Search results for: secure data storage
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 25967

Search results for: secure data storage

25697 A 3kW Grid Connected Residential Energy Storage System with PV and Li-Ion Battery

Authors: Moiz Masood Syed, Seong-Jun Hong, Geun-Hie Rim, Kyung-Ae Cho, Hyoung-Suk Kim

Abstract:

In the near future, energy storage will play a vital role to enhance the present changing technology. Energy storage with power generation becomes necessary when renewable energy sources are connected to the grid which consequently adjoins to the total energy in the system since utilities require more power when peak demand occurs. This paper describes the operational function of a 3 kW grid-connected residential Energy Storage System (ESS) which is connected with Photovoltaic (PV) at its input side. The system can perform bidirectional functions of charging from the grid and discharging to the grid when power demand becomes high and low respectively. It consists of PV module, Power Conditioning System (PCS) containing a bidirectional DC/DC Converter and bidirectional DC/AC inverter and a Lithium-ion battery pack. ESS Configuration, specifications, and control are described. The bidirectional DC/DC converter tracks the maximum power point (MPPT) and maintains the stability of PV array in case of power deficiency to fulfill the load requirements. The bidirectional DC/AC inverter has good voltage regulation properties like low total harmonic distortion (THD), low electromagnetic interference (EMI), faster response and anti-islanding characteristics. Experimental results satisfy the effectiveness of the proposed system.

Keywords: energy storage system, photovoltaic, DC/DC converter, DC/AC inverter

Procedia PDF Downloads 612
25696 Behavior of an Elevated Liquid Storage Tank under Near-Fault Earthquakes

Authors: Koushik Roy, Sourav Gur, Sudib K. Mishra

Abstract:

Evidence of pulse type features in near-fault ground motions has raised serious concern to the structural engineering community, in view of their possible implications on the behavior of structures located on the fault regions. Studies in the recent past explore the effects of pulse type ground motion on the special structures, such as transmission towers in view of their high flexibility. Identically, long period sloshing of liquid in the storage tanks under dynamic loading might increase their failure vulnerability under near-fault pulses. Therefore, the behavior of the elevated liquid storage tank is taken up in this study. Simple lumped mass model is considered, with the bilinear force-deformation hysteresis behavior. Set of near-fault seismic ground acceleration time histories are adopted for this purpose, along with the far-field records for comparison. It has been demonstrated that pulse type motions lead to significant increase of the responses; in particular, sloshing of the fluid mass could be as high as 5 times, then the far field counterpart. For identical storage capacity, slender tanks are found to be more vulnerable than the broad ones.

Keywords: far-field motion, hysteresis, liquid storage tank, near fault earthquake, sloshing

Procedia PDF Downloads 376
25695 Durability Study of Pultruded CFRP Plates under Sustained Bending in Distilled Water and Seawater Immersions: Effects on the Visco-Elastic Properties

Authors: Innocent Kafodya, Guijun Xian

Abstract:

This paper presents effects of distilled water, seawater and sustained bending strains of 30% and 50% ultimate strain at room temperature, on the durability of unidirectional pultruded carbon fiber reinforced polymer (CFRP) plates. In this study, dynamic mechanical analyzer (DMA) was used to investigate the synergic effects of the immersions and bending strains on the visco-elastic properties of (CFRP) such as storage modulus, tan delta and glass transition temperature. The study reveals that the storage modulus and glass transition temperature increase while tan delta peak decreases in the initial stage of both immersions due to the progression of curing. The storage modulus and Tg subsequently decrease and tan delta increases due to the matrix plasticization. The blister induced damages in the unstrained seawater samples enhance water uptake and cause more serious degradation of Tg and storage modulus than in water immersion. Increasing sustained bending decreases Tg and storage modulus in a long run for both immersions due to resin matrix cracking and debonding. The combined effects of immersions and strains are not clearly reflected due to the statistical effects of DMA sample sizes and competing processes of molecular reorientation and postcuring.

Keywords: pultruded CFRP plate, bending strain, glass transition temperature, storage modulus, tan delta

Procedia PDF Downloads 252
25694 Artificial Neural Network Based Model for Detecting Attacks in Smart Grid Cloud

Authors: Sandeep Mehmi, Harsh Verma, A. L. Sangal

Abstract:

Ever since the idea of using computing services as commodity that can be delivered like other utilities e.g. electric and telephone has been floated, the scientific fraternity has diverted their research towards a new area called utility computing. New paradigms like cluster computing and grid computing came into existence while edging closer to utility computing. With the advent of internet the demand of anytime, anywhere access of the resources that could be provisioned dynamically as a service, gave rise to the next generation computing paradigm known as cloud computing. Today, cloud computing has become one of the most aggressively growing computer paradigm, resulting in growing rate of applications in area of IT outsourcing. Besides catering the computational and storage demands, cloud computing has economically benefitted almost all the fields, education, research, entertainment, medical, banking, military operations, weather forecasting, business and finance to name a few. Smart grid is another discipline that direly needs to be benefitted from the cloud computing advantages. Smart grid system is a new technology that has revolutionized the power sector by automating the transmission and distribution system and integration of smart devices. Cloud based smart grid can fulfill the storage requirement of unstructured and uncorrelated data generated by smart sensors as well as computational needs for self-healing, load balancing and demand response features. But, security issues such as confidentiality, integrity, availability, accountability and privacy need to be resolved for the development of smart grid cloud. In recent years, a number of intrusion prevention techniques have been proposed in the cloud, but hackers/intruders still manage to bypass the security of the cloud. Therefore, precise intrusion detection systems need to be developed in order to secure the critical information infrastructure like smart grid cloud. Considering the success of artificial neural networks in building robust intrusion detection, this research proposes an artificial neural network based model for detecting attacks in smart grid cloud.

Keywords: artificial neural networks, cloud computing, intrusion detection systems, security issues, smart grid

Procedia PDF Downloads 293
25693 Quantum Entangled States and Image Processing

Authors: Sanjay Singh, Sushil Kumar, Rashmi Jain

Abstract:

Quantum registering is another pattern in computational hypothesis and a quantum mechanical framework has a few helpful properties like Entanglement. We plan to store data concerning the structure and substance of a basic picture in a quantum framework. Consider a variety of n qubits which we propose to use as our memory stockpiling. In recent years classical processing is switched to quantum image processing. Quantum image processing is an elegant approach to overcome the problems of its classical counter parts. Image storage, retrieval and its processing on quantum machines is an emerging area. Although quantum machines do not exist in physical reality but theoretical algorithms developed based on quantum entangled states gives new insights to process the classical images in quantum domain. Here in the present work, we give the brief overview, such that how entangled states can be useful for quantum image storage and retrieval. We discuss the properties of tripartite Greenberger-Horne-Zeilinger and W states and their usefulness to store the shapes which may consist three vertices. We also propose the techniques to store shapes having more than three vertices.

Keywords: Greenberger-Horne-Zeilinger, image storage and retrieval, quantum entanglement, W states

Procedia PDF Downloads 276
25692 The Dynamics of Microorganisms in Dried Yogurt Storages at Different Temperatures

Authors: Jaruwan Chutrtong

Abstract:

Yoghurt is a fermented milk product. The process of making yogurt involves fermenting milk with live and active bacterial cultures by adding bacteria directly to the dairy product. It is usually made with a culture of Lactobacillus sp. (L. acidophilus or L. bulgaricus) and Streptococcus thermophilus. Many people like to eat it plain or flavored and it's also use as ingredient in many dishes. Yogurt is rich in nutrients including the microorganism which have important role in balancing the digestion and absorption of the boy.Consumers will benefit from lactic acid bacteria more or less depending on the amount of bacteria that lives in yogurt while eating. When purchasing yogurt, consumers should always check the label for live cultures. Yoghurt must keep in refrigerator at 4°C for up to ten days. After this amount of time, the cultures often become weak. This research studied freezing dry yogurt storage by monitoring on the survival of microorganisms when stored at different temperatures. At 300°C, representative room temperature of country in equator zone, number of lactic acid bacteria reduced 4 log cycles in 10 week. At 400°C, representative temperature in summer of country in equator zone, number of lactic acid bacteria also dropped 4 log cycle in 10 week, similar as storage at 300°C. But drying yogurt storage at 400°C couldn’t reformed to be good character yogurt as good as storage at 400°C only 4 week storage too. After 1 month, it couldn’t bring back the yogurt form. So if it is inevitable to keep yogurt powder at a temperature of 40°C, yoghurt is maintained only up to 4 weeks.

Keywords: dynamic, dry yoghurt, storage, temperature

Procedia PDF Downloads 295
25691 Development and Evaluation of Whey-Based Drink: An Approach to Protect Environmental Pollution

Authors: Zarmina Gillani, Mulazim Hussain Bukhari, Nuzhat Huma, Aqsa Qayyum

Abstract:

Whey is a valuable by-product of dairy industry comprising of precious nutrients lactose, protein, vitamins and minerals for the human food but considered as a pollutant due to its biological activity. So, there is a need to develop nutritious whey products to overcome the problem of environmental pollution. This project was planned to develop a whey drink at different pasteurization temperatures and its quality was evaluated during storage. The result indicated that pH, acidity, total soluble solids and lactose content changed significantly (p < 0.01) due to lactic acid production during storage. Non-significant (p > 0.05) effects were detected on the protein and ash content of whey drink. Fat and viscosity changed significantly with respect to storage only. Sensory evaluation of whey drink revealed that both treatments remained acceptable while whey drink pasteurized at 75°C/30 minutes (WD2) gained more sensory score compared to whey drink pasteurized at 65°C/30minutes (WD1).

