Search results for: layered security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3143

Search results for: layered security

3143 Double Encrypted Data Communication Using Cryptography and Steganography

Authors: Adine Barett, Jermel Watson, Anteneh Girma, Kacem Thabet

Abstract:

In information security, secure communication of data across networks has always been a problem at the forefront. Transfer of information across networks is susceptible to being exploited by attackers engaging in malicious activity. In this paper, we leverage steganography and cryptography to create a layered security solution to protect the information being transmitted. The first layer of security leverages crypto- graphic techniques to scramble the information so that it cannot be deciphered even if the steganography-based layer is compromised. The second layer of security relies on steganography to disguise the encrypted in- formation so that it cannot be seen. We consider three cryptographic cipher methods in the cryptography layer, namely, Playfair cipher, Blowfish cipher, and Hills cipher. Then, the encrypted message is passed through the least significant bit (LSB) to the steganography algorithm for further encryption. Both encryption approaches are combined efficiently to help secure information in transit over a network. This multi-layered encryption is a solution that will benefit cloud platforms, social media platforms and networks that regularly transfer private information such as banks and insurance companies.

Keywords: cryptography, steganography, layered security, Cipher, encryption

Procedia PDF Downloads 82
3142 Enterprise Security Architecture: Approaches and a Framework

Authors: Amir Mohtarami, Hadi Kandjani

Abstract:

The amount of business-critical information in enterprises is growing at an extraordinary rate, and the ability to catalog that information and properly protect it using traditional security mechanisms is not keeping pace. Alongside the Information Technology (IT), information security needs a holistic view in enterprise. In other words, a comprehensive architectural approach is required, focusing on the information itself, understanding what the data are, who owns it, and which business and regulatory policies should be applied to the information. Enterprise Architecture Frameworks provide useful tools to grasp different dimensions of IT in organizations. Usually this is done by the layered views on IT architecture, but not requisite security attention has been held in this frameworks. In this paper, after a brief look at the Enterprise Architecture (EA), we discuss the issue of security in the overall enterprise IT architecture. Due to the increasing importance of security, a rigorous EA program in an enterprise should be able to consider security architecture as an integral part of its processes and gives a visible roadmap and blueprint for this aim.

Keywords: enterprise architecture, architecture framework, security architecture, information systems

Procedia PDF Downloads 703
3141 Shear Elastic Waves in Disordered Anisotropic Multi-Layered Periodic Structure

Authors: K. B. Ghazaryan, R. A. Ghazaryan

Abstract:

Based on the constitutive model and anti-plane equations of anisotropic elastic body of monoclinic symmetry we consider the problem of shear wave propagation in multi-layered disordered composite structure with point defect. Using transfer matrix method the analytic expression is obtained providing solutions of shear Floquet wave propagation in periodic disordered anisotropic structure. The usefulness of the obtained analytical expression was discussed also in reflection and refraction problems from multi-layered reflector as well as in vibration problem of multi-layered waveguides. Numerical results are presented highlighting the effects arising in disordered periodic structure due to defects of multi-layered structure.

Keywords: shear elastic waves, monoclinic anisotropic media, periodic structure, disordered multilayer laminae, multi-layered waveguide

Procedia PDF Downloads 407
3140 Modification of Li-Rich Layered Li1.2Mn0.54Ni0.13Co0.13O2 Cathode Material

Authors: Liu Li, Kim Seng Lee, Li Lu

Abstract:

The high-energy-density Li-rich layered materials are promising cathode materials for the next-generation high-performance lithium-ion batteries. The relatively low rate capability is one of the major problems that limit their practical application. In this work, Li-rich layered Li1.2Mn0.54Ni0.13Co0.13O2 cathode material synthesized by coprecipitation method is further modified by F doping or surface treatment to enhance its cycling stability as well as rate capability.

