Search results for: asymmetric key cryptography
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 352

Search results for: asymmetric key cryptography

292 High Power Low Loss CMOS SPDT Antenna Switch for LTE-A Front End Module

Authors: Ki-Jin Kim, Suk-Hui LEE, Sanghoon Park, K. H. Ahn

Abstract:

A high power, low loss asymmetric single pole double through(SPDT) antenna switch for LTE-A Front-End Module(FEM) is presented in this paper by using CMOS technology. For the usage of LTE-A applications, low loss and high linearity are the key features which are very challenging works under CMOS process. To enhance insertion loss(IL) and power handling capability, this paper adopts asymmetric Transmitter (TX) and RX (Receiver) structure, floating body technique, multi-stacked structure, and feed forward capacitor technique. The designed SPDT switch shows TX IL 0.34 dB, RX IL 0.73 dB, P1dB 38.9 dBm at 0.9 GHz and TX IL 0.37 dB, RX IL 0.95 dB, P1dB 39.1 dBm at 2.5 GHz respectively.

Keywords: CMOS switch, SPDT switch, high power CMOS switch, LTE-A FEM

Procedia PDF Downloads 334
291 Formation of the Water Assisted Supramolecular Assembly in the Transition Structure of Organocatalytic Asymmetric Aldol Reaction: A DFT Study

Authors: Kuheli Chakrabarty, Animesh Ghosh, Atanu Roy, Gourab Kanti Das

Abstract:

Aldol reaction is an important class of carbon-carbon bond forming reactions. One of the popular ways to impose asymmetry in aldol reaction is the introduction of chiral auxiliary that binds the approaching reactants and create dissymmetry in the reaction environment, which finally evolves to enantiomeric excess in the aldol products. The last decade witnesses the usage of natural amino acids as chiral auxiliary to control the stereoselectivity in various carbon-carbon bond forming processes. In this context, L-proline was found to be an effective organocatalyst in asymmetric aldol additions. In last few decades the use of water as solvent or co-solvent in asymmetric organocatalytic reaction is increased sharply. Simple amino acids like L-proline does not catalyze asymmetric aldol reaction in aqueous medium not only that, In organic solvent medium high catalytic loading (~30 mol%) is required to achieve moderate to high asymmetric induction. In this context, huge efforts have been made to modify L-proline and 4-hydroxy-L-proline to prepare organocatalyst for aqueous medium asymmetric aldol reaction. Here, we report the result of our DFT calculations on asymmetric aldol reaction of benzaldehyde, p-NO2 benzaldehyde and t-butyraldehyde with a number of ketones using L-proline hydrazide as organocatalyst in wet solvent free condition. Gaussian 09 program package and Gauss View program were used for the present work. Geometry optimizations were performed using B3LYP hybrid functional and 6-31G(d,p) basis set. Transition structures were confirmed by hessian calculation and IRC calculation. As the reactions were carried out in solvent free condition, No solvent effect were studied theoretically. Present study has revealed for the first time, the direct involvement of two water molecules in the aldol transition structures. In the TS, the enamine and the aldehyde is connected through hydrogen bonding by the assistance of two intervening water molecules forming a supramolecular network. Formation of this type of supramolecular assembly is possible due to the presence of protonated -NH2 group in the L-proline hydrazide moiety, which is responsible for the favorable entropy contribution to the aldol reaction. It is also revealed from the present study that, water assisted TS is energetically more favorable than the TS without involving any water molecule. It can be concluded from this study that, insertion of polar group capable of hydrogen bond formation in the L-proline skeleton can lead to a favorable aldol reaction with significantly high enantiomeric excess in wet solvent free condition by reducing the activation barrier of this reaction.

Keywords: aldol reaction, DFT, organocatalysis, transition structure

Procedia PDF Downloads 395
290 Providing Reliability, Availability and Scalability Support for Quick Assist Technology Cryptography on the Cloud

Authors: Songwu Shen, Garrett Drysdale, Veerendranath Mannepalli, Qihua Dai, Yuan Wang, Yuli Chen, David Qian, Utkarsh Kakaiya

Abstract:

Hardware accelerator has been a promising solution to reduce the cost of cloud data centers. This paper investigates the QoS enhancement of the acceleration of an important datacenter workload: the webserver (or proxy) that faces high computational consumption originated from secure sockets layer (SSL) or transport layer security (TLS) procession in the cloud environment. Our study reveals that for the accelerator maintenance cases—need to upgrade driver/firmware or hardware reset due to hardware hang; we still can provide cryptography services by switching to software during maintenance phase and then switching back to accelerator after maintenance. The switching is seamless to server application such as Nginx that runs inside a VM on top of the server. To achieve this high availability goal, we propose a comprehensive fallback solution based on Intel® QuickAssist Technology (QAT). This approach introduces an architecture that involves the collaboration between physical function (PF) and virtual function (VF), and collaboration among VF, OpenSSL, and web application Nginx. The evaluation shows that our solution could provide high reliability, availability, and scalability (RAS) of hardware cryptography service in a 7x24x365 manner in the cloud environment.

