Search results for: composite security index
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7899

Search results for: composite security index

7779 Developing a Systems Dynamics Model for Security Management

Authors: Kuan-Chou Chen

Abstract:

This paper will demonstrate a simulation model of an information security system by using the systems dynamic approach. The relationships in the system model are designed to be simple and functional and do not necessarily represent any particular information security environments. The purpose of the paper aims to develop a generic system dynamic information security system model with implications on information security research. The interrelated and interdependent relationships of five primary sectors in the system dynamic model will be presented in this paper. The integrated information security systems model will include (1) information security characteristics, (2) users, (3) technology, (4) business functions, and (5) policy and management. Environments, attacks, government and social culture will be defined as the external sector. The interactions within each of these sectors will be depicted by system loop map as well. The proposed system dynamic model will not only provide a conceptual framework for information security analysts and designers but also allow information security managers to remove the incongruity between the management of risk incidents and the management of knowledge and further support information security managers and decision makers the foundation for managerial actions and policy decisions.

Keywords: system thinking, information security systems, security management, simulation

Procedia PDF Downloads 401
7778 Agriculture, Food Security and Poverty Reduction in Nigeria: Cointegration and Granger Causality Approach

Authors: Ogunwole Cecilia Oluwakemi, Timothy Ayomitunde Aderemi

Abstract:

Provision of sufficient food and elimination of abject poverty have usually been the conventional benefits of agriculture in any society. Meanwhile, despite the fact that Nigeria is an agrarian society, food insecurity and poverty have become the issues of concern among both scholars and policymakers in the recent times. Against this backdrop, this study examined the nexus among agriculture, food security, and poverty reduction in Nigeria from 1990 to 2019 within the framework of the Cointegration and Granger Causality approach. Data was collected from the Central Bank of Nigeria Statistical Bulletin and the World Development Indicators, respectively. The following are the major results that emanated from the study. A long run equilibrium relationship exists among agricultural value added, food production index, and GDP per capita in Nigeria. Similarly, there is a unidirectional causality which flows from food production index to poverty reduction in Nigeria. In the same vein, one way causality flows from poverty reduction to agricultural value added in Nigeria. Consequently, this study makes the following recommendation for the policymakers in Nigeria, and other African countries by extension, that agricultural value added and food production are the important variables that cannot be undermined when poverty reduction occupies the central focus of the policymakers. Therefore, any time these policymakers want to reduce poverty, policies that drive agricultural value added and food production should be embarked upon. Therefore, this study will contribute to the literature by establishing the type of linkage that exists between agriculture, food security, and poverty reduction in Nigeria.

Keywords: agriculture, value added, food production, GDP per capita, Nigeria

Procedia PDF Downloads 148
7777 Study of the Effect of Sewing on Non Woven Textile Waste at Dry and Composite Scales

Authors: Wafa Baccouch, Adel Ghith, Xavier Legrand, Faten Fayala

Abstract:

Textile waste recycling has become a necessity considering the augmentation of the amount of waste generated each year and the ecological problems that landfilling and burning can cause. Textile waste can be recycled into many different forms according to its composition and its final utilization. Using this waste as reinforcement to composite panels is a new recycling area that is being studied. Compared to virgin fabrics, recycled ones present the disadvantage of having lower structural characteristics, when they are eco-friendly and with low cost. The objective of this work is transforming textile waste into composite material with good characteristic and low price. In this study, we used sewing as a method to improve the characteristics of the recycled textile waste in order to use it as reinforcement to composite material. Textile non-woven waste was afforded by a local textile recycling industry. Performances tests were evaluated using tensile testing machine and based on the testing direction for both reinforcements and composite panels; machine and transverse direction. Tensile tests were conducted on sewed and non sewed fabrics, and then they were used as reinforcements to composite panels via epoxy resin infusion method. Rule of mixtures is used to predict composite characteristics and then compared to experimental ones.