Keywords: Li-ion battery, Li-rich layered cathode material, phase transformation, cycling stability, rate capacility

Procedia PDF Downloads 357
3139 Undrained Bearing Capacity of Circular Foundations on two Layered Clays

Authors: S. Benmebarek, S. Benmoussa, N. Benmebarek

Abstract:

Natural soils are often deposited in layers. The estimation of the bearing capacity of the soil using conventional bearing capacity theory based on the properties of the upper layer introduces significant inaccuracies if the thickness of the top layer is comparable to the width of the foundation placed on the soil surface. In this paper, numerical computations using the FLAC code are reported to evaluate the two clay layers effect on the bearing capacity beneath rigid circular rough footing subject to axial static load. The computation results of the parametric study are used to illustrate the sensibility of the bearing capacity, the shape factor and the failure mechanisms to the layered strength and layered thickness.

Keywords: numerical modeling, circular footings, layered clays, bearing capacity, failure

Procedia PDF Downloads 495
3138 A Simple Approach for the Analysis of First Vibration Mode of Layered Soil Profiles

Authors: Haizhong Zhang, Yan-Gang Zhao

Abstract:

Fundamental period, mode shape, and participation factor are important basic information for the understanding of earthquake response of ground. In this study, a simple approach is presented to calculate these basic information of layered soil profiles. To develop this method, closed form equations are derived for analysis of free vibration of layered soil profiles firstly, based on equilibrium between inertia and elastic forces. Then, by further associating with the Madera procedure developed for estimation of fundamental period, a simple method that can directly determine the fundamental period, mode shape and participation factor is proposed. The proposed approach can be conveniently implemented in simple spreadsheets and easily used by practicing engineers. In addition, the accuracy of the proposed approach is investigated by analyzing first vibration mode of 67 representative layered soil profiles, it is found that results by the proposed method agree very well with accurate results.

Keywords: layered soil profile, natural vibration, fundamental period, fundamental mode shape

Procedia PDF Downloads 325
3137 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks

Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas

Abstract:

Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.

Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model

Procedia PDF Downloads 57
3136 Study of Li-Rich Layered Cathode Materials for High-Energy Li-ion Batteries

Authors: Liu Li, Kim Seng Lee, Li Lu

Abstract:

The high-energy-density Li-rich layered materials are promising cathode materials for the next-generation high-performance lithium-ion batteries. They have attracted a lot of attentions due mainly to their high reversible capacity of more than 250 mAh•g-1 at low charge-discharge current. However several drawbacks still hinder their applications, such as voltage decay caused by an undesired phase transformation during cycling and poor rate capability. To conquer these issues, the authors applied F modification methods on the pristine Li1.2Mn0.54Ni0.13Co0.13O2 to enhance its electrochemical performance.

Keywords: Li-ion battery, Li-rich layered cathode material, phase transformation, cycling stability, rate capability

Procedia PDF Downloads 328
3135 2D Structured Non-Cyclic Fuzzy Graphs

Authors: T. Pathinathan, M. Peter

Abstract:

Fuzzy graphs incorporate concepts from graph theory with fuzzy principles. In this paper, we make a study on the properties of fuzzy graphs which are non-cyclic and are of two-dimensional in structure. In particular, this paper presents 2D structure or the structure of double layer for a non-cyclic fuzzy graph whose underlying crisp graph is non-cyclic. In any graph structure, introducing 2D structure may lead to an inherent cycle. We propose relevant conditions for 2D structured non-cyclic fuzzy graphs. These conditions are extended even to fuzzy graphs of the 3D structure. General theoretical properties that are studied for any fuzzy graph are verified to 2D structured or double layered fuzzy graphs. Concepts like Order, Degree, Strong and Size for a fuzzy graph are studied for 2D structured or double layered non-cyclic fuzzy graphs. Using different types of fuzzy graphs, the proposed concepts relating to 2D structured fuzzy graphs are verified.

