Search results for: composite security index
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7899

Search results for: composite security index

7749 Human Security as a Tool of Protecting International Human Rights Law

Authors: Arenca Trashani

Abstract:

20 years after its first entrance in a General Assembly of the United Nation’s Resolution, human security has became a very important tool in a global debate affecting directly the whole main rules and regulations in international law and more closely in international human rights law. This paper will cover a very important issue of today at how the human security has its impact to the development of international human rights law, not as far as a challenge as it is seen up now but a tool of moving toward development and globalization. In order to analyze the impact of human security to the global agenda, we need to look to the main pillars of the international legal order which are affected by the human security in itself and its application in the policy making for this international legal order global and regional ones. This paper will focus, also, on human security, as a new and very important tool of measuring development, stability and the level of democratic consolidation and the respect for human rights especially in developing countries such as Albania. The states are no longer capable to monopolize the use of human security just within their boundaries and separated from the other principles of a functioning democracy. In this context, human security would be best guaranteed under the respect of the rule of law and democratization. During the last two decades the concept security has broadly developed, from a state-centric to a more human-centric approach: from state security to respect for human rights, to economic security, to environmental security as well. Last but not least we would see that human rights could be affected by human security not just at their promotion but also at their enforcement and mainly at the international institutions, which are entitled to promote and to protect human rights.

Keywords: human security, international human rights law, development, Albania, international law

Procedia PDF Downloads 726
7748 Wrinkling Prediction of Membrane Composite of Varying Orientation under In-Plane Shear

Authors: F. Sabri, J. Jamali

Abstract:

In this article, the wrinkling failure of orthotropic composite membranes due to in-plane shear deformation is investigated using nonlinear finite element analyses. A nonlinear post-buckling analysis is performed to show the evolution of shear-induced wrinkles. The method of investigation is based on the post-buckling finite element analysis adopted from commercial FEM code; ANSYS. The resulting wrinkling patterns, their amplitude and their wavelengths under the prescribed loads and boundary conditions were confirmed by experimental results. Our study reveals that wrinkles develop when both the magnitudes and coverage of the minimum principal stresses in the laminated composite laminates are sufficiently large to trigger wrinkling.

Keywords: composite, FEM, membrane, wrinkling

Procedia PDF Downloads 246
7747 The Threshold Values of Soil Water Index for Landslides on Country Road No.89

Authors: Ji-Yuan Lin, Yu-Ming Liou, Yi-Ting Chen, Chen-Syuan Lin

Abstract:

Soil water index obtained by tank model is now commonly used in soil and sand disaster alarm system in Japan. Comparing with the rainfall trigging index in Taiwan, the tank model is easy to predict the slope water content on large-scale landslide. Therefore, this study aims to estimate the threshold value of large-scale landslide using the soil water index Sixteen typhoons and heavy rainfall events, were selected to establish the, to relationship between landslide event and soil water index. Finally, the proposed threshold values for landslides on country road No.89 are suggested in this study. The study results show that 95% landslide cases occurred in soil water index more than 125mm, and 30% of the more serious slope failure occurred in the soil water index is greater than 250mm. Beside, this study speculates when soil water index more than 250mm and the difference value between second tank and third tank less than -25mm, it leads to large-scale landslide more probably.

Keywords: soil water index, tank model, landslide, threshold values

Procedia PDF Downloads 359
7746 Comparison of Tribological Properties of TiO₂, ZrO₂ and TiO₂–ZrO₂ Composite Films Prepared by Sol–Gel Method

Authors: O. Çomaklı, M. Yazıcı, T. Yetim, A. F. Yetim, A. Çelik

Abstract:

In this study, TiO₂, ZrO₂, and TiO₂–ZrO₂ composite films were coated on Cp-Ti substrates by sol-gel method. Structures of uncoated and coated samples were investigated by X-ray diffraction and SEM. XRD data identified anatase phase in TiO₂ coated samples and tetragonal zirconia phase in ZrO₂ coated samples while both of anatase and tetragonal zirconia phases in TiO₂–ZrO₂ composite films. The mechanical and wear properties of samples were investigated using micro hardness, pin-on-disk tribotester, and 3D profilometer. The best wear resistance was obtained from TiO₂–ZrO₂ composite films. This can be attributed to their high surface hardness, low surface roughness and high thickness of the film.