Keywords: pasteurization, sensory evaluation, storage, whey

Procedia PDF Downloads 239
25690 Comparative Studies of Distributed and Aggregated Energy Storage Configurations in Direct Current Microgrids

Authors: Frimpong Kyeremeh, Albert Y. Appiah, Ben B. K. Ayawli

Abstract:

Energy storage system (ESS) is an essential part of a microgrid (MG) because of its immense benefits to the economics and the stability of MG. For a direct current (DC) MG (DCMG) in which the generating units are mostly variable renewable energy generators, DC bus voltage fluctuation is inevitable; hence ESS is vital in managing the mismatch between load demand and generation. Besides, to accrue the maximum benefits of ESS in the microgrid, there is the need for proper sizing and location of the ESSs. In this paper, a performance comparison is made between two configurations of ESS; distributed battery energy storage system (D-BESS) and an aggregated (centralized) battery energy storage system (A-BESS), on the basis of stability and operational cost for a DCMG. The configuration consists of four households with rooftop PV panels and a wind turbine. The objective is to evaluate and analyze the technical efficiencies, cost effectiveness as well as controllability of each configuration. The MG is first modelled with MATLAB Simulink then, a mathematical model is used to determine the optimal size of the BESS that minimizes the total operational cost of the MG. The performance of the two configurations would be tested with simulations. The two configurations are expected to reduce DC bus voltage fluctuations, but in the cases of voltage stability and optimal cost, the best configuration performance will be determined at the end of the research. The work is in progress, and the result would help MG designers and operators to make the best decision on the use of BESS for DCMG configurations.

Keywords: aggregated energy storage system, DC bus voltage, DC microgrid, distributed battery energy storage, stability

Procedia PDF Downloads 132
25689 Impure CO₂ Solubility Trapping in Deep Saline Aquifers: Role of Operating Conditions

Authors: Seyed Mostafa Jafari Raad, Hassan Hassanzadeh

Abstract:

Injection of impurities along with CO₂ into saline aquifers provides an exceptional prospect for low-cost carbon capture and storage technologies and can potentially accelerate large-scale implementation of geological storage of CO₂. We have conducted linear stability analyses and numerical simulations to investigate the effects of permitted impurities in CO₂ streams on the onset of natural convection and dynamics of subsequent convective mixing. We have shown that the rate of dissolution of an impure CO₂ stream with H₂S highly depends on the operating conditions such as temperature, pressure, and composition of impurity. Contrary to findings of previous studies, our results show that an impurity such as H₂S can potentially reduce the onset time of natural convection and can accelerate the subsequent convective mixing. However, at the later times, the rate of convective dissolution is adversely affected by the impurities. Therefore, the injection of an impure CO₂ stream can be engineered to improve the rate of dissolution of CO₂, which leads to higher storage security and efficiency. Accordingly, we have identified the most favorable CO₂ stream compositions based on the geophysical properties of target aquifers. Information related to the onset of natural convection such as the scaling relations and the most favorable operating conditions for CO₂ storage developed in this study are important in proper design, site screening, characterization and safety of geological storage. This information can be used to either identify future geological candidates for acid gas disposal or reviewing the current operating conditions of licensed injection sites.

Keywords: CO₂ storage, solubility trapping, convective dissolution, storage efficiency

Procedia PDF Downloads 170
25688 Secure Watermarking not at the Cost of Low Robustness

Authors: Jian Cao

Abstract:

This paper describes a novel watermarking technique which we call the random direction embedding (RDE) watermarking. Unlike traditional watermarking techniques, the watermark energy after the RDE embedding does not focus on a fixed direction, leading to the security against the traditional unauthorized watermark removal attack. In addition, the experimental results show that when compared with the existing secure watermarking, namely natural watermarking (NW), the RDE watermarking gains significant improvement in terms of robustness. In fact, the security of the RDE watermarking is not at the cost of low robustness, and it can even achieve more robust than the traditional spread spectrum watermarking, which has been shown to be very insecure.

