Search results for: cryptographic circuit
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 789

Search results for: cryptographic circuit

519 Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking

Authors: Modesta E. Ezema, Chikwendu V. Alabekee, Victoria N. Ishiwu, Ifeyinwa NwosuArize, Chinedu I. Nwoye

Abstract:

The advent of wireless networking in computing technology cannot be overemphasized, it opened up easy accessibility to information resources, networking made easier and brought internet accessibility to our doorsteps, but despite all these, some mishap came in with it that is causing mayhem in today ‘s overall information security. The cyber criminals will always compromise the integrity of a message that is not encrypted or that is encrypted with a weak algorithm.In other to correct the mayhem, this study focuses on cryptosystem and cryptography. This ensures end to end crypt messaging. The study of various cryptographic algorithms, as well as the techniques and applications of the cryptography for efficiency, were all considered in the work., present and future applications of cryptography were dealt with as well as Quantum Cryptography was exposed as the current and the future area in the development of cryptography. An empirical study was conducted to collect data from network users.

Keywords: algorithm, cryptography, cryptosystem, network

Procedia PDF Downloads 314
518 Cryptographic Attack on Lucas Based Cryptosystems Using Chinese Remainder Theorem

Authors: Tze Jin Wong, Lee Feng Koo, Pang Hung Yiu

Abstract:

Lenstra’s attack uses Chinese remainder theorem as a tool and requires a faulty signature to be successful. This paper reports on the security responses of fourth and sixth order Lucas based (LUC4,6) cryptosystem under the Lenstra’s attack as compared to the other two Lucas based cryptosystems such as LUC and LUC3 cryptosystems. All the Lucas based cryptosystems were exposed mathematically to the Lenstra’s attack using Chinese Remainder Theorem and Dickson polynomial. Result shows that the possibility for successful Lenstra’s attack is less against LUC4,6 cryptosystem than LUC3 and LUC cryptosystems. Current study concludes that LUC4,6 cryptosystem is more secure than LUC and LUC3 cryptosystems in sustaining against Lenstra’s attack.

Keywords: Lucas sequence, Dickson polynomial, faulty signature, corresponding signature, congruence

Procedia PDF Downloads 130
517 Pushing the Boundary of Parallel Tractability for Ontology Materialization via Boolean Circuits

Authors: Zhangquan Zhou, Guilin Qi

Abstract:

Materialization is an important reasoning service for applications built on the Web Ontology Language (OWL). To make materialization efficient in practice, current research focuses on deciding tractability of an ontology language and designing parallel reasoning algorithms. However, some well-known large-scale ontologies, such as YAGO, have been shown to have good performance for parallel reasoning, but they are expressed in ontology languages that are not parallelly tractable, i.e., the reasoning is inherently sequential in the worst case. This motivates us to study the problem of parallel tractability of ontology materialization from a theoretical perspective. That is we aim to identify the ontologies for which materialization is parallelly tractable, i.e., in the NC complexity. Since the NC complexity is defined based on Boolean circuit that is widely used to investigate parallel computing problems, we first transform the problem of materialization to evaluation of Boolean circuits, and then study the problem of parallel tractability based on circuits. In this work, we focus on datalog rewritable ontology languages. We use Boolean circuits to identify two classes of datalog rewritable ontologies (called parallelly tractable classes) such that materialization over them is parallelly tractable. We further investigate the parallel tractability of materialization of a datalog rewritable OWL fragment DHL (Description Horn Logic). Based on the above results, we analyze real-world datasets and show that many ontologies expressed in DHL belong to the parallelly tractable classes.

Keywords: ontology materialization, parallel reasoning, datalog, Boolean circuit

Procedia PDF Downloads 237
516 Investigation of Wind Farm Interaction with Ethiopian Electric Power’s Grid: A Case Study at Ashegoda Wind Farm

Authors: Fikremariam Beyene, Getachew Bekele

Abstract:

Ethiopia is currently on the move with various projects to raise the amount of power generated in the country. The progress observed in recent years indicates this fact clearly and indisputably. The rural electrification program, the modernization of the power transmission system, the development of wind farm is some of the main accomplishments worth mentioning. As it is well known, currently, wind power is globally embraced as one of the most important sources of energy mainly for its environmentally friendly characteristics, and also that once it is installed, it is a source available free of charge. However, integration of wind power plant with an existing network has many challenges that need to be given serious attention. In Ethiopia, a number of wind farms are either installed or are under construction. A series of wind farm is planned to be installed in the near future. Ashegoda Wind farm (13.2°, 39.6°), which is the subject of this study, is the first large scale wind farm under construction with the capacity of 120 MW. The first phase of 120 MW (30 MW) has been completed and is expected to be connected to the grid soon. This paper is concerned with the investigation of the wind farm interaction with the national grid under transient operating condition. The main concern is the fault ride through (FRT) capability of the system when the grid voltage drops to exceedingly low values because of short circuit fault and also the active and reactive power behavior of wind turbines after the fault is cleared. On the wind turbine side, a detailed dynamic modelling of variable speed wind turbine of a 1 MW capacity running with a squirrel cage induction generator and full-scale power electronics converters is done and analyzed using simulation software DIgSILENT PowerFactory. On the Ethiopian electric power corporation side, after having collected sufficient data for the analysis, the grid network is modeled. In the model, a fault ride-through (FRT) capability of the plant is studied by applying 3-phase short circuit on the grid terminal near the wind farm. The results show that the Ashegoda wind farm can ride from voltage deep within a short time and the active and reactive power performance of the wind farm is also promising.

