Search results for: electrical power system security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 24500

Search results for: electrical power system security

22550 An Operators’ Real-sense-based Fire Simulation for Human Factors Validation in Nuclear Power Plants

Authors: Sa-Kil Kim, Jang-Soo Lee

Abstract:

On March 31, 1993, a severe fire accident took place in a nuclear power plant located in Narora in North India. The event involved a major fire in the turbine building of NAPS unit-1 and resulted in a total loss of power to the unit for 17 hours. In addition, there was a heavy ingress of smoke in the control room, mainly through the intake of the ventilation system, forcing the operators to vacate the control room. The Narora fire accident provides us lessons indicating that operators could lose their mind and predictable behaviors during a fire. After the Fukushima accident, which resulted from a natural disaster, unanticipated external events are also required to be prepared and controlled for the ultimate safety of nuclear power plants. From last year, our research team has developed a test and evaluation facility that can simulate external events such as an earthquake and fire based on the operators’ real-sense. As one of the results of the project, we proposed a unit real-sense-based facility that can simulate fire events in a control room for utilizing a test-bed of human factor validation. The test-bed has the operator’s workstation shape and functions to simulate fire conditions such as smoke, heat, and auditory alarms in accordance with the prepared fire scenarios. Furthermore, the test-bed can be used for the operators’ training and experience.

Keywords: human behavior in fire, human factors validation, nuclear power plants, real-sense-based fire simulation

Procedia PDF Downloads 283
22549 FLC with 3DSVM for 4LEG 4WIRE Shunt Active Power Filter

Authors: Abdelhalim Kessal, Ali Chebabhi

Abstract:

In this paper, a controller based on fuzzy logic control (FLC) associated to Three Dimensional Space Vector Modulation (3DSVM) is applied for shunt active filter in αβo axes domain. The main goals are to improve power quality under disturbed loads, minimize source currents harmonics and reduce neutral current magnitude in the four-wire structure. FLC is used to obtain the reference current and control the DC-bus voltage at the inverter output. The switching signals of the four-leg inverter are generating through a Three Dimensional Space Vector Modulation (3DSVM). Selected simulation results have been shown to validate the proposed system.

Keywords: flc, 3dsvm, sapf, harmonic, inverter

Procedia PDF Downloads 497
22548 Multi Criteria Authentication Method in Cognitive Radio Networks

Authors: Shokoufeh Monjezi Kouchak

Abstract:

Cognitive radio network (CRN) is future network .Without this network wireless devices can’t work appropriately in the next decades. Today, wireless devices use static spectrum access methods and these methods don’t use spectrums optimum so we need use dynamic spectrum access methods to solve shortage spectrum challenge and CR is a great device for DSA but first of all its challenges should be solved .security is one of these challenges .In this paper we provided a survey about CR security. You can see this survey in tables 1 to 7 .After that we proposed a multi criteria authentication method in CRN. Our criteria in this method are: sensing results, following sending data rules, position of secondary users and no talk zone. Finally we compared our method with other authentication methods.

Keywords: authentication, cognitive radio, security, radio networks

Procedia PDF Downloads 392
22547 Electrical Tortuosity across Electrokinetically Remediated Soils

Authors: Waddah S. Abdullah, Khaled F. Al-Omari

Abstract:

Electrokinetic remediation is one of the most influential and effective methods to decontaminate contaminated soils. Electroosmosis and electromigration are the processes of electrochemical extraction of contaminants from soils. The driving force that causes removing contaminants from soils (electroosmosis process or electromigration process) is voltage gradient. Therefore, the electric field distribution throughout the soil domain is extremely important to investigate and to determine the factors that help to establish a uniform electric field distribution in order to make the clean-up process work properly and efficiently. In this study, small-sized passive electrodes (made of graphite) were placed at predetermined locations within the soil specimen, and the voltage drop between these passive electrodes was measured in order to observe the electrical distribution throughout the tested soil specimens. The electrokinetic test was conducted on two types of soils; a sandy soil and a clayey soil. The electrical distribution throughout the soil domain was conducted with different tests properties; and the electrical field distribution was observed in three-dimensional pattern in order to establish the electrical distribution within the soil domain. The effects of density, applied voltages, and degree of saturation on the electrical distribution within the remediated soil were investigated. The distribution of the moisture content, concentration of the sodium ions, and the concentration of the calcium ions were determined and established in three-dimensional scheme. The study has shown that the electrical conductivity within soil domain depends on the moisture content and concentration of electrolytes present in the pore fluid. The distribution of the electrical field in the saturated soil was found not be affected by its density. The study has also shown that high voltage gradient leads to non-uniform electric field distribution within the electroremediated soil. Very importantly, it was found that even when the electric field distribution is uniform globally (i.e. between the passive electrodes), local non-uniformity could be established within the remediated soil mass. Cracks or air gaps formed due to temperature rise (because of electric flow in low conductivity regions) promotes electrical tortuosity. Thus, fracturing or cracking formed in the remediated soil mass causes disconnection of electric current and hence, no removal of contaminant occur within these areas.

