Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 301

Search results for: asymmetric key cryptography

301 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels

Authors: Sartaj Singh, Amar Singh, Ashok Sharma, Sandeep Kaur


With upcoming threats in a digital world, we need to work continuously in the area of security in all aspects, from hardware to software as well as data modelling. The rise in social media activities and hunger for data by various entities leads to cybercrime and more attack on the privacy and security of persons. Cryptography has always been employed to avoid access to important data by using many processes. Symmetric key and asymmetric key cryptography have been used for keeping data secrets at rest as well in transmission mode. Various cryptosystems have evolved from time to time to make the data more secure. In this research article, we are studying various cryptosystems in asymmetric cryptography and their application with usefulness, and much emphasis is given to Elliptic curve cryptography involving algebraic mathematics.

Keywords: cryptography, symmetric key cryptography, asymmetric key cryptography

Procedia PDF Downloads 9
300 Improved of Elliptic Curves Cryptography over a Ring

Authors: Abdelhakim Chillali, Abdelhamid Tadmori, Muhammed Ziane


In this article we will study the elliptic curve defined over the ring An and we define the mathematical operations of ECC, which provides a high security and advantage for wireless applications compared to other asymmetric key cryptosystem.

Keywords: elliptic curves, finite ring, cryptography, study

Procedia PDF Downloads 293
299 Development of Ultrasounf Probe Holder for Automatic Scanning Asymmetric Reflector

Authors: Nabilah Ibrahim, Hafiz Mohd Zaini, Wan Fatin Liyana Mutalib


Ultrasound equipment or machine is capable to scan in two dimensional (2D) areas. However there are some limitations occur during scanning an object. The problem will occur when scanning process that involving the asymmetric object. In this project, the ultrasound probe holder for asymmetric reflector scanning in 3D image is proposed to make easier for scanning the phantom or object that has asymmetric shape. Initially, the constructed asymmetric phantom that construct will be used in 2D scanning. Next, the asymmetric phantom will be interfaced by the movement of ultrasound probe holder using the Arduino software. After that, the performance of the ultrasound probe holder will be evaluated by using the various asymmetric reflector or phantom in constructing a 3D image

Keywords: ultrasound 3D images, axial and lateral resolution, asymmetric reflector, Arduino software

Procedia PDF Downloads 481
298 Influence of Different Asymmetric Rolling Processes on Shear Strain

Authors: Alexander Pesin, Denis Pustovoytov, Mikhail Sverdlik


Materials with ultrafine-grained structure and unique physical and mechanical properties can be obtained by methods of severe plastic deformation, which include processes of asymmetric rolling (AR). Asymmetric rolling is a very effective way to create ultrafine-grained structures of metals and alloys. Since the asymmetric rolling is a continuous process, it has great potential for industrial production of ultrafine-grained structure sheets. Basic principles of asymmetric rolling are described in detail in scientific literature. In this work finite element modeling of asymmetric rolling and metal forming processes in multiroll gauge was performed. Parameters of the processes which allow achieving significant values of shear strain were defined. The results of the study will be useful for the research of the evolution of ultra-fine metal structure in asymmetric rolling.

Keywords: asymmetric rolling, equivalent strain, FEM, multiroll gauge, profile, severe plastic deformation, shear strain, sheet

Procedia PDF Downloads 193
297 Asymmetric Information and Composition of Capital Inflows: Stock Market Microstructure Analysis of Asia Pacific Countries

Authors: Farid Habibi Tanha, Hawati Janor, Mojtaba Jahanbazi


The purpose of this study is to examine the effect of asymmetric information on the composition of capital inflows. This study uses the stock market microstructure to capture the asymmetric information. Such an approach allows one to capture the level and extent of the asymmetric information from a firm’s perspective. This study focuses on the two-dimensional measure of the market microstructure in capturing asymmetric information. The composition of capital inflows is measured by running six models simultaneously. By employing the panel data technique, the main finding of this research shows an increase in the asymmetric information of the stock market, in any of the two dimensions of width and depth. This leads to the reduction of foreign investments in both forms of foreign portfolio investment (FPI) and foreign direct investment (FDI), while the reduction in FPI is higher than that of the FDI. The significant effect of asymmetric information on capital inflows implicitly suggests for policymakers to control the changes of foreign capital inflows through transparency in the level of the market.