Keywords: sol-gel, TiO₂, ZrO₂, TiO₂–ZrO₂, composite films, wear

Procedia PDF Downloads 238
7745 Sorption of Crystal Violet from Aqueous Solution Using Chitosan−Charcoal Composite

Authors: Kingsley Izuagbe Ikeke, Abayomi O. Adetuyi

Abstract:

The study investigated the removal efficiency of crystal violet from aqueous solution using chitosan-charcoal composite as adsorbent. Deproteination was carried out by placing 200g of powdered snail shell in 4% w/v NaOH for 2hours. The sample was then placed in 1% HCl for 24 hours to remove CaCO3. Deacetylation was done by boiling in 50% NaOH for 2hours. 10% Oxalic acid was used to dissolve the chitosan before mixing with charcoal at 55°C to form the composite. The composite was characterized by Fourier Transform Infra-Red and Scanning Electron Microscopy measurements. The efficiency of adsorption was evaluated by varying pH of the solution, contact time, initial concentration and adsorbent dose. Maximum removal of crystal violet by composite and activated charcoal was attained at pH10 while maximum removal of crystal violet by chitosan was achieved at pH 8. The results showed that adsorption of both dyes followed the pseudo-second-order rate equation and fit the Langmuir and Freundlich isotherms. The data showed that composite was best suited for crystal violet removal and also did relatively well in the removal of alizarin red. Thermodynamic parameters such as enthalpy change (ΔHº), free energy change (ΔGº) and entropy change (ΔSº) indicate that adsorption process of Crystal Violet was endothermic, spontaneous and feasible respectively.

Keywords: crystal violet, chitosan−charcoal composite, extraction process, sorption

Procedia PDF Downloads 408
7744 The Law of Treaties and National Security of Islamic Republic of Iran

Authors: S. M. Tavakoli Sani, M. Sabbet Moghadam, Y. Khorram Farhadi, Iraj Rezayi Nejad

Abstract:

The concept of national security in Iran is a permanently effective factor in acceptance or rejection of many international obligations. These obligations had been defined according to the type of legislation of Iran in many aspects. Therefore, there are several treaties at international level which requires Iran’s security to come in contact with obligations in these treaties in a way that an obstacle to join to them and their passage in parliament. This issue is a typical category which every country pays attention to be accepted in treaties or to include their national security in that treaties and also they can see the related treaties from this perspective, but this issue that 'what is the concept of Iran’s national security', and 'To what extent it is changed in recent years, especially after Islamic Revolution' are important issues that can be criticized. Thus, this study is trying to assess singed treaties from the perspective of Iran’s national security according of the true meaning of treaty and to investigate how the international treaties may be in conflict with Iran’s national security.

Keywords: treaties, national security, Iran, Islamic Revolution

Procedia PDF Downloads 444
7743 Study of Mechanical Behavior of Unidirectional Composite Laminates According

Authors: Deliou Adel, Saadalah Younes, Belkaid Khmissi, Dehbi Meriem

Abstract:

Composite materials, in the most common sense of the term, are a set of synthetic materials designed and used mainly for structural applications; the mechanical function is dominant. The mechanical behaviors of the composite, as well as the degradation mechanisms leading to its rupture, depend on the nature of the constituents and on the architecture of the fiber preform. The profile is required because it guides the engineer in designing structures with precise properties in relation to the needs. This work is about studying the mechanical behavior of unidirectional composite laminates according to different failure criteria. Varying strength parameter values make it possible to compare the ultimate mechanical characteristics obtained by the criteria of Tsai-Hill, Fisher and maximum stress. The laminate is subjected to uniaxial tensile membrane forces. Estimates of their ultimate strengths and the plotting of the failure envelope constitute the principal axis of this study. Using the theory of maximum stress, we can determine the various modes of damage of the composite. The different components of the deformation are presented for different orientations of fibers.