Keywords: contaminant removal, electrical tortuousity, electromigration, electroosmosis, voltage distribution

Procedia PDF Downloads 421
22546 Household Food Security and Poverty Reduction in Cameroon

Authors: Bougema Theodore Ntenkeh, Chi-bikom Barbara Kyien

Abstract:

The reduction of poverty and hunger sits at the heart of the United Nations 2030 Agenda for Sustainable Development, and are the first two of the Sustainable Development Goals. The World Food Day celebrated on the 16th of October every year, highlights the need for people to have physical and economic access at all times to enough nutritious and safe food to live a healthy and active life; while the world poverty day celebrated on the 17th of October is an opportunity to acknowledge the struggle of people living in poverty, a chance for them to make their concerns heard, and for the community to recognize and support poor people in their fight against poverty. The association between household food security and poverty reduction is not only sparse in Cameroon but mostly qualitative. The paper therefore investigates the effect of household food security on poverty reduction in Cameroon quantitatively using data from the Cameroon Household Consumption Survey collected by the Government Statistics Office. The methodology employed five indicators of household food security using the Multiple Correspondence Analysis and poverty is captured as a dummy variable. Using a control function technique, with pre and post estimation test for robustness, the study postulates that household food security has a positive and significant effect on poverty reduction in Cameroon. A unit increase in the food security score reduces the probability of the household being poor by 31.8%, and this effect is statistically significant at 1%. The result further illustrates that the age of the household head and household size increases household poverty while households residing in urban areas are significantly less poor. The paper therefore recommends that households should diversify their food intake to enhance an effective supply of labour in the job market as a strategy to reduce household poverty. Furthermore, family planning methods should be encouraged as a strategy to reduce birth rate for an equitable distribution of household resources including food while the government of Cameroon should also develop the rural areas given that trend in urbanization are associated with the concentration of productive economic activities, leading to increase household income, increased household food security and poverty reduction.

Keywords: food security, poverty reduction, SDGs, Cameroon

Procedia PDF Downloads 77
22545 Estimation of the Pore Electrical Conductivity Using Dielectric Sensors

Authors: Fethi Bouksila, Magnus Persson, Ronny Berndtsson, Akissa Bahri

Abstract:

Under salinity conditions, we evaluate the performance of Hilhost (2000) model to predict pore electrical conductivity ECp from dielectric permittivity and bulk electrical conductivity (ECa) using Time and Frequency Domain Reflectometry sensors (TDR, FDR). Using FDR_WET sensor, RMSE of ECp was 4.15 dS m-1. By replacing the standard soil parameter (K0) in Hilhost model by K0-ECa relationship, the RMSE of ECp decreased to 0.68 dS m-1. WET sensor could give similar accuracy to estimate ECp than TDR if calibrated values of K0 were used instead of standard values in Hilhost model.

Keywords: hilhost model, soil salinity, time domain reflectometry, frequency domain reflectometry, dielectric methods

Procedia PDF Downloads 135
22544 Pakistan Nuclear Security: Threats from Non-State Actors

Authors: Jennifer Wright

Abstract:

The recent rise of powerful terrorist groups such as ISIS and Al-Qaeda brings up concerns about nuclear terrorism as well as a focus on nuclear security, specifically the physical security of nuclear weapons and fissile material storage sites in countries where powerful nonstate actors are present. Particularly because these non-state actors, who lack their own sovereign territory, cannot be ‘deterred’ in the traditional sense. In light of the current threat environment, it’s necessary to now rethink these strategies in the 21st century – a multipolar world with the presence of powerful non-state actors. As a country in the spotlight for its low ranking on the Nuclear Threat Initiative’s (NTI) Nuclear Security Index, Pakistan is a relevant example to explore the question of whether the presence of non-state actors poses a real risk to nuclear security today. It’s necessary to take a look at their nuclear security policies to determine if they’re robust enough to deal with political instability and violence in the country. After carrying out interviews with experts in May 2017 in Islamabad on nuclear security and nuclear terrorism, this paper aims to highlight findings by providing a Pakistan-centric view on the subject and give experts there a chance to counter criticism. Western media would have us fearful of nuclear security mechanisms in Pakistan after reports that areas such as cybersecurity and accounting and control of materials are weak, as well as sensitive nuclear material being transported in unmarked, unguarded vehicles. Also reported are cases where terrorist groups carried out targeted attacks against Pakistani military bases or secure sites where nuclear material is stored. One specific question asked of each interviewee in Islamabad was Do you feel the threat of nuclear terrorism calls into question the reliance on deterrence? Their responses will be elaborated on in the longer paper, but overall they demonstrate views that deterrence still serves a purpose for state-to-state security strategy, but not for a state in countering nonstate threats. If nuclear security is lax enough for these non-state actors to get their hands on either an intact nuclear weapon or enough military-grade fissile material to build a nuclear weapon, then what would stop them from launching a nuclear attack? As deterrence is a state-centric strategy, it doesn’t work to deter non-state actors from carrying out an attack on another state, as they lack their own territory, and as such, are not fearful of a reprisal attack. Deterrence will need to be addressed, and its relevance analyzed to determine its utility in the current security environment. The aim of this research is to demonstrate the real risk of nuclear terrorism by pointing to weaknesses in global nuclear security, particularly in Pakistan. The research also aims to provoke thought on the weaknesses of deterrence as a whole. Original thinking is needed as we attempt to adequately respond to the 21st century’s current threat environment.