Keywords: accelerator, cryptography service, RAS, secure sockets layer/transport layer security, SSL/TLS, virtualization fallback architecture

Procedia PDF Downloads 115
289 Education of Mothers and Influence on the Development of Intrauterine Growth Restriction

Authors: Sabina Garayeva

Abstract:

To determine the significant risk factors for intrauterine growth restriction (IUGR), we carried out a thorough study of the social status of the parents of children with IUGR. We observed 315 mothers who gave birth to children with (IUGR), of which 172 mothers with asymmetric type and 143 mothers with symmetric type of IUGR. Through a detailed survey was gathered detailed information about education of parents. The results show that the majority of mothers with IUGR had secondary education (44,8 ± 2,8%), and fathers - higher education (35,2 ± 2,7%). Whereas in the control group, the largest number of parents had higher education (mother 35,3 ± 4,4%, fathers 42,9 ± 4,5%). Number of mothers with secondary education with IUGR was significantly (p1 <0,01; χ2 = 22,67) differs from the number of mothers with physiological pregnancy with the same level of education. Meanwhile, in the group with a symmetrical embodiment of IUGR mothers with secondary formation of significantly greater 53,1 ± 4,2%, than the asymmetric embodiment IUGR 37,8 ± 3,7% (p2 <0,05; χ2 = 8 06). Among fathers with secondary education significant difference was noted in the symmetric version of IUGR 37,8 ± 4,1% more than in the control group (p1 <0,05), and among parents of children with asymmetric IUGR option prevailed fathers with higher education - 37 2 ± 3,7%. Thus, our results revealed a low educational level of the mother as a risk factor for IUGR, which further help to develop preventive and therapeutic measures to eliminate the severity of its consequences. As seen from the data presented, mothers of children with asymmetric IUGR had a school education and fathers - higher education, while in the symmetric type of both parents had secondary education. It is found that frequency of children, born with IUGR, of mothers - housewives and fathers, engage in physical labor, was high. Thus, the analysis conducted by the social status of the parents with IUGR revealed a low level of education and unemployed mothers as risk factors for this disease, which in the future will help to develop preventive and therapeutic measures to eliminate the severity of its.

Keywords: intrauterine growth restriction, education of mothers, education influence, IUGR

Procedia PDF Downloads 359
288 Coupled Flexural-Lateral-Torsional of Shear Deformable Thin-Walled Beams with Asymmetric Cross-Section–Closed Form Exact Solution

Authors: Mohammed Ali Hjaji, Magdi Mohareb

Abstract:

This paper develops the exact solutions for coupled flexural-lateral-torsional static response of thin-walled asymmetric open members subjected to general loading. Using the principle of stationary total potential energy, the governing differential equations of equilibrium are formulated as well as the associated boundary conditions. The formulation is based on a generalized Timoshenko-Vlasov beam theory and accounts for the effects of shear deformation due to bending and warping, and captures the effects of flexural–torsional coupling due to cross-section asymmetry. Closed-form solutions are developed for cantilever and simply supported beams under various forces. In order to demonstrate the validity and the accuracy of this solution, numerical examples are presented and compared with well-established ABAQUS finite element solutions and other numerical results available in the literature. In addition, the results are compared against non-shear deformable beam theories in order to demonstrate the shear deformation effects.

Keywords: asymmetric cross-section, flexural-lateral-torsional response, Vlasov-Timoshenko beam theory, closed form solution

Procedia PDF Downloads 440
287 The Effect of Oil Price Uncertainty on Food Price in South Africa

Authors: Goodness C. Aye

Abstract:

This paper examines the effect of the volatility of oil prices on food price in South Africa using monthly data covering the period 2002:01 to 2014:09. Food price is measured by the South African consumer price index for food while oil price is proxied by the Brent crude oil. The study employs the GARCH-in-mean VAR model, which allows the investigation of the effect of a negative and positive shock in oil price volatility on food price. The model also allows the oil price uncertainty to be measured as the conditional standard deviation of a one-step-ahead forecast error of the change in oil price. The results show that oil price uncertainty has a positive and significant effect on food price in South Africa. The responses of food price to a positive and negative oil price shocks is asymmetric.

