Search results for: secure data storage
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 25967

Search results for: secure data storage

25757 Government (Big) Data Ecosystem: Definition, Classification of Actors, and Their Roles

Authors: Syed Iftikhar Hussain Shah, Vasilis Peristeras, Ioannis Magnisalis

Abstract:

Organizations, including governments, generate (big) data that are high in volume, velocity, veracity, and come from a variety of sources. Public Administrations are using (big) data, implementing base registries, and enforcing data sharing within the entire government to deliver (big) data related integrated services, provision of insights to users, and for good governance. Government (Big) data ecosystem actors represent distinct entities that provide data, consume data, manipulate data to offer paid services, and extend data services like data storage, hosting services to other actors. In this research work, we perform a systematic literature review. The key objectives of this paper are to propose a robust definition of government (big) data ecosystem and a classification of government (big) data ecosystem actors and their roles. We showcase a graphical view of actors, roles, and their relationship in the government (big) data ecosystem. We also discuss our research findings. We did not find too much published research articles about the government (big) data ecosystem, including its definition and classification of actors and their roles. Therefore, we lent ideas for the government (big) data ecosystem from numerous areas that include scientific research data, humanitarian data, open government data, industry data, in the literature.

Keywords: big data, big data ecosystem, classification of big data actors, big data actors roles, definition of government (big) data ecosystem, data-driven government, eGovernment, gaps in data ecosystems, government (big) data, public administration, systematic literature review

Procedia PDF Downloads 128
25756 Energy Efficiency Analysis of Discharge Modes of an Adiabatic Compressed Air Energy Storage System

Authors: Shane D. Inder, Mehrdad Khamooshi

Abstract:

Efficient energy storage is a crucial factor in facilitating the uptake of renewable energy resources. Among the many options available for energy storage systems required to balance imbalanced supply and demand cycles, compressed air energy storage (CAES) is a proven technology in grid-scale applications. This paper reviews the current state of micro scale CAES technology and describes a micro-scale advanced adiabatic CAES (A-CAES) system, where heat generated during compression is stored for use in the discharge phase. It will also describe a thermodynamic model, developed in EES (Engineering Equation Solver) to evaluate the performance and critical parameters of the discharge phase of the proposed system. Three configurations are explained including: single turbine without preheater, two turbines with preheaters, and three turbines with preheaters. It is shown that the micro-scale A-CAES is highly dependent upon key parameters including; regulator pressure, air pressure and volume, thermal energy storage temperature and flow rate and the number of turbines. It was found that a micro-scale AA-CAES, when optimized with an appropriate configuration, could deliver energy input to output efficiency of up to 70%.

Keywords: CAES, adiabatic compressed air energy storage, expansion phase, micro generation, thermodynamic

Procedia PDF Downloads 285
25755 The Impact of Corn Grain Consolidation on the Emission of Volatile Organic Compounds

Authors: Marek Gancarz, Katarzyna Grądecka-Jakubowska, Urszula Malaga-Toboła, Rafał Kornas, Aleksandra Żytek, Robert Rusinek

Abstract:

The aim of the research was to determine the emission of volatile organic compounds (VOCs) from corn grain depending on the degree of consolidation of the bulk material, imitating the processes occurring in silos during material storage. An electronic nose and a gas chromatograph were used for VOC analysis. Corn grain was densified under pressure of 40 and 80 kPa. Control samples of corn grain were not compacted and had bulk density. The analyzes were carried out at 14% and 17% humidity (w.b. – wet basis). The measurement system enabled quantitative and qualitative analyzes of volatile compounds and their emission intensity during the 10-day storage period. The study determined the profile of volatile compounds as a function of storage time and grain density level. The test results showed that the highest emission of volatile compounds was recorded in the first four days of storage of corn grain. VOC emissions, as well as grain moisture and volume, can be helpful in determining the quality of material stored in silos and its subsequent suitability for consumption.

Keywords: maize, consolidation, storage, VOCs, GC-MS, chemometrics

Procedia PDF Downloads 49
25754 Effects of Roof Materials on Onion Storage

Authors: Imoukhuede Oladunni Bimpe, Ale Monday Olatunbosun

Abstract:

Periodic scarcity of onion requires urgent solution in Nigerian agro-economy. The high percentage of onion losses incurred after harvesting period is due to non-availability of appropriate facility for its storage. Therefore, some storage structures were constructed with different roofing materials. The response of the materials to the weather parameters like temperature and relative humidity were evaluated to know their effects on the performance of the storage structures. The temperature and relative humidity were taken three times daily alongside with the weight of the onion in each of the structures; the losses as indicated by loss indices like shrinkage, rottenness, sprouting and colour were identified and percentage loss per week determined. The highest mean percentage loss (22%) was observed in the structure with iron roofing materials while structure with thatched materials had the lowest (9.4%); The highest temperature was observed in the structure with Asbestos roofing materials and no significant difference in the temperature value in the structure with thatched and Iron materials; highest relatively humidity was found in Asbestos roofing material while the lowest in the structure with Iron materials. It was conclusively found that the storage structure with thatched roof had the best performance in terms of losses.