Keywords: robustness, spread spectrum watermarking, watermarking security, random direction embedding (RDE)

Procedia PDF Downloads 357
25687 Coupling Heat Transfer by Natural Convection and Thermal Radiation in a Storage Tank of LNG

Authors: R. Hariti, M. Saighi, H. Saidani-Scott

Abstract:

A numerical simulation of natural convection double diffusion, coupled with thermal radiation in unsteady laminar regime in a storage tank is carried out. The storage tank contains a liquefied natural gas (LNG) in its gaseous phase. Fluent, a commercial CFD package, based on the numerical finite volume method, is used to simulate the flow. The radiative transfer equation is solved using the discrete coordinate method. This numerical simulation is used to determine the temperature profiles, stream function, velocity vectors and variation of the heat flux density for unsteady laminar natural convection. Furthermore, the influence of thermal radiation on the heat transfer has been investigated and the results obtained were compared to those found in the literature. Good agreement between the results obtained by the numerical method and those taken on site for the temperature values.

Keywords: tank, storage, liquefied natural gas, natural convection, thermal radiation, numerical simulation

Procedia PDF Downloads 510
25686 A Review on Existing Challenges of Data Mining and Future Research Perspectives

Authors: Hema Bhardwaj, D. Srinivasa Rao

Abstract:

Technology for analysing, processing, and extracting meaningful data from enormous and complicated datasets can be termed as "big data." The technique of big data mining and big data analysis is extremely helpful for business movements such as making decisions, building organisational plans, researching the market efficiently, improving sales, etc., because typical management tools cannot handle such complicated datasets. Special computational and statistical issues, such as measurement errors, noise accumulation, spurious correlation, and storage and scalability limitations, are brought on by big data. These unique problems call for new computational and statistical paradigms. This research paper offers an overview of the literature on big data mining, its process, along with problems and difficulties, with a focus on the unique characteristics of big data. Organizations have several difficulties when undertaking data mining, which has an impact on their decision-making. Every day, terabytes of data are produced, yet only around 1% of that data is really analyzed. The idea of the mining and analysis of data and knowledge discovery techniques that have recently been created with practical application systems is presented in this study. This article's conclusion also includes a list of issues and difficulties for further research in the area. The report discusses the management's main big data and data mining challenges.

Keywords: big data, data mining, data analysis, knowledge discovery techniques, data mining challenges

Procedia PDF Downloads 80
25685 Impact Evaluation of Discriminant Analysis on Epidemic Protocol in Warships’s Scenarios

Authors: Davi Marinho de Araujo Falcão, Ronaldo Moreira Salles, Paulo Henrique Maranhão

Abstract:

Disruption Tolerant Networks (DTN) are an evolution of Mobile Adhoc Networks (MANET) and work good in scenarioswhere nodes are sparsely distributed, with low density, intermittent connections and an end-to-end infrastructure is not possible to guarantee. Therefore, DTNs are recommended for high latency applications that can last from hours to days. The maritime scenario has mobility characteristics that contribute to a DTN network approach, but the concern with data security is also a relevant aspect in such scenarios. Continuing the previous work, which evaluated the performance of some DTN protocols (Epidemic, Spray and Wait, and Direct Delivery) in three warship scenarios and proposed the application of discriminant analysis, as a classification technique for secure connections, in the Epidemic protocol, thus, the current article proposes a new analysis of the directional discriminant function with opening angles smaller than 90 degrees, demonstrating that the increase in directivity influences the selection of a greater number of secure connections by the directional discriminant Epidemic protocol.

Keywords: DTN, discriminant function, epidemic protocol, security, tactical messages, warship scenario

Procedia PDF Downloads 161
25684 Effect of Hydroxy Propyl Methyl Cellulose (HPMC) Coating in Combination with MGSO4 on Some Guava Cultivars

Authors: Muhammad Randhawa, Muhammad Nadeem

Abstract:

Guava (Psidium guajava L.) is a vital source of minerals, vitamins, dietary fiber and antioxidants. Owing to highly perishable nature and proning towards chilling injury, diseases, insect-pests and physical damage the main drawbacks of guava after harvesting, present study was designed. Due to its delicacy in physiology, economic importance, effects of pre and postharvest factors and maturity indices, guava fruits should be given prime importance for good quality attributes. In this study guava fruits were stored at 10°C with 80% relative humidity after treating with different levels of sulphate salt of magnesium followed by dipping in cellulose based edible coating hydroxy propyl methyl cellulose (HPMC). The main objective of this coating was to enhance the shelf life of guava by inhibiting the respiration and also by binding the dissolved solids with salt application. Characterization for quality attributes including physical, physiological and bio chemical analysis was performed after every 7 days interval till the fruit remains edible during the storage period of 4 weeks. Finally, data obtained was subjected to statistical analysis. It was concluded on statistical basis that Surahi variety (treated with 5% MgSO4) showed best storage stability and kept its original quality up to almost 23 days during storage.