Keywords: squirrel cage induction generator, active and reactive power, DIgSILENT PowerFactory, fault ride-through capability, 3-phase short circuit

Procedia PDF Downloads 137
515 NFC Communications with Mutual Authentication Based on Limited-Use Session Keys

Authors: Chalee Thammarat

Abstract:

Mobile phones are equipped with increased short-range communication functionality called Near Field Communication (or NFC for short). NFC needs no pairing between devices but suitable for little amounts of data in a very restricted area. A number of researchers presented authentication techniques for NFC communications, however, they still lack necessary authentication, particularly mutual authentication and security qualifications. This paper suggests a new authentication protocol for NFC communication that gives mutual authentication between devices. The mutual authentication is a one of property, of security that protects replay and man-in-the-middle (MitM) attack. The proposed protocols deploy a limited-use offline session key generation and use of distribution technique to increase security and make our protocol lightweight. There are four sub-protocols: NFCAuthv1 is suitable for identification and access control and NFCAuthv2 is suitable for the NFC-enhanced phone by a POS terminal for digital and physical goods and services.

Keywords: cryptographic protocols, NFC, near field communications, security protocols, mutual authentication, network security

Procedia PDF Downloads 397
514 A Memristive Device with Intrinsic Rectification Behavior and Performace of Crossbar Arrays

Authors: Yansong Gao, Damith C.Ranasinghe, Siad F. Al-Sarawi, Omid Kavehei, Derek Abbott

Abstract:

Passive crossbar arrays is in principle the simplest functional electrical circuit, together with memristive device in cross-point, holding great promise in future high-density, non-volatile memories. However, the greatest problem of crossbar array is the sneak path current. In this paper, we investigate one type of memristive device with intrinsic rectification behavior to address the sneak path currents. Firstly, a SPICE behavior model written in Verilog-A language of the memristive device is presented to fit experimental data published in literature. Next, systematic performance simulations including read margin and power consumption of crossbar array, which uses the self-rectifying memristive device as storage element at cross-point, with respect to different crossbar sizes, interconnect resistance, ratio of HRS/LRS (High Resistance State/ Low Resistance State), rectification ratio and different read schemes are conducted. Subsequently, Trade-offs among reading margin, power consumption, and reading schemes are analyzed to provide guidelines for circuit design. Finally, performance comparison between the memristive device with/without intrinsic rectification behavior is given to show the worthiness of this intrinsic rectification behavior.

Keywords: memristive device, memristor, crossbar, RRAM, read margin, power consumption

Procedia PDF Downloads 413
513 2 Stage CMOS Regulated Cascode Distributed Amplifier Design Based On Inductive Coupling Technique in Submicron CMOS Process

Authors: Kittipong Tripetch, Nobuhiko Nakano

Abstract:

This paper proposes one stage and two stage CMOS Complementary Regulated Cascode Distributed Amplifier (CRCDA) design based on Inductive and Transformer coupling techniques. Usually, Distributed amplifier is based on inductor coupling between gate and gate of MOSFET and between drain and drain of MOSFET. But this paper propose some new idea, by coupling with differential primary windings of transformer between gate and gate of MOSFET first stage and second stage of regulated cascade amplifier and by coupling with differential secondary windings transformer of MOSFET between drain and drain of MOSFET first stage and second stage of regulated cascade amplifier. This paper also proposes polynomial modeling of Silicon Transformer passive equivalent circuit from Nanyang Technological University which is used to extract frequency response of transformer. Cadence simulation results are used to verify validity of transformer polynomial modeling which can be used to design distributed amplifier without Cadence. 4 parameters of scattering matrix of 2 port of the propose circuit is derived as a function of 4 parameters of impedance matrix.

