Search results for: symmetric cryptography
155 Performance Evaluation of an Efficient Asynchronous Protocol for WDM Ring MANs
Authors: Baziana Peristera
Abstract:
The idea of the asynchronous transmission in wavelength division multiplexing (WDM) ring MANs is studied in this paper. Especially, we present an efficient access technique to coordinate the collisions-free transmission of the variable sizes of IP traffic in WDM ring core networks. Each node is equipped with a tunable transmitter and a tunable receiver. In this way, all the wavelengths are exploited for both transmission and reception. In order to evaluate the performance measures of average throughput, queuing delay and packet dropping probability at the buffers, a simulation model that assumes symmetric access rights among the nodes is developed based on Poisson statistics. Extensive numerical results show that the proposed protocol achieves apart from high bandwidth exploitation for a wide range of offered load, fairness of queuing delay and dropping events among the different packets size categories.Keywords: asynchronous transmission, collision avoidance, wavelength division multiplexing, WDM
Procedia PDF Downloads 375154 Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve
Authors: Eun-Jun Yoon
Abstract:
Deniable authentication protocol is a new security authentication mechanism which can enable a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. In 2013, Kar proposed a secure ID-based deniable authentication protocol whose security is based on computational infeasibility of solving Elliptic Curve Diffie-Hellman Problem (ECDHP). Kar claimed that the proposed protocol achieves properties of deniable authentication, mutual authentication, and message confidentiality. However, this paper points out that Kar's protocol still suffers from sender spoofing attack and message modification attack unlike its claims.Keywords: deniable authentication, elliptic curve cryptography, Diffie-Hellman problem, cryptanalysis
Procedia PDF Downloads 332153 Bypassing Docker Transport Layer Security Using Remote Code Execution
Authors: Michael J. Hahn
Abstract:
Docker is a powerful tool used by many companies such as PayPal, MetLife, Expedia, Visa, and many others. Docker works by bundling multiple applications, binaries, and libraries together on top of an operating system image called a container. The container runs on a Docker engine that in turn runs on top of a standard operating system. This centralization saves a lot of system resources. In this paper, we will be demonstrating how to bypass Transport Layer Security and execute remote code within Docker containers built on a base image of Alpine Linux version 3.7.0 through the use of .apk files due to flaws in the Alpine Linux package management program. This exploit renders any applications built using Docker with a base image of Alpine Linux vulnerable to unwanted outside forces.Keywords: cloud, cryptography, Docker, Linux, security
Procedia PDF Downloads 198152 2D RF ICP Torch Modelling with Fluid Plasma
Authors: Mokhtar Labiod, Nabil Ikhlef, Keltoum Bouherine, Olivier Leroy
Abstract:
A numerical model for the radio-frequency (RF) Argon discharge chamber is developed to simulate the low pressure low temperature inductively coupled plasma. This model will be of fundamental importance in the design of the plasma magnetic control system. Electric and magnetic fields inside the discharge chamber are evaluated by solving a magnetic vector potential equation. To start with, the equations of the ideal magnetohydrodynamics theory will be presented describing the basic behaviour of magnetically confined plasma and equations are discretized with finite element method in cylindrical coordinates. The discharge chamber is assumed to be axially symmetric and the plasma is treated as a compressible gas. Plasma generation due to ionization is added to the continuity equation. Magnetic vector potential equation is solved for the electromagnetic fields. A strong dependence of the plasma properties on the discharge conditions and the gas temperature is obtained.Keywords: direct-coupled model, magnetohydrodynamic, modelling, plasma torch simulation
Procedia PDF Downloads 433151 Unsteady Similarity Solution for a Slender Dry Patch in a Thin Newtonian Fluid Film
Authors: S. S. Abas, Y. M. Yatim
Abstract:
In this paper the unsteady, slender, symmetric dry patch in an infinitely wide and thin liquid film of Newtonian fluid draining under gravity down an inclined plane in the presence of strong surface-tension effect is considered. A similarity transformation, named a travelling-wave similarity solution is used to reduce the governing partial differential equation into the ordinary differential equation which is then solved numerically using a shooting method. The introduction of surface-tension effect on the flow leads to a fourth-order ordinary differential equation. The solution obtained predicts that the dry patch has a quartic shape and the free surface has a capillary ridge near the contact line which decays in an oscillatory manner far from it.Keywords: dry patch, Newtonian fluid, similarity solution, surface-tension effect, travelling-wave, unsteady thin-film flow
Procedia PDF Downloads 303150 Computer Aided Engineering Optimization of Synchronous Reluctance Motor and Vibro-Acoustic Analysis for Lift Systems
Authors: Ezio Bassi, Francesco Vercesi, Francesco Benzi
Abstract:
The aim of this study is to evaluate the potentiality of synchronous reluctance motors for lift systems by also evaluating the vibroacoustic behaviour of the motor. Two types of synchronous machines are designed, analysed, and compared with an equivalent induction motor, which is the more common solution in such gearbox applications. The machines' performance are further improved with optimization procedures based on multiobjective optimization genetic algorithm (MOGA). The difference between the two synchronous motors consists in the rotor geometry; a symmetric and an asymmetric rotor design were investigated. The evaluation of the vibroacoustic performance has been conducted with a multi-variable model and finite element software taking into account electromagnetic, mechanical, and thermal features of the motor, therefore carrying out a multi-physics analysis of the electrical machine.Keywords: synchronous reluctance motor, vibro-acoustic, lift systems, genetic algorithm
Procedia PDF Downloads 178149 A Blockchain-Based Privacy-Preserving Physical Delivery System
Authors: Shahin Zanbaghi, Saeed Samet
Abstract:
The internet has transformed the way we shop. Previously, most of our purchases came in the form of shopping trips to a nearby store. Now, it’s as easy as clicking a mouse. But with great convenience comes great responsibility. We have to be constantly vigilant about our personal information. In this work, our proposed approach is to encrypt the information printed on the physical packages, which include personal information in plain text, using a symmetric encryption algorithm; then, we store that encrypted information into a Blockchain network rather than storing them in companies or corporations centralized databases. We present, implement and assess a blockchain-based system using Ethereum smart contracts. We present detailed algorithms that explain the details of our smart contract. We present the security, cost, and performance analysis of the proposed method. Our work indicates that the proposed solution is economically attainable and provides data integrity, security, transparency, and data traceability.Keywords: blockchain, Ethereum, smart contract, commit-reveal scheme
Procedia PDF Downloads 150148 Cellular Automata Model for Car Accidents at a Signalized Intersection
Authors: Rachid Marzoug, Noureddine Lakouari, Beatriz Castillo Téllez, Margarita Castillo Téllez, Gerardo Alberto Mejía Pérez
Abstract:
This paper developed a two-lane cellular automata model to explain the relationship between car accidents at a signalized intersection and traffic-related parameters. It is found that the increase of the lane-changing probability P?ₕ? increases the risk of accidents, besides, the inflow α and the probability of accidents Pₐ? exhibit a nonlinear relationship. Furthermore, depending on the inflow, Pₐ? exhibits three different phases. The transition from phase I to phase II is of first (second) order when P?ₕ?=0 (P?ₕ?>0). However, the system exhibits a second (first) order transition from phase II to phase III when P?ₕ?=0 (P?ₕ?>0). In addition, when the inflow is not very high, the green light length of one road should be increased to improve road safety. Finally, simulation results show that the traffic at the intersection is safer adopting symmetric lane-changing rules than asymmetric ones.Keywords: two-lane intersection, accidents, fatality risk, lane-changing, phase transition
Procedia PDF Downloads 218147 Localization of Near Field Radio Controlled Unintended Emitting Sources
Authors: Nurbanu Guzey, S. Jagannathan
Abstract:
Locating radio controlled (RC) devices using their unintended emissions has a great interest considering security concerns. Weak nature of these emissions requires near field localization approach since it is hard to detect these signals in far field region of array. Instead of only angle estimation, near field localization also requires range estimation of the source which makes this method more complicated than far field models. Challenges of locating such devices in a near field region and real time environment are analyzed in this paper. An ESPRIT like near field localization scheme is utilized for both angle and range estimation. 1-D search with symmetric subarrays is provided. Two 7 element uniform linear antenna arrays (ULA) are employed for locating RC source. Experiment results of location estimation for one unintended emitting walkie-talkie for different positions are given.Keywords: localization, angle of arrival (AoA), range estimation, array signal processing, ESPRIT, Uniform Linear Array (ULA)
Procedia PDF Downloads 526146 The Influence of Oil Price Fluctuations on Macroeconomics Variables of the Kingdom of Saudi Arabia
Authors: Khalid Mujaljal, Hassan Alhajhoj
Abstract:
This paper empirically investigates the influence of oil price fluctuations on the key macroeconomic variables of the Kingdom of Saudi Arabia using unrestricted VAR methodology. Two analytical tools- Granger-causality and variance decomposition are used. The Granger-causality test reveals that almost all specifications of oil price shocks significantly Granger-cause GDP and demonstrates evidence of causality between oil price changes and money supply (M3) and consumer price index percent (CPIPC) in the case of positive oil price shocks. Surprisingly, almost all specifications of oil price shocks do not Granger-cause government expenditure. The outcomes from variance decomposition analysis suggest that positive oil shocks contribute about 25 percent in causing inflation in the country. Also, contribution of symmetric linear oil price shocks and asymmetric positive oil price shocks is significant and persistent with 25 percent explaining variation in world consumer price index till end of the period.Keywords: Granger causality, oil prices changes, Saudi Arabian economy, variance decomposition
Procedia PDF Downloads 322145 Anti-Phase Synchronization of Complex Delayed Networks with Output Coupling via Pinning Control
Authors: Chanyuan Gu, Shouming Zhong
Abstract:
Synchronization is a fundamental phenomenon that enables coherent behavior in networks as a result of interactions. The purpose of this research had been to investigate the problem of anti-phase synchronization for complex delayed dynamical networks with output coupling. The coupling configuration is general, with the coupling matrix not assumed to be symmetric or irreducible. The amount of the coupling variables between two connected nodes is flexible, the nodes in the drive and response systems need not to be identical and there is not any extra constraint on the coupling matrix. Some pinning controllers are designed to make the drive-response system achieve the anti-phase synchronization. For the convenience of description, we applied the matrix Kronecker product. Some new criteria are proposed based on the Lyapunov stability theory, linear matrix inequalities (LMI) and Schur complement. Lastly, some simulation examples are provided to illustrate the effectiveness of our proposed conditions.Keywords: anti-phase synchronization, complex networks, output coupling, pinning control
Procedia PDF Downloads 394144 Accelerated Expansion of a Matter-Antimatter Universe and Gravity as an Electromagnetic Force
Authors: Maarten J. Van der Burgt
Abstract:
A universe containing matter and antimatter can only exist when matter and antimatter repel each other. Such a system, where like attracts like and like repels unlike, will always expand. Calculations made for such a symmetric universe demonstrate that the expansion is consistent with Hubble’s law, the observed increase in the expansion velocity with time, the initial high acceleration and the foam structure of the universe. Conversely, these observations can be considered as proof for a symmetrical universe and for antimatter possessing a negative gravitational mass. A second proof can be found by reinterpreting the behavior of relativistic moving charged particles. Attributing their behavior to a charge defect of √(1-v2/c2) instead of to a mass defect of 1/√(1-v2/c2) makes it plausible that gravitation is an electromagnetic force, as already suggested by Feynman. This would automatically imply that antimatter has a negative gravitational mass. These proofs underpin the untenability of the Weak Equivalence Principle which states that in a gravitational field all structure less point-like particles follow the same path.Keywords: celestial mechanics, cosmology, gravitation astrophysics, origin of structure, miscellaneous (matter and antimatter)