Keywords: unidirectional kevlar/epoxy composite, failure criterion, membrane stress, deformations, failure envelope

Procedia PDF Downloads 51
7742 Effect of Mechanical Loading on the Delamination of Stratified Composite in Mode I

Authors: H. Achache, Y. Madani, A. Benzerdjeb

Abstract:

The present study is based on the three-dimensional digital analysis by the finite elements method of the mechanical loading effect on the delamination of unidirectional and multidirectional stratified composites. The aim of this work is the determination of the release energy rate G in mode I and the Von Mises equivalent constraint distribution along the damaged area under the influence of several parameters such as the applied load and the delamination size. The results obtained in this study show that the unidirectional composite laminates have better mechanical resistance one the loading line than the multidirectional composite laminates.

Keywords: delamination, release energy rate, stratified composite, finite element method, ply

Procedia PDF Downloads 399
7741 The Implementation of Information Security Audits in Public Sector: Perspective from Indonesia

Authors: Nur Imroatun Sholihat, Gresika Bunga Sylvana

Abstract:

Currently, cyber attack became an incredibly serious problem due to its increasing trend all over the world. Therefore, information security becomes prominent for every organization including public sector organization. In Indonesia, unfortunately, Ministry of Finance (MoF) is the only public sector organization that has already formally established procedure to assess its information security adequacy by performing information security audits (November 2017). We assess the implementation of information security audits in the MoF using qualitative data obtained by interviewing IT auditors and by analysis of related documents. For this reason, information security audit practice in the MoF could become the acceptable benchmark for all other public sector organizations in Indonesia. This study is important because, to the best of the author’s knowledge, our research into information security audits practice in Indonesia’s public sector have not been found yet. Results showed that information security audits performed mostly by doing pentest (penetration testing) to MoF’s critical applications.

Keywords: information security audit, information technology, Ministry of Finance of Indonesia, public sector organization

Procedia PDF Downloads 200
7740 Software Quality Assurance in Network Security using Cryptographic Techniques

Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar

Abstract:

The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.

Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography

Procedia PDF Downloads 706
7739 Security Features for Remote Healthcare System: A Feasibility Study

Authors: Tamil Chelvi Vadivelu, Nurazean Maarop, Rasimah Che Yusoff, Farhana Aini Saludin

Abstract:

Implementing a remote healthcare system needs to consider many security features. Therefore, before any deployment of the remote healthcare system, a feasibility study from the security perspective is crucial. Remote healthcare system using WBAN technology has been used in other countries for medical purposes but in Malaysia, such projects are still not yet implemented. This study was conducted qualitatively. The interview results involving five healthcare practitioners are further elaborated. The study has addressed four important security features in order to incorporate remote healthcare system using WBAN in Malaysian government hospitals.

Keywords: remote healthcare, IT security, security features, wireless sensor application

Procedia PDF Downloads 275
7738 A Novel Spectral Index for Automatic Shadow Detection in Urban Mapping Based on WorldView-2 Satellite Imagery

Authors: Kaveh Shahi, Helmi Z. M. Shafri, Ebrahim Taherzadeh

Abstract:

In remote sensing, shadow causes problems in many applications such as change detection and classification. It is caused by objects which are elevated, thus can directly affect the accuracy of information. For these reasons, it is very important to detect shadows particularly in urban high spatial resolution imagery which created a significant problem. This paper focuses on automatic shadow detection based on a new spectral index for multispectral imagery known as Shadow Detection Index (SDI). The new spectral index was tested on different areas of World-View 2 images and the results demonstrated that the new spectral index has a massive potential to extract shadows effectively and automatically.