Keywords: composite material, epoxy resin, non woven waste, recycling, sewing, textile

Procedia PDF Downloads 559
7776 Enterprise Security Architecture: Approaches and a Framework

Authors: Amir Mohtarami, Hadi Kandjani

Abstract:

The amount of business-critical information in enterprises is growing at an extraordinary rate, and the ability to catalog that information and properly protect it using traditional security mechanisms is not keeping pace. Alongside the Information Technology (IT), information security needs a holistic view in enterprise. In other words, a comprehensive architectural approach is required, focusing on the information itself, understanding what the data are, who owns it, and which business and regulatory policies should be applied to the information. Enterprise Architecture Frameworks provide useful tools to grasp different dimensions of IT in organizations. Usually this is done by the layered views on IT architecture, but not requisite security attention has been held in this frameworks. In this paper, after a brief look at the Enterprise Architecture (EA), we discuss the issue of security in the overall enterprise IT architecture. Due to the increasing importance of security, a rigorous EA program in an enterprise should be able to consider security architecture as an integral part of its processes and gives a visible roadmap and blueprint for this aim.

Keywords: enterprise architecture, architecture framework, security architecture, information systems

Procedia PDF Downloads 671
7775 Security as Human Value: Issue of Human Rights in Indian Sub-Continental Operations

Authors: Pratyush Vatsala, Sanjay Ahuja

Abstract:

The national security and human rights are related terms as there is nothing like absolute security or absolute human right. If we are committed to security, human right is a problem and also a solution, and if we deliberate on human rights, security is a problem but also part of the solution. Ultimately, we have to maintain a balance between the two co-related terms. As more and more armed forces are being deployed by the government within the nation for maintaining peace and security, using force against its own citizen, the search for a judicious balance between intent and action needs to be emphasized. Notwithstanding that a nation state needs complete political independence; the search for security is a driving force behind unquestioned sovereignty. If security is a human value, it overlaps the value of freedom, order, and solidarity. Now, the question needs to be explored, to what extent human rights can be compromised in the name of security in Kashmir or Mizoram like places. The present study aims to explore the issue of maintaining a balance between the use of power and good governance as human rights, providing security as a human value. This paper has been prepared with an aim of strengthening the understanding of the complex and multifaceted relationship between human rights and security forces operating for conflict management and identifies some of the critical human rights issues raised in the context of security forces operations highlighting the relevant human rights principles and standards in which Security as human value be respected at all times and in particular in the context of security forces operations in India.

Keywords: Kashmir, Mizoram, security, value, human right

Procedia PDF Downloads 251
7774 Brainwave Classification for Brain Balancing Index (BBI) via 3D EEG Model Using k-NN Technique

Authors: N. Fuad, M. N. Taib, R. Jailani, M. E. Marwan

Abstract:

In this paper, the comparison between k-Nearest Neighbor (kNN) algorithms for classifying the 3D EEG model in brain balancing is presented. The EEG signal recording was conducted on 51 healthy subjects. Development of 3D EEG models involves pre-processing of raw EEG signals and construction of spectrogram images. Then, maximum PSD values were extracted as features from the model. There are three indexes for the balanced brain; index 3, index 4 and index 5. There are significant different of the EEG signals due to the brain balancing index (BBI). Alpha-α (8–13 Hz) and beta-β (13–30 Hz) were used as input signals for the classification model. The k-NN classification result is 88.46% accuracy. These results proved that k-NN can be used in order to predict the brain balancing application.

Keywords: power spectral density, 3D EEG model, brain balancing, kNN

Procedia PDF Downloads 458
7773 Quality of Age Reporting from Tanzania 2012 Census Results: An Assessment Using Whipple’s Index, Myer’s Blended Index, and Age-Sex Accuracy Index

Authors: A. Sathiya Susuman, Hamisi F. Hamisi

Abstract:

Background: Many socio-economic and demographic data are age-sex attributed. However, a variety of irregularities and misstatement are noted with respect to age-related data and less to sex data because of its biological differences between the genders. Noting the misstatement/misreporting of age data regardless of its significance importance in demographics and epidemiological studies, this study aims at assessing the quality of 2012 Tanzania Population and Housing Census Results. Methods: Data for the analysis are downloaded from Tanzania National Bureau of Statistics. Age heaping and digit preference were measured using summary indices viz., Whipple’s index, Myers’ blended index, and Age-Sex Accuracy index. Results: The recorded Whipple’s index for both sexes was 154.43; male has the lowest index of about 152.65 while female has the highest index of about 156.07. For Myers’ blended index, the preferences were at digits ‘0’ and ‘5’ while avoidance were at digits ‘1’ and ‘3’ for both sexes. Finally, Age-sex index stood at 59.8 where sex ratio score was 5.82 and age ratio scores were 20.89 and 21.4 for males and female respectively. Conclusion: The evaluation of the 2012 PHC data using the demographic techniques has qualified the data inaccurate as the results of systematic heaping and digit preferences/avoidances. Thus, innovative methods in data collection along with measuring and minimizing errors using statistical techniques should be used to ensure accuracy of age data.