Procedia PDF Downloads 228143 Hybrid Robust Estimation via Median Filter and Wavelet Thresholding with Automatic Boundary Correction
Authors: Alsaidi M. Altaher, Mohd Tahir Ismail
Abstract:
Wavelet thresholding has been a power tool in curve estimation and data analysis. In the presence of outliers this non parametric estimator can not suppress the outliers involved. This study proposes a new two-stage combined method based on the use of the median filter as primary step before applying wavelet thresholding. After suppressing the outliers in a signal through the median filter, the classical wavelet thresholding is then applied for removing the remaining noise. We use automatic boundary corrections; using a low order polynomial model or local polynomial model as a more realistic rule to correct the bias at the boundary region; instead of using the classical assumptions such periodic or symmetric. A simulation experiment has been conducted to evaluate the numerical performance of the proposed method. Results show strong evidences that the proposed method is extremely effective in terms of correcting the boundary bias and eliminating outlier’s sensitivity.Keywords: boundary correction, median filter, simulation, wavelet thresholding
Procedia PDF Downloads 428142 Robust Image Design Based Steganographic System
Authors: Sadiq J. Abou-Loukh, Hanan M. Habbi
Abstract:
This paper presents a steganography to hide the transmitted information without excite suspicious and also illustrates the level of secrecy that can be increased by using cryptography techniques. The proposed system has been implemented firstly by encrypted image file one time pad key and secondly encrypted message that hidden to perform encryption followed by image embedding. Then the new image file will be created from the original image by using four triangles operation, the new image is processed by one of two image processing techniques. The proposed two processing techniques are thresholding and differential predictive coding (DPC). Afterwards, encryption or decryption keys are generated by functional key generator. The generator key is used one time only. Encrypted text will be hidden in the places that are not used for image processing and key generation system has high embedding rate (0.1875 character/pixel) for true color image (24 bit depth).Keywords: encryption, thresholding, differential predictive coding, four triangles operation
Procedia PDF Downloads 493141 Implementation and Performance Analysis of Data Encryption Standard and RSA Algorithm with Image Steganography and Audio Steganography
Authors: S. C. Sharma, Ankit Gambhir, Rajeev Arya
Abstract:
In today’s era data security is an important concern and most demanding issues because it is essential for people using online banking, e-shopping, reservations etc. The two major techniques that are used for secure communication are Cryptography and Steganography. Cryptographic algorithms scramble the data so that intruder will not able to retrieve it; however steganography covers that data in some cover file so that presence of communication is hidden. This paper presents the implementation of Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) Algorithm with Image and Audio Steganography and Data Encryption Standard (DES) Algorithm with Image and Audio Steganography. The coding for both the algorithms have been done using MATLAB and its observed that these techniques performed better than individual techniques. The risk of unauthorized access is alleviated up to a certain extent by using these techniques. These techniques could be used in Banks, RAW agencies etc, where highly confidential data is transferred. Finally, the comparisons of such two techniques are also given in tabular forms.Keywords: audio steganography, data security, DES, image steganography, intruder, RSA, steganography
Procedia PDF Downloads 290140 Using the Cluster Computing to Improve the Computational Speed of the Modular Exponentiation in RSA Cryptography System
Authors: Te-Jen Chang, Ping-Sheng Huang, Shan-Ten Cheng, Chih-Lin Lin, I-Hui Pan, Tsung- Hsien Lin
Abstract:
RSA system is a great contribution for the encryption and the decryption. It is based on the modular exponentiation. We call this system as “a large of numbers for calculation”. The operation of a large of numbers is a very heavy burden for CPU. For increasing the computational speed, in addition to improve these algorithms, such as the binary method, the sliding window method, the addition chain method, and so on, the cluster computer can be used to advance computational speed. The cluster system is composed of the computers which are installed the MPICH2 in laboratory. The parallel procedures of the modular exponentiation can be processed by combining the sliding window method with the addition chain method. It will significantly reduce the computational time of the modular exponentiation whose digits are more than 512 bits and even more than 1024 bits.Keywords: cluster system, modular exponentiation, sliding window, addition chain