Keywords: spectral index, shadow detection, remote sensing images, World-View 2

Procedia PDF Downloads 501
7737 Finite Element Analysis of Low-Velocity Impact Damage on Stiffened Composite Panels

Authors: Xuan Sun, Mingbo Tong

Abstract:

To understand the factors which affect impact damage on composite structures, particularly the effects of impact position and ribs. In this paper, a finite element model (FEM) of low-velocity impact damage on the composite structure was established via the nonlinear finite element method, combined with the user-defined materials subroutine (VUMAT) of the ABAQUS software. The structural elements chosen for the investigation comprised a series of stiffened composite panels, representative of real aircraft structure. By impacting the panels at different positions relative to the ribs, the effect of relative position of ribs was found out. Then the simulation results and the experiments data were compared. Finally, the factors which affect impact damage on the structures were discussed. The paper was helpful for the design of stiffened composite structures.

Keywords: stiffened, low-velocity impact, Abaqus, impact energy

Procedia PDF Downloads 595
7736 An Evaluation on the Effectiveness of a 3D Printed Composite Compression Mold

Authors: Peng Hao Wang, Garam Kim, Ronald Sterkenburg

Abstract:

The applications of composite materials within the aviation industry has been increasing at a rapid pace.  However, the growing applications of composite materials have also led to growing demand for more tooling to support its manufacturing processes. Tooling and tooling maintenance represents a large portion of the composite manufacturing process and cost. Therefore, the industry’s adaptability to new techniques for fabricating high quality tools quickly and inexpensively will play a crucial role in composite material’s growing popularity in the aviation industry. One popular tool fabrication technique currently being developed involves additive manufacturing such as 3D printing. Although additive manufacturing and 3D printing are not entirely new concepts, the technique has been gaining popularity due to its ability to quickly fabricate components, maintain low material waste, and low cost. In this study, a team of Purdue University School of Aviation and Transportation Technology (SATT) faculty and students investigated the effectiveness of a 3D printed composite compression mold. A 3D printed composite compression mold was fabricated by 3D scanning a steel valve cover of an aircraft reciprocating engine. The 3D printed composite compression mold was used to fabricate carbon fiber versions of the aircraft reciprocating engine valve cover. The 3D printed composite compression mold was evaluated for its performance, durability, and dimensional stability while the fabricated carbon fiber valve covers were evaluated for its accuracy and quality. The results and data gathered from this study will determine the effectiveness of the 3D printed composite compression mold in a mass production environment and provide valuable information for future understanding, improvements, and design considerations of 3D printed composite molds.

Keywords: additive manufacturing, carbon fiber, composite tooling, molds

Procedia PDF Downloads 177
7735 Cointegration Dynamics in Asian Stock Markets: Implications for Long-Term Portfolio Management

Authors: Xinyi Xu

Abstract:

This study conducts a detailed examination of Asian stock markets over the period from 2008 to 2023, with a focus on the dynamics of cointegration and their relevance for long-term investment strategies. Specifically, we assess the co-movement and potential for pairs trading—a strategy where investors take opposing positions on two stocks, indices, or financial instruments that historically move together. For example, we explore the relationship between the Nikkei 225 (N225), Japan’s benchmark stock index, and the Straits Times Index (STI) of Singapore, as well as the relationship between the Korea Composite Stock Price Index (KS11) and the STI. The methodology includes tests for normality, stationarity, cointegration, and the application of Vector Error Correction Modeling (VECM). Our findings reveal significant long-term relationships between these pairs, indicating opportunities for pairs trading strategies. Furthermore, the research underscores the challenges posed by model instability and the influence of major global incidents, which are identified as structural breaks. These findings pave the way for further exploration into the intricacies of financial market dynamics.