Keywords: capital flows composition, asymmetric information, stock market microstructure, foreign portfolio investment, foreign direct investment

Procedia PDF Downloads 268
296 SA-SPKC: Secure and Efficient Aggregation Scheme for Wireless Sensor Networks Using Stateful Public Key Cryptography

Authors: Merad Boudia Omar Rafik, Feham Mohammed


Data aggregation in wireless sensor networks (WSNs) provides a great reduction of energy consumption. The limited resources of sensor nodes make the choice of an encryption algorithm very important for providing security for data aggregation. Asymmetric cryptography involves large ciphertexts and heavy computations but solves, on the other hand, the problem of key distribution of symmetric one. The latter provides smaller ciphertexts and speed computations. Also, the recent researches have shown that achieving the end-to-end confidentiality and the end-to-end integrity at the same is a challenging task. In this paper, we propose (SA-SPKC), a novel security protocol which addresses both security services for WSNs, and where only the base station can verify the individual data and identify the malicious node. Our scheme is based on stateful public key encryption (StPKE). The latter combines the best features of both kinds of encryption along with state in order to reduce the computation overhead. Our analysis

Keywords: secure data aggregation, wireless sensor networks, elliptic curve cryptography, homomorphic encryption

Procedia PDF Downloads 215
295 Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking

Authors: Modesta E. Ezema, Chikwendu V. Alabekee, Victoria N. Ishiwu, Ifeyinwa NwosuArize, Chinedu I. Nwoye


The advent of wireless networking in computing technology cannot be overemphasized, it opened up easy accessibility to information resources, networking made easier and brought internet accessibility to our doorsteps, but despite all these, some mishap came in with it that is causing mayhem in today ‘s overall information security. The cyber criminals will always compromise the integrity of a message that is not encrypted or that is encrypted with a weak algorithm.In other to correct the mayhem, this study focuses on cryptosystem and cryptography. This ensures end to end crypt messaging. The study of various cryptographic algorithms, as well as the techniques and applications of the cryptography for efficiency, were all considered in the work., present and future applications of cryptography were dealt with as well as Quantum Cryptography was exposed as the current and the future area in the development of cryptography. An empirical study was conducted to collect data from network users.

Keywords: algorithm, cryptography, cryptosystem, network

Procedia PDF Downloads 250
294 BigCrypt: A Probable Approach of Big Data Encryption to Protect Personal and Business Privacy

Authors: Abdullah Al Mamun, Talal Alkharobi


As data size is growing up, people are became more familiar to store big amount of secret information into cloud storage. Companies are always required to need transfer massive business files from one end to another. We are going to lose privacy if we transmit it as it is and continuing same scenario repeatedly without securing the communication mechanism means proper encryption. Although asymmetric key encryption solves the main problem of symmetric key encryption but it can only encrypt limited size of data which is inapplicable for large data encryption. In this paper we propose a probable approach of pretty good privacy for encrypt big data using both symmetric and asymmetric keys. Our goal is to achieve encrypt huge collection information and transmit it through a secure communication channel for committing the business and personal privacy. To justify our method an experimental dataset from three different platform is provided. We would like to show that our approach is working for massive size of various data efficiently and reliably.

Keywords: big data, cloud computing, cryptography, hadoop, public key

Procedia PDF Downloads 245
293 Digital Watermarking Based on Visual Cryptography and Histogram

Authors: R. Rama Kishore, Sunesh


Nowadays, robust and secure watermarking algorithm and its optimization have been need of the hour. A watermarking algorithm is presented to achieve the copy right protection of the owner based on visual cryptography, histogram shape property and entropy. In this, both host image and watermark are preprocessed. Host image is preprocessed by using Butterworth filter, and watermark is with visual cryptography. Applying visual cryptography on water mark generates two shares. One share is used for embedding the watermark, and the other one is used for solving any dispute with the aid of trusted authority. Usage of histogram shape makes the process more robust against geometric and signal processing attacks. The combination of visual cryptography, Butterworth filter, histogram, and entropy can make the algorithm more robust, imperceptible, and copy right protection of the owner.