Keywords: age heaping, digit preference/avoidance, summary indices, Whipple’s index, Myer’s index, age-sex accuracy index

Procedia PDF Downloads 446
7772 Numerical Simulation of Lightning Strike Direct Effects on Aircraft Skin Composite Laminate

Authors: Muhammad Khalil, Nader Abuelfoutouh, Gasser Abdelal, Adrian Murphy

Abstract:

Nowadays, the direct effects of lightning to aircrafts are of great importance because of the massive use of composite materials. In comparison with metallic materials, composites present several weaknesses for lightning strike direct effects. Especially, their low electrical and thermal conductivities lead to severe lightning strike damage. The lightning strike direct effects are burning, heating, magnetic force, sparking and arcing. As the problem is complex, we investigated it gradually. A magnetohydrodynamics (MHD) model is developed to simulate the lightning strikes in order to estimate the damages on the composite materials. Then, a coupled thermal-electrical finite element analysis is used to study the interaction between the lightning arc and the composite laminate and to investigate the material degradation.

Keywords: composite structures, lightning multiphysics, magnetohydrodynamic (MHD), coupled thermal-electrical analysis, thermal plasmas.

Procedia PDF Downloads 347
7771 Simulation of Non-Crimp 3D Orthogonal Carbon Fabric Composite for Aerospace Applications Using Finite Element Method

Authors: Sh. Minapoor, S. Ajeli, M. Javadi Toghchi

Abstract:

Non-crimp 3D orthogonal fabric composite is one of the textile-based composite materials that are rapidly developing light-weight engineering materials. The present paper focuses on geometric and micro mechanical modeling of non-crimp 3D orthogonal carbon fabric and composites reinforced with it for aerospace applications. In this research meso-finite element (FE) modeling employs for stress analysis in different load conditions. Since mechanical testing of expensive textile carbon composites with specific application isn't affordable, simulation composite in a virtual environment is a helpful way to investigate its mechanical properties in different conditions.

Keywords: woven composite, aerospace applications, finite element method, mechanical properties

Procedia PDF Downloads 438
7770 Security Threats on Wireless Sensor Network Protocols

Authors: H. Gorine, M. Ramadan Elmezughi

Abstract:

In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issues of security in wireless sensor networks in an attempt to encourage more research into this area.

Keywords: wireless sensor networks, network security, light weight encryption, threats

Procedia PDF Downloads 491
7769 Magnetic Nano-Composite of Self-Doped Polyaniline Nanofibers for Magnetic Dispersive Micro Solid Phase Extraction Applications

Authors: Hatem I. Mokhtar, Randa A. Abd-El-Salam, Ghada M. Hadad

Abstract:

An improved nano-composite of self-doped polyaniline nanofibers and silica-coated magnetite nanoparticles were prepared and evaluated for suitability to magnetic dispersive micro solid-phase extraction. The work focused on optimization of the composite capacity to extract four fluoroquinolones (FQs) antibiotics, ciprofloxacin, enrofloxacin, danofloxacin, and difloxacin from water and improvement of composite stability towards acid and atmospheric degradation. Self-doped polyaniline nanofibers were prepared by oxidative co-polymerization of aniline with anthranilic acid. Magnetite nanopariticles were prepared by alkaline co-precipitation and coated with silica by silicate hydrolysis on magnetite nanoparticles surface at pH 6.5. The composite was formed by self-assembly by mixing self-doped polyaniline nanofibers with silica-coated magnetite nanoparticles dispersions in ethanol. The composite structure was confirmed by transmission electron microscopy (TEM). Self-doped polyaniline nanofibers and magnetite chemical structures were confirmed by FT-IR while silica coating of the magnetite was confirmed by Energy Dispersion X-ray Spectroscopy (EDS). Improved stability of the composite magnetic component was evidenced by resistance to degrade in 2N HCl solution. The adsorption capacity of self-doped polyaniline nanofibers based composite was higher than previously reported corresponding composite prepared from polyaniline nanofibers instead of self-doped polyaniline nanofibers. Adsorption-pH profile for the studied FQs on the prepared composite revealed that the best pH for adsorption was in range of 6.5 to 7. Best extraction recovery values were obtained at pH 7 using phosphate buffer. The best solvent for FQs desorption was found to be 0.1N HCl in methanol:water (8:2; v/v) mixture. 20 mL of Spiked water sample with studied FQs were preconcentrated using 4.8 mg of composite and resulting extracts were analysed by HPLC-UV method. The prepared composite represented a suitable adsorbent phase for magnetic dispersive micro-solid phase application.