Keywords: edible coating, guava cultivars, physicochemical attributes, storage

Procedia PDF Downloads 292
25683 Technical Feasibility Analysis of PV Water Pumping System in Khuzestan Province-Iran

Authors: M.Goodarzi, M.Mohammadi, M. Rezaee

Abstract:

The technical analysis of using solar energy and electricity for water pumping in the Khuzestan province in Iran is investigated. For this purpose, the ecological conditions such as the weather data, air clearness and sunshine hours are analyzed. The nature of groundwater in the region was examined in terms of depth, static and dynamic head, water pumping rate.Three configurations for solar water pumping system were studied in this thesis; AC solar water pumping with storage battery, AC solar water pumping with storage tank and DC direct solar water pumping.

Keywords: technical feasibility, solar energy, photovoltaic systems, photovoltaic water pumping system

Procedia PDF Downloads 596
25682 Influence of Security Attributes in Component-Based Software Development

Authors: Somayeh Zeinali

Abstract:

A component is generally defined as a piece of executable software with a published interface. Component-based software engineering (CBSE) has become recognized as a new sub-discipline of software engineering. In the component-based software development, components cannot be completely secure and thus easily become vulnerable. Some researchers have investigated this issue and proposed approaches to detect component intrusions or protect distributed components. Software security also refers to the process of creating software that is considered secure.The terms “dependability”, “trustworthiness”, and “survivability” are used interchangeably to describe the properties of software security.

Keywords: component-based software development, component-based software engineering , software security attributes, dependability, component

Procedia PDF Downloads 518
25681 Efficient Signcryption Scheme with Provable Security for Smart Card

Authors: Jayaprakash Kar, Daniyal M. Alghazzawi

Abstract:

The article proposes a novel construction of signcryption scheme with provable security which is most suited to implement on smart card. It is secure in random oracle model and the security relies on Decisional Bilinear Diffie-Hellmann Problem. The proposed scheme is secure against adaptive chosen ciphertext attack (indistiguishbility) and adaptive chosen message attack (unforgebility). Also, it is inspired by zero-knowledge proof. The two most important security goals for smart card are Confidentiality and authenticity. These functions are performed in one logical step in low computational cost.

Keywords: random oracle, provable security, unforgebility, smart card

Procedia PDF Downloads 567
25680 Signs-Only Compressed Row Storage Format for Exact Diagonalization Study of Quantum Fermionic Models

Authors: Michael Danilov, Sergei Iskakov, Vladimir Mazurenko

Abstract:

The present paper describes a high-performance parallel realization of an exact diagonalization solver for quantum-electron models in a shared memory computing system. The proposed algorithm contains a storage format for efficient computing eigenvalues and eigenvectors of a quantum electron Hamiltonian matrix. The results of the test calculations carried out for 15 sites Hubbard model demonstrate reduction in the required memory and good multiprocessor scalability, while maintaining performance of the same order as compressed row storage.

Keywords: sparse matrix, compressed format, Hubbard model, Anderson model

Procedia PDF Downloads 365
25679 Energy Self-Sufficiency Through Smart Micro-Grids and Decentralised Sector-Coupling

Authors: C. Trapp, A. Vijay, M. Khorasani

Abstract:

Decentralised micro-grids with sector coupling can combat the spatial and temporal intermittence of renewable energy by combining power, transportation and infrastructure sectors. Intelligent energy conversion concepts such as electrolysers, hydrogen engines and fuel cells combined with energy storage using intelligent batteries and hydrogen storage form the back-bone of such a system. This paper describes a micro-grid based on Photo-Voltaic cells, battery storage, innovative modular and scalable Anion Exchange Membrane (AEM) electrolyzer with an efficiency of up to 73%, high-pressure hydrogen storage as well as cutting-edge combustion-engine based Combined Heat and Power (CHP) plant with more than 85% efficiency at the university campus to address the challenges of decarbonization whilst eliminating the necessity for expensive high-voltage infrastructure.

Keywords: sector coupling, micro-grids, energy self-sufficiency, decarbonization, AEM electrolysis, hydrogen CHP

Procedia PDF Downloads 153
25678 A Multicopy Strategy for Improved Security Wireless Sensor Network

Authors: Tuğçe Yücel

Abstract:

A Wireless Sensor Network(WSN) is a collection of sensor nodes which are deployed randomly in an area for surveillance. Efficient utilization of limited battery energy of sensors for increased network lifetime as well as data security are major design objectives for WSN. Moreover secure transmission of data sensed to a base station for further processing. Producing multiple copies of data packets and sending them on different paths is one of the strategies for this purpose, which leads to redundant energy consumption and hence reduced network lifetime. In this work we develop a restricted multi-copy multipath strategy where data move through ‘frequently’ or ‘heavily’ used sensors is copied by the sensor incident to such central nodes and sent on node-disjoint paths. We develop a mixed integer programing(MIP) model and heuristic approach present some preleminary test results.