Keywords: oil price volatility, food price, bivariate, GARCH-in-mean VAR, asymmetric

Procedia PDF Downloads 447
286 A Review Of Blended Wing Body And Slender Delta Wing Performance Utilizing Experimental Techniques And Computational Fluid Dynamics

Authors: Abhiyan Paudel, Maheshwaran M Pillai

Abstract:

This paper deals with the optimization and comparison of slender delta wing and blended wing body. The objective is to study the difference between the two wing types and analyze the various aerodynamic characteristics of both of these types.The blended-wing body is an aircraft configuration that has the potential to be more efficient than conventional large transport aircraft configurations with the same capability. The purported advantages of the BWB approach are efficient high-lift wings and a wide airfoil-shaped body. Similarly, symmetric separation vortices over slender delta wing may become asymmetric as the angle of attack is increased beyond a certain value, causing asymmetric forces even at symmetric flight conditions. The transition of the vortex pattern from being symmetric to asymmetric over symmetric bodies under symmetric flow conditions is a fascinating fluid dynamics problem and of major importance for the performance and control of high-maneuverability flight vehicles that favor the use of slender bodies. With the use of Star CCM, we analyze both the fluid properties. The CL, CD and CM were investigated in steady state CFD of BWB at Mach 0.3 and through wind tunnel experiments on 1/6th model of BWB at Mach 0.1. From CFD analysis pressure variation, Mach number contours and turbulence area was observed.

Keywords: Coefficient of Lift, Coefficient of Drag, CFD=Computational Fluid Dynamics, BWB=Blended Wing Body, slender delta wing

Procedia PDF Downloads 495
285 Continuous Processing Approaches for Tunable Asymmetric Photochemical Synthesis

Authors: Amanda C. Evans

Abstract:

Enabling technologies such as continuous processing (CP) approaches can provide the tools needed to control and manipulate reactivities and transform chemical reactions into micro-controlled in-flow processes. Traditional synthetic approaches can be radically transformed by the application of CP, facilitating the pairing of chemical methodologies with technologies from other disciplines. CP supports sustainable processes that controllably generate reaction specificity utilizing supramolecular interactions. Continuous photochemical processing is an emerging field of investigation. The use of light to drive chemical reactivity is not novel, but the controlled use of specific and tunable wavelengths of light to selectively generate molecular structure under continuous processing conditions is an innovative approach towards chemical synthesis. This investigation focuses on the use of circularly polarized (cp) light as a sustainable catalyst for the CP generation of asymmetric molecules. Chiral photolysis has already been achieved under batch, solid-phase conditions: using synchrotron-sourced cp light, asymmetric photolytic selectivities of up to 4.2% enantiomeric excess (e.e.) have been reported. In order to determine the optimal wavelengths to use for irradiation with cp light for any given molecular building block, CD and anisotropy spectra for each building block of interest have been generated in two different solvents (water, hexafluoroisopropanol) across a range of wavelengths (130-400 nm). These spectra are being used to support a series of CP experiments using cp light to generate enantioselectivity.

Keywords: anisotropy, asymmetry, flow chemistry, active pharmaceutical ingredients

Procedia PDF Downloads 125
284 Passive and Active Spatial Pendulum Tuned Mass Damper with Two Tuning Frequencies

Authors: W. T. A. Mohammed, M. Eltaeb, R. Kashani

Abstract:

The first bending modes of tall asymmetric structures in the two lateral X and Y-directions have two different natural frequencies. To add tuned damping to these bending modes, one needs to either a) use two pendulum-tuned mass dampers (PTMDs) with one tuning frequency, each PTMD targeting one of the bending modes, or b) use one PTMD with two tuning frequencies (one in each lateral directions). Option (a), being more massive, requiring more space, and being more expensive, is less attractive than option (b). Considering that the tuning frequency of a pendulum depends mainly on the pendulum length, one way of realizing option (b) is by constraining the swinging length of the pendulum in one direction but not in the other; such PTMD is dubbed passive Bi-PTMD. Alternatively, option (b) can be realized by actively setting the tuning frequencies of the PTMD in the two directions. In this work, accurate physical models of passive Bi-PTMD and active PTMD are developed and incorporated into the numerical model of a tall asymmetric structure. The model of PTMDs plus structure is used for a)synthesizing such PTMDs for particular applications and b)evaluating their damping effectiveness in mitigating the dynamic lateral responses of their target asymmetric structures, perturbed by wind load in X and Y-directions. Depending on how elaborate the control scheme is, the active PTMD can either be made to yield the same damping effectiveness as the passive Bi-PTMD of the same size or the passive Bi-TMD twice as massive as the active PTMD.