Keywords: onion, storage structures, weather parameters, roof materials, losses

Procedia PDF Downloads 578
25753 Security in Resource Constraints Network Light Weight Encryption for Z-MAC

Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy

Abstract:

Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios.

Keywords: hybrid MAC protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node dataprocessing, Z-MAC

Procedia PDF Downloads 115
25752 An Empirical Investigation of the Challenges of Secure Edge Computing Adoption in Organizations

Authors: Hailye Tekleselassie

Abstract:

Edge computing is a spread computing outline that transports initiative applications closer to data sources such as IoT devices or local edge servers, and possible happenstances would skull the action of new technologies. However, this investigation was attained to investigation the consciousness of technology and communications organization workers and computer users who support the service cloud. Surveys were used to achieve these objectives. Surveys were intended to attain these aims, and it is the functional using survey. Enquiries about confidence are also a key question. Problems like data privacy, integrity, and availability are the factors affecting the company’s acceptance of the service cloud.

Keywords: IoT, data, security, edge computing

Procedia PDF Downloads 59
25751 A Design Framework for an Open Market Platform of Enriched Card-Based Transactional Data for Big Data Analytics and Open Banking

Authors: Trevor Toy, Josef Langerman

Abstract:

Around a quarter of the world’s data is generated by financial with an estimated 708.5 billion global non-cash transactions reached between 2018 and. And with Open Banking still a rapidly developing concept within the financial industry, there is an opportunity to create a secure mechanism for connecting its stakeholders to openly, legitimately and consensually share the data required to enable it. Integration and data sharing of anonymised transactional data are still operated in silos and centralised between the large corporate entities in the ecosystem that have the resources to do so. Smaller fintechs generating data and businesses looking to consume data are largely excluded from the process. Therefore there is a growing demand for accessible transactional data for analytical purposes and also to support the rapid global adoption of Open Banking. The following research has provided a solution framework that aims to provide a secure decentralised marketplace for 1.) data providers to list their transactional data, 2.) data consumers to find and access that data, and 3.) data subjects (the individuals making the transactions that generate the data) to manage and sell the data that relates to themselves. The platform also provides an integrated system for downstream transactional-related data from merchants, enriching the data product available to build a comprehensive view of a data subject’s spending habits. A robust and sustainable data market can be developed by providing a more accessible mechanism for data producers to monetise their data investments and encouraging data subjects to share their data through the same financial incentives. At the centre of the platform is the market mechanism that connects the data providers and their data subjects to the data consumers. This core component of the platform is developed on a decentralised blockchain contract with a market layer that manages transaction, user, pricing, payment, tagging, contract, control, and lineage features that pertain to the user interactions on the platform. One of the platform’s key features is enabling the participation and management of personal data by the individuals from whom the data is being generated. This framework developed a proof-of-concept on the Etheruem blockchain base where an individual can securely manage access to their own personal data and that individual’s identifiable relationship to the card-based transaction data provided by financial institutions. This gives data consumers access to a complete view of transactional spending behaviour in correlation to key demographic information. This platform solution can ultimately support the growth, prosperity, and development of economies, businesses, communities, and individuals by providing accessible and relevant transactional data for big data analytics and open banking.

Keywords: big data markets, open banking, blockchain, personal data management

Procedia PDF Downloads 44
25750 A User Interface for Easiest Way Image Encryption with Chaos

Authors: D. López-Mancilla, J. M. Roblero-Villa

Abstract:

Since 1990, the research on chaotic dynamics has received considerable attention, particularly in light of potential applications of this phenomenon in secure communications. Data encryption using chaotic systems was reported in the 90's as a new approach for signal encoding that differs from the conventional methods that use numerical algorithms as the encryption key. The algorithms for image encryption have received a lot of attention because of the need to find security on image transmission in real time over the internet and wireless networks. Known algorithms for image encryption, like the standard of data encryption (DES), have the drawback of low level of efficiency when the image is large. The encrypting based on chaos proposes a new and efficient way to get a fast and highly secure image encryption. In this work, a user interface for image encryption and a novel and easiest way to encrypt images using chaos are presented. The main idea is to reshape any image into a n-dimensional vector and combine it with vector extracted from a chaotic system, in such a way that the vector image can be hidden within the chaotic vector. Once this is done, an array is formed with the original dimensions of the image and turns again. An analysis of the security of encryption from the images using statistical analysis is made and is used a stage of optimization for image encryption security and, at the same time, the image can be accurately recovered. The user interface uses the algorithms designed for the encryption of images, allowing you to read an image from the hard drive or another external device. The user interface, encrypt the image allowing three modes of encryption. These modes are given by three different chaotic systems that the user can choose. Once encrypted image, is possible to observe the safety analysis and save it on the hard disk. The main results of this study show that this simple method of encryption, using the optimization stage, allows an encryption security, competitive with complicated encryption methods used in other works. In addition, the user interface allows encrypting image with chaos, and to submit it through any public communication channel, including internet.

Keywords: image encryption, chaos, secure communications, user interface

Procedia PDF Downloads 457
25749 Exploring the Physicochemical and Quality Attributes of Potato Cultivars during Subsequent Storage

Authors: Muhammad Atif Randhawa, Adnan Amjad, Muhammad Nadeem

Abstract:

Potato (Solanum tuberosum) popularly known as ‘the king of vegetables’, has emerged as fourth most important food crop after rice, wheat and maize. Potato contains carbohydrates, minerals, vitamins and antioxidants. The antioxidants of potatoes especially vitamin C helps in reducing cancer, cardiovascular diseases and high blood pressure by binding free radicals. Physical characteristics and some major chemical properties of potato tubers at fresh and stored stages were investigated. Two varieties of potatoes, Sante (V1) having white colour and Lal moti (V2) with red colour were stored for 3 months and analysis were performed after each month interval. Physical and chemical attributes including weight loss, sprouting, specific gravity, pH, total sugars (reducing and non-reducing sugars) and vitamin C were analyzed before and after storage. Value of weight loss at zero day was null but it increased to 6.45% after 90 days on average in both cultivars and sprouting increased gradually at the end of 90 days. Moreover total sugars were 3.10% at zero day but increased to 9.30% after 90 days. Ascorbic acid was decreased during storage from 17.49(mg/100g) to 3.79. Both varieties of potato were stored at 60C and 120C temperatures with 85% relative humidity in order to prolong their acceptability in the market. The storage conditions influence the potatoes quality and consequently their acceptability to consumer. The data was analyzed statistically and clarifies that total sugars, weight loss, sprouting and specific gravity increase during the storage period while ascorbic acid (Vit-C) and pH decreased. Among both varieties that were stored at 60C and 120C, Sante (V1) was better than Lal moti (V2) due to less physicochemical and quality changes at 60C as compared to store at 120C.

Keywords: physicochemical, potato, quality attributes, storage

Procedia PDF Downloads 403
25748 Diffusion Mechanism of Aroma Compound (2-Acetyl-1-Pyrroline) in Rice During Storage

Authors: Mary Ann U. Baradi, Arnold R. Elepaño, Manuel Jose C. Regalado

Abstract:

Aromatic rice has become popular and continues to command higher price than ordinary rice because of its distinctive scent that makes it special. Freshly harvested aromatic rice exhibits strong aromatic scent but decreases with time and conditions during storage. Of the many volatile compounds in aromatic rice, 2-acetyl-1-pyrroline (2AP) is a major compound that gives rice its popcorn-like aroma. The diffusion mechanism of 2AP in rice was investigated. Semi-empirical models explaining 2AP diffusion as affected by temperature and duration were developed. Storage time and temperature affected 2AP loss via diffusion. The amount of 2AP in rice decreased with time. Free 2AP, being volatile, is lost due to diffusion. Storage experiment indicated rapid 2AP loss during the first five weeks and subsequently leveled off afterwards; attaining level of starch bound 2AP. Decline of 2AP during storage followed exponential equation and exhibited four stages; i.e. the initial, second, third and final stage. Free 2AP is easily lost while bound 2AP is left, only to be released upon exposure to high temperature such as cooking. Both free and bound 2AP is found in endosperm while free 2AP is in the bran. Around 63–67% of total 2AP was lost in brown and milled rice of MS 6 paddy kept at ambient. Samples stored at higher temperature (27°C) recorded higher 2AP loss than those kept at lower temperature (15°C). The study should be able to guide processors in understanding and controlling parameters in storage to produce high quality rice.