Keywords: fluoroquinolones, magnetic dispersive micro extraction, nano-composite, self-doped polyaniline nanofibers

Procedia PDF Downloads 100
7768 Ferroelectricity in Fused Potassium Nitrate-Polymer Composite Films

Authors: Navneet Dabra, Baljinder Kaur, Lakhbir Singh, V. Annapu Reddy, R. Nath, Dae-Yong Jeong, Jasbir S. Hundal

Abstract:

The ferroelectric properties of fused potassium nitrate (KNO3)- polyvinyl alcohol (PVA) composite films have been investigated. The composite films of KNO3-PVA have been prepared by solvant cast technique and then fused over the brass substrate. The ferroelectric hysteresis loops (P-E) have been obtained at room temperature using modified Sawyer-Tower circuit. Percentage of back switching and differential dielectric constant has been derived from P-V loops. The x-ray diffraction (XRD) studies confirm the formation of ferroelectric phase (phase III) in these composite films. The AFM and FE-SEM studies have been used to study the surface morphology of these composite films. The values of remanemt polarization, coercive field, back switching, crystallite size, lattice parameters, and surface roughness have been estimated and correlated.

Keywords: ferroelectric polymer composite, remanemt polarization, back switching, crystallite size, lattice parameters and surface roughness

Procedia PDF Downloads 374
7767 Towards Security in Virtualization of SDN

Authors: Wanqing You, Kai Qian, Xi He, Ying Qian

Abstract:

In this paper, the potential security issues brought by the virtualization of a Software Defined Networks (SDN) would be analyzed. The virtualization of SDN is achieved by FlowVisor (FV). With FV, a physical network is divided into multiple isolated logical networks while the underlying resources are still shared by different slices (isolated logical networks). However, along with the benefits brought by network virtualization, it also presents some issues regarding security. By examining security issues existing in an OpenFlow network, which uses FlowVisor to slice it into multiple virtual networks, we hope we can get some significant results and also can get further discussions among the security of SDN virtualization.

Keywords: SDN, network, virtualization, security

Procedia PDF Downloads 395
7766 On Estimating the Headcount Index by Using the Logistic Regression Estimator

Authors: Encarnación Álvarez, Rosa M. García-Fernández, Juan F. Muñoz, Francisco J. Blanco-Encomienda

Abstract:

The problem of estimating a proportion has important applications in the field of economics, and in general, in many areas such as social sciences. A common application in economics is the estimation of the headcount index. In this paper, we define the general headcount index as a proportion. Furthermore, we introduce a new quantitative method for estimating the headcount index. In particular, we suggest to use the logistic regression estimator for the problem of estimating the headcount index. Assuming a real data set, results derived from Monte Carlo simulation studies indicate that the logistic regression estimator can be more accurate than the traditional estimator of the headcount index.

Keywords: poverty line, poor, risk of poverty, Monte Carlo simulations, sample

Procedia PDF Downloads 400
7765 On the Fatigue Behavior of a Triphasic Composite

Authors: G. Minak, D. Ghelli, A. Zucchelli

Abstract:

This paper presents the results of an experimental characterization of a glass fibre-epoxy composite. The behavior of the traditional two-phase composite has been compared with the one of a new three-phase composite where the epoxy matrix was modified by addition of a 3% weight fraction of montmorillonite nano-particles. Two different types of nano-clays, Cloisite® 30B and RXG7000, produced by Southern Clay Products Inc., have been considered. Three-point bending tests, both monotonic and cyclic, were carried out. A strong reduction of the ultimate flexural strength upon nano-modification has been observed in quasi-static tests. Fatigue tests yielded a smaller strength loss. In both quasi-static and fatigue tests a more pronounced tendency to delamination has been noticed in three-phase composites, especially in the case of 30B nano-clay, with respect to the standard two-phase glass fiber composite.

