity model

Procedia PDF Downloads 250
8614 A Survey on the Blockchain Smart Contract System: Security Strengths and Weaknesses

Authors: Malaw Ndiaye, Karim Konate

Abstract:

Smart contracts are computer protocols that facilitate, verify, and execute the negotiation or execution of a contract, or that render a contractual term unnecessary. Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. Smart contracts have become lucrative and profitable targets for attackers because they can hold a great amount of money. Smart contracts, although widely used in blockchain technology, are far from perfect due to security concerns. Since there are recent studies on smart contract security, none of them systematically study the strengths and weaknesses of smart contract security. Some have focused on an analysis of program-related vulnerabilities by providing a taxonomy of vulnerabilities. Other studies are responsible for listing the series of attacks linked to smart contracts. Although a series of attacks are listed, there is a lack of discussions and proposals on improving security. This survey takes stock of smart contract security from a more comprehensive perspective by correlating the level of vulnerability and systematic review of security levels in smart contracts.

Keywords: blockchain, Bitcoin, smart contract, criminal smart contract, security

Procedia PDF Downloads 156
8613 Smart Security Concept in the East Mediterranean: Anti Asymmetrical Area Denial (A3D)

Authors: Serkan Tezgel

Abstract:

The two qualities of the sea, as a medium of transportation and as a resource, necessitate maritime security for economic stability and good order at sea. The borderless nature of the sea makes it one of the best platforms to contribute to regional peace and international order. For this reason, the establishment of maritime security in East Mediterranean will enhance the security-peace-democracy triangle in the region. This paper proposes the application of the Smart Security Concept in the East Mediterranean. Smart Security aims to secure critical infrastructure, such as hydrocarbon platforms, against asymmetrical threats. The concept is based on Anti Asymmetrical Area Denial (A3D) which necessitates limiting freedom of action of maritime terrorists and piracy by founding safe and secure maritime areas through sea lines of communication using short range capabilities. Smart Security is a regional maritime cooperation concept for the narrow seas. Cooperation and interoperability are essential attributes of this regional security concept. Therefore, multinational excellence centers such as Multinational Maritime Security Center of Excellence-Aksaz in Turkey, which will determine necessary capabilities and plan/coordinate workshops, training and exercises, are bound to be the principal characteristic of Smart Security concept and similar regional concepts. Smart Security, a crucial enabler of energy and regional security, can provide an enduring approach for operating in the challenging environment of narrow seas and for countering asymmetrical threats.

Keywords: security, cooperation, asymmetrical, area denial

Procedia PDF Downloads 796
8612 Active Control of Multiferroic Composite Shells Using 1-3 Piezoelectric Composites

Authors: S. C. Kattimani

Abstract:

This article deals with the analysis of active constrained layer damping (ACLD) of smart multiferroic or magneto-electro-elastic doubly curved shells. The kinematics of deformations of the multiferroic doubly curved shell is described by a layer-wise shear deformation theory. A three-dimensional finite element model of multiferroic shells has been developed taking into account the electro-elastic and magneto-elastic couplings. A simple velocity feedback control law is employed to incorporate the active damping. Influence of layer stacking sequence and boundary conditions on the response of the multiferroic doubly curved shell has been studied. In addition, for the different orientation of the fibers of the constraining layer, the performance of the ACLD treatment has been studied.

Keywords: active constrained layer damping (ACLD), doubly curved shells, magneto-electro-elastic, multiferroic composite, smart structures

Procedia PDF Downloads 300