Keywords: digital watermarking, visual cryptography, histogram, butter worth filter

Procedia PDF Downloads 270
292 Leverage Effect for Volatility with Generalized Laplace Error

Authors: Farrukh Javed, Krzysztof Podgórski


We propose a new model that accounts for the asymmetric response of volatility to positive ('good news') and negative ('bad news') shocks in economic time series the so-called leverage effect. In the past, asymmetric powers of errors in the conditionally heteroskedastic models have been used to capture this effect. Our model is using the gamma difference representation of the generalized Laplace distributions that efficiently models the asymmetry. It has one additional natural parameter, the shape, that is used instead of power in the asymmetric power models to capture the strength of a long-lasting effect of shocks. Some fundamental properties of the model are provided including the formula for covariances and an explicit form for the conditional distribution of 'bad' and 'good' news processes given the past the property that is important for the statistical fitting of the model. Relevant features of volatility models are illustrated using S&P 500 historical data.

Keywords: heavy tails, volatility clustering, generalized asymmetric laplace distribution, leverage effect, conditional heteroskedasticity, asymmetric power volatility, GARCH models

Procedia PDF Downloads 314
291 Chiral Diphosphine Ligands and Their Transition Metal Diphosphine Complexes in Asymmetric Catalysis

Authors: Shannen Lorraine, Paul Maragh, Tara Dasgupta, Kamaluddin Abdur-Rashid


(R)-(4,4',6,6'-tetramethoxybiphenyl-2,2'-diyl)bis(diphenylphosphine) (R-Ph-Garphos), and (S)-(4,4',6,6'-tetramethoxybiphenyl-2,2'-diyl)bis(diphenylphosphine) (S-Ph-Garphos) are novel, nucleophilic, chiral atropisomeric ligands. The research explored the synthesis of chiral transition metal complexes containing these ligands and their applications in various asymmetric catalytic transformations. Herein, the transition metal complexes having ruthenium(II), rhodium(I) and iridium(I) metal centres will be discussed. These are air stable complexes and were characterized by CHN analysis, 1H, 13C, and 31P NMR spectroscopy, and polarimetry. Currently, there is an emphasis on 'greener' catalysts and the need for 'green' solvents in asymmetric catalysis. As such, the Ph-Garphos ligands were demethylated thereby introducing hydroxyl moieties unto the ligand scaffold. The facile tunability of the biaryl diphosphines led to the preparation of the (R)-(4,4',6,6'-tetrahydroxybiphenyl-2,2'-diyl)bis(diphenylphosphine) (R-Ph-Garphos-OH), and (S)-(4,4',6,6'-tetrahydroxybiphenyl-2,2'-diyl)bis(diphenylphosphine) (S-Ph-Garphos-OH) ligands. These were successfully characterized by CHN analysis, 1H, 13C, and 31P NMR spectroscopy, and polarimetry. The use of the Ph-Garphos and Ph-Garphos-OH ligands and their transition metal complexes in asymmetric hydrogenations will be reported. Additionally, the scope of the research will highlight the applicability of the Ph-Garphos-OH ligand and its transitional metal complexes as 'green' catalysts.

Keywords: catalysis, asymmetric hydrogenation, diphosphine transition metal complexes, Ph-Garphos ligands

Procedia PDF Downloads 208
290 Cryptography Based Authentication Methods

Authors: Mohammad A. Alia, Abdelfatah Aref Tamimi, Omaima N. A. Al-Allaf


This paper reviews a comparison study on the most common used authentication methods. Some of these methods are actually based on cryptography. In this study, we show the main cryptographic services. Also, this study presents a specific discussion about authentication service, since the authentication service is classified into several categorizes according to their methods. However, this study gives more about the real life example for each of the authentication methods. It talks about the simplest authentication methods as well about the available biometric authentication methods such as voice, iris, fingerprint, and face authentication.