Keywords: CMOS regulated cascode distributed amplifier, silicon transformer modeling with polynomial, low power consumption, distribute amplification technique

Procedia PDF Downloads 477
512 Effect of Coronary Insulators in Increasing the Lifespan of Electrolytic Cells: Short-circuit and Heat Resistance

Authors: Robert P. Dufresne, Hamid Arabzadeh

Abstract:

The current study investigates the effectiveness of a new form of permanent baseboard insulators with an umbrella action, hereinafter referred to as Coronary Insulator, in supporting and protecting the assembly of electrodes immersed in an electrolytic cell and in increasing the lifespan of the lateral sides of the electrolytic cell, in both electro-winning and electro-refinery method. The advantages of using a coronary insulator in addition to the top capping board (equipotential insulator) were studied compared to the conventional assembly of an electrolytic cell. Then, a thermal imaging technique was utilized during high-temperature thermal (heat transfer) tests for sample cell walls with and without coronary insulators in their assembly to show the effectiveness of coronary insulators in protecting the cell wall under extreme conditions. It was shown that, unlike the conventional assembly, which is highly prone to damages to the cell wall under thermal shocks, the presence of coronary insulator can significantly increase the level of protection of the cell due to their ultra-high thermal and chemical resistance, as well as decreasing the replacement frequency of insulators to almost zero. Besides, the results of the study showed that the test assembly with the coronary insulator provides better consistency in positioning and, subsequently, better contact, compared to the conventional method, which reduces the chance of electric short-circuit in the system.

Keywords: capping board, coronary insulator, electrolytic cell, thermal shock.

Procedia PDF Downloads 159
511 Implementation and Performance Analysis of Data Encryption Standard and RSA Algorithm with Image Steganography and Audio Steganography

Authors: S. C. Sharma, Ankit Gambhir, Rajeev Arya

Abstract:

In today’s era data security is an important concern and most demanding issues because it is essential for people using online banking, e-shopping, reservations etc. The two major techniques that are used for secure communication are Cryptography and Steganography. Cryptographic algorithms scramble the data so that intruder will not able to retrieve it; however steganography covers that data in some cover file so that presence of communication is hidden. This paper presents the implementation of Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) Algorithm with Image and Audio Steganography and Data Encryption Standard (DES) Algorithm with Image and Audio Steganography. The coding for both the algorithms have been done using MATLAB and its observed that these techniques performed better than individual techniques. The risk of unauthorized access is alleviated up to a certain extent by using these techniques. These techniques could be used in Banks, RAW agencies etc, where highly confidential data is transferred. Finally, the comparisons of such two techniques are also given in tabular forms.

Keywords: audio steganography, data security, DES, image steganography, intruder, RSA, steganography

Procedia PDF Downloads 259
510 Zero-Knowledge Proof-of-Reserve: A Confidential Approach to Cryptocurrency Asset Verification

Authors: Sam Ng, Lewis Leighton, Sam Atkinson, Carson Yan, Landan Hu, Leslie Cheung, Brian Yap, Kent Lung, Ketat Sarakune

Abstract:

This paper introduces a method for verifying cryptocurrency reserves that balances the need for both transparency and data confidentiality. Our methodology employs cryptographic techniques, including Merkle Trees, Bulletproof, and zkSnark, to verify that total assets equal or exceed total liabilities, represented by customer funds. Importantly, this verification is achieved without disclosing sensitive information such as the total asset value, customer count, or cold wallet addresses. We delve into the construction and implementation of this methodology. While the system is robust and scalable, we also identify areas for potential enhancements to improve its efficiency and versatility. As the digital asset landscape continues to evolve, our approach provides a solid foundation for ensuring continued trust and security in digital asset platforms.

Keywords: cryptocurrency, crypto-currency, proof-of-reserve, por, zero-knowledge, ZKP

Procedia PDF Downloads 40
509 Integrated Model for Enhancing Data Security Performance in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud Ccomputing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 448
508 Optimal Allocation of Battery Energy Storage Considering Stiffness Constraints

Authors: Felipe Riveros, Ricardo Alvarez, Claudia Rahmann, Rodrigo Moreno

Abstract:

Around the world, many countries have committed to a decarbonization of their electricity system. Under this global drive, converter-interfaced generators (CIG) such as wind and photovoltaic generation appear as cornerstones to achieve these energy targets. Despite its benefits, an increasing use of CIG brings several technical challenges in power systems, especially from a stability viewpoint. Among the key differences are limited short circuit current capacity, inertia-less characteristic of CIG, and response times within the electromagnetic timescale. Along with the integration of CIG into the power system, one enabling technology for the energy transition towards low-carbon power systems is battery energy storage systems (BESS). Because of the flexibility that BESS provides in power system operation, its integration allows for mitigating the variability and uncertainty of renewable energies, thus optimizing the use of existing assets and reducing operational costs. Another characteristic of BESS is that they can also support power system stability by injecting reactive power during the fault, providing short circuit currents, and delivering fast frequency response. However, most methodologies for sizing and allocating BESS in power systems are based on economic aspects and do not exploit the benefits that BESSs can offer to system stability. In this context, this paper presents a methodology for determining the optimal allocation of battery energy storage systems (BESS) in weak power systems with high levels of CIG. Unlike traditional economic approaches, this methodology incorporates stability constraints to allocate BESS, aiming to mitigate instability issues arising from weak grid conditions with low short-circuit levels. The proposed methodology offers valuable insights for power system engineers and planners seeking to maintain grid stability while harnessing the benefits of renewable energy integration. The methodology is validated in the reduced Chilean electrical system. The results show that integrating BESS into a power system with high levels of CIG with stability criteria contributes to decarbonizing and strengthening the network in a cost-effective way while sustaining system stability. This paper potentially lays the foundation for understanding the benefits of integrating BESS in electrical power systems and coordinating their placements in future converter-dominated power systems.