Keywords: double layered fuzzy graph, double layered non–cyclic fuzzy graph, order, degree and size

Procedia PDF Downloads 399
3134 Numerical Modeling Analysis for the Double-Layered Asphalt Pavement Structure Behavior with Interface Bonding

Authors: Minh Tu Le, Quang Huy Nguyen, Mai Lan Nguyen

Abstract:

Bonding characteristics between pavement layers have an important influence on responses of pavement structures. This paper deals with analytical solution for the stresses, strains, and deflections of double-layered asphalt pavement structure. This solution is based on the homogeneous half-space of layered theory developed by Burmister (1943). The partial interaction between the layers is taken into account by considering an interface bonding behavior which is obtained by push-out shear test. Numerical applications considering three cases of bonding (unbonded, partially bonded, and fully bonded overlays) are carried out to the influence of the interface bonding on the structural behavior of asphalt pavement under static loading. Further, it was observed that numerical results indicate that the horizontal shear reaction modulus at the interface (Ks) will significantly affect pavement structure behavior.

Keywords: analytical solution, interface bonding, shear test keyword, double-layered asphalt, shear reaction modulus

Procedia PDF Downloads 228
3133 Dynamic Interaction between Two Neighboring Tunnels in a Layered Half-Space

Authors: Chao He, Shunhua Zhou, Peijun Guo

Abstract:

The vast majority of existing underground railway lines consist of twin tunnels. In this paper, the dynamic interaction between two neighboring tunnels in a layered half-space is investigated by an analytical model. The two tunnels are modelled as cylindrical thin shells, while the soil in the form of a layered half-space with two cylindrical cavities is simulated by the elastic continuum theory. The transfer matrix method is first used to derive the relationship between the plane wave vectors in arbitrary layers and the source layer. Thereafter, the wave translation and transformation are introduced to determine the plane and cylindrical wave vectors in the source layer. The solution for the dynamic interaction between twin tunnels in a layered half-space is obtained by means of the compatibility of displacements and equilibrium of stresses on the two tunnel–soil interfaces. By coupling the proposed model with a fully track model, the train-induced vibrations from twin tunnels in a multi-layered half-space are investigated. The numerical results demonstrate that the existence of a neighboring tunnel has a significant effect on ground vibrations.

Keywords: underground railway, twin tunnels, wave translation and transformation, transfer matrix method

Procedia PDF Downloads 119
3132 Legal Issues of Food Security in Republic of Kazakhstan

Authors: G. T. Aigarinova

Abstract:

This article considers the legal issues of food security as a major component of national security of the republic. The problem of food security is the top priority of the economic policy strategy of any state, the effectiveness of this solution influences social, political, and ethnic stability in society. Food security and nutrition is everyone’s business. Food security exists when all people, at all times, have physical, social and economic access to sufficient safe and nutritious food that meets their dietary needs and food preferences for an active and healthy life. By analyzing the existing legislation in the area of food security, the author identifies weaknesses and gaps, suggesting ways to improve it.

Keywords: food security, national security, agriculture, public resources, economic security

Procedia PDF Downloads 423
3131 Security of Internet of Things: Challenges, Requirements and Future Directions

Authors: Amjad F. Alharbi, Bashayer A. Alotaibi, Fahd S. Alotaibi

Abstract:

The emergence of Internet of Things (IoT) technology provides capabilities for a huge number of smart devices, services and people to be communicate with each other for exchanging data and information over existing network. While as IoT is progressing, it provides many opportunities for new ways of communications as well it introduces many security and privacy threats and challenges which need to be considered for the future of IoT development. In this survey paper, an IoT security issues as threats and current challenges are summarized. The security architecture for IoT are presented from four main layers. Based on these layers, the IoT security requirements are presented to insure security in the whole system. Furthermore, some researches initiatives related to IoT security are discussed as well as the future direction for IoT security are highlighted.

Keywords: Internet of Things (IoT), IoT security challenges, IoT security requirements, IoT security architecture

Procedia PDF Downloads 373
3130 Stress Field Induced By an Interfacial Edge Dislocation in a Multi-Layered Medium

Authors: Aditya Khanna, Andrei Kotousov

Abstract:

A novel method is presented for obtaining the stress field induced by an edge dislocation in a multilayered composite. To demonstrate the applications of the obtained solution, we consider the problem of an interfacial crack in a periodically layered bimaterial medium. The crack is modeled as a continuous distribution of edge dislocations and the Distributed Dislocation Technique (DDT) is utilized to obtain numerical results for the energy release rate (ERR). The numerical results correspond well with previously published results and the comparison serves as a validation of the obtained dislocation solution.