Keywords: information security, cryptography, system access control, authentication, network security

Procedia PDF Downloads 371
289 Chiral Ruthenium Aminophosphine and Phosphine Iminopyridine Complexes: Synthesis and Application to Asymmetric Hydrogenation and Transfer Hydrogenation

Authors: Littlelet N. Scarlet, Kamaluddin Abdur-Rashid, Paul T. Maragh, Tara Dasgupta


Aminophosphines are a privileged class of ancillary ligands with emerging importance in homogeneous catalysis. The unique combination of soft phosphorus (P) and hard nitrogen (N) centres affords a variety of transition metal complexes as potential pre-catalysts for synthetically useful reactions. Herein three ligand systems will be reported; two bidentate ligands - (S)-8-(diphenyl-phosphino)-1,2,3,4-tetrahydronaphthalen-1-amine, (S)THNANH2, and (Rc)-1-((Sp)-2-diphenylphosphino) ferrocenylethylamine, (RcSp)PPFNH2 - and a tridentate (Rc)-1-((Sp)-2-diphenylphosphino) ferrocenylimino-pyridine, (RcSp)PPFNNH2 ligand; the latter prepared from the condensation of selected ferrocene aminophosphines with pyridine-2-carboxaldehyde. Suitable combinations of these aminophosphine ligands with ruthenium precursors have afforded highly efficient systems for the asymmetric hydrogenation and transfer hydrogenation of selected ketones in 2-propanol. The Ru-(S)THNANH2 precatalyst was the most efficient in the asymmetric hydrogenation of selected ketones with 100% conversions within 4 hours at a catalyst loading of 0.1 mol%. The Ru-(RcSp)PPFNNH2 precatalyst was the most efficient in the asymmetric transfer hydrogenation of the ketones with conversions as high as 98% with 0.1 mol% catalyst. However, the enantioselectivities were generally low.

Keywords: aminophosphine, asymmetric hydrogenation, homogeneous catalysis, ruthenium (II), transfer hydrogenation

Procedia PDF Downloads 162
288 Numerical Buckling of Composite Cylindrical Shells under Axial Compression Using Asymmetric Meshing Technique (AMT)

Authors: Zia R. Tahir, P. Mandal


This paper presents the details of a numerical study of buckling and post buckling behaviour of laminated carbon fiber reinforced plastic (CFRP) thin-walled cylindrical shell under axial compression using asymmetric meshing technique (AMT) by ABAQUS. AMT is considered to be a new perturbation method to introduce disturbance without changing geometry, boundary conditions or loading conditions. Asymmetric meshing affects both predicted buckling load and buckling mode shapes. Cylindrical shell having lay-up orientation [0°/+45°/-45°/0°] with radius to thickness ratio (R/t) equal to 265 and length to radius ratio (L/R) equal to 1.5 is analysed numerically. A series of numerical simulations (experiments) are carried out with symmetric and asymmetric meshing to study the effect of asymmetric meshing on predicted buckling behaviour. Asymmetric meshing technique is employed in both axial direction and circumferential direction separately using two different methods, first by changing the shell element size and varying the total number elements, and second by varying the shell element size and keeping total number of elements constant. The results of linear analysis (Eigenvalue analysis) and non-linear analysis (Riks analysis) using symmetric meshing agree well with analytical results. The results of numerical analysis are presented in form of non-dimensional load factor, which is the ratio of buckling load using asymmetric meshing technique to buckling load using symmetric meshing technique. Using AMT, load factor has about 2% variation for linear eigenvalue analysis and about 2% variation for non-linear Riks analysis. The behaviour of load end-shortening curve for pre-buckling is same for both symmetric and asymmetric meshing but for asymmetric meshing curve behaviour in post-buckling becomes extraordinarily complex. The major conclusions are: different methods of AMT have small influence on predicted buckling load and significant influence on load displacement curve behaviour in post buckling; AMT in axial direction and AMT in circumferential direction have different influence on buckling load and load displacement curve in post-buckling.