Keywords: normality tests, stationarity, cointegration, VECM, pairs trading

Procedia PDF Downloads 20
7734 Evidence-Based Policy Making to Improve Human Security in Pakistan

Authors: Ayesha Akbar

Abstract:

Pakistan is moving from a security state to a welfare state despite several security challenges both internal and external. Human security signifies a varied approach in different regions depending upon the leadership and policy priorities. The link between human development and economic growth is not automatic. It has to be created consciously by forward-looking policies and strategies by national governments. There are seven components or categories of human security these include: Economic Security, Personal Security, Health Security, Environmental Security, Food Security, Community Security and Political Security. The increasing interest of the international community to clearly understand the dimensions of human security provided the grounds to Pakistani scholars as well to ponder on the issue and delineate lines of human security. A great deal of work has been either done or in process to evaluate human security indicators in Pakistan. Notwithstanding, after having been done a great deal of work the human security in Pakistan is not satisfactory. A range of deteriorating indicators of human development that lies under the domain of human security leaves certain inquiries to be answered. What are the dimensions of human security in Pakistan? And how are they being dealt from the perspective of policy and institution in terms of its operationalization in Pakistan? Is the human security discourse reflects evidence-based policy changes. The methodology is broadly based on qualitative methods that include interviews, content analysis of policy documents. Pakistan is among the most populous countries in the world and faces high vulnerability to climate change. Literacy rate has gone down with the surge of youth bulge to accommodate in the job market. Increasing population is creating food problems as the resources have not been able to compete with the raising demands of food and other social amenities of life. Majority of the people are facing acute poverty. Health outcomes are also not satisfactory with the high infant and maternal mortality rate. Pakistan is on the verge of facing water crisis as the water resources are depleting so fast with the high demand in agriculture and energy sector. Pakistan is striving hard to deal with the declining state of human security but the dilemma is lack of resources that hinders in meeting up with the emerging demands. The government requires to bring about more change with scaling-up economic growth avenues with enhancing the capacity of human resources. A modern performance drive culture with the integration of technology is required to deliver efficient and effective service delivery. On an already fast track process of reforms; e-governance and evidence based policy mechanism is being instilled in the government process for better governance and evidence based decisions.

Keywords: governance, human development index, human security, Pakistan, policy

Procedia PDF Downloads 225
7733 Development of Sustainable Composite Fabric from Orange Peel for Ladies’ Undergarments: A Different Approach Towards Eco-Friendly Textile Design

Authors: Abdul Hafeez, Samiya Shehzadi

Abstract:

This research paper presents a different approach towards eco-friendly textile design by developing a sustainable composite fabric from orange peel for ladies' undergarments. The research focuses on utilizing orange peel to develop a unique orange leather/composite (fabric) through a process involving heating, extracting, and subsequent sun-drying to obtain the composite. The sustainable composite fabric shows properties that are favorable to the development of environmentally friendly undergarments, which not only offer UV protection but also possess healing properties for the skin. Through comprehensive testing and analysis, it has been determined that the orange peel composite fabric has zero harmful effects on the skin, making it a safe and desirable material for intimate wear. Furthermore, the research suggests that the orange peel composite fabric has the potential to reduce the rate of cancer cell growth. While the exact mechanisms and factors contributing to this effect require further investigation, the initial findings indicate promising aspects of the fabric in terms of potential cancer-preventive properties. Research contribution to the field of sustainable textile design by introducing a usual and eco-friendly approach utilizing orange peel waste. This work opens up avenues for further exploration and development of innovative materials that are both sustainable and beneficial for human health.