Keywords: distributed dislocation technique, edge dislocation, elastic field, interfacial crack, multi-layered composite

Procedia PDF Downloads 442
3129 Measurement of Acoustic Loss in Nano-Layered Coating Developed for Thermal Noise Reduction

Authors: E. Cesarini, M. Lorenzini, R. Cardarelli, S. Chao, E. Coccia, V. Fafone, Y. Minenkow, I. Nardecchia, I. M. Pinto, A. Rocchi, V. Sequino, C. Taranto

Abstract:

Structural relaxation processes in optical coatings represent a fundamental limit to the sensitivity of gravitational waves detectors, MEMS, optical metrology and entangled state experiments. To face this problem, many research lines are now active, in particular the characterization of new materials and novel solutions to be employed as coatings in future gravitational wave detectors. Nano-layered coating deposition is among the most promising techniques. We report on the measurement of acoustic loss of nm-layered composites (Ti2O/SiO2), performed with the GeNS nodal suspension, compared with sputtered λ/4 thin films nowadays employed.

Keywords: mechanical measurement, nanomaterials, optical coating, thermal noise

Procedia PDF Downloads 422
3128 Fabrication of Biosensor Based on Layered Double Hydroxide/Polypyrrole/Carbon Paste Electrode for Determination of Anti-Hypertensive and Prostatic Hyperplasia Drug Terazosin

Authors: Amira M. Hassanein, Nehal A. Salahuddin, Atsunori Matsuda, Toshiaki Hattori, Mona N. Elfiky

Abstract:

New insights into the design of highly sensitive, carbon-based electrochemical sensors are presented in this work. This was achieved by exploring the interesting properties of conductive (Mg/Al) layered double hydroxide- Dodecyl Sulphate/Polypyrrole nanocomposites which were synthesized by in-situ polymerization of pyrrole during the assembly of (Mg/Al) layered double hydroxide, and by employing the anionic surfactant Dodecyl sulphate as a modifier. The morphology and surface area of the nanocomposites changed with the percentage of Pyrrole. Under optimal conditions, the modified carbon paste electrode successfully achieved detection limits of 0.057 and 0.134 nmol.L-1 of Terazosin hydrochloride in pharmaceutical formulation and spiked human serum fluid, respectively. Moreover, the sensors are highly stable, reusable, and free from interference by other commonly present excipients in drug formulations.

Keywords: layered double hydroxide, polypyrrole, terazosin hydrochloride, square-wave adsorptive anodic stripping voltammetry

Procedia PDF Downloads 221
3127 Efficient Ni(II)-Containing Layered Triple Hydroxide-Based Catalysts: Synthesis, Characterisation and Their Role in the Heck Reaction

Authors: Gabor Varga, Krisztina Karadi, Zoltan Konya, Akos Kukovecz, Pal Sipos, Istvan Palinko

Abstract:

Nickel can efficiently replace palladium in the Heck, Suzuki and Negishi reactions. This study focuses on the synthesis and catalytic application of Ni(II)-containing layered double hydroxides (LDHs) and layered triple hydroxides (LTHs). Our goals were to incorporate Ni(II) ions among the layers of LDHs or LTHs, or binding it to their surface or building it into their layers in such a way that their catalytic activities are maintained or even increased. The LDHs and LTHs were prepared by the co-precipitation method using ethylene glycol as co-solvent. In several cases, post-synthetic modifications (e.g., thermal treatment) were performed. After optimizing the synthesis conditions, the composites displayed good crystallinity and were free of byproducts. The success of the syntheses and the post-synthetic modifications was confirmed by relevant characterization methods (XRD, SEM, SEM-EDX and combined IR techniques). Catalytic activities of the produced and well-characterized solids were investigated through the Heck reaction. The composites behaved as efficient, recyclable catalysts in the Heck reaction between 4-bromoanisole and styrene. Through varying the reaction parameters, we were able to obtain acceptable conversions under mild conditions. Our study highlights the possibility of the application of Ni(II)-containing composites as efficient catalysts in coupling reactions.