Keywords: deterrence, non-proliferation, nuclear security, nuclear terrorism

Procedia PDF Downloads 226
22543 Investigating Constructions and Operation of Internal Combustion Engine Water Pumps

Authors: Michał Gęca, Konrad Pietrykowski, Grzegorz Barański

Abstract:

The water pump in the compression-ignition internal combustion engine transports a hot coolant along a system of ducts from the engine block to the radiator where coolant temperature is lowered. This part needs to maintain a constant volumetric flow rate. Its power should be regulated to avoid a significant drop in pressure if a coolant flow decreases. The internal combustion engine cooling system uses centrifugal pumps for suction. The paper investigates 4 constructions of engine pumps. The pumps are from diesel engine of a maximum power of 75 kW. Each of them has a different rotor shape, diameter and width. The test stand was created and the geometry inside the all 4 engine blocks was mapped. For a given pump speed on the inverter of the electric engine motor, the valve position was changed and volumetric flow rate, pressure, and power were recorded. Pump speed was regulated from 1200 RPM to 7000 RPM every 300 RPM. The volumetric flow rates and pressure drops for the pump speeds and efficiencies were specified. Accordingly, the operations of each pump were mapped. Our research was to select a pump for the aircraft compression-ignition engine. There was calculated a pressure drop at a given flow on the block and radiator of the designed aircraft engine. The water pump should be lightweight and have a low power demand. This fact shall affect the shape of a rotor and bearings. The pump volumetric flow rate was assumed as 3 kg/s (previous AVL BOOST research model) where the temperature difference was 5°C between the inlet (90°C) and outlet (95°C). Increasing pump speed above the boundary flow power defined by pressure and volumetric flow rate does not increase it but pump efficiency decreases. The maximum total pump efficiency (PCC) is 45-50%. When the pump is driven by low speeds with a 90% closed valve, its overall efficiency drops to 15-20%. Acknowledgement: This work has been realized in the cooperation with The Construction Office of WSK "PZL-KALISZ" S.A." and is part of Grant Agreement No. POIR.01.02.00-00-0002/15 financed by the Polish National Centre for Research and Development.

Keywords: aircraft engine, diesel engine, flow, water pump

Procedia PDF Downloads 252
22542 Preparation, Characterisation and Electrical Properties of Metal/polymer-DNA Nanohybrids

Authors: Mahdi Almaky

Abstract:

Conducting polymer of N-(3-pyrrol-1-yl-propyl)-2,2`-bipyridinium hexafluoro-phosphate (PPBH) was prepared via chemical and electrochemical polymerization methods. The bulk polymer showed conductivity in the order of 10-12 S cm-1. DNA-templated polymer nano wires of PPBH (PolyPPBH-DNA) have been chemically prepared then used as templates to direct the formation of metal nanowires (Cu) in order to enhance the electrical properties of the polymer/DNA wires. The chemical structures, morphology and the electrical characterisation of the as obtained structures have been characterized through spectroscopic (FTIR, UV-vis and XPS), single-crystal X-ray diffraction and microscopic (AFM, EFM and c-AFM) techniques. The morphology of the nanomaterials has been observed by AFM; showing the nanowires are uniform and continuous. The polymer conductivity was slightly improved after metallization. The conductivity of Cu-PolyPPBH-DNA nanowires was estimated to be 7.1x10-2 S cm-1. This conductivity is slightly higher than the conductivity of PolyPPBH-DNA nano wires (2.0 x 10-2 S cm-1), but it is lower than the measurements for PPy/DNA nano wires (2.1 x 10-1 S cm-1) prepared and measured by using c-AFM probe. These results reflect the large effect of the chemical structure (N-substitution) on the electrical properties of these polymers by reducing the extended conjugation.

Keywords: DNA, template, nano wires, N-Alkylatedpyrrole, copper

Procedia PDF Downloads 422
22541 Hydraulic Resources Management under Imperfect Competition with Thermal Plants in the Wholesale Electricity Market

Authors: Abdessalem Abbassi, Ahlem Dakhlaoui, Lota D. Tamini

Abstract:

In this paper, we analyze infinite discrete-time games between hydraulic and thermal power operators in the wholesale electricity market under Cournot competition. We consider a deregulated electrical industry where certain demand is satisfied by hydraulic and thermal technologies. The hydraulic operator decides the production in each season of each period that maximizes the sum of expected profits from power generation with respect to the stochastic dynamic constraint on the water stored in the dam, the environmental constraint and the non-negative output constraint. In contrast, the thermal plant is operated with quadratic cost function, with respect to the capacity production constraint and the non-negativity output constraint. We show that under imperfect competition, the hydraulic operator has a strategic storage of water in the peak season. Then, we quantify the strategic inter-annual and intra-annual water transfer and compare the numerical results. Finally, we show that the thermal operator can restrict the hydraulic output without compensation.

Keywords: asymmetric risk aversion, electricity wholesale market, hydropower dams, imperfect competition

Procedia PDF Downloads 359
22540 Laboratory Assessment of Electrical Vertical Drains in Composite Soils Using Kaolin and Bentonite Clays

Authors: Maher Z. Mohammed, Barry G. Clarke

Abstract:

As an alternative to stone column in fine grained soils, it is possible to create stiffened columns of soils using electroosmosis (electroosmotic piles). This program of this research is to establish the effectiveness and efficiency of the process in different soils. The aim of this study is to assess the capability of electroosmosis treatment in a range of composite soils. The combined electroosmotic and preloading equipment developed by Nizar and Clarke (2013) was used with an octagonal array of anodes surrounding a single cathode in a nominal 250mm diameter 300mm deep cylinder of soil and 80mm anode to cathode distance. Copper coiled springs were used as electrodes to allow the soil to consolidate either due to an external vertical applied load or electroosmosis. The equipment was modified to allow the temperature to be monitored during the test. Electroosmotic tests were performed on China Clay Grade E kaolin and calcium bentonite (Bentonex CB) mixed with sand fraction C (BS 1881 part 131) at different ratios by weight; (0, 23, 33, 50 and 67%) subjected to applied voltages (5, 10, 15 and 20). The soil slurry was prepared by mixing the dry soil with water to 1.5 times the liquid limit of the soil mixture. The mineralogical and geotechnical properties of the tested soils were measured before the electroosmosis treatment began. In the electroosmosis cell tests, the settlement, expelled water, variation of electrical current and applied voltage, and the generated heat was monitored during the test time for 24 osmotic tests. Water content was measured at the end of each test. The electroosmotic tests are divided into three phases. In Phase 1, 15 kPa was applied to simulate a working platform and produce a uniform soil which had been deposited as a slurry. 50 kPa was used in Phase 3 to simulate a surcharge load. The electroosmotic treatment was only performed during Phase 2 where a constant voltage was applied through the electrodes in addition to the 15 kPa pressure. This phase was stopped when no further water was expelled from the cell, indicating the electroosmotic process had stopped due to either the degradation of the anode or the flow due to the hydraulic gradient exactly balanced the electroosmotic flow resulting in no flow. Control tests for each soil mixture were carried out to assess the behaviour of the soil samples subjected to only an increase of vertical pressure, which is 15kPa in Phase 1 and 50kPa in Phase 3. Analysis of the experimental results from this study showed a significant dewatering effect on the soil slurries. The water discharged by the electroosmotic treatment process decreased as the sand content increased. Soil temperature increased significantly when electrical power was applied and drops when applied DC power turned off or when the electrode degraded. The highest increase in temperature was found in pure clays at higher applied voltage after about 8 hours of electroosmosis test.

Keywords: electrokinetic treatment, electrical conductivity, electroosmotic consolidation, electroosmosis permeability ratio

Procedia PDF Downloads 166
22539 Effect of Chromium Behavior on Mechanical and Electrical Properties Of P/M Copper-Chromium Alloy Dispersed with VGCF

Authors: Hisashi Imai, Kuan-Yu Chen, Katsuyoshi Kondoh, Hung-Yin Tsai, Junko Umeda

Abstract:

Microstructural and electrical properties of copper-chromium alloy (Cu-Cr) dispersed with vapor-grown carbon fiber (VGCF) prepared by powder metallurgy (P/M) process have been investigated. Cu-0.7 mass% Cr pre-alloyed powder (Cu-Cr) made by water atomization process was used as raw materials, which contained solid solute Cr elements in Cu matrix. The alloy powder coated with un-bundled VGCF by using oil coating process was consolidated at 1223 K in vacuum by spark plasma sintering, and then extruded at 1073 K. The extruded Cu-Cr alloy (monolithic alloy) had 209.3 MPa YS and 80.4 IACS% conductivity. The extruded Cu-Cr with 0.1 mass% VGCF composites revealed a small decrease of YS compared to the monolithic Cu-Cr alloy. On the other hand, the composite had a higher electrical conductivity than that of the monolithic alloy. For example, Cu-Cr with 0.1 mass% VGCF composite sintered for 5 h showed 182.7 MPa YS and 89.7 IACS% conductivity. In the case of Cu-Cr with VGCFs composites, the Cr concentration was observed around VGCF by SEM-EDS analysis, where Cr23C6 compounds were detected by TEM observation. The amount of Cr solid solution in the matrix of the Cu-Cr composites alloy was about 50% compared to the monolithic Cu-Cr sintered alloy, and resulted in the remarkable increment of the electrical conductivity.

Keywords: powder metallurgy Cu-Cr alloy powder, vapor-grown carbon fiber, electrical conductivity

Procedia PDF Downloads 493
22538 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks

Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner

Abstract:

Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.

Keywords: USB, device, cyber security, attack, detection

Procedia PDF Downloads 398
22537 Optimization of a Hybrid PV-Diesel Mini grid System: A Case Study of Vimtim-Mubi, Nigeria

Authors: Julius Agaka Yusufu

Abstract:

This study undertakes the development of an optimal PV-diesel hybrid power system tailored to the specific energy landscape of Vimtim Mubi, Nigeria, utilizing real-world wind speed, solar radiation, and diesel cost data. Employing HOMER simulation, the research meticulously assesses the technical and financial viability of this hybrid configuration. Additionally, a rigorous performance comparison is conducted between the PV-diesel system and the conventional grid-connected alternative, offering crucial insights into the potential advantages and economic feasibility of adopting hybrid renewable energy solutions in regions grappling with energy access and reliability challenges, with implications for sustainable electrification efforts in similar communities worldwide.

Keywords: Vimtim-Nigeria, homer, renewable energy, PV-diesel hybrid system.