Keywords: active tuned mass damper, high-rise building, multi-frequency tuning, vibration control

Procedia PDF Downloads 52
283 The Impact of the Global Financial Crises on MILA Stock Markets

Authors: Miriam Sosa, Edgar Ortiz, Alejandra Cabello

Abstract:

This paper examines the volatility changes and leverage effects of the MILA stock markets and their changes since the 2007 global financial crisis. This group integrates the stock markets from Chile, Colombia, Mexico and Peru. Volatility changes and leverage effects are tested with a symmetric GARCH (1,1) and asymmetric TARCH (1,1) models with a dummy variable in the variance equation. Daily closing prices of the stock indexes of Chile (IPSA), Colombia (COLCAP), Mexico (IPC) and Peru (IGBVL) are examined for the period 2003:01 to 2015:02. The evidence confirms the presence of an overall increase in asymmetric market volatility in the Peruvian share market since the 2007 crisis.

Keywords: financial crisis, Latin American Integrated Market, TARCH, GARCH

Procedia PDF Downloads 243
282 Improving Cryptographically Generated Address Algorithm in IPv6 Secure Neighbor Discovery Protocol through Trust Management

Authors: M. Moslehpour, S. Khorsandi

Abstract:

As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.

Keywords: CGA, ICMPv6, IPv6, malicious node, modifier, NDP, overall load, SEND, trust management

Procedia PDF Downloads 150
281 Scalable Systolic Multiplier over Binary Extension Fields Based on Two-Level Karatsuba Decomposition

Authors: Chiou-Yng Lee, Wen-Yo Lee, Chieh-Tsai Wu, Cheng-Chen Yang

Abstract:

Shifted polynomial basis (SPB) is a variation of polynomial basis representation. SPB has potential for efficient bit-level and digit-level implementations of multiplication over binary extension fields with subquadratic space complexity. For efficient implementation of pairing computation with large finite fields, this paper presents a new SPB multiplication algorithm based on Karatsuba schemes, and used that to derive a novel scalable multiplier architecture. Analytical results show that the proposed multiplier provides a trade-off between space and time complexities. Our proposed multiplier is modular, regular, and suitable for very-large-scale integration (VLSI) implementations. It involves less area complexity compared to the multipliers based on traditional decomposition methods. It is therefore, more suitable for efficient hardware implementation of pairing based cryptography and elliptic curve cryptography (ECC) in constraint driven applications.

Keywords: digit-serial systolic multiplier, elliptic curve cryptography (ECC), Karatsuba algorithm (KA), shifted polynomial basis (SPB), pairing computation

Procedia PDF Downloads 331
280 A Scheme Cooperating with Cryptography to Enhance Security in Satellite Communications

Authors: Chieh-Fu Chang, Wan-Hsin Hsieh

Abstract:

We have proposed a novel scheme— iterative word-extension (IWE) to enhance the cliff effect of Reed-Solomon codes regarding the error performance at a specific Eb/N0. The scheme can be readily extended to block codes and the important properties of IWE are further investigated here. In order to select proper block codes specifying the desired cliff Eb/N0, the associated features of IWE are explored. These properties and features grant IWE ability to enhance security regarding the received Eb/N0 in physical layer so that IWE scheme can cooperate with the traditional presentation layer approach — cryptography, to meet the secure requirements in diverse applications. The features and feasibility of IWE scheme in satellite communication are finally discussed.

Keywords: security, IWE, cliff effect, space communications

Procedia PDF Downloads 387
279 Modelling Exchange-Rate Pass-Through: A Model of Oil Prices and Asymmetric Exchange Rate Fluctuations in Selected African Countries

Authors: Fajana Sola Isaac

Abstract:

In the last two decades, we have witnessed an increased interest in exchange rate pass-through (ERPT) in developing economies and emerging markets. This is perhaps due to the acknowledged significance of the pattern of exchange rate pass-through as a key instrument in monetary policy design, principally in retort to a shock in exchange rate in literature. This paper analyzed Exchange Rate Pass-Through by A Model of Oil Prices and Asymmetric Exchange Rate Fluctuations in Selected African Countries. The study adopted A Non-Linear Autoregressive Distributed Lag approach using yearly data on Algeria, Burundi, Nigeria and South Africa from 1986 to 2022. The paper found asymmetry in exchange rate pass-through in net oil-importing and net oil-exporting countries in the short run during the period under review. An ERPT exhibited a complete pass-through in the short run in the case of net oil-importing countries but an incomplete pass-through in the case of the net oil-exporting countries that were examined. An extended result revealed a significant impact of oil price shock on exchange rate pass-through to domestic price in the long run only for net oil importing countries. The Wald restriction test also confirms the evidence of asymmetric with the role of oil price acting as an accelerator to exchange rate pass-through to domestic price in the countries examined. The study found the outcome to be very useful for gaining expansive knowledge on the external shock impact on ERPT and could be of critical value for national monetary policy decisions on inflation targeting, especially for countries examined and other developing net oil importers and exporters.