Keywords: layered double hydroxide, layered triple hydroxide, heterogeneous catalysis, heck reaction

Procedia PDF Downloads 173
3126 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 226
3125 The Value of Job Security across Various Welfare Policies

Authors: Eithan Hourie, Miki Malul, Raphael Bar-El

Abstract:

To investigate the relationship between various welfare policies and the value of job security, we conducted a study with 201 people regarding their assessments of the value of job security with respect to three elements: income stability, assurance of continuity of employment, and security in the job. The experiment simulated different welfare policy scenarios, such as the amount and duration of unemployment benefits, workfare, and basic income. The participants evaluated the value of job security in various situations. We found that the value of job security is approximately 22% of the starting salary, which is distributed as follows: 13% reflects income security, 8.7% reflects job security, and about 0.3% is for being able to keep their current employment in the future. To the best of our knowledge, this article is one of the pioneers in trying to quantify the value of job security in different market scenarios and at varying levels of welfare policy. Our conclusions may help decision-makers when deciding on a welfare policy.

Keywords: job security value, employment protection legislation, status quo bias, expanding welfare policy

Procedia PDF Downloads 104
3124 Graphene-Oxide-Supported Coal-Layered Double Hydroxides: Synthesis and Characterizations

Authors: Shaeel A. Al Thabaiti, Sulaiman N. Basahel, Salem M. Bawaked, Mohamed Mokhtar

Abstract:

Nanosheets for cobalt-layered double hydroxide (Co-Al-LDH)/GO were successfully synthesized with different Co:M g:Al ratios (0:3:1, 1.5:1.5:1, and 3:0:1). The layered double hydroxide structure and morphology were determined using x-ray diffraction (XRD), Fourier transform infrared spectroscopy (FTIR), and scanning electron microscopy (SEM). Temperature prgrammed reduction (TPR) of Co-Al-LDH showed reduction peaks at lower temperature which indicates the ease reducibility of this particular sample. The thermal behaviour was studied using thermal graviemetric technique (TG), and the BET-surface area was determined using N2 physisorption at -196°C. The C-C coupling reaction was carried out over all the investigated catalysts. The Mg–Al LDH catalyst without Co ions is inactive, but the isomorphic substitution of Mg by Co ions (Co:Mg:Al = 1.5:1.5:1) in the cationic sheet resulted in 88% conversion of iodobenzene under reflux. LDH/GO hybrid is up to 2 times higher activity than for the unsupported LDH.

Keywords: adsorption, co-precipitation, graphene oxide, layer double hydroxide

Procedia PDF Downloads 299
3123 Network Security Attacks and Defences

Authors: Ranbir Singh, Deepinder Kaur

Abstract:

Network security is an important aspect in every field like government offices, Educational Institute and any business organization. Network security consists of the policies adopted to prevent and monitor forbidden access, misuse, modification, or denial of a computer network. Network security is very complicated subject and deal by only well trained and experienced people. However, as more and more people become wired, an increasing number of people need to understand the basics of security in a networked world. The history of the network security included an introduction to the TCP/IP and interworking. Network security starts with authenticating, commonly with a username and a password. In this paper, we study about various types of attacks on network security and how to handle or prevent this attack.

Keywords: network security, attacks, denial, authenticating

Procedia PDF Downloads 403
3122 NiAl-Layered Double Hydroxide: Preparation, Characterization and Applications in Photo-Catalysis and Hydrogen Storage

Authors: Ahmed Farghali, Heba Amar, Mohamed Khedr

Abstract:

NiAl-Layered Double Hydroxide (NiAl-LDH), one of anionic functional layered materials, has been prepared by a simple co-precipitation process. X-ray diffraction patterns confirm the formation of the desired compounds of NiAl hydroxide single phase and the crystallite size was found to be about 4.6 nm. The morphology of the prepared samples was investigated using scanning electron microscopy and the layered structure was appeared under the transmission electron microscope. The thermal stability and the function groups of NiAl-LDH were investigated using thermal gravimetric analysis (TGA) and Fourier transform infrared (FTIR) respectively. NiAl-LDH was investigated as a photo-catalyst for the degradation of some toxic dyes such as toluidine blue and bromopyrogallol red. It shows good catalytic efficiency in visible light and even in dark. For the first time NiAl-LDH was used for hydrogen storage application. NiAl-LDH samples were exposed to 20 bar applied hydrogen pressure at room temperature, 100 and -193 oC. NiAl-LDH samples appear to have feasible hydrogen storage capacity. It was capable to adsorb 0.1wt% at room temperature, 0.15 wt% at 100oC and storage capacity reached 0.3 wt% at -193 oC.

Keywords: NiAl-LDH, preparation, characterization, photo-catalysis, hydrogen storage

Procedia PDF Downloads 311
3121 Cybersecurity Strategies for Protecting Oil and Gas Industrial Control Systems

Authors: Gaurav Kumar Sinha

Abstract:

The oil and gas industry is a critical component of the global economy, relying heavily on industrial control systems (ICS) to manage and monitor operations. However, these systems are increasingly becoming targets for cyber-attacks, posing significant risks to operational continuity, safety, and environmental integrity. This paper explores comprehensive cybersecurity strategies for protecting oil and gas industrial control systems. It delves into the unique vulnerabilities of ICS in this sector, including outdated legacy systems, integration with IT networks, and the increased connectivity brought by the Industrial Internet of Things (IIoT). We propose a multi-layered defense approach that includes the implementation of robust network security protocols, regular system updates and patch management, advanced threat detection and response mechanisms, and stringent access control measures. We illustrate the effectiveness of these strategies in mitigating cyber risks and ensuring the resilient and secure operation of oil and gas industrial control systems. The findings underscore the necessity for a proactive and adaptive cybersecurity framework to safeguard critical infrastructure in the face of evolving cyber threats.

Keywords: cybersecurity, industrial control systems, oil and gas, cyber-attacks, network security, IoT, threat detection, system updates, patch management, access control, cybersecurity awareness, critical infrastructure, resilience, cyber threats, legacy systems, IT integration, multi-layered defense, operational continuity, safety, environmental integrity

Procedia PDF Downloads 42
3120 Experimental Investigations on the Mechanical properties of Spiny (Kawayan Tinik) Bamboo Layers

Authors: Ma. Doreen E. Candelaria, Ma. Louise Margaret A. Ramos, Dr. Jaime Y. Hernandez, Jr

Abstract:

Bamboo has been introduced as a possible alternative to some construction materials nowadays. Its potential use in the field of engineering, however, is still not widely practiced due to insufficient engineering knowledge on the material’s properties and characteristics. Although there are researches and studies proving its advantages, it is still not enough to say that bamboo can sustain and provide the strength and capacity required of common structures. In line with this, a more detailed analysis was made to observe the layered structure of the bamboo, particularly the species of Kawayan Tinik. It is the main intent of this research to provide the necessary experiments to determine the tensile strength of dried bamboo samples. The test includes tensile strength parallel to fibers with samples taken at internodes only. Throughout the experiment, methods suggested by the International Organization for Standardization (ISO) were followed. The specimens were tested using 3366 INSTRON Universal Testing Machine, with a rate of loading set to 0.6 mm/min. It was then observed from the results of these experiments that dried bamboo samples recorded high layered tensile strengths, as high as 600 MPa. Likewise, along the culm’s length and across its cross section, higher tensile strength were observed at the top part and at its outer layers. Overall, the top part recorded the highest tensile strength per layer, with its outer layers having tensile strength as high as 600 MPa. The recorded tensile strength of its middle and inner layers, on the other hand, were approximately 450 MPa and 180 MPa, respectively. From this variation in tensile strength across the cross section, it may be concluded that an increase in tensile strength may be observed towards the outer periphery of the bamboo. With these preliminary investigations on the layered tensile strength of bamboo, it is highly recommended to conduct experimental investigations on the layered compressive strength properties as well. It is also suggested to conduct investigations evaluating perpendicular layered tensile strength of the material.