Procedia PDF Downloads 522139 Transforming Healthcare Data Privacy: Integrating Blockchain with Zero-Knowledge Proofs and Cryptographic Security
Authors: Kenneth Harper
Abstract:
Blockchain technology presents solutions for managing healthcare data, addressing critical challenges in privacy, integrity, and access. This paper explores how privacy-preserving technologies, such as zero-knowledge proofs (ZKPs) and homomorphic encryption (HE), enhance decentralized healthcare platforms by enabling secure computations and patient data protection. An examination of the mathematical foundations of these methods, their practical applications, and how they meet the evolving demands of healthcare data security is unveiled. Using real-world examples, this research highlights industry-leading implementations and offers a roadmap for future applications in secure, decentralized healthcare ecosystems.Keywords: blockchain, cryptography, data privacy, decentralized data management, differential privacy, healthcare, healthcare data security, homomorphic encryption, privacy-preserving technologies, secure computations, zero-knowledge proofs
Procedia PDF Downloads 18138 Two Quasiparticle Rotor Model for Deformed Nuclei
Authors: Alpana Goel, Kawalpreet Kalra
Abstract:
The study of level structures of deformed nuclei is the most complex topic in nuclear physics. For the description of level structure, a simple model is good enough to bring out the basic features which may then be further refined. The low lying level structures of these nuclei can, therefore, be understood in terms of Two Quasiparticle plus axially symmetric Rotor Model (TQPRM). The formulation of TQPRM for deformed nuclei has been presented. The analysis of available experimental data on two quasiparticle rotational bands of deformed nuclei present unusual features like signature dependence, odd-even staggering, signature inversion and signature reversal in two quasiparticle rotational bands of deformed nuclei. These signature effects are well discussed within the framework of TQPRM. The model is well efficient in reproducing the large odd-even staggering and anomalous features observed in even-even and odd-odd deformed nuclei. The effect of particle-particle and the Coriolis coupling is well established from the model. Detailed description of the model with implications to deformed nuclei is presented in the paper.Keywords: deformed nuclei, signature effects, signature inversion, signature reversal
Procedia PDF Downloads 158137 Large Amplitude Vibration of Sandwich Beam
Authors: Youssef Abdelli, Rachid Nasri
Abstract:
The large amplitude free vibration analysis of three-layered symmetric sandwich beams is carried out using two different approaches. The governing nonlinear partial differential equations of motion in free natural vibration are derived using Hamilton's principle. The formulation leads to two nonlinear partial differential equations that are coupled both in axial and binding deformations. In the first approach, the method of multiple scales is applied directly to the governing equation that is a nonlinear partial differential equation. In the second approach, we discretize the governing equation by using Galerkin's procedure and then apply the shooting method to the obtained ordinary differential equations. In order to check the validity of the solutions obtained by the two approaches, they are compared with the solutions obtained by two approaches; they are compared with the solutions obtained numerically by the finite difference method.Keywords: finite difference method, large amplitude vibration, multiple scales, nonlinear vibration
Procedia PDF Downloads 463136 FPGA Implementation of Novel Triangular Systolic Array Based Architecture for Determining the Eigenvalues of Matrix
Authors: Soumitr Sanjay Dubey, Shubhajit Roy Chowdhury, Rahul Shrestha
Abstract:
In this paper, we have presented a novel approach of calculating eigenvalues of any matrix for the first time on Field Programmable Gate Array (FPGA) using Triangular Systolic Arra (TSA) architecture. Conventionally, additional computation unit is required in the architecture which is compliant to the algorithm for determining the eigenvalues and this in return enhances the delay and power consumption. However, recently reported works are only dedicated for symmetric matrices or some specific case of matrix. This works presents an architecture to calculate eigenvalues of any matrix based on QR algorithm which is fully implementable on FPGA. For the implementation of QR algorithm we have used TSA architecture, which is further utilising CORDIC (CO-ordinate Rotation DIgital Computer) algorithm, to calculate various trigonometric and arithmetic functions involved in the procedure. The proposed architecture gives an error in the range of 10−4. Power consumption by the design is 0.598W. It can work at the frequency of 900 MHz.Keywords: coordinate rotation digital computer, three angle complex rotation, triangular systolic array, QR algorithm
Procedia PDF Downloads 415135 The Pile Group Efficiency for Different Embedment Lengths in Dry Sand
Authors: Mohamed M. Shahin
Abstract:
This study investigated the design of the pile foundation to support heavy structures-especially bridges for highways-in the Sahara, which contains many dunes of medium dense sand in different levels, where the foundation is supposed to be piles. The base resistance of smooth model pile groups in sand under static loading is investigated experimentally in a pile soil test apparatus. Improvement were made to the sand around the piles in order to increase the shaft resistance of the single pile and the pile groups, and also base resistance especially for the central pile in pile groups. The study outlines the behaviour of a single-pile, 4-, 5-, and 9- pile groups arranged in a doubly symmetric [square] layout with different embedment lengths and pile spacing in loose dry sand [normal] and dense dry sand [compacted] around the piles. This study evaluate the variation of the magnitude and the proportion of end bearing capacity of individual piles in different pile groups. Also to investigate the magnitude of the efficiency coefficient in the case of different pile groups.Keywords: pile group, base resistance, efficiency coefficient, pile spacing, pile-soil interaction
Procedia PDF Downloads 363134 Volatility Spillover Among the Stock Markets of South Asian Countries
Authors: Tariq Aziz, Suresh Kumar, Vikesh Kumar, Sheraz Mustafa, Jhanzeb Marwat
Abstract:
The paper provides an updated version of volatility spillover among the equity markets of South Asian countries, including Pakistan, India, Srilanka, and Bangladesh. The analysis uses both symmetric and asymmetric Generalized Autoregressive Conditional Heteroscedasticity models to investigate volatility persistence and leverage effect. The bivariate EGARCH model is used to test for volatility transmission between two equity markets. Weekly data for the period February 2013 to August 2019 is used for empirical analysis. The findings indicate that the leverage effect exists in the equity markets of all the countries except Bangladesh. The volatility spillover from the equity market of Bangladesh to all other countries is negative and significant whereas the volatility of the equity market of Sri-Lanka does influence the volatility of any other country’s equity market. Indian equity market influence only the volatility of the Sri-Lankan equity market; and there is bidirectional volatility spillover between the equity markets of Pakistan and Bangladesh. The findings are important for policy-makers and international investors.Keywords: volatility spillover, volatility persistence, garch, egarch
Procedia PDF Downloads 139133 Longitudinal Vortices Mixing in Three-Stream Micromixers with Two Inlets
Authors: Yi-Tun Huang, Chih-Yang Wu, Shu-Wei Huang
Abstract:
In this work, we examine fluid mixing in a full three-stream mixing channel with longitudinal vortex generators (LVGs) built on the channel bottom by numerical simulation and experiment. The effects of the asymmetrical arrangement and the attack angle of the LVGs on fluid mixing are investigated. The results show that the micromixer with LVGs at a small asymmetry index (defined by the ratio of the distance from the center plane of the gap between the winglets to the center plane of the main channel to the width of the main channel) is superior to the micromixer with symmetric LVGs and that with LVGs at a large asymmetry index. The micromixer using five mixing modules of the LVGs with an attack angle between 16.5 degrees and 22.5 degrees can achieve excellent mixing over a wide range of Reynolds numbers. Here, we call a section of channel with two pairs of staggered asymmetrical LVGs a mixing module. Besides, the micromixer with LVGs at a small attack angle is more efficient than that with a larger attack angle when pressure losses are taken into account.Keywords: microfluidics, mixing, longitudinal vortex generators, two stream interfaces