Keywords: bending fatigue, epoxy resin, glass fiber, montmorillonite

Procedia PDF Downloads 429
7764 Development and Utilization of Keratin-Fibrin-Gelatin Composite Films as Potential Material for Skin Tissue Engineering Application

Authors: Sivakumar Singaravelu, Giriprasath Ramanathan, M. D. Raja, Uma Tirichurapalli Sivagnanam

Abstract:

The goal of the present study was to develop and evaluate composite film for tissue engineering application. The keratin was extracted from bovine horn and used for preparation of keratin (HK), physiologically clotted fibrin (PCF) and gelatin (G) blend films in different stoichiometric ratios (1:1:1, 1:1:2 and 1:1:3) by using solvent casting method. The composite films (HK-PCF-G) were characterized physiochemically using Fourier Transform Infrared Spectroscopy (FTIR), Differential Scanning Calorimetry (DSC), Thermogravimetric Analysis (TGA) and Scanning Electron Microscopy (SEM). The mechanical properties of the composite films were analyzed. The results of tensile strength show that ultimate strength and elongation were 10.72 Mpa and 4.83 MPA respectively for 1:1:3 ratio combination. The SEM image showed a slight smooth surface for 1:1:3 ratio combination compared to other films. In order to impart antibacterial activities, the composite films were loaded with Mupirocin (MP) to act against infection. The composite films acted as a suitable carrier to protect and release the drug in a controlled manner. This developed composite film would be a suitable alternative material for tissue engineering application.

Keywords: bovine horn, keratin, fibrin, gelatin, tensile strength

Procedia PDF Downloads 423
7763 A Systematic Literature Review on Security and Privacy Design Patterns

Authors: Ebtehal Aljedaani, Maha Aljohani

Abstract:

Privacy and security patterns are both important for developing software that protects users' data and privacy. Privacy patterns are designed to address common privacy problems, such as unauthorized data collection and disclosure. Security patterns are designed to protect software from attack and ensure reliability and trustworthiness. Using privacy and security patterns, software engineers can implement security and privacy by design principles, which means that security and privacy are considered throughout the software development process. These patterns are available to translate "security & privacy-by-design" into practical advice for software engineering. Previous research on privacy and security patterns has typically focused on one category of patterns at a time. This paper aims to bridge this gap by merging the two categories and identifying their similarities and differences. To do this, the authors conducted a systematic literature review of 25 research papers on privacy and security patterns. The papers were analysed based on the category of the pattern, the classification of the pattern, and the security requirements that the pattern addresses. This paper presents the results of a comprehensive review of privacy and security design patterns. The review is intended to help future IT designers understand the relationship between the two types of patterns and how to use them to design secure and privacy-preserving software. The paper provides a clear classification of privacy and security design patterns, along with examples of each type. The authors found that there is only one widely accepted classification of privacy design patterns, while there are several competing classifications of security design patterns. Three types of security design patterns were found to be the most commonly used.

Keywords: design patterns, security, privacy, classification of patterns, security patterns, privacy patterns

Procedia PDF Downloads 96
7762 Composite Materials from Epoxidized Linseed Oil and Lignin

Authors: R. S. Komartin, B. Balanuca, R. Stan

Abstract:

the last decades, studies about the use of polymeric materials of plant origin, considering environmental concerns, have captured the interest of researchers because these represent an alternative to petroleum-derived materials. Vegetable oils are one of the preferred alternatives for petroleum-based raw materials having long aliphatic chains similar to hydrocarbons which means that can be processed using conventional chemistry. Epoxidized vegetable oils (EVO) are among the most interesting products derived from oil both for their high reactivity (epoxy group) and for the potential to react with compounds from various classes. As in the case of epoxy resins starting from petrochemical raw materials, those obtained from EVO can be crosslinked with different agents to build polymeric networks and can also be reinforced with various additives to improve their thermal and mechanical performances. Among the multitude of known EVO, the most common in industrial practice are epoxidized linseed oils (ELO) and epoxidized soybean oils (ESO), the first with an iodine index over 180, the second having a lower iodine index but being cheaper. On the other hand, lignin (Ln) is the second natural organic material as a spread, whose use has long been hampered because of the high costs associated with its isolation and purification. In this context, our goal was to obtain new composite materials with satisfactory intermediate properties in terms of stiffness and elasticity using the characteristics of ELO and Ln and choosing the proper curing procedure. In the present study linseed oil (LO) epoxidation was performed using peracetic acid generated in situ. The obtained bio-based epoxy resin derived from linseed oil was used further to produce the new composites byloading Ln in various mass ratios. The resulted ELO-Ln blends were subjected to a dual-curing protocol, namely photochemical and thermal. The new ELO-Ln composites were investigated by FTIR spectrometry, thermal stability, water affinity, and morphology. The positive effect of lignin regarding the thermal stability of the composites could be proved. The results highlight again the still largely unexplored potential of lignin in industrial applications.