Keywords: battery energy storage, power system stability, system strength, weak power system

Procedia PDF Downloads 32
507 Generation of Symmetric Key Using Randomness of Hash Function

Authors: Sai Charan Kamana, Harsha Vardhan Nakkina, B.R. Chandavarkar

Abstract:

In a highly secure and robust key generation process, a key role is played by randomness and random numbers when current real-world cryptosystems are observed. Most of the present-day cryptographic protocols depend upon the Random Number Generators (RNG), Pseudo-Random Number Generator (PRNG). These protocols often use noisy channels such as Disk seek time, CPU temperature, Mouse pointer movement, Fan noise to obtain true random values. Despite being cost-effective, these noisy channels may need additional hardware devices to continuously communicate with them. On the other hand, Hash functions are Pseudo-Random (because of their requirements). So, they are a good replacement for these noisy channels and have low hardware requirements. This paper discusses, some of the key generation methodologies, and their drawbacks. This paper explains how hash functions can be used in key generation, how to combine Key Derivation Functions with hash functions.

Keywords: key derivation, hash based key derivation, password based key derivation, symmetric key derivation

Procedia PDF Downloads 126
506 Noise and Thermal Analyses of Memristor-Based Phase Locked Loop Integrated Circuit

Authors: Naheem Olakunle Adesina

Abstract:

The memristor is considered as one of the promising candidates for mamoelectronic engineering and applications. Owing to its high compatibility with CMOS, nanoscale size, and low power consumption, memristor has been employed in the design of commonly used circuits such as phase-locked loop (PLL). In this paper, we designed a memristor-based loop filter (LF) together with other components of PLL. Following this, we evaluated the noise-rejection feature of loop filter by comparing the noise levels of input and output signals of the filter. Our SPICE simulation results showed that memristor behaves like a linear resistor at high frequencies. The result also showed that loop filter blocks the high-frequency components from phase frequency detector so as to provide a stable control voltage to the voltage controlled oscillator (VCO). In addition, we examined the effects of temperature on the performance of the designed phase locked loop circuit. A critical temperature, where there is frequency drift of VCO as a result of variations in control voltage, is identified. In conclusion, the memristor is a suitable choice for nanoelectronic systems owing to a small area, low power consumption, dense nature, high switching speed, and endurance. The proposed memristor-based loop filter, together with other components of the phase locked loop, can be designed using memristive emulator and EDA tools in current CMOS technology and simulated.

Keywords: Fast Fourier Transform, hysteresis curve, loop filter, memristor, noise, phase locked loop, voltage controlled oscillator

Procedia PDF Downloads 149
505 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 320
504 Surface Modified Thermoplastic Polyurethane and Poly(Vinylidene Fluoride) Nanofiber Based Flexible Triboelectric Nanogenerator and Wearable Bio-Sensor

Authors: Sk Shamim Hasan Abir, Karen Lozano, Mohammed Jasim Uddin

Abstract:

Over the last few years, nanofiber-based triboelectric nanogenerator (TENG) has caught great attention among researchers all over the world due to its inherent capability of converting mechanical energy to usable electrical energy. In this study, poly(vinylidene fluoride) (PVDF) and thermoplastic polyurethane (TPU) nanofiber prepared by Forcespinning® (FS) technique were used to fabricate TENG for self-charging energy storage device and biomechanical body motion sensor. The surface of the TPU nanofiber was modified by uniform deposition of thin gold film to enhance the frictional properties; yielded 254 V open-circuit voltage (Voc) and 86 µA short circuit current (Isc), which were 2.12 and 1.87 times greater in contrast to bare PVDF-TPU TENG. Moreover, the as-fabricated PVDF-TPU/Au TENG was tested against variable capacitors and resistive load, and the results showed that with a 3.2 x 2.5 cm2 active contact area, it can quick charge up to 7.64 V within 30 seconds using a 1.0 µF capacitor and generate significant 2.54 mW power, enough to light 75 commercial LEDs (1.5 V each) by the hand tapping motion at 4 Hz (240 beats per minutes (bpm)) load frequency. Furthermore, the TENG was attached to different body parts to capture distinctive electrical signals for various body movements, elucidated the prospective usability of our prepared nanofiber-based TENG in wearable body motion sensor application.