Procedia PDF Downloads 521132 Biocarbon for High-Performance Supercapacitors Derived from the Wastewater Treatment of Sewage Sludge
Authors: Santhosh Ravichandran, F. J. Rodríguez-Varela
Abstract:
In this study, a biocarbon (BC) was made from sewage sludge from the water treatment plant (PTAR) in Saltillo, Coahuila, Mexico. The sludge was carbonized in water and then chemically activated by pyrolysis. The biocarbon was evaluated physicochemically using XRD, SEM-EDS, and FESEM. A broad (002) peak attributable to graphitic structures indicates that the material is amorphous. The resultant biocarbon has a high specific surface area (412 m2 g-1), a large pore volume (0.39 cm3 g-1), interconnected hierarchical porosity, and outstanding electrochemical performance. It is appropriate for high-performance supercapacitor electrode materials due to its high specific capacitance of 358 F g-1, great rate capability, and outstanding cycling stability (around 87% capacitance retention after 10,000 cycles, even at a high current density of 19 A g-1). In an aqueous solution, the constructed BC/BC symmetric supercapacitor exhibits increased super capacitor behavior with a high energy density of 29.5 Whkg-1. The concept provides an efficient method for producing high-performance electrode materials for supercapacitors from conventional water treatment biomass wastes.Keywords: supercapacitors, carbon, material science, batteries
Procedia PDF Downloads 84131 Thermal Buckling of Functionally Graded Panel Based on Mori-Tanaka Scheme
Authors: Seok-In Bae, Young-Hoon Lee, Ji-Hwan Kim
Abstract:
Due to the asymmetry of the material properties of the Functionally Graded Materials(FGMs) in the thickness direction, neutral surface of the model is not the same as the mid-plane of the symmetric structure. In order to investigate the thermal bucking behavior of FGMs, neutral surface is chosen as a reference plane. In the model, material properties are assumed to be temperature dependent, and varied continuously in the thickness direction of the plate. Further, the effective material properties such as Young’s modulus and Poisson’s ratio are homogenized using Mori-Tanaka scheme which considers the interaction among adjacent inclusions. In this work, the finite element methods are used, and the first-order shear deformation theory of plate are accounted. The thermal loads are assumed to be uniform, linear and non-linear distribution through the thickness directions, respectively. Also, the effects of various parameters for thermal buckling behavior of FGM panel are discussed in detail.Keywords: functionally graded plate, thermal buckling analysis, neutral surface
Procedia PDF Downloads 401130 Effect of the Initial Billet Shape Parameters on the Final Product in a Backward Extrusion Process for Pressure Vessels
Authors: Archana Thangavelu, Han-Ik Park, Young-Chul Park, Joon-Hong Park
Abstract:
In this numerical study, we have proposed a method for evaluation of backward extrusion process of pressure vessel made up of steel. Demand for lighter and stiffer products have been increasing in the last years especially in automobile engineering. Through detailed finite element analysis, effective stress, strain and velocity profile have been obtained with optimal range. The process design of a forward and backward extrusion axe-symmetric part has been studied. Forging is mainly carried out because forged products are highly reliable and possess superior mechanical properties when compared to normal products. Performing computational simulations of 3D hot forging with various dimensions of billet and optimization of weight is carried out using Taguchi Orthogonal Array (OA) Optimization technique. The technique used in this study can be used for newly developed materials to investigate its forgeability for much complicated shapes in closed hot die forging process.Keywords: backward extrusion, hot forging, optimization, finite element analysis, Taguchi method
Procedia PDF Downloads 309129 A Study of General Attacks on Elliptic Curve Discrete Logarithm Problem over Prime Field and Binary Field
Authors: Tun Myat Aung, Ni Ni Hla
Abstract:
This paper begins by describing basic properties of finite field and elliptic curve cryptography over prime field and binary field. Then we discuss the discrete logarithm problem for elliptic curves and its properties. We study the general common attacks on elliptic curve discrete logarithm problem such as the Baby Step, Giant Step method, Pollard’s rho method and Pohlig-Hellman method, and describe in detail experiments of these attacks over prime field and binary field. The paper finishes by describing expected running time of the attacks and suggesting strong elliptic curves that are not susceptible to these attacks.cKeywords: discrete logarithm problem, general attacks, elliptic curve, prime field, binary field