Keywords: CFRP composite cylindrical shell, asymmetric meshing technique, primary buckling, secondary buckling, linear eigenvalue analysis, non-linear riks analysis

Procedia PDF Downloads 289
287 Modelling the Dynamics of Corporate Bonds Spreads with Asymmetric GARCH Models

Authors: Sélima Baccar, Ephraim Clark


This paper can be considered as a new perspective to analyse credit spreads. A comprehensive empirical analysis of conditional variance of credit spreads indices is performed using various GARCH models. Based on a comparison between traditional and asymmetric GARCH models with alternative functional forms of the conditional density, we intend to identify what macroeconomic and financial factors have driven daily changes in the US Dollar credit spreads in the period from January 2011 through January 2013. The results provide a strong interdependence between credit spreads and the explanatory factors related to the conditions of interest rates, the state of the stock market, the bond market liquidity and the exchange risk. The empirical findings support the use of asymmetric GARCH models. The AGARCH and GJR models outperform the traditional GARCH in credit spreads modelling. We show, also, that the leptokurtic Student-t assumption is better than the Gaussian distribution and improves the quality of the estimates, whatever the rating or maturity.

Keywords: corporate bonds, default risk, credit spreads, asymmetric garch models, student-t distribution

Procedia PDF Downloads 398
286 Secure E-Pay System Using Steganography and Visual Cryptography

Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi


Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.

Keywords: image security, random LSB, steganography, visual cryptography

Procedia PDF Downloads 257
285 Asymmetric Warfare: Exploratory Study of the Implicit Defense Strategy of the People's Republic of China in 2012-2016

Authors: María Victoria Alvarez Magañini, Lautaro Nahuel Rubbi


According to different theories, the hegemonic war between the United States and the People's Republic of China seems to be imminent. However, nowadays, it is clear that China's conventional military capacity is inferior to that of the United States. Nevertheless, the conditions that in the past were considered to be an indicator of validity in asymmetrical warfare, at present, in a possible asymmetric war scenario, are no longer considered to be taken as such. The military capacity is not the only concept that represents the main indicator of victory. The organisation and the use of forces are also an essential part of it. The present paper aims to analyze the Chinese Defense Strategy in relation to the concept of asymmetric warfare in the face of a possible war with the United States. The starting point will be developed on the basis of application of the theory which corresponds to the concept aforementioned making focus on recent developments of the People’s Republic of China in the field of non-conventional defense. A comparative analysis of the conventional forces of both powers/countries will also be carried out.

Keywords: asymmetric warfare, China, United States, hegemonic warfare

Procedia PDF Downloads 194
284 Digital Watermarking Using Fractional Transform and (k,n) Halftone Visual Cryptography (HVC)

Authors: R. Rama Kishore, Sunesh Malik


Development in the usage of internet for different purposes in recent times creates great threat for the copy right protection of the digital images. Digital watermarking is the best way to rescue from the said problem. This paper presents detailed review of the different watermarking techniques, latest trends in the field and categorized like spatial and transform domain, blind and non-blind methods, visible and non visible techniques etc. It also discusses the different optimization techniques used in the field of watermarking in order to improve the robustness and imperceptibility of the method. Different measures are discussed to evaluate the performance of the watermarking algorithm. At the end, this paper proposes a watermarking algorithm using (k.n) shares of halftone visual cryptography (HVC) instead of (2, 2) share cryptography. (k,n) shares visual cryptography improves the security of the watermark. As halftone is a method of reprographic, it helps in improving the visual quality of watermark image. The proposed method uses fractional transformation to improve the robustness of the copyright protection of the method.

Keywords: digital watermarking, fractional transform, halftone, visual cryptography

Procedia PDF Downloads 278
283 Secure Optical Communication System Using Quantum Cryptography

Authors: Ehab AbdulRazzaq Hussein


Quantum cryptography (QC) is an emerging technology for secure key distribution with single-photon transmissions. In contrast to classical cryptographic schemes, the security of QC schemes is guaranteed by the fundamental laws of nature. Their security stems from the impossibility to distinguish non-orthogonal quantum states with certainty. A potential eavesdropper introduces errors in the transmissions, which can later be discovered by the legitimate participants of the communication. In this paper, the modeling approach is proposed for QC protocol BB84 using polarization coding. The single-photon system is assumed to be used in the designed models. Thus, Eve cannot use beam-splitting strategy to eavesdrop on the quantum channel transmission. The only eavesdropping strategy possible to Eve is the intercept/resend strategy. After quantum transmission of the QC protocol, the quantum bit error rate (QBER) is estimated and compared with a threshold value. If it is above this value the procedure must be stopped and performed later again.