Keywords: biomotion sensor, forcespinning, nanofibers, triboelectric nanogenerator

Procedia PDF Downloads 59
503 Considerations for the Use of High Intensity Interval Training in Secondary Physical Education

Authors: Amy Stringer, Resa Chandler

Abstract:

High Intensity Interval Training (HIIT) involves a 3-10-minute circuit of various exercises which is a viable alternative to a traditional cardiovascular and strength training regimen. Research suggests that measures of health-related fitness can either be maintained or actually improve with the use of this training method. After conducting a 6-week HIIT research study with 10-14 year old children, considerations for using a daily HIIT workout are presented. Is the use of HIIT with children a reasonable consideration for physical education programs? The benefits and challenges of this type of an intervention are identified. This study is significant in that achieving fitness gains in a small amount of daily class time is an attractive concept – especially for physical education teachers who often do not have the time necessary to accomplish all of their curricular goals in the amount of class time assigned. Basic methodologies include students participating in a circuit of exercises for 7-10 minutes at 80-95% of max heart rate as measured by heart rate monitors. Student pre and post fitness test data were collected for cardio-vascular endurance, muscular endurance, and body composition. Research notes as well as commentary by the teachers and researchers who participated in the HIIT study contributed to the understanding of the cost-benefit analysis. Major findings of the study are that HIIT has limited effectiveness but is a good choice for limited class times. Student efficacy of their ability to complete the exercises and visible heart rate data were considered to be significant factors in success of the HIIT study. The effective use of technology promoting positive audience effect during the display of heart rate data was more important at the beginning of the study than at the end. Student ‘buy-in’ and motivation, teacher motivation and ‘buy-in’, the variety of activities in the circuit and the fitness level of the student at the beginning of the study were also findings influencing the fitness outcomes of the study. Concluding Statement: High intensity interval training can be used effectively in a secondary physical education program. It is not a ‘magic bullet’ to produce health-related fitness outcomes in every student but it is an effective tool to enhance student fitness in a limited time and contribute to the goals of the program.

Keywords: cardio vascular fitness, children, high intensity interval training, physical education

Procedia PDF Downloads 87
502 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 306
501 Hybrid Energy Harvesting System with Energy Storage Management

Authors: Lucian Pîslaru-Dănescu, George-Claudiu Zărnescu, Laurențiu Constantin Lipan, Rareș-Andrei Chihaia

Abstract:

In recent years, the utilization of supercapacitors for energy storage (ES) devices that are designed for energy harvesting (EH) applications has increased substantially. The use of supercapacitors as energy storage devices in hybrid energy harvesting systems allows the miniaturization of electronic structures for energy storage. This study is concerned with the concept of energy management capacitors – supercapacitors and the new electronic structures for energy storage used for energy harvesting devices. Supercapacitors are low-voltage devices, and electronic overvoltage protection is needed for powering the source. The power management device that uses these proposed new electronic structures for energy storage is better than conventional electronic structures used for this purpose, like rechargeable batteries, supercapacitors, and hybrid systems. A hybrid energy harvesting system with energy storage management is able to simultaneously use several energy sources with recovery from the environment. The power management device uses a summing electronic block to combine the electric power obtained from piezoelectric composite plates and from a photovoltaic conversion system. Also, an overvoltage protection circuit used as a voltage detector and an improved concept of charging supercapacitors is presented. The piezoelectric composite plates are realized only by pressing two printed circuit boards together without damaging or prestressing the piezoceramic elements. The photovoltaic conversion system has the advantage that the modules are covered with glass plates with nanostructured film of ZnO with the role of anti-reflective coating and to improve the overall efficiency of the solar panels.

Keywords: supercapacitors, energy storage, electronic overvoltage protection, energy harvesting

Procedia PDF Downloads 36
500 Compact, Lightweight, Low Cost, Rectangular Core Power Transformers

Authors: Abidin Tortum, Kubra Kocabey

Abstract:

One of the sectors where the competition is experienced at the highest level in the world is the transformer sector, and sales can be made with a limited profit margin. For this reason, manufacturers must develop cost-cutting designs to achieve higher profits. The use of rectangular cores and coils in transformer design is one of the methods that can be used to reduce costs. According to the best knowledge we have obtained, we think that we are the first company producing rectangular core power transformers in our country. BETA, to reduce the cost of this project, more compact products to reveal, as we know it to increase the alleviate and competitiveness of the product, will perform cored coil design and production rectangle for the first-time power transformers in Turkey. The transformer to be designed shall be 16 MVA, 33/11 kV voltage level. With the rectangular design of the transformer core and windings, no-load losses can be reduced. Also, the least costly transformer type is rectangular. However, short-circuit forces on rectangular windings do not affect every point of the windings in the same way. Whereas more force is applied inwards to the mid-points of the low-voltage winding, the opposite occurs in the high-voltage winding. Therefore, the windings tend to deteriorate in the event of a short circuit. While trying to reach the project objectives, the difficulties in the design should be overcome. Rectangular core transformers to be produced in our country offer a more compact structure than conventional transformers. In other words, both height and width were smaller. Thus, the reducer takes up less space in the center. Because the transformer boiler is smaller, less oil is used, and its weight is lower. Biotemp natural ester fluid is used in rectangular transformer and the cooling performance of this oil is analyzed. The cost was also reduced with the reduction of dimensions. The decrease in the amount of oil used has also increased the environmental friendliness of the developed product. Transportation costs have been reduced by reducing the total weight. The amount of carbon emissions generated during the transportation process is reduced. Since the low-voltage winding is wound with a foil winding technique, a more resistant structure is obtained against short circuit forces. No-load losses were lower due to the use of a rectangular core. The project was handled in three phases. In the first stage, preliminary research and designs were carried out. In the second stage, the prototype manufacturing of the transformer whose designs have been completed has been started. The prototype developed in the last stage has been subjected to routine, type and special tests.

Keywords: rectangular core, power transformer, transformer, productivity

Procedia PDF Downloads 96
499 Experimental Investigation of Tip-Speed-Ratio Effects on Wake Dynamics of Horizontal-Axis Wind Turbine

Authors: Paul Bayron, Richard Kelso, Rey Chin

Abstract:

Wind tunnel experiments were performed in the KC closed-circuit wind tunnel in the University of Adelaide to study the influence of tip-speed-ratio (

Keywords: hotwire anemometry, wake dynamics, wind tunnel, wind turbines

Procedia PDF Downloads 183
498 Developing Laser Spot Position Determination and PRF Code Detection with Quadrant Detector

Authors: Mohamed Fathy Heweage, Xiao Wen, Ayman Mokhtar, Ahmed Eldamarawy

Abstract:

In this paper, we are interested in modeling, simulation, and measurement of the laser spot position with a quadrant detector. We enhance detection and tracking of semi-laser weapon decoding system based on microcontroller. The system receives the reflected pulse through quadrant detector and processes the laser pulses through a processing circuit, a microcontroller decoding laser pulse reflected by the target. The seeker accuracy will be enhanced by the decoding system, the laser detection time based on the receiving pulses number is reduced, a gate is used to limit the laser pulse width. The model is implemented based on Pulse Repetition Frequency (PRF) technique with two microcontroller units (MCU). MCU1 generates laser pulses with different codes. MCU2 decodes the laser code and locks the system at the specific code. The codes EW selected based on the two selector switches. The system is implemented and tested in Proteus ISIS software. The implementation of the full position determination circuit with the detector is produced. General system for the spot position determination was performed with the laser PRF for incident radiation and the mechanical system for adjusting system at different angles. The system test results show that the system can detect the laser code with only three received pulses based on the narrow gate signal, and good agreement between simulation and measured system performance is obtained.

Keywords: four quadrant detector, pulse code detection, laser guided weapons, pulse repetition frequency (PRF), Atmega 32 microcontrollers

Procedia PDF Downloads 348
497 Study of the Protection of Induction Motors

Authors: Bencheikh Abdellah

Abstract:

In this paper, we present a mathematical model dedicated to the simulation breaks bars in a three-phase cage induction motor. This model is based on a mesh circuit representing the rotor cage. The tested simulation allowed us to demonstrate the effectiveness of this model to describe the behavior of the machine in a healthy state, failure.

Keywords: AC motors, squirrel cage, diagnostics, MATLAB, SIMULINK

Procedia PDF Downloads 407
496 Double Layer Security Model for Identification Friend or Foe

Authors: Buse T. Aydın, Enver Ozdemir

Abstract:

In this study, a double layer authentication scheme between the aircraft and the Air Traffic Control (ATC) tower is designed to prevent any unauthorized aircraft from introducing themselves as friends. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or foe according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as a friend. In this method, even if embedded key is captured by the enemy aircraft, without the information of the second layer, the enemy can easily be determined. Overall, in this work, we present a more reliable system by adding a physical layer in the authentication process.