Procedia PDF Downloads 72
22536 Criminal Attitude vs Transparency in the Arab World

Authors: Keroles Akram Saed Ghatas

Abstract:

The political violence that characterized 1992 continued into 1993, creating a major security crisis for President Hosni Mubarak's government as the death toll and human rights abuses soared. Increasingly sensitive to criticism of 's human rights activities, the government established human rights departments in key ministries, beginning with the Foreign Office in February. Similar offices have been set up in the Justice and Agriculture Ministries, and plans to set up an office in the Home Office have been announced. It turned out that the main task of the law unit was to overturn the conclusions of international human rights organizations.President Mubarak was elected in a national referendum on October 4 for a third six-year term after being appointed on July 21 by the People's Assembly, an elected parliament overwhelmingly dominated by the in-power National Democratic Party will Mr. Mubarak ran unhindered. The Interior Ministry announced that nearly 16 million people cast their votes (84% of eligible voters), of which 96.28%. voted for presidential re-election.In 1993, armed Islamic extremists escalated their attacks on Christian citizens, government officials, police officers and senior security officials, resulting in casualties among the intended victims and bystanders. Sporadic attacks on buses, boats and tourist attractions also occurred throughout the year. From March 1992 to October 28, 1993, a total of 222 people lost their lives in the riots: 36 Coptic Christians and 38 other citizens; If one is a foreigner; sixty-six members of the Security Forces; and seventy-six known or suspected activists who were killed while resisting arrest. The latter was killed in airstrikes and firefights with security forces and at the site of planned attacks. On March 9-10, a series of airstrikes in Cairo, Giza, Qalyubiya province north of the capital and Aswan killed fifteen suspected militants and five members of the security forces.One of the airstrikes in Giza, part of Greater Cairo, killed the wife and son of Khalifa Mahmoud Ramadan, a suspected militant who was himself killed. The government agency Middle East News Agency reported on March 10 that the raids were part of a "broad confrontational plan aimed at ofterrorist elements"The state of emergency declared in October 1981 after the assassination of President Anwar el-Sadat was still in force in Egypt. The law, previously in effect continuously from June 1967 to May 1980, continued to grant the executive branch unique legal powers that effectively overrode the human rights guarantees of the Egyptian constitution. These provisions included wide discretionary powers in arresting and detaining individuals, as well as the ability to try civilians in military courts. The Cairo-based Independent Organization for Human Rights said so in a document sent to the United Nations in July 1993The human rights committee said the continued imposition of the state of emergency had resulted in "another constitution for the country" and "led to widespread misconduct by the security apparatus".

Keywords: constitution, human rights, legal power, president, anwar, el-sadat, assassination, state of emergency, middle east, news, agency, confrontational, arresting, fugitive, leaders, terrorist, elements, armed islamic extremists.

Procedia PDF Downloads 44
22535 Framing Opposition to Nuclear Power: Case of Akkuyu Nuclear Power

Authors: Pinar Temocin

Abstract:

Although the Akkuyu nuclear power project has been in the planning the Akkuyu nuclear power plant in the Mersin Province of Southern Turkey, recent events have increased its visibility in the Turkish debate. The Fukushima accident, the 2010 nuclear deal with Russia followed by several consequent nuclear revelations of administrative deficiencies, and waste issues all spurted widespread protests across Turkey and have polarized the nation into two camps; supporters and detractors. Those who support a nuclear Turkey include energy entrepreneurs, local investors, and technical experts who are heavily involved in paving the way for the realization of a nuclear project. Civil society activists and environmentalists overwhelmingly oppose the nuclear program. This study focuses on the latter, analyzing how groups opposing nuclear power plants (NPPs) have framed the Akkuyu nuclear project as a dangerous, risky, disadvantageous, and irrational policy choice.

Keywords: nuclear energy, anti-nuclear movements, environmentalists, civil society, Turkey

Procedia PDF Downloads 366
22534 Emotional Security in Relation to Students' Emotional Efficiency

Authors: Ibtisam Mahmoud Mohammed Sultan

Abstract:

The present research aimed to identify the level of both emotional and emotional competence among students in Tikrit University aimed to know the assumptions in statistical significance for both variables as gender variables (m-f) and specialty (scientific-humanistic), as research to learn what Relationship between emotional safety and efficiency alanfaalet Tikrit University students. The researcher built emotional security measure (54) as built measure emotional competence (46), as the researcher extract full alsaykomtrih characteristics of both scales. The research sample consisted of (600) students selected by the random way and applying the scales on a basic search sample and processed statistical data using a variety of methods, including statistical test (test T.) and Pearson correlation coefficient, the researcher found a set of results. The following: 1. that the Tikrit University students possess a high level of emotional security. 2. to safely enjoy passionate males more than females. 3. that there is no difference between students of scientific and humanitarian specialization in variable emotional security. 4. that the Tikrit University students enjoy a high level of emotional competence. 5. the female-male outperforming in emotional competence level. 6. the humanitarian specialization students Excel in emotional competence for those of specialty. 7. the existence of a positive correlation between variables. Through search results, the researcher has developed a set of conclusions, proposals, and recommendations.

Keywords: relation, emotional security, students, efficiency

Procedia PDF Downloads 120
22533 Dynamics of Norms and Identities Facilitate Countries to Resolve Their Conflicts: A Case Study of ASEAN

Authors: Chander Shekhar Kohli

Abstract:

In the field of international relations, countries have been experiencing distinct nature of conflicts. But, in the case of Association of Southeast Asian Nations (ASEAN) for a long time, the members have witnessed conflicts, small and large. These conflicts, as a result, have given catastrophic outcomes, such as killings and destroying properties. For the resolution of such conflicts, nonetheless, efforts likewise have been made, simultaneously, in terms of establishing peace and security. In this background, the ASEAN presents a significant example as before it had faced several wars, like Vietnam War, Cambodia conflicts, and so on. This research paper, therefore, strives to examine the ASEAN as a case with the help of both primary and secondary sources. It likewise will be dealt with how changing norms and identity building facilitate the ASEAN countries to deal with their conflicts both internal and external. This paper also will discuss how internal developments within countries affect conflict resolution process as each member of ASEAN is guided by its national interest. It is then argued that conflict resolution in the ASEAN is moving from its existing power-based solution to norms and identity-based solution as member countries have become more dependent on other countries. The research, therefore, is concluded by saying that the conflicts could only be resolved through building norms and common identities, which of course are recognized crucial mechanisms among the ASEAN countries with some exceptions.