Keywords: composite materials, dual curing, epoxidized linseed oil, lignin

Procedia PDF Downloads 135
7761 A Holistic Approach to Institutional Cyber Security

Authors: Mehmet Kargaci

Abstract:

It is more important to access information than to get the correct information and to transform it to the knowledge in a proper way. Every person, organizations or governments who have the knowledge now become the target. Cyber security involves the range of measures to be taken from individual to the national level. The National institutions refer to academic, military and major public and private institutions, which are very important for the national security. Thus they need further cyber security measures. It appears that the traditional cyber security measures in the national level are alone not sufficient, while the individual measures remain in a restricted level. It is evaluated that the most appropriate method for preventing the cyber vulnerabilities rather than existing measures are to develop institutional measures. This study examines the cyber security measures to be taken, especially in the national institutions.

Keywords: cyber defence, information, critical infrastructure, security

Procedia PDF Downloads 507
7760 Polymer-Ceramic Composite Film Fabrication and Characterization for Harsh Environment Applications

Authors: Santiranjan Shannigrahi, Mohit Sharma, Ivan Tan Chee Kiang, Yong Anna Marie

Abstract:

Polymer-ceramics composites are gaining importance due to their high specific strength, corrosion resistance, and high mechanical properties, as well as low cost. As a result, polymer composites are suitable for various industrial applications, like automobiles, aerospace, and biomedical areas. The present work comprises the development of polymer-ceramic composite films and is tested for the harsh environment including weatherability and UV barrier property. The polymer composite films are kept in weather chamber for a fixed period of time followed by tested for their physical, mechanical and chemical properties. The composite films are fabricated using compounding followed by hot pressing. UV-visible spectroscopy results reveal that the pure polymer polyethylene (PE) films are transparent in the visible range and do not absorb UV. However, polymer ceramic composite films start absorbing UV completely even at very low filler loading amount of 5 wt.%. The changes in tensile properties of the various composite films before and after UV illuminations for 40 hrs at 60 degC are analyzed. The tensile strength of neat PE film has been observed 8% reduction, whereas the remarkable increase in tensile strength has been observed (18% improvement for 10 wt. % filled composites films). The UV exposure leads to strengthen the crosslinking among PE polymer chains in the filled composite films, which contributes towards the incremented tensile strength properties.

Keywords: polymer ceramic composite, processing, harsh environment, mechanical properties

Procedia PDF Downloads 361
7759 Compression Index Estimation by Water Content and Liquid Limit and Void Ratio Using Statistics Method

Authors: Lizhou Chen, Abdelhamid Belgaid, Assem Elsayed, Xiaoming Yang

Abstract:

Compression index is essential in foundation settlement calculation. The traditional method for determining compression index is consolidation test which is expensive and time consuming. Many researchers have used regression methods to develop empirical equations for predicting compression index from soil properties. Based on a large number of compression index data collected from consolidation tests, the accuracy of some popularly empirical equations were assessed. It was found that primary compression index is significantly overestimated in some equations while it is underestimated in others. The sensitivity analyses of soil parameters including water content, liquid limit and void ratio were performed. The results indicate that the compression index obtained from void ratio is most accurate. The ANOVA (analysis of variance) demonstrates that the equations with multiple soil parameters cannot provide better predictions than the equations with single soil parameter. In other words, it is not necessary to develop the relationships between compression index and multiple soil parameters. Meanwhile, it was noted that secondary compression index is approximately 0.7-5.0% of primary compression index with an average of 2.0%. In the end, the proposed prediction equations using power regression technique were provided that can provide more accurate predictions than those from existing equations.