Keywords: security, key distribution, cryptography, quantum protocols, Quantum Cryptography (QC), Quantum Key Distribution (QKD).

Procedia PDF Downloads 323
282 Plastic Strain Accumulation Due to Asymmetric Cyclic Loading of Zircaloy-2 at 400°C

Authors: R. S. Rajpurohit, N. C. Santhi Srinivas, Vakil Singh


Asymmetric stress cycling leads to accumulation of plastic strain which is called as ratcheting strain. The problem is generally associated with nuclear fuel cladding materials used in nuclear power plants and pressurized pipelines. In the present investigation, asymmetric stress controlled fatigue tests were conducted with three different parameters namely, mean stress, stress amplitude and stress rate (keeping two parameters constant and varying third parameter) to see the plastic strain accumulation and its effect on fatigue life and deformation behavior of Zircaloy-2 at 400°C. The tests were conducted with variable mean stress (45-70 MPa), stress amplitude (95-120 MPa) and stress rate (30-750 MPa/s) and tested specimens were characterized using transmission and scanning electron microscopy. The experimental results show that with the increase in mean stress and stress amplitude, the ratcheting strain accumulation increases with reduction in fatigue life. However, increase in stress rate leads to improvement in fatigue life of the material due to small ratcheting strain accumulation. Fractographs showed a decrease in area fraction of fatigue failed region.

Keywords: asymmetric cyclic loading, ratcheting fatigue, mean stress, stress amplitude, stress rate, plastic strain

Procedia PDF Downloads 185
281 Tamper Resistance Evaluation Tests with Noise Resources

Authors: Masaya Yoshikawa, Toshiya Asai, Ryoma Matsuhisa, Yusuke Nozaki, Kensaku Asahi


Recently, side-channel attacks, which estimate secret keys using side-channel information such as power consumption and compromising emanations of cryptography circuits embedded in hardware, have become a serious problem. In particular, electromagnetic analysis attacks against cryptographic circuits between information processing and electromagnetic fields, which are related to secret keys in cryptography circuits, are the most threatening side-channel attacks. Therefore, it is important to evaluate tamper resistance against electromagnetic analysis attacks for cryptography circuits. The present study performs basic examination of the tamper resistance of cryptography circuits using electromagnetic analysis attacks with noise resources.

Keywords: tamper resistance, cryptographic circuit, hardware security evaluation, noise resources

Procedia PDF Downloads 373
280 Paraplegic Dimensions of Asymmetric Warfare: A Strategic Analysis for Resilience Policy Plan

Authors: Sehrish Qayyum


In this age of constant technology, asymmetrical warfare could not be won. Attuned psychometric study confirms that screaming sometimes is more productive than active retaliation against strong adversaries. Asymmetric warfare is a game of nerves and thoughts with least vigorous participation for large anticipated losses. It creates the condition of paraplegia with partial but permanent immobility, which effects the core warfare operations, being screams rather than active retaliation. When one’s own power is doubted, it gives power to one’s own doubt to ruin all planning either done with superlative cost-benefit analysis. Strategically calculated estimation of asymmetric warfare since the early WWI to WWII, WWII-to Cold War, and then to the current era in three chronological periods exposits that courage makes nations win the battle of warriors to battle of comrades. Asymmetric warfare has been most difficult to fight and survive due to unexpectedness and being lethal despite preparations. Thoughts before action may be the best-assumed strategy to mix Regional Security Complex Theory and OODA loop to develop the Paraplegic Resilience Policy Plan (PRPP) to win asymmetric warfare. PRPP may serve to control and halt the ongoing wave of terrorism, guerilla warfare, and insurgencies, etc. PRPP, along with a strategic work plan, is based on psychometric analysis to deal with any possible war condition and tactic to save millions of innocent lives such that lost in Christchurch New Zealand in 2019, November 2015 Paris attacks, and Berlin market attacks in 2016, etc. Getting tangled into self-imposed epistemic dilemmas results in regret that becomes the only option of performance. It is a descriptive psychometric analysis of war conditions with generic application of probability tests to find the best possible options and conditions to develop PRPP for any adverse condition possible so far. Innovation in technology begets innovation in planning and action-plan to serve as a rheostat approach to deal with asymmetric warfare.