Keywords: sustainability, composite textiles, extracting, undergarments, eco-friendly, orange peels

Procedia PDF Downloads 47
7732 Mechanistic Study of Composite Pavement Behavior in Heavy Duty Area

Authors: Makara Rith, Young Kyu Kim, Seung Woo Lee

Abstract:

In heavy duty areas, asphalt pavement constructed as entrance roadway may expose distresses such as cracking and rutting during service life. To mitigate these problems, composite pavement with a roller-compacted concrete base may be a good alternative; however, it should be initially investigated. Structural performances such as fatigue cracking and rut depth may be changed due to variation of some design factors. Therefore, this study focuses on the variation effect of material modulus, layer thickness and loading on composite pavement performances. Stress and strain at the critical location are determined and used as the input of transfer function for corresponding distresses to evaluate the pavement performance. Also, composite pavement satisfying the design criteria may be selected as a design section for heavy duty areas. Consequently, this investigation indicates that composite pavement has the ability to eliminate fatigue cracking in asphalt surfaces and significantly reduce rut depth. In addition, a thick or strong rigid base can significantly reduce rut depth and prolong fatigue life of this layer.

Keywords: composite pavement, ports, cracking, rutting

Procedia PDF Downloads 172
7731 A Survey of Attacks and Security Requirements in Wireless Sensor Networks

Authors: Vishnu Pratap Singh Kirar

Abstract:

Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.

Keywords: wireless sensor network (WSN), wireless network attacks, wireless network security, security requirements

Procedia PDF Downloads 457
7730 Design and Realization of Computer Network Security Perception Control System

Authors: El Miloudi Djelloul

Abstract:

Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.

Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)

Procedia PDF Downloads 414
7729 Human Security Providers in Fragile State under Asymmetric War Conditions

Authors: Luna Shamieh

Abstract:

Various players are part of the game in an asymmetric war, all making efforts to provide human security to their own adherents. Although a fragile state is not able to provide sufficient and comprehensive services, it still provides special services and security to the elite; the insurgents as well provide services and security to their associates. The humanitarian organisations, on the other hand, provide some fundamental elements of human security, but only in the regions, they are able to access when possible (if possible). The counterinsurgents (security forces of the state and intervention forces) operate within a narrow band defined by the vision of the responsibility to protect and the perspective of the resolution of the conflict through combat; hence, the possibility to provide human security is shaken at this end. This article examines how each player provides human security from the perspective of freedom from want in order to secure basic and strategic needs, freedom from fear through providing protection against all kinds of violence, and the freedom to live in dignity. It identifies a vicious cycle caused by the intervention of the different players causing a centrifugal force that may lead to disintegration of the nation under war.

Keywords: asymmetric war, counterinsurgency, fragile state, human security, insurgency

Procedia PDF Downloads 311
7728 Optimal Design of Composite Patch for a Cracked Pipe by Utilizing Genetic Algorithm and Finite Element Method

Authors: Mahdi Fakoor, Seyed Mohammad Navid Ghoreishi

Abstract:

Composite patching is a common way for reinforcing the cracked pipes and cylinders. The effects of composite patch reinforcement on fracture parameters of a cracked pipe depend on a variety of parameters such as number of layers, angle, thickness, and material of each layer. Therefore, stacking sequence optimization of composite patch becomes crucial for the applications of cracked pipes. In this study, in order to obtain the optimal stacking sequence for a composite patch that has minimum weight and maximum resistance in propagation of cracks, a coupled Multi-Objective Genetic Algorithm (MOGA) and Finite Element Method (FEM) process is proposed. This optimization process has done for longitudinal and transverse semi-elliptical cracks and optimal stacking sequences and Pareto’s front for each kind of cracks are presented. The proposed algorithm is validated against collected results from the existing literature.

Keywords: multi objective optimization, pareto front, composite patch, cracked pipe

Procedia PDF Downloads 288
7727 Preparation, Characterization and Ionic Conductivity of (1‒x) (CdI2‒Ag2CrO4)‒(x) Al2O3 Composite Solid Electrolytes

Authors: Rafiuddin

Abstract:

Composite solid electrolyte of the salt and oxide type is an effective approach to improve the ionic conductivity in low and intermediate temperature regions. The conductivity enhancement in the composites occurs via interfaces. Because of their high ionic conduction, composite electrolytes have wide applications in different electrochemical devices such as solid-state batteries, solid oxide fuel cells, and electrochemical cells. In this work, a series of novel (1‒x) (CdI2‒Ag2CrO4)‒xAl2O3 composite solid electrolytes has been synthesized. The prepared materials were characterized by X‒ray diffraction, differential thermal analysis, and AC impedance spectroscopy. The impedance spectra show single semicircle representing the simultaneous contribution of grain and grain boundary. The conductivity increased with the increase of Al2O3 content and shows the maximum conductivity (σ= 0.0012 S cm‒1) for 30% of Al2O3 content at 30 ℃.