Keywords: compression index, clay, settlement, consolidation, secondary compression index, soil parameter

Procedia PDF Downloads 135
7758 The Nexus between Downstream Supply Chain Losses and Food Security in Nigeria: Empirical Evidence from the Yam Industry

Authors: Alban Igwe, Ijeoma Kalu, Alloy Ezirim

Abstract:

Food insecurity is a global problem, and the search for food security has assumed a central stage in the global development agenda as the United Nations currently placed zero hunger as a goal number in its sustainable development goals. Nigeria currently ranks 107th out of 113 countries in the global food security index (GFSI), a metric that defines a country's ability to furnish its citizens with food and nutrients for healthy living. Paradoxically, Nigeria is a global leader in food production, ranking 1st in yam (over 70% of global output), beans (over 41% of global output), cassava (20% of global output) and shea nuts, where it commands 53% of global output. Furthermore, it ranks 2nd in millet, sweet potatoes, and cashew nuts. It is Africa's largest producer of rice. So, it is apparent that Nigeria's food insecurity woes must relate to a factor other than food production. We investigated the nexus between food security and downstream supply chain losses in the yam industry with secondary data from the Food and Agricultural Organization (FAOSTAT) and the National Bureau of Statics for the decade 2012-2021. In analyzing the data, multiple regression techniques were used, and findings reveal that downstream losses have a strong positive correlation with food security (r = .763*) and a 58.3% variation in food security is explainable by post-downstream supply chain food losses. The study discovered that yam supply chain losses within the period under review averaged 50.6%, suggestive of the fact that downstream supply chain losses are the drainpipe and the major source of food insecurity in Nigeria. Therefore, the study concluded that there is a significant relationship between downstream supply chain losses and food insecurity and recommended the establishment of food supply chain structures and policies to enhance food security in Nigeria.

Keywords: food security, downstream supply chain losses, yam, nigeria, supply chain

Procedia PDF Downloads 63
7757 Experimental Study Damage in a Composite Structure by Vibration Analysis- Glass / Polyester

Authors: R. Abdeldjebar, B. Labbaci, L. Missoum, B. Moudden, M. Djermane

Abstract:

The basic components of a composite material made him very sensitive to damage, which requires techniques for detecting damage reliable and efficient. This work focuses on the detection of damage by vibration analysis, whose main objective is to exploit the dynamic response of a structure to detect understand the damage. The experimental results are compared with those predicted by numerical models to confirm the effectiveness of the approach.

Keywords: experimental, composite, vibration analysis, damage

Procedia PDF Downloads 644
7756 Mechanical and Chemical Properties of Zn-Ni-Al2O3 Nano Composite Coatings

Authors: Soroor Ghaziof, Wei Gao

Abstract:

Zn alloy and composite coatings are widely used in buildings and structures, automobile and fasteners industries to protect steel component from corrosion. In this paper, Zn-Ni-Al2O3 nano-composite coatings were electrodeposited on mild steel using a novel sol enhanced electroplating method. In this method, transparent Al2O3 sol was added into the acidic Zn-Ni bath to produced Zn-Ni-Al2O3 nano-composite coatings. The effect of alumina sol on the electrodeposition process, and coating properties was investigated using cyclic voltammetry, XRD, ESEM and Tafel test. Results from XRD tests showed that the structure of all coatings was single γ-Ni5Zn21 phase. Cyclic voltammetry results showed that the electrodeposition overpotential was lower in the presence of alumina sol in the bath, and caused the reduction potential of Zn-Ni to shift to more positive values. Zn-Ni-Al2O3 nano composite coatings produced more uniform and compact deposits, with fine grained microstructure when compared to Zn-Ni coatings. The corrosion resistance of Zn-Ni coatings was improved significantly by incorporation of alumina nano particles into the coatings.

Keywords: Zn-Ni-Al2O3 composite coatings, steel, sol-enhanced electroplating, corrosion resistance

Procedia PDF Downloads 371
7755 Nonlinear Finite Element Analysis of Composite Cantilever Beam with External Prestressing

Authors: R. I. Liban, N. Tayşi

Abstract:

This paper deals with a nonlinear finite element analysis to examine the behavior up to failure of cantilever composite steel-concrete beams which are prestressed externally. 'Pre-' means stressing the high strength external tendons in the steel beam section before the concrete slab is added. The composite beam contains a concrete slab which is connected together with steel I-beam by means of perfect shear connectors between the concrete slab and the steel beam which is subjected to static loading. A finite element analysis will be done to study the effects of external prestressed tendons on the composite steel-concrete beams by locating the tendons in different locations (profiles). ANSYS version 12.1 computer program is being used to analyze the represented three-dimensional model of the cantilever composite beam. This model gives all these outputs, mainly load-displacement behavior of the cantilever end and in the middle span of the simple support part.