Keywords: 2-acetyl-1-pyrroline, aromatic rice, diffusion mechanism, storage

Procedia PDF Downloads 308
25747 Modeling Core Flooding Experiments for Co₂ Geological Storage Applications

Authors: Avinoam Rabinovich

Abstract:

CO₂ geological storage is a proven technology for reducing anthropogenic carbon emissions, which is paramount for achieving the ambitious net zero emissions goal. Core flooding experiments are an important step in any CO₂ storage project, allowing us to gain information on the flow of CO₂ and brine in the porous rock extracted from the reservoir. This information is important for understanding basic mechanisms related to CO₂ geological storage as well as for reservoir modeling, which is an integral part of a field project. In this work, a different method for constructing accurate models of CO₂-brine core flooding will be presented. Results for synthetic cases and real experiments will be shown and compared with numerical models to exhibit their predictive capabilities. Furthermore, the various mechanisms which impact the CO₂ distribution and trapping in the rock samples will be discussed, and examples from models and experiments will be provided. The new method entails solving an inverse problem to obtain a three-dimensional permeability distribution which, along with the relative permeability and capillary pressure functions, constitutes a model of the flow experiments. The model is more accurate when data from a number of experiments are combined to solve the inverse problem. This model can then be used to test various other injection flow rates and fluid fractions which have not been tested in experiments. The models can also be used to bridge the gap between small-scale capillary heterogeneity effects (sub-core and core scale) and large-scale (reservoir scale) effects, known as the upscaling problem.

Keywords: CO₂ geological storage, residual trapping, capillary heterogeneity, core flooding, CO₂-brine flow

Procedia PDF Downloads 41
25746 Thermodynamic Modeling and Exergoeconomic Analysis of an Isobaric Adiabatic Compressed Air Energy Storage System

Authors: Youssef Mazloum, Haytham Sayah, Maroun Nemer

Abstract:

The penetration of renewable energy sources into the electric grid is significantly increasing. However, the intermittence of these sources breaks the balance between supply and demand for electricity. Hence, the importance of the energy storage technologies, they permit restoring the balance and reducing the drawbacks of intermittence of the renewable energies. This paper discusses the modeling and the cost-effectiveness of an isobaric adiabatic compressed air energy storage (IA-CAES) system. The proposed system is a combination among a compressed air energy storage (CAES) system with pumped hydro storage system and thermal energy storage system. The aim of this combination is to overcome the disadvantages of the conventional CAES system such as the losses due to the storage pressure variation, the loss of the compression heat and the use of fossil fuel sources. A steady state model is developed to perform an energy and exergy analyses of the IA-CAES system and calculate the distribution of the exergy losses in the latter system. A sensitivity analysis is also carried out to estimate the effects of some key parameters on the system’s efficiency, such as the pinch of the heat exchangers, the isentropic efficiency of the rotating machinery and the pressure losses. The conducted sensitivity analysis is a local analysis since the sensibility of each parameter changes with the variation of the other parameters. Therefore, an exergoeconomic study is achieved as well as a cost optimization in order to reduce the electricity cost produced during the production phase. The optimizer used is OmOptim which is a genetic algorithms based optimizer.

Keywords: cost-effectiveness, Exergoeconomic analysis, isobaric adiabatic compressed air energy storage (IA-CAES) system, thermodynamic modeling

Procedia PDF Downloads 218
25745 Useful Effects of Silica Nanoparticles in Ionic Liquid Electrolyte for Energy Storage

Authors: Dong Won Kim, Hye Ji Kim, Hyun Young Jung

Abstract:

Improved energy storage is inevitably needed to improve energy efficiency and to be environmentally friendly to chemical processes. Ionic liquids (ILs) can play a crucial role in addressing these needs due to inherent adjustable properties including low volatility, low flammability, inherent conductivity, wide liquid range, broad electrochemical window, high thermal stability, and recyclability. Here, binary mixtures of ILs were prepared with fumed silica nanoparticles and characterized to obtain ILs with conductivity and electrochemical properties optimized for use in energy storage devices. The solutes were prepared by varying the size and the weight percent concentration of the nanoparticles and made up 10 % of the binary mixture by weight. We report on the physical and electrochemical properties of the individual ILs and their binary mixtures.