Keywords: MIP, sensor, telecommunications, WSN

Procedia PDF Downloads 478
25677 Activated Carbons Prepared from Date Pits for Hydrogen Storage

Authors: M. Belhachemi, M. Monteiro de Castro, M. Casco, A. Sepúlveda-Escribano, F. Rodríguez-Reinoso

Abstract:

In this study, activated carbons were prepared from Algerian date pits using thermal activation with CO2 or steam. The prepared activated carbons were doped by vanadium oxide in order to increase the H2 adsorption capacity. The adsorbents were characterized by N2 and CO2 adsorption at 77 K and 273K, respectively. The hydrogen adsorption experiments were carried at 298K in the 0–100 bar pressure range using a volumetric equipment. The results show that the H2 adsorption capacity is influenced by the size and volume of micropores in the activated carbon adsorbent. Furthermore, vanadium doping of activated carbons has a slight positive effect on H2 storage.

Keywords: hydrogen storage, activated carbon, vanadium doping, adsorption

Procedia PDF Downloads 533
25676 Colour Characteristics of Dried Cocoa Using Shallow Box Fermentation Technique

Authors: Khairul Bariah Sulaiman, Tajul Aris Yang

Abstract:

Fermentation is well known as an essential process in cocoa beans. Besides to develop the precursor of cocoa flavour, it also induce the colour changes in the beans.The fermentation process is reported to be influenced by duration of pod storage and fermentation. Therefore, this study was conducted to evaluate colour of Malaysian cocoa beans and how the pods storage and fermentation duration using shallow box technique will effect on it characteristics. There are two factors being studied ie duration of cocoa pod storage (0, 2, 4, and 6 days) and duration of cocoa fermentation (0, 1, 2, 3, 4 and 5 days). The experiment is arranged in 4 x 6 factorial design with 24 treatments and arrangement is in a Completely Randomised Design (CRD). The produced beans is inspected for colour changes under artificial light during cut test and divided into four groups of colour namely fully brown, purple brown, fully purple and slaty. Cut tests indicated that cocoa beans which are directly dried without undergone fermentation has the highest slaty percentage. However, application of pods storage before fermentation process is found to decrease the slaty percentage. In contrast, the percentages of fully brown beans start to dominate after two days of fermentation, especially from four and six days of pods storage batch. Whereas, almost all batch have percentage of fully purple less than 20%. Interestingly, the percentage of purple brown beans are scattered in the entire beans batch regardless any specific trend. Meanwhile, statistical analysis using General Linear Model showed that the pods storage has a significant effect on the colour characteristic of the Malaysian dried beans compared to fermentation duration.

Keywords: cocoa beans, colour, fermentation, shallow box

Procedia PDF Downloads 455
25675 Security of Database Using Chaotic Systems

Authors: Eman W. Boghdady, A. R. Shehata, M. A. Azem

Abstract:

Database (DB) security demands permitting authorized users and prohibiting non-authorized users and intruders actions on the DB and the objects inside it. Organizations that are running successfully demand the confidentiality of their DBs. They do not allow the unauthorized access to their data/information. They also demand the assurance that their data is protected against any malicious or accidental modification. DB protection and confidentiality are the security concerns. There are four types of controls to obtain the DB protection, those include: access control, information flow control, inference control, and cryptographic. The cryptographic control is considered as the backbone for DB security, it secures the DB by encryption during storage and communications. Current cryptographic techniques are classified into two types: traditional classical cryptography using standard algorithms (DES, AES, IDEA, etc.) and chaos cryptography using continuous (Chau, Rossler, Lorenz, etc.) or discreet (Logistics, Henon, etc.) algorithms. The important characteristics of chaos are its extreme sensitivity to initial conditions of the system. In this paper, DB-security systems based on chaotic algorithms are described. The Pseudo Random Numbers Generators (PRNGs) from the different chaotic algorithms are implemented using Matlab and their statistical properties are evaluated using NIST and other statistical test-suits. Then, these algorithms are used to secure conventional DB (plaintext), where the statistical properties of the ciphertext are also tested. To increase the complexity of the PRNGs and to let pass all the NIST statistical tests, we propose two hybrid PRNGs: one based on two chaotic Logistic maps and another based on two chaotic Henon maps, where each chaotic algorithm is running side-by-side and starting from random independent initial conditions and parameters (encryption keys). The resulted hybrid PRNGs passed the NIST statistical test suit.