Keywords: bamboo strength, layered strength tests, strength test, tensile test

Procedia PDF Downloads 417
3119 Structural Identification for Layered Composite Structures through a Wave and Finite Element Methodology

Authors: Rilwan Kayode Apalowo, Dimitrios Chronopoulos

Abstract:

An approach for identifying the geometric and material characteristics of layered composite structures through an inverse wave and finite element methodology is proposed. These characteristics are obtained through multi-frequency single shot measurements. However, it is established that the frequency regime of the measurements does not matter, meaning that both ultrasonic and structural dynamics frequency spectra can be employed. Taking advantage of a full FE (finite elements) description of the periodic composite, the scheme is able to account for arbitrarily complex structures. In order to demonstrate the robustness of the presented scheme, it is applied to a sandwich composite panel and results are compared with that of experimental characterization techniques. Excellent agreement is obtained with the experimental measurements.

Keywords: structural identification, non-destructive evaluation, finite elements, wave propagation, layered structures, ultrasound

Procedia PDF Downloads 141
3118 The Influence of the Geogrid Layers on the Bearing Capacity of Layered Soils

Authors: S. A. Naeini, H. R. Rahmani, M. Hossein Zade

Abstract:

Many classical bearing capacity theories assume that the natural soil's layers are homogenous for determining the bearing capacity of the soil. But, in many practical projects, we encounter multi-layer soils. Geosynthetic as reinforcement materials have been extensively used in the construction of various structures. In this paper, numerical analysis of the Plate Load Test (PLT) using of ABAQUS software in double-layered soils with different thicknesses of sandy and gravelly layers reinforced with geogrid was considered. The PLT is one of the common filed methods to calculate parameters such as soil bearing capacity, the evaluation of the compressibility and the determination of the Subgrade Reaction module. In fact, the influence of the geogrid layers on the bearing capacity of the layered soils is investigated. Finally, the most appropriate mode for the distance and number of reinforcement layers is determined. Results show that using three layers of geogrid with a distance of 0.3 times the width of the loading plate has the highest efficiency in bearing capacity of double-layer (sand and gravel) soils. Also, the significant increase in bearing capacity between unreinforced and reinforced soil with three layers of geogrid is caused by the condition that the upper layer (gravel) thickness is equal to the loading plate width.

Keywords: bearing capacity, reinforcement, geogrid, plate load test, layered soils

Procedia PDF Downloads 174
3117 Approaches to Ethical Hacking: A Conceptual Framework for Research

Authors: Lauren Provost

Abstract:

The digital world remains increasingly vulnerable, making the development of effective cybersecurity approaches even more critical in supporting the success of the digital economy and national security. Although approaches to cybersecurity have shifted and improved in the last decade with new models, especially with cloud computing and mobility, a record number of high severity vulnerabilities were recorded in the National Institute of Standards and Technology (NIST), and its National Vulnerability Database (NVD) in 2020. This is due, in part, to the increasing complexity of cyber ecosystems. Security must be approached with a more comprehensive, multi-tool strategy that addresses the complexity of cyber ecosystems, including the human factor. Ethical hacking has emerged as such an approach: a more effective, multi-strategy, comprehensive approach to cyber security's most pressing needs, especially understanding the human factor. Research on ethical hacking, however, is limited in scope. The two main objectives of this work are to (1) provide highlights of case studies in ethical hacking, (2) provide a conceptual framework for research in ethical hacking that embraces and addresses both technical and nontechnical security measures. Recommendations include an improved conceptual framework for research centered on ethical hacking that addresses many factors and attributes of significant attacks that threaten computer security; a more robust, integrative multi-layered framework embracing the complexity of cybersecurity ecosystems.