Keywords: asymmetric warfare, psychometric analysis, PRPP, security

Procedia PDF Downloads 59
279 Mathematical Model of a Compound Gear Pump

Authors: Hsueh-Cheng Yang


The generation and design of compound involute spur gearings can be used in gear pump. A compound rack cutter with asymmetric involute teeth is presented for determining the mathematical model of compound gear pumps. This paper covers the following topics: (a) generation and geometry of compound rack cutter is presented and used to generate a compound gear and a compound pinion. (b) Based on the developed compound gears, stress analysis was performed for the symmetric gears and the asymmetric gears. Comparing the results of the stress analysis for the asymmetric involute teeth is superior to the symmetric involute teeth. A numerical example that illustrates the developed compound rack cutter is represented.

Keywords: compound, involute teeth, gear pump, rack cutter

Procedia PDF Downloads 298
278 Finite Elemental Simulation of the Combined Process of Asymmetric Rolling and Plastic Bending

Authors: A. Pesin, D. Pustovoytov, M. Sverdlik


Traditionally, the need in items represents a large body of rotation (e.g. shrouds of various process units: a converter, a mixer, a scrubber, a steel ladle and etc.) is satisfied by using them at engineering enterprises. At these enterprises large parts of bodies of rotation are made on stamping units or bending and forming machines. In Nosov Magnitogorsk State Technical University in alliance with JSC "Magnitogorsk Metal and Steel Works" there was suggested and implemented the technology for producing such items based on a combination of asymmetric rolling processes and plastic bending under conditions of the plate mill. In this paper, based on finite elemental mathematical simulation in technology of a combined process of asymmetric rolling and bending plastic has been improved. It is shown that for the same curvature along the entire length of the metal sheet it is necessary to introduce additional asymmetry speed when rolling front end and tape trailer. Production of large bodies of rotation at mill 4500 JSC "Magnitogorsk Metal and Steel Works" showed good convergence of theoretical and experimental values of the curvature of the metal. Economic effect obtained more than 1.0 million dollars.

Keywords: asymmetric rolling, plastic bending, combined process, FEM

Procedia PDF Downloads 247
277 Torsional Design Method of Asymmetric and Irregular Building under Horizontal Earthquake Action

Authors: Radhwane Boudjelthia


Based upon elaborate analysis on torsional design methods of asymmetric and irregular structure under horizontal earthquake action, it points out that the main design principles of an asymmetric building subjected to horizontal earthquake are: the torsion of vertical members induced by the torsion angle of the floor (rigid diaphragm) cannot exceed the allowable value, the inter-story displacement at outermost frame or shear wall should be less than that required by design code, stresses in plane of the slab should be controlled within acceptable extent under different intensity earthquakes. That current seismic design code only utilizes the torsion displacement ratio to control the floor torsion, which seems not reasonable enough since its connotation is the multiple of the floor torsion angle and the distance of floor mass center to the edge frame or shear wall.

Keywords: earthquake, building, seismic forces, displacement, resonance, response

Procedia PDF Downloads 273
276 Nonreciprocal Optical Effects in Plasmonic Nanoparticle Aggregates

Authors: Ward Brullot, Thierry Verbiest


Nonreciprocal optical effects, such as Faraday rotation or magnetic circular dichroism, are very useful both for fundamental studies as for applications such as magnetic field sensors or optical isolators. In this study, we developed layer-by-layer deposited 20nm thick plasmonic nanoparticle aggregates consisting of gold, silver and magnetite nanoparticles that show broadband nonreciprocal asymmetric transmission. As such, the optical transmittance, or absorbance, depends on the direction of light propagation in the material, which means that looking from one direction or the other, more or less light passes through the sample. Theoretical analysis showed that strong electric quadrupole fields, which are electric field gradients, occur in the aggregates and that these quadrupole fields are responsible for the observed asymmetric transmission and the nonreciprocity of the effect. Apart from nonreciprocal asymmetric transmission, also other effects such as, but not limited to, optical rotation, circular dichroism or nonlinear optical responses were measured in the plasmonic nanoparticle aggregates and the influences of the intense electric quadrupole fields determined. In conclusion, the presence of strong electric quadrupole fields make the developed plasmonic nanoparticle aggregates ideal candidates for the study and application of various nonreciprocal optical effects.