Keywords: algorithms and data structure, DB security, encryption, chaotic algorithms, Matlab, NIST

Procedia PDF Downloads 242
25674 Security Issues on Smart Grid and Blockchain-Based Secure Smart Energy Management Systems

Authors: Surah Aldakhl, Dafer Alali, Mohamed Zohdy

Abstract:

The next generation of electricity grid infrastructure, known as the "smart grid," integrates smart ICT (information and communication technology) into existing grids in order to alleviate the drawbacks of existing one-way grid systems. Future power systems' efficiency and dependability are anticipated to significantly increase thanks to the Smart Grid, especially given the desire for renewable energy sources. The security of the Smart Grid's cyber infrastructure is a growing concern, though, as a result of the interconnection of significant power plants through communication networks. Since cyber-attacks can destroy energy data, beginning with personal information leaking from grid members, they can result in serious incidents like huge outages and the destruction of power network infrastructure. We shall thus propose a secure smart energy management system based on the Blockchain as a remedy for this problem. The power transmission and distribution system may undergo a transformation as a result of the inclusion of optical fiber sensors and blockchain technology in smart grids. While optical fiber sensors allow real-time monitoring and management of electrical energy flow, Blockchain offers a secure platform to safeguard the smart grid against cyberattacks and unauthorized access. Additionally, this integration makes it possible to see how energy is produced, distributed, and used in real time, increasing transparency. This strategy has advantages in terms of improved security, efficiency, dependability, and flexibility in energy management. An in-depth analysis of the advantages and drawbacks of combining blockchain technology with optical fiber is provided in this paper.

Keywords: smart grids, blockchain, fiber optic sensor, security

Procedia PDF Downloads 70
25673 Effect of Different Temperatures and Cold Storage on Pupaes Apanteles gelechiidivoris Marsh (Hymenoptera: Braconidae) Parasitoid of Tuta absoluta Meyrick (Lepidoptera: Gelechiidae)

Authors: Jessica Morales Perdomo, Daniel Rodriguez Caicedo, Fernando Cantor Rincon

Abstract:

Tuta absoluta known as the tomato leaf miner, is one of the main pests in tomato crops in South America and the main pest in many European countries. Apanteles gelechiidivoris is a parasitoid of third instar Tuta absoluta larvae. Our studies have demonstrated that this parasitoid can cause up to 80% mortality of T. absoluta larvae in the field. We investigated cold storage of A. gelechiidivoris pupae as a method of mass production of this parasitoid. This storage method does not interfere with biological characteristics of the parasitoid. In this study, we evaluated the effect of different temperatures (4, 8 and 12°C) and different time duration (7, 14, 21 or 28 days) of cold storage on biological parameters of A. gelechiidivoris pupae and adults. The biological parameters of the parasitoid evaluated were: adult emergence time, lifespan, parasitism percentage and sex ratio. We found that the adult emergence time was delayed when the parasitoid pupae were stored at 4°C and 8°C. The shortest adult emergence was recorded when pupae were stored for seven days. The lowest adult emergence was found for pupae stored at 4°C and decreased significantly as the days of storage increased. We found high percentages of adult emergence when pupae were stored at 8°C and 12°C for seven days. Adult lifespan decreased with increasing days of cold storage. Adults emerging from pupae stored at 8°C during seven and 14 days showed the longest lifespan (nine days). The lowest parasitism rate was recorded at 4°C at every time point. The highest percentage of parasitism (80%) was found at 8°C during seven days of storage. The treatments had no effect on adults the sex ratio. The results suggest that A. gelechiidivoris pupae can be stored for up to 14 days at 8°C without affecting the efficacy of the parasitoid in the field.

Keywords: biological control, cold storage, massive rearing, quality control

Procedia PDF Downloads 337
25672 Engineered Reactor Components for Durable Iron Flow Battery

Authors: Anna Ivanovskaya, Alexandra E. L. Overland, Swetha Chandrasekaran, Buddhinie S. Jayathilake

Abstract:

Iron-based redox flow batteries (IRFB) are promising for grid-scale storage because of their low-cost and environmental safety. Earth-abundant iron can enable affordable grid-storage to meet DOE’s target material cost <$20/kWh and levelized cost for storage $0.05/kWh. In conventional redox flow batteries, energy is stored in external electrolyte tanks and electrolytes are circulated through the cell units to achieve electrochemical energy conversions. However, IRFBs are hybrid battery systems where metallic iron deposition at the negative side of the battery controls the storage capacity. This adds complexity to the design of a porous structure of 3D-electrodes to achieve a desired high storage capacity. In addition, there is a need to control parasitic hydrogen evolution reaction which accompanies the metal deposition process, increases the pH, lowers the energy efficiency, and limits the durability. To achieve sustainable operation of IRFBs, electrolyte pH, which affects the solubility of reactants and the rate of parasitic reactions, needs to be dynamically readjusted. In the present study we explore the impact of complexing agents on maintaining solubility of the reactants and find the optimal electrolyte conditions and battery operating regime, which are specific for IRFBs with additives, and demonstrate the robust operation.