Keywords: composite solid electrolyte, X-ray diffraction, Impedance spectroscopy, ionic conductivity

Procedia PDF Downloads 376
7726 Review of Cyber Security in Oil and Gas Industry with Cloud Computing Perspective: Taxonomy, Issues and Future Direction

Authors: Irfan Mohiuddin, Ahmad Al Mogren

Abstract:

In recent years, cloud computing has earned substantial attention in the Oil and Gas Industry and provides services in all the phases of the industry lifecycle. Oil and gas supply infrastructure, in particular, is more vulnerable to accidental, natural and intentional threats because of its widespread distribution. Numerous surveys have been conducted on cloud security and privacy. However, to the best of our knowledge, hardly any survey is carried out that reviews cyber security in all phases with a cloud computing perspective. Moreover, a distinctive classification is performed for all the cloud-based cyber security measures based on the cloud component in use. The classification approach will enable researchers to identify the required technique used to enhance the security in specific cloud components. Also, the limitation of each component will allow the researchers to design optimal algorithms. Lastly, future directions are given to point out the imminent challenges that can pave the way for researchers to further enhance the resilience to cyber security threats in the oil and gas industry.

Keywords: cyber security, cloud computing, safety and security, oil and gas industry, security threats, oil and gas pipelines

Procedia PDF Downloads 119
7725 Blockchain Security in MANETs

Authors: Nada Mouchfiq, Ahmed Habbani, Chaimae Benjbara

Abstract:

The security aspect of the IoT occupies a place of great importance especially after the evolution that has known this field lastly because it must take into account the transformations and the new applications .Blockchain is a new technology dedicated to the data sharing. However, this does not work the same way in the different systems with different operating principles. This article will discuss network security using the Blockchain to facilitate the sending of messages and information, enabling the use of new processes and enabling autonomous coordination of devices. To do this, we will discuss proposed solutions to ensure a high level of security in these networks in the work of other researchers. Finally, our article will propose a method of security more adapted to our needs as a team working in the ad hoc networks, this method is based on the principle of the Blockchain and that we named ”MPR Blockchain”.

Keywords: Ad hocs networks, blockchain, MPR, security

Procedia PDF Downloads 151
7724 Performance Evaluation of Composite Beam under Uniform Corrosion

Authors: Ririt Aprilin Sumarsono

Abstract:

Composite member (concrete and steel) has been widely advanced for structural utilization due to its best performance in resisting load, reducing the total weight of the structure, increasing stiffness, and other available advantages. On the other hand, the environment load such as corrosion (e.g. chloride ingress) creates significant time-dependent degradation for steel. Analysis performed in this paper is mainly considered uniform corrosion for evaluating the composite beam without examining the pit corrosion as the initial corrosion formed. Corrosion level in terms of weight loss is modified in yield stress and modulus elasticity of steel. Those two mechanical properties are utilized in this paper for observing the stresses due to corrosion attacked. As corrosion level increases, the effective width of the composite beam in the concrete section will be wider. The position of a neutral axis of composite section will indicate the composite action due to corrosion of composite beam so that numerous shear connectors provided must be reconsidered. Flexure capacity quantification provides stresses, and shear capacity calculation derives connectors needed in overcoming the shear problem for composite beam under corrosion. A model of simply supported composite beam examined in this paper under uniform corrosion where the stresses as the focus of the evaluation. Principal stress at the first stage of composite construction decline as the corrosion level incline, parallel for the second stage stress analysis where the tension region held by the steel undergoes lower capacity due to corrosion. Total stresses of the composite section for steel to be born significantly decreases particularly in the outermost fiber of tension side. Whereas, the available compression side is smaller as the corrosion level increases so that the stress occurs on the compression side shows reduction as well. As a conclusion, the increment of corrosion level will degrade both compression and tension side of stresses.