Keywords: pass through, exchange rate, ARDL, monetary policy

Procedia PDF Downloads 34
278 Secure Message Transmission Using Meaningful Shares

Authors: Ajish Sreedharan

Abstract:

Visual cryptography encodes a secret image into shares of random binary patterns. If the shares are exerted onto transparencies, the secret image can be visually decoded by superimposing a qualified subset of transparencies, but no secret information can be obtained from the superposition of a forbidden subset. The binary patterns of the shares, however, have no visual meaning and hinder the objectives of visual cryptography. In the Secret Message Transmission through Meaningful Shares a secret message to be transmitted is converted to grey scale image. Then (2,2) visual cryptographic shares are generated from this converted gray scale image. The shares are encrypted using A Chaos-Based Image Encryption Algorithm Using Wavelet Transform. Two separate color images which are of the same size of the shares, taken as cover image of the respective shares to hide the shares into them. The encrypted shares which are covered by meaningful images so that a potential eavesdropper wont know there is a message to be read. The meaningful shares are transmitted through two different transmission medium. During decoding shares are fetched from received meaningful images and decrypted using A Chaos-Based Image Encryption Algorithm Using Wavelet Transform. The shares are combined to regenerate the grey scale image from where the secret message is obtained.

Keywords: visual cryptography, wavelet transform, meaningful shares, grey scale image

Procedia PDF Downloads 417
277 Electron Spin Resonance of Conduction and Spin Waves Dynamics Investigations in Bi-2223 Superconductor for Decoding Pairing Mechanism

Authors: S. N. Ekbote, G. K. Padam, Manju Arora

Abstract:

Electron spin resonance (ESR) spectroscopic investigations of (Bi, Pb)₂Sr₂Ca₂Cu₃O₁₀₋ₓ (Bi-2223) bulk samples were carried out in both the normal and superconducting states. A broad asymmetric resonance signal with side signals is obtained in the normal state, and all of them disappear in the superconducting state. The temperature and angular orientation effects on these signals suggest that the broad asymmetric signal arises from electron spin resonance of conduction electrons (CESR) and the side signals from exchange interactions as Platzman-Wolff type spin waves. The disappearance of CESR and spin waves in a superconducting state demonstrates the role of exchange interactions in Cooper pair formation.

Keywords: Bi-2223 superconductor, CESR, ESR, exchange interactions, spin waves

Procedia PDF Downloads 91
276 Peristaltic Transport of a Jeffrey Fluid with Double-Diffusive Convection in Nanofluids in the Presence of Inclined Magnetic Field

Authors: Safia Akram

Abstract:

In this article, the effects of peristaltic transport with double-diffusive convection in nanofluids through an asymmetric channel with different waveforms is presented. Mathematical modelling for two-dimensional and two directional flows of a Jeffrey fluid model along with double-diffusive convection in nanofluids are given. Exact solutions are obtained for nanoparticle fraction field, concentration field, temperature field, stream functions, pressure gradient and pressure rise in terms of axial and transverse coordinates under the restrictions of long wavelength and low Reynolds number. With the help of computational and graphical results the effects of Brownian motion, thermophoresis, Dufour, Soret, and Grashof numbers (thermal, concentration, nanoparticles) on peristaltic flow patterns with double-diffusive convection are discussed.

Keywords: nanofluid particles, peristaltic flow, Jeffrey fluid, magnetic field, asymmetric channel, different waveforms

Procedia PDF Downloads 343
275 Effect of Homogeneous and Heterogeneous Chemical Reactions on Peristaltic Flow of a Jeffrey Fluid in an Asymmetric Channel

Authors: G. Ravi Kiran, G. Radhakrishnamacharya

Abstract:

In this paper, the dispersion of a solute in the peristaltic flow of a Jeffrey fluid in the presence of both homogeneous and heterogeneous chemical reactions has been discussed. The average effective dispersion coefficient has been found using Taylor's limiting condition under long wavelength approximation. It is observed that the average dispersion coefficient increases with amplitude ratio which implies that dispersion is more in the presence of peristalsis. The average effective dispersion coefficient increases with Jeffrey parameter in the cases of both homogeneous and combined homogeneous and heterogeneous chemical reactions. Further, dispersion decreases with a phase difference, homogeneous reaction rate parameters, and heterogeneous reaction rate parameter.

Keywords: peristalsis, dispersion, chemical reaction, Jeffrey fluid, asymmetric channel

Procedia PDF Downloads 551
274 A Distributed Cryptographically Generated Address Computing Algorithm for Secure Neighbor Discovery Protocol in IPv6

Authors: M. Moslehpour, S. Khorsandi

Abstract:

Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.