Keywords: ADS-B, communication with physical layer security, cryptography, identification friend or foe

Procedia PDF Downloads 126
495 Thermal Securing of Electrical Contacts inside Oil Power Transformers

Authors: Ioan Rusu

Abstract:

In the operation of power transformers of 110 kV/MV from substations, these are traveled by fault current resulting from MV line damage. Defect electrical contacts are heated when they are travelled from fault currents. In the case of high temperatures when 135 °C is reached, the electrical insulating oil in the vicinity of the electrical faults comes into contact with these contacts releases gases, and activates the electrical protection. To avoid auto-flammability of electro-insulating oil, we designed a security system thermal of electrical contact defects by pouring fire-resistant polyurethane foam, mastic or mortar fire inside a cardboard electro-insulating cylinder. From practical experience, in the exploitation of power transformers of 110 kV/MT in oil electro-insulating were recorded some passing disconnecting commanded by the gas protection at internal defects. In normal operation and in the optimal load, nominal currents do not require thermal secure contacts inside electrical transformers, contacts are made at the fabrication according to the projects or to repair by solder. In the case of external short circuits close to the substation, the contacts inside electrical transformers, even if they are well made in sizes of Rcontact = 10‑6 Ω, are subjected to short-circuit currents of the order of 10 kA-20 kA which lead to the dissipation of some significant second-order electric powers, 100 W-400 W, on contact. At some internal or external factors which action on electrical contacts, including electrodynamic efforts at short-circuits, these factors could be degraded over time to values in the range of 10-4 Ω to 10-5 Ω and if the action time of protection is great, on the order of seconds, power dissipation on electrical contacts achieve high values of 1,0 kW to 40,0 kW. This power leads to strong local heating, hundreds of degrees Celsius and can initiate self-ignition and burning oil in the vicinity of electro-insulating contacts with action the gas relay. Degradation of electrical contacts inside power transformers may not be limited for the duration of their operation. In order to avoid oil burn with gas release near electrical contacts, at short-circuit currents 10 kA-20 kA, we have outlined the following solutions: covering electrical contacts in fireproof materials that would avoid direct burn oil at short circuit and transmission of heat from electrical contact along the conductors with heat dissipation gradually over time, in a large volume of cooling. Flame retardant materials are: polyurethane foam, mastic, cement (concrete). In the normal condition of operation of transformer, insulating of conductors coils is with paper and insulating oil. Ignition points of its two components respectively are approximated: 135 °C heat for oil and 200 0C for paper. In the case of a faulty electrical contact, about 10-3 Ω, at short-circuit; the temperature can reach for a short time, a value of 300 °C-400 °C, which ignite the paper and also the oil. By burning oil, there are local gases that disconnect the power transformer. Securing thermal electrical contacts inside the transformer, in cardboard tube with polyurethane foams, mastik or cement, ensures avoiding gas release and also gas protection working.

Keywords: power transformer, oil insulatation, electric contacts, Bucholtz relay

Procedia PDF Downloads 131
494 Memristor-A Promising Candidate for Neural Circuits in Neuromorphic Computing Systems

Authors: Juhi Faridi, Mohd. Ajmal Kafeel

Abstract:

The advancements in the field of Artificial Intelligence (AI) and technology has led to an evolution of an intelligent era. Neural networks, having the computational power and learning ability similar to the brain is one of the key AI technologies. Neuromorphic computing system (NCS) consists of the synaptic device, neuronal circuit, and neuromorphic architecture. Memristor are a promising candidate for neuromorphic computing systems, but when it comes to neuromorphic computing, the conductance behavior of the synaptic memristor or neuronal memristor needs to be studied thoroughly in order to fathom the neuroscience or computer science. Furthermore, there is a need of more simulation work for utilizing the existing device properties and providing guidance to the development of future devices for different performance requirements. Hence, development of NCS needs more simulation work to make use of existing device properties. This work aims to provide an insight to build neuronal circuits using memristors to achieve a Memristor based NCS.  Here we throw a light on the research conducted in the field of memristors for building analog and digital circuits in order to motivate the research in the field of NCS by building memristor based neural circuits for advanced AI applications. This literature is a step in the direction where we describe the various Key findings about memristors and its analog and digital circuits implemented over the years which can be further utilized in implementing the neuronal circuits in the NCS. This work aims to help the electronic circuit designers to understand how the research progressed in memristors and how these findings can be used in implementing the neuronal circuits meant for the recent progress in the NCS.

Keywords: analog circuits, digital circuits, memristors, neuromorphic computing systems

Procedia PDF Downloads 140
493 Non-Interactive XOR Quantum Oblivious Transfer: Optimal Protocols and Their Experimental Implementations

Authors: Lara Stroh, Nikola Horová, Robert Stárek, Ittoop V. Puthoor, Michal Mičuda, Miloslav Dušek, Erika Andersson

Abstract:

Oblivious transfer (OT) is an important cryptographic primitive. Any multi-party computation can be realised with OT as a building block. XOR oblivious transfer (XOT) is a variant where the sender Alice has two bits, and a receiver, Bob, obtains either the first bit, the second bit, or their XOR. Bob should not learn anything more than this, and Alice should not learn what Bob has learned. Perfect quantum OT with information-theoretic security is known to be impossible. We determine the smallest possible cheating probabilities for unrestricted dishonest parties in non-interactive quantum XOT protocols using symmetric pure states and present an optimal protocol which outperforms classical protocols. We also "reverse" this protocol so that Bob becomes the sender of a quantum state and Alice the receiver who measures it while still implementing oblivious transfer from Alice to Bob. Cheating probabilities for both parties stay the same as for the unreversed protocol. We optically implemented both the unreversed and the reversed protocols and cheating strategies, noting that the reversed protocol is easier to implement.