Keywords: ethical hacking, literature review, penetration testing, social engineering

Procedia PDF Downloads 217
3116 Determination of Bisphenol A and Uric Acid by Modified Single-Walled Carbon Nanotube with Magnesium Layered Hydroxide 3-(4-Methoxyphenyl)Propionic Acid Nanocomposite

Authors: Illyas Md Isa, Maryam Musfirah Che Sobry, Mohamad Syahrizal Ahmad, Nurashikin Abd Azis

Abstract:

A single-walled carbon nanotube (SWCNT) that has been modified with magnesium layered hydroxide 3-(4-methoxyphenyl)propionic acid nanocomposite was proposed for the determination of uric acid and bisphenol A by square wave voltammetry. The results obtained denote that MLH-MPP nanocomposites enhance the sensitivity of the voltammetry detection responses. The best performance is shown by the modified carbon nanotube paste electrode (CNTPE) with the composition of single-walled carbon nanotube: magnesium layered hydroxide 3-(4-methoxyphenyl)propionic acid nanocomposite at 100:15 (% w/w). The linear range where the sensor works well is within the concentration 1.0 10-7 – 1.0 10-4 and 3.0 10-7 – 1.0 10-4 for uric acid and bisphenol A respectively with the limit of detection of 1.0 10-7 M for both organics. The interferences of uric acid and bisphenol A with other organic were studied and most of them did not interfere. The results shown for each experimental parameter on the proposed CNTPE showed that it has high sensitivity, good selectivity, repeatability and reproducibility. Therefore, the modified CNTPE can be used for the determination of uric acid and bisphenol A in real samples such as blood, plastic bottles and foods.

Keywords: bisphenol A, magnesium layered hydroxide 3-(4-methoxyphenyl)propionic acid nanocomposite, Nanocomposite, uric acid

Procedia PDF Downloads 211
3115 Optimization of Double-Layered Microchannel Heat Sinks

Authors: Tu-Chieh Hung, Wei-Mon Yan, Xiao-Dong Wang, Yu-Xian Huang

Abstract:

This work employs a combined optimization procedure including a simplified conjugate-gradient method and a three-dimensional fluid flow and heat transfer model to study the optimal geometric parameter design of double-layered microchannel heat sinks. The overall thermal resistance RT is the objective function to be minimized with number of channels, N, the channel width ratio, β, the bottom channel aspect ratio, αb, and upper channel aspect ratio, αu, as the search variables. It is shown that, for the given bottom area (10 mm×10 mm) and heat flux (100 W cm-2), the optimal (minimum) thermal resistance of double-layered microchannel heat sinks is about RT=0.12 ℃/m2W with the corresponding optimal geometric parameters N=73, β=0.50, αb=3.52, and, αu= 7.21 under a constant pumping power of 0.05 W. The optimization process produces a maximum reduction by 52.8% in the overall thermal resistance compared with an initial guess (N=112, β=0.37, αb=10.32 and, αu=10.93). The results also show that the optimal thermal resistance decreases rapidly with the pumping power and tends to be a saturated value afterward. The corresponding optimal values of parameters N, αb, and αu increase while that of β decrease as the pumping power increases. However, further increasing pumping power is not always cost-effective for the application of heat sink designs.

Keywords: optimization, double-layered microchannel heat sink, simplified conjugate-gradient method, thermal resistance

Procedia PDF Downloads 490
3114 The Benefits of Security Culture for Improving Physical Protection Systems at Detection and Radiation Measurement Laboratory

Authors: Ari S. Prabowo, Nia Febriyanti, Haryono B. Santosa

Abstract:

Security function that is called as Physical Protection Systems (PPS) has functions to detect, delay and response. Physical Protection Systems (PPS) in Detection and Radiation Measurement Laboratory needs to be improved continually by using internal resources. The nuclear security culture provides some potentials to support this research. The study starts by identifying the security function’s weaknesses and its strengths of security culture as a purpose. Secondly, the strengths of security culture are implemented in the laboratory management. Finally, a simulation was done to measure its effectiveness. Some changes were happened in laboratory personnel behaviors and procedures. All became more prudent. The results showed a good influence of nuclear security culture in laboratory security functions.

Keywords: laboratory, physical protection system, security culture, security function

Procedia PDF Downloads 184