Keywords: NDP, IPsec, SEND, CGA, modifier, malicious node, self-computing, distributed-computing

Procedia PDF Downloads 252
273 Effect of Asymmetric Amphiphilic Dicationic Ionic Liquids as Oil Spill Dispersants in Red Sea

Authors: Raghda El-Nagara, Maher I. Nessim, Carmen E. Elshafee, Renee I. Abdallah, Yasser M. Moustafa

Abstract:

Three asymmetric dicationic ionic liquids (ADILs), 1-(2-(1-dodecyl-2-methyl-1H-imidazolium-3-yl)ethyl)-3-methyl pyridinium bromide (IL₁), 1-(6-(1-dodecyl-2-methyl-1H-imidazolium-3-yl)hexyl)-3-methyl pyridinium bromide (IL₂) and 1-(10-(1-dodecyl-2-methyl-1H-imidazolium-3-yl)decyl)-3-methyl pyridinium bromide (IL₃) were synthesized with yield of 83.54, 84.12 & 83.05% respectively. They were elucidated via conventional tools of analysis (elemental analysis, FT-IR, and 1H-NMR). The thermogravimetric analysis confirmed that the three ADILs possessed high thermal stability (up to 500ᵒC). Their critical micelle concentration (CMC) was investigated and exhibited values of 5.5-1*10⁻³ Mol./L. They were evaluated as oil spill dispersants were at different temperatures (10, 30 & 50ᵒC) with different concentrations (750, 1500, 2000, 3000 ppm). Data reveals that the efficiency is ranked as follows: IL₂ > IL₁ > IL₃, which showed high dispersion efficiency reached to 63% with the concentration of 1500 ppm.

Keywords: ionic liquids, amphiphilic, oil spill dispersants, dicationic, efficiency test

Procedia PDF Downloads 120
272 Comparison between Separable and Irreducible Goppa Code in McEliece Cryptosystem

Authors: Newroz Nooralddin Abdulrazaq, Thuraya Mahmood Qaradaghi

Abstract:

The McEliece cryptosystem is an asymmetric type of cryptography based on error correction code. The classical McEliece used irreducible binary Goppa code which considered unbreakable until now especially with parameter [1024, 524, and 101], but it is suffering from large public key matrix which leads to be difficult to be used practically. In this work Irreducible and Separable Goppa codes have been introduced. The Irreducible and Separable Goppa codes used are with flexible parameters and dynamic error vectors. A Comparison between Separable and Irreducible Goppa code in McEliece Cryptosystem has been done. For encryption stage, to get better result for comparison, two types of testing have been chosen; in the first one the random message is constant while the parameters of Goppa code have been changed. But for the second test, the parameters of Goppa code are constant (m=8 and t=10) while the random message have been changed. The results show that the time needed to calculate parity check matrix in separable are higher than the one for irreducible McEliece cryptosystem, which is considered expected results due to calculate extra parity check matrix in decryption process for g2(z) in separable type, and the time needed to execute error locator in decryption stage in separable type is better than the time needed to calculate it in irreducible type. The proposed implementation has been done by Visual studio C#.

Keywords: McEliece cryptosystem, Goppa code, separable, irreducible

Procedia PDF Downloads 231
271 Design of Photonic Crystal with Defect Layer to Eliminate Interface Corrugations for Obtaining Unidirectional and Bidirectional Beam Splitting under Normal Incidence

Authors: Evrim Colak, Andriy E. Serebryannikov, Pavel V. Usik, Ekmel Ozbay

Abstract:

Working with a dielectric photonic crystal (PC) structure which does not include surface corrugations, unidirectional transmission and dual-beam splitting are observed under normal incidence as a result of the strong diffractions caused by the embedded defect layer. The defect layer has twice the period of the regular PC segments which sandwich the defect layer. Although the PC has even number of rows, the structural symmetry is broken due to the asymmetric placement of the defect layer with respect to the symmetry axis of the regular PC. The simulations verify that efficient splitting and occurrence of strong diffractions are related to the dispersion properties of the Floquet-Bloch modes of the photonic crystal. Unidirectional and bi-directional splitting, which are associated with asymmetric transmission, arise due to the dominant contribution of the first positive and first negative diffraction orders. The effect of the depth of the defect layer is examined by placing single defect layer in varying rows, preserving the asymmetry of PC. Even for deeply buried defect layer, asymmetric transmission is still valid even if the zeroth order is not coupled. This transmission is due to evanescent waves which reach to the deeply embedded defect layer and couple to higher order modes. In an additional selected performance, whichever surface is illuminated, i.e., in both upper and lower surface illumination cases, incident beam is split into two beams of equal intensity at the output surface where the intensity of the out-going beams are equal for both illumination cases. That is, although the structure is asymmetric, symmetric bidirectional transmission with equal transmission values is demonstrated and the structure mimics the behavior of symmetric structures. Finally, simulation studies including the examination of a coupled-cavity defect for two different permittivity values (close to the permittivity values of GaAs or Si and alumina) reveal unidirectional splitting for a wider band of operation in comparison to the bandwidth obtained in the case of a single embedded defect layer. Since the dielectric materials that are utilized are low-loss and weakly dispersive in a wide frequency range including microwave and optical frequencies, the studied structures should be scalable to the mentioned ranges.