Keywords: ASEAN, conflict resolution, norms and identities, peace and security

Procedia PDF Downloads 207
22532 Overview of Different Approaches Used in Optimal Operation Control of Hybrid Renewable Energy Systems

Authors: K. Kusakana

Abstract:

A hybrid energy system is a combination of renewable energy sources with back up, as well as a storage system used to respond to given load energy requirements. Given that the electrical output of each renewable source is fluctuating with changes in weather conditions, and since the load demand also varies with time; one of the main attributes of hybrid systems is to be able to respond to the load demand at any time by optimally controlling each energy source, storage and back-up system. The induced optimization problem is to compute the optimal operation control of the system with the aim of minimizing operation costs while efficiently and reliably responding to the load energy requirement. Current optimization research and development on hybrid systems are mainly focusing on the sizing aspect. Thus, the aim of this paper is to report on the state-of-the-art of optimal operation control of hybrid renewable energy systems. This paper also discusses different challenges encountered, as well as future developments that can help in improving the optimal operation control of hybrid renewable energy systems.

Keywords: renewable energies, hybrid systems, optimization, operation control

Procedia PDF Downloads 379
22531 Double Layer Security Model for Identification Friend or Foe

Authors: Buse T. Aydın, Enver Ozdemir

Abstract:

In this study, a double layer authentication scheme between the aircraft and the Air Traffic Control (ATC) tower is designed to prevent any unauthorized aircraft from introducing themselves as friends. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or foe according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as a friend. In this method, even if embedded key is captured by the enemy aircraft, without the information of the second layer, the enemy can easily be determined. Overall, in this work, we present a more reliable system by adding a physical layer in the authentication process.

Keywords: ADS-B, communication with physical layer security, cryptography, identification friend or foe

Procedia PDF Downloads 161
22530 Food for Health: Understanding the Importance of Food Safety in the Context of Food Security

Authors: Carmen J. Savelli, Romy Conzade

Abstract:

Background: Access to sufficient amounts of safe and nutritious food is a basic human necessity, required to sustain life and promote good health. Food safety and food security are therefore inextricably linked, yet the importance of food safety in this relationship is often overlooked. Methodologies: A literature review and desk study were conducted to examine existing frameworks for discussing food security, especially from an international perspective, to determine the entry points for enhancing considerations for food safety in national and international policies. Major Findings: Food security is commonly understood as the state when all people at all times have physical, social and economic access to sufficient, safe and nutritious food to meet their dietary needs and food preferences for an active and healthy life. Conceptually, food security is built upon four pillars including food availability, access, utilization and stability. Within this framework, the safety of food is often wrongly assumed as a given. However, in places where food supplies are insufficient, coping mechanisms for food insecurity are primarily focused on access to food without considerations for ensuring safety. Under such conditions, hygiene and nutrition are often ignored as people shift to less nutritious diets and consume more potentially unsafe foods, in which chemical, microbiological, zoonotic and other hazards can pose serious, acute and chronic health risks. While food supplies might be safe and nutritious, if consumed in quantities insufficient to support normal growth, health and activity, the result is hunger and famine. Recent estimates indicate that at least 842 million people, or roughly one in eight, still suffer from chronic hunger. Even if people eat enough food that is safe, they will become malnourished if the food does not provide the proper amounts of micronutrients and/or macronutrients to meet daily nutritional requirements, resulting in under- or over-nutrition. Two billion people suffer from one or more micronutrient deficiencies and over half a billion adults are obese. Access to sufficient amounts of nutritious food is not enough. If food is unsafe, whether arising from poor quality supplies or inadequate treatment and preparation, it increases the risk of foodborne infections such as diarrhoea. 70% of diarrhoea episodes occurring annually in children under five are due to biologically contaminated food. Conclusions: An integrated approach is needed where food safety and nutrition are systematically introduced into mainstream food system policies and interventions worldwide in order to achieve health and development goals. A new framework, “Food for Health” is proposed to guide policy development and requires all three aspects of food security to be addressed in balance: sufficiency, nutrition and safety.

Keywords: food safety, food security, nutrition, policy

Procedia PDF Downloads 422
22529 On the Path of Radicalization: Policing of Muslim Americans Post 9/11

Authors: Hagar Elsayed

Abstract:

This case study examines the framing of the diverse populations of Arab, Muslim and South Asian immigrants and their descendants in local communities by both federal and local law enforcement agencies. It explores how urban spaces and policing are constructed as necessary components of national security in the context of the war on terror by focusing on practices employed in local spaces such as Dearborn, Michigan and training methods adopted on a national level. The proliferation of American Arabs as ‘terrorist’ works to legitimize not only increasing state surveillance, but also military strategies which infringe on ‘inside’ spaces. Sustaining these progressively militarized civil policing operations, which demand intense mobilization of state power, requires that whole neighborhoods and districts are reimagined to portray these geographies in a certain light. This case study is central in understanding how Arab, South Asian, and Muslim civilians’ transformation into a “national security” issue have created militarized police enforcement agencies that employ military tactics to map the terrain of Otherness. This study looks at how race factors into key recent incidents, and asks whether this militarization builds from past forms of racist policing, and whether these specific incidents are reflective of larger patterns or whether they are just isolated incidents.