Keywords: asymmetric transmission, electric quadrupoles, nanoparticle aggregates, nonreciprocity

Procedia PDF Downloads 358
275 Human Security Providers in Fragile State under Asymmetric War Conditions

Authors: Luna Shamieh


Various players are part of the game in an asymmetric war, all making efforts to provide human security to their own adherents. Although a fragile state is not able to provide sufficient and comprehensive services, it still provides special services and security to the elite; the insurgents as well provide services and security to their associates. The humanitarian organisations, on the other hand, provide some fundamental elements of human security, but only in the regions, they are able to access when possible (if possible). The counterinsurgents (security forces of the state and intervention forces) operate within a narrow band defined by the vision of the responsibility to protect and the perspective of the resolution of the conflict through combat; hence, the possibility to provide human security is shaken at this end. This article examines how each player provides human security from the perspective of freedom from want in order to secure basic and strategic needs, freedom from fear through providing protection against all kinds of violence, and the freedom to live in dignity. It identifies a vicious cycle caused by the intervention of the different players causing a centrifugal force that may lead to disintegration of the nation under war.

Keywords: asymmetric war, counterinsurgency, fragile state, human security, insurgency

Procedia PDF Downloads 266
274 Implementation of Elliptic Curve Cryptography Encryption Engine on a FPGA

Authors: Mohamad Khairi Ishak


Conventional public key crypto systems such as RSA (Ron Rivest, Adi Shamir and Leonard Adleman), DSA (Digital Signature Algorithm), and Elgamal are no longer efficient to be implemented in the small, memory constrained devices. Elliptic Curve Cryptography (ECC), which allows smaller key length as compared to conventional public key crypto systems, has thus become a very attractive choice for many applications. This paper describes implementation of an elliptic curve cryptography (ECC) encryption engine on a FPGA. The system has been implemented in 2 different key sizes, which are 131 bits and 163 bits. Area and timing analysis are provided for both key sizes for comparison. The crypto system, which has been implemented on Altera’s EPF10K200SBC600-1, has a hardware size of 5945/9984 and 6913/9984 of logic cells for 131 bits implementation and 163 bits implementation respectively. The crypto system operates up to 43 MHz, and performs point multiplication operation in 11.3 ms for 131 bits implementation and 14.9 ms for 163 bits implementation. In terms of speed, our crypto system is about 8 times faster than the software implementation of the same system.

Keywords: elliptic curve cryptography, FPGA, key sizes, memory

Procedia PDF Downloads 226
273 Pythagorean-Platonic Lattice Method for Finding all Co-Prime Right Angle Triangles

Authors: Anthony Overmars, Sitalakshmi Venkatraman


This paper presents a method for determining all of the co-prime right angle triangles in the Euclidean field by looking at the intersection of the Pythagorean and Platonic right angle triangles and the corresponding lattice that this produces. The co-prime properties of each lattice point representing a unique right angle triangle are then considered. This paper proposes a conjunction between these two ancient disparaging theorists. This work has wide applications in information security where cryptography involves improved ways of finding tuples of prime numbers for secure communication systems. In particular, this paper has direct impact in enhancing the encryption and decryption algorithms in cryptography.

Keywords: Pythagorean triples, platonic triples, right angle triangles, co-prime numbers, cryptography

Procedia PDF Downloads 124
272 Fast-Forward Problem in Asymmetric Double-Well Potential

Authors: Iwan Setiawan, Bobby Eka Gunara, Katshuhiro Nakamura


The theory to accelerate system on quantum dynamics has been constructed to get the desired wave function on shorter time. This theory is developed on adiabatic quantum dynamics which any regulation is done on wave function that satisfies Schrödinger equation. We show accelerated manipulation of WFs with the use of a parameter-dependent in asymmetric double-well potential and also when it’s influenced by electromagnetic fields.

Keywords: driving potential, Adiabatic Quantum Dynamics, regulation, electromagnetic field

Procedia PDF Downloads 246