Keywords: flow battery, iron-based redox flow battery, IRFB, energy storage, electrochemistry

Procedia PDF Downloads 47
25671 Use of Fish Gelatin Based-Films as Edible Pouch to Extend the Shelf-Life of Dried Chicken Powder and Chicken Oil

Authors: Soottawat Benjakul, Phakawat Tongnuanchan, Thummanoon Prodpran

Abstract:

Edible pouches made from fish gelatin film incorporated without and with palm oil (PO), basil essential oil (BEO) or oil mixture (M) were prepared and used to store chicken powder and chicken skin oil in comparison with nylon/low-density polyethylene (Nylon/LDPE) pouch during storage of 15 days. The moisture content of chicken powder packaged in pouches from fish gelatin films incorporated without and with various oils increased during 15 days of storage (p > 0.05). However, there was a non-significant change in moisture content of sample packaged in Nylon/LDPE pouch (p > 0.05). Samples packaged in pouches from fish gelatin films incorporated with oils had lower moisture content than those stored in pouch from gelatin film without oil added throughout the storage (p < 0.05). This coincided with the higher increases in darkness and yellowness for the latter. All samples packaged in pouches made from all films had the slight increase in PV, whereas a drastic increase in TBARS was observed for all samples during 15 days of storage. During 15 days of storage, chicken skin oil packaged in Nylon/LDPE pouch had higher TBARS and p-anisidine value than those stored in pouches made from fish gelatin, regardless of oil incorporated (p< 0.05). Therefore, pouches from gelatin film incorporated with oils could lower water migration and lipid oxidation in fat containing foods and oils.

Keywords: edible pouch, fish gelatin, quality changes, storage stability

Procedia PDF Downloads 214
25670 Examining the Extent and Magnitude of Food Security amongst Rural Farming Households in Nigeria

Authors: Ajibade T., Omotesho O. A., Ayinde O. E, Ajibade E. T., Muhammad-Lawal A.

Abstract:

This study was carried out to examine the extent and magnitude of food security amongst farming rural households in Nigeria. Data used for this study was collected from a total of two hundred and forty rural farming households using a two-stage random sampling technique. The main tools of analysis for this study include descriptive statistics and a constructed food security index using the identification and aggregation procedure. The headcount ratio in this study reveals that 71% of individuals in the study area were food secure with an average per capita calorie and protein availability of 4,213.92kcal and 99.98g respectively. The aggregated household daily calorie availability and daily protein availability per capita were 3,634.57kcal and 84.08g respectively which happens to be above the food security line of 2,470kcal and 65g used in this study. The food insecure households fell short of the minimum daily per capita calorie and protein requirement by 2.1% and 24.9%. The study revealed that the area is food insecure due to unequal distribution of the available food amongst the sampled population. The study recommends that the households should empower themselves financially in order to enhance their ability to afford the food during both on and off seasons. Also, processing and storage of farm produce should be enhanced in order to improve on availability throughout the year.

Keywords: farming household, food security, identification and aggregation, food security index

Procedia PDF Downloads 256
25669 Efficient Control of Some Dynamic States of Wheeled Robots

Authors: Boguslaw Schreyer

Abstract:

In some types of wheeled robots it is important to secure starting acceleration and deceleration maxima while at the same time maintaining transversal stability. In this paper torque distribution between the front and rear wheels as well as the timing of torque application have been calculated. Both secure an optimum traction coefficient. This paper also identifies required input signals to a control unit, which controls the torque values and timing. Using a three dimensional, two mass model of a robot developed by the author a computer simulation was performed confirming the calculations presented in this paper. These calculations were also implemented and confirmed during military robot testing.

Keywords: robot dynamics, torque distribution, traction coefficient, wheeled robots

Procedia PDF Downloads 292
25668 Image Encryption Using Eureqa to Generate an Automated Mathematical Key

Authors: Halima Adel Halim Shnishah, David Mulvaney

Abstract:

Applying traditional symmetric cryptography algorithms while computing encryption and decryption provides immunity to secret keys against different attacks. One of the popular techniques generating automated secret keys is evolutionary computing by using Eureqa API tool, which got attention in 2013. In this paper, we are generating automated secret keys for image encryption and decryption using Eureqa API (tool which is used in evolutionary computing technique). Eureqa API models pseudo-random input data obtained from a suitable source to generate secret keys. The validation of generated secret keys is investigated by performing various statistical tests (histogram, chi-square, correlation of two adjacent pixels, correlation between original and encrypted images, entropy and key sensitivity). Experimental results obtained from methods including histogram analysis, correlation coefficient, entropy and key sensitivity, show that the proposed image encryption algorithms are secure and reliable, with the potential to be adapted for secure image communication applications.

Keywords: image encryption algorithms, Eureqa, statistical measurements, automated key generation

Procedia PDF Downloads 455