Keywords: American-Muslims, Arabs, militarization, policing

Procedia PDF Downloads 136
22528 Robust Data Image Watermarking for Data Security

Authors: Harsh Vikram Singh, Ankur Rai, Anand Mohan

Abstract:

In this paper, we propose secure and robust data hiding algorithm based on DCT by Arnold transform and chaotic sequence. The watermark image is scrambled by Arnold cat map to increases its security and then the chaotic map is used for watermark signal spread in middle band of DCT coefficients of the cover image The chaotic map can be used as pseudo-random generator for digital data hiding, to increase security and robustness .Performance evaluation for robustness and imperceptibility of proposed algorithm has been made using bit error rate (BER), normalized correlation (NC), and peak signal to noise ratio (PSNR) value for different watermark and cover images such as Lena, Girl, Tank images and gain factor .We use a binary logo image and text image as watermark. The experimental results demonstrate that the proposed algorithm achieves higher security and robustness against JPEG compression as well as other attacks such as addition of noise, low pass filtering and cropping attacks compared to other existing algorithm using DCT coefficients. Moreover, to recover watermarks in proposed algorithm, there is no need to original cover image.

Keywords: data hiding, watermarking, DCT, chaotic sequence, arnold transforms

Procedia PDF Downloads 515
22527 Numerical Investigation of Supertall Buildings and Using Aerodynamic Characteristics to Create New Wind Power Sources

Authors: Mohammad A. Masoumi, Mohammad Zare, Soroush Sabouki

Abstract:

This study investigates the aerodynamic characteristics of supertall buildings to evaluate wind turbine installation at high altitudes. Most recent studies have investigated supertall buildings at a horizontal plane, while a vertical plan could be as important, especially to install wind turbines. A typical square-plan building with a height of 500 m is investigated numerically at horizontal and vertical plans to evaluate wind power generation potentials. The results show good agreement with experimental data and past studies. Then four new geometries are proposed to improvise regions at high altitudes to install wind turbines. Evaluating the simulations shows two regions with high power density, which have the possibility to install wind turbines. Results show that improvised regions to install wind turbines at high altitudes contain significant power density while higher power density is found behind buildings in a far distance. In addition, power density fluctuations behind buildings are investigated, which show decreasing fluctuations by reaching 50 m altitude while altitudes lower than 20 m have the most fluctuations.

Keywords: wind power, supertall building, power density, aerodynamic characteristics, wind turbine mobile, quality assurance, testing, applications

Procedia PDF Downloads 168
22526 Grain and Grain Boundary Behavior of Sm Substituted Barium Titanate Based Ceramics

Authors: Parveen Kumar, J. K. Juneja, Chandra Prakash, K. K. Raina

Abstract:

A series of polycrystalline ferroelectric ceramics with compositional formula Ba0.80-xSmxPb0.20Ti0.90Zr0.10O3 with x varying from 0 to 0.01 in the steps of 0.0025 has been prepared by solid state reaction method. The dielectric constant and tangent loss was measured as a function of frequency from 100Hz to 1MHz at different temperatures (200-500oC). The electrical behavior was then investigated using complex impedance spectroscopy (CIS) technique. From the CIS study, it has been found that there is a contribution of both grain and grain boundary in the electrical behavior of such ceramics. Grain and grain boundary resistivity and capacitance were calculated at different temperature using CIS technique. The present paper is about the discussion of grain and grain boundary contribution towards the electrical properties of Sm modified BaTiO3 based ceramics at high temperature.

Keywords: grain, grain boundary, impedance, dielectric

Procedia PDF Downloads 398
22525 A Comparative Analysis of Various Companding Techniques Used to Reduce PAPR in VLC Systems

Authors: Arushi Singh, Anjana Jain, Prakash Vyavahare

Abstract:

Recently, Li-Fi(light-fiedelity) has been launched based on VLC(visible light communication) technique, 100 times faster than WiFi. Now 5G mobile communication system is proposed to use VLC-OFDM as the transmission technique. The VLC system focused on visible rays, is considered for efficient spectrum use and easy intensity modulation through LEDs. The reason of high speed in VLC is LED, as they flicker incredibly fast(order of MHz). Another advantage of employing LED is-it acts as low pass filter results no out-of-band emission. The VLC system falls under the category of ‘green technology’ for utilizing LEDs. In present scenario, OFDM is used for high data-rates, interference immunity and high spectral efficiency. Inspite of the advantages OFDM suffers from large PAPR, ICI among carriers and frequency offset errors. Since, the data transmission technique used in VLC system is OFDM, the system suffers the drawbacks of OFDM as well as VLC, the non-linearity dues to non-linear characteristics of LED and PAPR of OFDM due to which the high power amplifier enters in non-linear region. The proposed paper focuses on reduction of PAPR in VLC-OFDM systems. Many techniques are applied to reduce PAPR such as-clipping-introduces distortion in the carrier; selective mapping technique-suffers wastage of bandwidth; partial transmit sequence-very complex due to exponentially increased number of sub-blocks. The paper discusses three companding techniques namely- µ-law, A-law and advance A-law companding technique. The analysis shows that the advance A-law companding techniques reduces the PAPR of the signal by adjusting the companding parameter within the range. VLC-OFDM systems are the future of the wireless communication but non-linearity in VLC-OFDM is a severe issue. The proposed paper discusses the techniques to reduce PAPR, one of the non-linearities of the system. The companding techniques mentioned in this paper provides better results without increasing the complexity of the system.