Keywords: composite steel-concrete beams, external prestressing, finite element analysis, ANSYS

Procedia PDF Downloads 289
7754 Developing a Viral Artifact to Improve Employees’ Security Behavior

Authors: Stefan Bauer, Josef Frysak

Abstract:

According to the scientific information management literature, the improper use of information technology (e.g. personal computers) by employees are one main cause for operational and information security loss events. Therefore, organizations implement information security awareness programs to increase employees’ awareness to further prevention of loss events. However, in many cases these information security awareness programs consist of conventional delivery methods like posters, leaflets, or internal messages to make employees aware of information security policies. We assume that a viral information security awareness video might be more effective medium than conventional methods commonly used by organizations. The purpose of this research is to develop a viral video artifact to improve employee security behavior concerning information technology.

Keywords: information security awareness, delivery methods, viral videos, employee security behavior

Procedia PDF Downloads 519
7753 Developing Cyber Security Asset Mangement Framework for UK Rail

Authors: Shruti Kohli

Abstract:

The sophistication and pervasiveness of cyber-attacks are constantly growing, driven partly by technological progress, profitable applications in organized crime and state-sponsored innovation. The modernization of rail control systems has resulted in an increasing reliance on digital technology and increased the potential for security breaches and cyber-attacks. This research track showcases the need for developing a secure reusable scalable framework for enhancing cyber security of rail assets. A cyber security framework has been proposed that is being developed to detect the tell-tale signs of cyber-attacks against industrial assets.

Keywords: cyber security, rail asset, security threat, cyber ontology

Procedia PDF Downloads 407
7752 Enhancing the Network Security with Gray Code

Authors: Thomas Adi Purnomo Sidhi

Abstract:

Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter.

Keywords: network, network security, grey code, physical layer

Procedia PDF Downloads 474
7751 Bamboo Fibre Extraction and Its Reinforced Polymer Composite Material

Authors: P. Zakikhani, R. Zahari, M. T. H. Sultan, D. L. Majid

Abstract:

Natural plant fibres reinforced polymeric composite materials have been used in many fields of our lives to save the environment. Especially, bamboo fibres due to its environmental sustainability, mechanical properties, and recyclability have been utilized as reinforced polymer matrix composite in construction industries. In this review study bamboo structure and three different methods such as mechanical, chemical and combination of mechanical and chemical to extract fibres from bamboo are summarized. Each extraction method has been done base on the application of bamboo. In addition Bamboo fibre is compared with glass fibre from various aspects and in some parts it has advantages over the glass fibre.

Keywords: bamboo fibres, natural fibres, bio composite, mechanical extraction, glass fibres

Procedia PDF Downloads 458
7750 Poly(Methyl Methacrylate)/Graphene Microparticles Having a Core/Shell Structure Prepared with Carboxylated Graphene as a Pickering Stabilizer

Authors: Gansukh Erdenedelger, Doljinsuren Sukhbaatar, Trung Dung Dao, Byeong-Kyu Lee, Han Mo Jeong

Abstract:

Two kinds of carboxylated thermally reduced graphenes (C-TRGs) having different lateral sizes are examined as a Pickering stabilizer in the suspension polymerization of methyl methacrylate. The size and the shape of the prepared composite particles are irregular due to agglomeration, more evidently when the larger C-TRG is used. In addition, C-TRG is distributed not only on the surface but also inside the composite particles. It indicates that the C-TRG alone is not a stable Pickering agent. However, a very small dosage of acrylic acid remedies all these issues, because acrylic acid interacts with C-TRG and synergizes the stabilizing effect. The compression molded composite of the core/shell poly(methyl methacrylate)/C-TRG particles exhibits a very low percolation threshold of electrical conductivity of 0.03 vol%. It demonstrates that the C-TRG shells of the composite particles effectively form a segregated conductive network throughout the composite.

Keywords: pickering, graphene, polymerization, PMMA

Procedia PDF Downloads 268