Keywords: oblivious transfer, quantum protocol, cryptography, XOR

Procedia PDF Downloads 78
492 Analysis on Solar Panel Performance and PV-Inverter Configuration for Tropical Region

Authors: Eko Adhi Setiawan, Duli Asih Siregar, Aiman Setiawan

Abstract:

Solar energy is abundant in nature, particularly in the tropics which have peak sun hour that can reach 8 hours per day. In the fabrication process, Photovoltaic’s (PV) performance are tested in standard test conditions (STC). It specifies a module temperature of 25°C, an irradiance of 1000 W/ m² with an air mass 1.5 (AM1.5) spectrum and zero wind speed. Thus, the results of the performance testing of PV at STC conditions cannot fully represent the performance of PV in the tropics. For example Indonesia, which has a temperature of 20-40°C. In this paper, the effect of temperature on the choice of the 5 kW AC inverter topology on the PV system such as the Central Inverter, String Inverter and AC-Module specifically for the tropics will be discussed. The proper inverter topology can be determined by analysis of the effect of temperature and irradiation on the PV panel. The effect of temperature and irradiation will be represented in the characteristics of I-V and P-V curves. PV’s characteristics on high temperature would be analyzed using Solar panel modeling through MATLAB Simulink based on mathematical equations that form Solar panel’s characteristic curve. Based on PV simulation, it is known then that temperature coefficients of short circuit current (ISC), open circuit voltage (VOC), and maximum output power (PMAX) consecutively as high as 0.56%/oC, -0.31%/oC and -0.4%/oC. Those coefficients can be used to calculate PV’s electrical parameters such as ISC, VOC, and PMAX in certain earth’s surface’s certain point. Then, from the parameters, the utility of the 5 kW AC inverter system can be determined. As the result, for tropical area, string inverter topology has the highest utility rates with 98, 80 %. On the other hand, central inverter and AC-Module Topology has utility rates of 92.69 % and 87.7 % eventually.

Keywords: Photovoltaic, PV-Inverter Configuration, PV Modeling, Solar Panel Characteristics.

Procedia PDF Downloads 350
491 A New Block Cipher for Resource-Constrained Internet of Things Devices

Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam

Abstract:

In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.

Keywords: internet of things, cryptography block cipher, S-box, key management, security, network

Procedia PDF Downloads 67
490 Development of a Self-Retractable Front Spoilers Suitable for Indian Road Conditions to Reduce Aerodynamic Drag

Authors: G. Sivaraj, K. M. Parammasivam, R. Veeramanikandan, S. Nithish

Abstract:

Reduction of ground clearance or (ride height) is a vital factor in minimizing aerodynamic drag force and improving vehicle performance. But in India, minimization of ground clearance is limited because of the road conditions. Due to this problem, reduction of aerodynamic drag and performance are not fully improved. In this view, this paper deals with the development of self-retractable front spoilers which are most suitable for Indian road conditions. These retractable spoilers are fitted in the front portion of the car and in speed below 60 km/hr these spoilers are in retracted positions. But, when the car crosses a speed above 60 km/hr, using electronic circuit the spoilers are activated. Thus, using this technique aerodynamic performance can be improved at a speed above 60 km/hr. Also, when the car speed is reduced below the 60 km/hr mark, the front spoiler are retracted which makes it as a normal car. This is because, in Indian roads, speed breakers are installed to cut off speed at particular places. Thus, in these circumstances there are chances of damaging front spoilers. Since, when the driver sees the speed breaker, he will automatically apply break to prevent damage, at this time using electronic circuit the front spoiler is retracted. However, accidentally when the driver fails to apply brakes there are chances for the front spoilers to get a hit. But as the front spoilers are made of Kevlar composite, it can withstand high impact loads and using a spring mechanism the spoilers are retracted immediately. By using CFD analysis and low-speed wind tunnel testing drag coefficient of the 1:10 scaled car model with and without self-retractable spoilers are calculated and validated. Also, using wind tunnel, proper working of self-retractable at car speed below and above 60 km/hr are validated.

Keywords: aerodynamic drag, CFD analysis, kevlar composite, self-retractable spoilers, wind tunnel

Procedia PDF Downloads 315