Keywords: composite beam, modulus of elasticity, stress analysis, yield strength, uniform corrosion

Procedia PDF Downloads 256
7723 Degradation of Mechanical Properties of Offshoring Polymer Composite Pipes in Thermal Environment

Authors: Hamza Benyahia, Mostapha Tarfaoui, Ahmed El-Moumen, Djamel Ouinas

Abstract:

Composite pipes are commonly used in the oil industry, and extreme flow of hot and cold gas fluid can cause degradation of their mechanical performance and properties. Therefore, it is necessary to consider thermomechanical behavior as an important parameter in designing these tubular structures. In this paper, an experimental study is conducted on composite glass/epoxy tubes, with a thickness of 6.2 mm and 86 mm internal diameter made by filament winding of (Փ = ± 55°), to investigate the effects of extreme thermal condition on their mechanical properties b over a temperature range from -40 to 80°C. The climatic chamber is used for the thermal aging and then, combine split disk system is used to perform tensile tests on these composite pies. Thermal aging is carried out for 8hr but each specimen was subjected to various temperature ranges and then, uniaxial tensile test is conducted to evaluate their mechanical performance. Experimental results show degradation in the mechanical properties of composite pipes with an increase in temperature. The rigidity of pipes increases progressively with a decrease in thermal load and results in a radical decrease in their elongation before fracture, thus, decreasing their ductility. However, with an increase in the temperature, there is a decrease in the yield strength and an increase in yield strain, which confirmed an increase in the plasticity of composite pipes.

Keywords: composite pipes, thermal-mechanical properties, filament winding, thermal degradation

Procedia PDF Downloads 115
7722 Percentages of Alumina Phase and Different Ph on The Ha- Al2o3 Nano Composite

Authors: S. Tayyebi, F. Mirjalili, H. Samadi, A. Nemati

Abstract:

In this study, hydroxyapatite-Alumina nano composite powder, containing 15,20 and 25% weight percent of reinforced alumina were prepared by chemical precipitation from the reaction between calcium nitrate tetrahydrate and di-ammonium hydrogen phosphate with ratio of Ca / p = 1.67 and different percentage of aluminum nitrate nona hydrate in different pH of 9,10 and 11. The microstructure and thermal stability of samples were measured by X-ray diffraction (XRD), infrared spectroscopy (FT-IR) and transmission electron microscopy (TEM). The results showed that the presence of reinforced alumina phase reduced the degree of crystallinity of hydroxyapatite phase and increased its decomposition to tricalcium phosphate phase. Microstructural analysis showed that the hydroxyapatite-alumina nano composite powder was obtained with spherical shape and size of less than 100 nm.

Keywords: biomaterial, hydroxyapatite, alumina, nano composite, precipitation method

Procedia PDF Downloads 514
7721 Design a Network for Implementation a Hospital Information System

Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇

Abstract:

A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.

Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network

Procedia PDF Downloads 403
7720 Some Tips for Increasing Online Services Safety

Authors: Mohsen Rezaee

Abstract:

Although robust security softwares, including anti-viruses, anti-spywares, anti-spam and firewalls are amalgamated with new technologies such as safe zone, hybrid cloud, sand box and etc., and although it can be said that they have managed to prepare highest level of security against viruses, spywares and other malwares in 2012, in fact, hacker attacks to websites are increasingly becoming more and more complicated. Because of security matters developments it can be said it was expected to happen so. Here in this work we try to point out some functional and vital notes to enhance security on the web, enabling the user to browse safely in unlimited web world and to use virtual space securely.

Keywords: firewalls, security, web services, computer science

Procedia PDF Downloads 372