Keywords: non-linear companding techniques, peak to average power ratio (PAPR), visible light communication (VLC), VLC-OFDM

Procedia PDF Downloads 286
22524 The Influence of the Islamic State (IS) on India: Recent Developments and Challenges

Authors: Alvite Singh Ningthoujam

Abstract:

The most recent terror phenomenon, which is also known as the Islamic State of Iraq and Syria (ISIS), or Islamic State (IS), has its influence felt in South Asia. This dreaded Sunni militant group, today, has become a concern in India as well. Already affected by various terror activities in the country, the influence of the IS on the radicalised Muslim youths in India has been watched closely by the security agencies. There had already been a few IS-related incidents in India due to which this issue has emerged as a threat or challenge to India’s internal security. The rapid radicalisation of youths in a few states where there are sizeable Muslim populations has gone, to some extent, in favour of the IS, particularly in the terror outfit’s recruitment process. What has added to the worry of the Indian security agencies is the announcement of the Al-Qaeda leader, Ayman al-Zawahari, of the creation of the Al-Qaeda in the Indian Subcontinent. In fact, this is a worrisome factor as both the militant groups, that is, al-Qaeda and ISIS, have a similar objective to target India and to turn this South Asian country as one of the recruiting grounds for extremists. There is also a possibility that an Indian Mujahedeen (IM) man was believed to be instrumental in recruiting for the ISIS poor Muslims in a few Indian states. If this nexus between ISIS and India’s home-grown terror groups manages to establish a robust link, then the headache of combating such amalgamated force will be a hard task for Indian security agencies. In the wake of the above developments, this paper would seek to analyse the developing trend in India in regard to IS. It would also bring out the reasons as to why further penetration of the IS influence on India would be a grave concern in the internal security of the country. The last section of the paper would highlight the steps that have been taken by the Indian government to tackle this menace effectively.

Keywords: India, Islamic State, Muslim, Security

Procedia PDF Downloads 376
22523 Sororicide in the Forbidden City: Women Oppressing Each Other in the Chinese TV Drama “The Legend of Zhen Huan”

Authors: Muriel Canas-Walker

Abstract:

The 2012 TV series "The Legend of Zhen Huan" is one of the most popular and influential historical dramas on Chinese television and is regularly discussed on Chinese social media such as Weibo. Set in the Qing dynasty, the 76 episodes series features palace intrigues focused on female characters. In the Forbidden City, concubines must survive the cruelty of an extreme polygamy system, constantly competing against each other. The patriarchal oppression of the women sequestred in the harem relies on fierce female competition and does not leave much room for compassion. Using Michel Foucault’s theory of power, feminist theories, and visual anthropology, this paper analyzes the complex relationships between the female characters, from their rise to power to their fall from grace, from alliances to betrayals, from sorority to sororicide. This analysis aims to understand what makes this series particularly popular with young female audiences in China and explain its importance in Chinese media.

Keywords: Chinese TV Drama, feminism, popular culture, Theory of Power

Procedia PDF Downloads 193
22522 Analysis of Pollution in Agriculture Land Using Decagon Em-50 and Rock Magnetism Method

Authors: Adinda Syifa Azhari, Eleonora Agustine, Dini Fitriani

Abstract:

This measurement has been done to analyze the impact of industrial pollution on the environment. Our research is to indicate the soil which has contained some pollution by industrial activity around the area, especially in Sumedang, West Java. The parameter phsyics such as total dissolved solid, volumetric water content, electrical conductivity bulk and FD have shown that the soil has polluted and measured by Decagon EM 50. Decagon EM 50 is one of the geophysical environment instrumentation that is used to interpret the soil condition. This experiment has given a result of these parameter physics, these are: Volumetric water content (m³/m³) = 0,154 – 0,384; Electrical Conductivity Bulk (dS/m) = 0,29 – 1,11 ; Dielectric Permittivity (DP) = 77,636 – 78, 339.Based on these data, we have got the conclusion that the area has, in fact, been contaminated by dangerous materials. VWC is parameter physics that has shown water in soil. The data show the pollution of the soil at the place, of which the specifications are PH, Total Dissolved Solid (TDS), Electrical Conductivity (EC) bigger (>>) and Frequency Dependent (FD) smaller (<<); that means the soil is alkali with big grain and has high salt concentration.

Keywords: Decagon EM 50, electrical conductivity, industrial textiles, land, pollution

Procedia PDF Downloads 381
22521 Investigation of Axisymmetric Bimetallic Tube Extrusion with Conic Die

Authors: A. Eghbali, M. Goodarzi, M. Hagh Panahi

Abstract:

In this article process of direct extrusion of axisymmetric bimetallic tube with conic die profile and constant Mandrel by upper bound method has been analyzed and finite element method is simulated. Deformation area is divided into six smaller deformation areas and are calculated by presenting two generalized velocity field and applicable input and output sections separately (velocity profile with logarithmic curve for input section and spherical velocity profile for materials output ) for each die profile in spherical coordinate system strain rate values in every deformation area. After internal power, shearing power and material friction power is obtained, extrusion force is calculated. The results of upper bound analysis method with given results from other researcher's experiments and simulation by finite parts method (Abaqus software) are compared for conic die.

Keywords: extrusion, upper bound, axisy metric, deformation velocity field

Procedia PDF Downloads 376