Keywords: asymmetric transmission, beam deflection, blazing, bi-directional splitting, defect layer, dual beam splitting, Floquet-Bloch modes, isofrequency contours, line defect, oblique incidence, photonic crystal, unidirectionality

Procedia PDF Downloads 155
270 Enhanced Visual Sharing Method for Medical Image Security

Authors: Kalaivani Pachiappan, Sabari Annaji, Nithya Jayakumar

Abstract:

In recent years, Information security has emerged as foremost challenges in many fields. Especially in medical information systems security is a major issue, in handling reports such as patients’ diagnosis and medical images. These sensitive data require confidentiality for transmission purposes. Image sharing is a secure and fault-tolerant method for protecting digital images, which can use the cryptography techniques to reduce the information loss. In this paper, visual sharing method is proposed which embeds the patient’s details into a medical image. Then the medical image can be divided into numerous shared images and protected by various users. The original patient details and medical image can be retrieved by gathering the shared images.

Keywords: information security, medical images, cryptography, visual sharing

Procedia PDF Downloads 372
269 A Comparative CFD Study on the Hemodynamics of Flow through an Idealized Symmetric and Asymmetric Stenosed Arteries

Authors: B. Prashantha, S. Anish

Abstract:

The aim of the present study is to computationally evaluate the hemodynamic factors which affect the formation of atherosclerosis and plaque rupture in the human artery. An increase of atherosclerosis disease in the artery causes geometry changes, which results in hemodynamic changes such as flow separation, reattachment, and adhesion of new cells (chemotactic) in the artery. Hence, geometry plays an important role in the determining the nature of hemodynamic patterns. Influence of stenosis in the non-bifurcating artery, under pulsatile flow condition, has been studied on an idealized geometry. Analysis of flow through symmetric and asymmetric stenosis in the artery revealed the significance of oscillating shear index (OSI), flow separation, low WSS zones and secondary flow patterns on plaque formation. The observed characteristic of flow in the post-stenotic region highlight the importance of plaque eccentricity on the formation of secondary stenosis on the arterial wall.

Keywords: atherosclerotic plaque, oscillatory shear index, stenosis nature, wall shear stress

Procedia PDF Downloads 320
268 Thermal Comfort Characteristics in an Enclosure with a Radiant Ceiling Heating and Floor Air Heating System

Authors: Seung-Ho Yoo, Jong-Ryeul Sohn

Abstract:

An environmental friendly or efficient heating & cooling systems attract a great attention, due to the energy or environmental problems. Especially the heat balance of human body is about 50% influenced by radiation exchange in built environment. Therefore, a thermal comfort characteristics in a radiant built environment need to be accessed through the development of an efficient evaluation method. Almost of Korean housings use traditionally the radiant floor heating system. A radiant cooling system attracts also many attention nowadays in the viewpoint of energy conservation and comfort. Thermal comfort characteristics in an enclosure with a radiant heating and cooling system are investigated by experiment, thermal sensation vote analysis and mean radiant temperature simulation. Asymmetric radiation between radiant heating ceiling and air heating system in 9 points of room is compared with each other.

Keywords: radiant heating and cooling ceiling, asymmetric radiation, thermal comfort, thermal sensation vote

Procedia PDF Downloads 478
267 Software Quality Assurance in Network Security using Cryptographic Techniques

Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar

Abstract:

The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.

Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography

Procedia PDF Downloads 699
266 Exploring the Bifunctional Organocatalysts for Asymmetric Synthesis of 3-Substituted-3-Aminooxindoles

Authors: Jasneet Kaur, Swapandeep Singh Chimni

Abstract:

The unfavorable use of metal-based catalysts that are often extortionate and toxic can be overcome by using small organic molecules known as organocatalysts. A variety of small organic molecules, including Brønsted/Lewis bases and acids, based on sulfonic acids, phosphoric acids, amines, phosphines or carbenes, Cinchona alkaloids, have been used as organocatalysts. One of the key reasons for using organocatalysis is their ability to be effectively removed from the final product in comparison to the metallic counterparts, which are exceedingly difficult to remove. The present investigation seeks to explore the catalytic nature of Cinchona alkaloids as an organocatalyst for enantioselective synthesis of 3-substituted-3-aminooxindole, which is known to exhibit a variety of biological activities and pharmacological activities. In this context, an organocatalytic asymmetric route for the synthesis of 3-aminooxindoles via reaction of isatin imine with α-acetoxy-β-ketoesters has been developed. The bifunctional Cinchona derived thiourea catalyzed the reaction of α-acetoxy-β-ketoesters derivatives with isatin imine to afford 3-substituted-aminooxindole derivatives in up to 93% yield, 95% enantiomeric excess and >20:1 diastereomeric ratio. The reaction was performed at room temperature for two hours using 10 mol% of catalyst, in the presence of 4Å molecular sieves in tetrahydrofuran as a solvent at ambient temperature. After the completion of the reaction, the pure product could be easily separated by using column chromatography using hexane and ethyl acetate as solvents. In conclusion, the catalytic potential of Cinchona derived chiral thiourea-tertiary amine catalyst was explored for an organocatalytic enantioselective Mannich reaction of β-ketoester derivatives with various isatin imine derivatives under mild conditions.

Keywords: asymmetric synthesis, aminooxindoles, enantioselective, isatin imine

Procedia PDF Downloads 85
265 Implementation of a Novel Modified Multilevel Inverter Topology for Grid Connected PV System

Authors: Dhivya Balakrishnan, Dhamodharan Shanmugam

Abstract:

Multilevel converters offer high power capability, associated with lower output harmonics and lower commutation losses. Their main disadvantage is their complexity requiring a great number of power devices and passive components, and a rather complex control circuitry. This paper proposes a single-phase seven-level inverter for grid connected PV systems, With a novel pulse width-modulated (PWM) control scheme. Three reference signals that are identical to each other with an offset that is equivalent to the amplitude of the triangular carrier signal were used to generate the PWM signals. The inverter is capable of producing seven levels of output-voltage levels from the dc supply voltage. This paper proposes a new multilevel inverter topology using an H-bridge output stage with two bidirectional auxiliary switches. The new topology produces a significant reduction in the number of power devices and capacitors required to implement a multilevel output using the asymmetric cascade configuration.

Keywords: asymmetric cascade configuration, H-Bridge, multilevel inverter, Pulse Width Modulation (PWM)

Procedia PDF Downloads 319
264 Microstrip Bandpass Filter with Wide Stopband and High Out-of-Band Rejection Based on Inter-Digital Capacitor

Authors: Mohamad Farhat, Bal Virdee

Abstract:

This paper present a compact Microstrip Bandpass filter exhibiting a very wide stop band and high selectivity. The filter comprises of asymmetric resonator structures, which are interconnected by an inter-digital capacitor to enable the realization of a wide bandwidth with high rejection level. High selectivity is obtained by optimizing the parameters of the interdigital capacitor. The filter has high out-of-band rejection (> 30 dB), less than 0.6 dB of insertion-loss, up to 5.5 GHz spurii free, and about 18 dB of return-loss. Full-wave electromagnetic simulator ADSTM (Mom) is used to analyze and optimize the prototype bandpass filter. The proposed technique was verified practically to validate the design methodology. The experimental results of the prototype circuit are presented and a good agreement was obtained comparing with the simulation results. The dimensions of the proposed filter are 32 x 24 mm2.The filter’s characteristics and compact size make it suitable for wireless communication systems.

Keywords: asymmetric resonator, bandpass filter, microstrip, spurious suppression, ultra-wide stop band

Procedia PDF Downloads 157
263 Investigation of a Hybrid Process: Multipoint Incremental Forming

Authors: Safa Boudhaouia, Mohamed Amen Gahbiche, Eliane Giraud, Wacef Ben Salem, Philippe Dal Santo

Abstract:

Multi-point forming (MPF) and asymmetric incremental forming (ISF) are two flexible processes for sheet metal manufacturing. To take advantages of these two techniques, a hybrid process has been developed: The Multipoint Incremental Forming (MPIF). This process accumulates at once the advantages of each of these last mentioned forming techniques, which makes it a very interesting and particularly an efficient process for single, small, and medium series production. In this paper, an experimental and a numerical investigation of this technique are presented. To highlight the flexibility of this process and its capacity to manufacture standard and complex shapes, several pieces were produced by using MPIF. The forming experiments are performed on a 3-axis CNC machine. Moreover, a numerical model of the MPIF process has been implemented in ABAQUS and the analysis showed a good agreement with experimental results in terms of deformed shape. Furthermore, the use of an elastomeric interpolator allows avoiding classical local defaults like dimples, which are generally caused by the asymmetric contact and also improves the distribution of residual strain. Future works will apply this approach to other alloys used in aeronautic or automotive applications.

Keywords: incremental forming, numerical simulation, MPIF, multipoint forming

Procedia PDF Downloads 310