Procedia PDF Downloads 233128 Optimization of Multiplier Extraction Digital Filter On FPGA
Authors: Shiksha Jain, Ramesh Mishra
Abstract:
One of the most widely used complex signals processing operation is filtering. The most important FIR digital filter are widely used in DSP for filtering to alter the spectrum according to some given specifications. Power consumption and Area complexity in the algorithm of Finite Impulse Response (FIR) filter is mainly caused by multipliers. So we present a multiplier less technique (DA technique). In this technique, precomputed value of inner product is stored in LUT. Which are further added and shifted with number of iterations equal to the precision of input sample. But the exponential growth of LUT with the order of FIR filter, in this basic structure, makes it prohibitive for many applications. The significant area and power reduction over traditional Distributed Arithmetic (DA) structure is presented in this paper, by the use of slicing of LUT to the desired length. An architecture of 16 tap FIR filter is presented, with different length of slice of LUT. The result of FIR Filter implementation on Xilinx ISE synthesis tool (XST) vertex-4 FPGA Tool by using proposed method shows the increase of the maximum frequency, the decrease of the resources as usage saving in area with more number of slices and the reduction dynamic power.Keywords: multiplier less technique, linear phase symmetric FIR filter, FPGA tool, look up table
Procedia PDF Downloads 390127 Separating Permanent and Induced Magnetic Signature: A Simple Approach
Authors: O. J. G. Somsen, G. P. M. Wagemakers
Abstract:
Magnetic signature detection provides sensitive detection of metal objects, especially in the natural environment. Our group is developing a tabletop setup for magnetic signatures of various small and model objects. A particular issue is the separation of permanent and induced magnetization. While the latter depends only on the composition and shape of the object, the former also depends on the magnetization history. With common deperming techniques, a significant permanent signature may still remain, which confuses measurements of the induced component. We investigate a basic technique of separating the two. Measurements were done by moving the object along an aluminum rail while the three field components are recorded by a detector attached near the center. This is done first with the rail parallel to the Earth magnetic field and then with anti-parallel orientation. The reversal changes the sign of the induced- but not the permanent magnetization so that the two can be separated. Our preliminary results on a small iron block show excellent reproducibility. A considerable permanent magnetization was indeed present, resulting in a complex asymmetric signature. After separation, a much more symmetric induced signature was obtained that can be studied in detail and compared with theoretical calculations.Keywords: magnetic signature, data analysis, magnetization, deperming techniques
Procedia PDF Downloads 451126 Piezoelectric Actuator for Controlling Robotics Organs
Authors: Lemoussi Somia, Ouali Mohammed, Zemirline Adel
Abstract:
In precision engineering, including precision positioning, micro-manipulation, robotic systems... a majority of these applications actuated by piezo stack used the compliant amplifier mechanism to amplifying motion and guiding it as needed utilize the flexibility of their components, in this paper, we present a novel approach introducing a symmetric structure comprising three stages, featuring rectangular flexure hinges with a compact size of 77mm×42mm×10mm. This design provides the capability for rotation, translation or a combination of both movements in both directions. The system allows for a displacement of 2107.5 μm when the input displacement of PZT is 50 μm while considering the material constraints of the aluminum alloy (7075 T6) which has a maximum admissible stress of 500 MPa However, our proposed design imposes additional constraints to ensure the stress remains below 361 MPa for optimal performance. These findings were obtained through finite element simulations conducted using ANSYS Workbench. Furthermore, our module facilitates precise control of various components within robotic systems, allowing for adjustable speeds based on specific requirements or desired outcomes.Keywords: robotic, piezoelectric, compliant mechanism, flexure hinge
Procedia PDF Downloads 79