Keywords: ionic liquid, silica nanoparticle, energy storage, electrochemical properties

Procedia PDF Downloads 177
25744 The Role of Data Protection Officer in Managing Individual Data: Issues and Challenges

Authors: Nazura Abdul Manap, Siti Nur Farah Atiqah Salleh

Abstract:

For decades, the misuse of personal data has been a critical issue. Malaysia has accepted responsibility by implementing the Malaysian Personal Data Protection Act 2010 to secure personal data (PDPA 2010). After more than a decade, this legislation is set to be revised by the current PDPA 2023 Amendment Bill to align with the world's key personal data protection regulations, such as the European Union General Data Protection Regulations (GDPR). Among the other suggested adjustments is the Data User's appointment of a Data Protection Officer (DPO) to ensure the commercial entity's compliance with the PDPA 2010 criteria. The change is expected to be enacted in parliament fairly soon; nevertheless, based on the experience of the Personal Data Protection Department (PDPD) in implementing the Act, it is projected that there will be a slew of additional concerns associated with the DPO mandate. Consequently, the goal of this article is to highlight the issues that the DPO will encounter and how the Personal Data Protection Department should respond to this subject. The study result was produced using a qualitative technique based on an examination of the current literature. This research reveals that there are probable obstacles experienced by the DPO, and thus, there should be a definite, clear guideline in place to aid DPO in executing their tasks. It is argued that appointing a DPO is a wise measure in ensuring that the legal data security requirements are met.

Keywords: guideline, law, data protection officer, personal data

Procedia PDF Downloads 51
25743 Effect of Defect Dipoles And Microstructure Engineering in Energy Storage Performance of Co-doped Barium Titanate Ceramics

Authors: Mahmoud Saleh Mohammed Alkathy

Abstract:

Electricity generated from renewable resources may help the transition to clean energy. A reliable energy storage system is required to use this energy properly. To do this, a high breakdown strength (Eb) and a significant difference between spontaneous polarization (Pmax) and remnant polarization (Pr) are required. To achieve this, the defect dipoles in lead free BaTiO3 ferroelectric ceramics are created using Mg2+ and Ni2+ ions as acceptor co-doping in the Ti site. According to the structural analyses, the co-dopant ions were effectively incorporated into the BTO unit cell. According to the ferroelectric study, the co-doped samples display a double hysteresis loop, stronger polarization, and high breakdown strength. The formation of oxygen vacancies and defect dipoles prevent domains' movement, resulting in hysteresis loop pinching. This results in increased energy storage density and efficiency. The defect dipoles mechanism effect can be considered a fascinating technology that can guide the researcher working on developing energy storage for next-generation applications.

Keywords: microstructure, defect, energy storage, effciency

Procedia PDF Downloads 57
25742 The Proton Flow Battery for Storing Renewable Energy: Hydrogen Storage Capacity of Selected Activated Carbon Electrodes Made from Brown Coal

Authors: Amandeep Singh Oberoi, John Andrews, Alan L. Chaffee, Lachlan Ciddor

Abstract:

Electrochemical storage of hydrogen in activated carbon electrodes as part of a reversible fuel cell offers a potentially attractive option for storing surplus electrical energy from inherently variable solar and wind energy resources. Such a system – which we have called a proton flow battery – promises to have roundtrip energy efficiency comparable to lithium ion batteries, while having higher gravimetric and volumetric energy densities. Activated carbons with high internal surface area, high pore volume, light weight and easy availability have attracted considerable research interest as a solid-state hydrogen storage medium. This paper compares the physical characteristics and hydrogen storage capacities of four activated carbon electrodes made by different methods from brown coal. The fabrication methods for these samples are explained. Their proton conductivity was measured using electrochemical impedance spectroscopy, and their hydrogen storage capacity by galvanostatic charging and discharging in a three-electrode electrolytic cell with 1 mol sulphuric acid as electrolyte. The highest hydrogen storage capacity obtained was 1.29 wt%, which compares favourably with metal hydrides used in commercially available solid-state hydrogen storages. The hydrogen storage capacity of the samples increased monotonically with increasing BET surface area (calculated from CO2 adsorption method). The results point the way towards selecting high-performing electrodes for proton flow batteries that the competitiveness of this energy storage technology.

Keywords: activated carbon, electrochemical hydrogen storage, proton flow battery, proton conductivity

Procedia PDF Downloads 548
25741 Photocapacitor Integrating Solar Energy Conversion and Energy Storage

Authors: Jihuai Wu, Zeyu Song, Zhang Lan, Liuxue Sun

Abstract:

Solar energy is clean, open, and infinite, but solar radiation on the earth is fluctuating, intermittent, and unstable. So, the sustainable utilization of solar energy requires a combination of high-efficient energy conversion and low-loss energy storage technologies. Hence, a photo capacitor integrated with photo-electrical conversion and electric-chemical storage functions in single device is a cost-effective, volume-effective and functional-effective optimal choice. However, owing to the multiple components, multi-dimensional structure and multiple functions in one device, especially the mismatch of the functional modules, the overall conversion and storage efficiency of the photocapacitors is less than 13%, which seriously limits the development of the integrated system of solar conversion and energy storage. To this end, two typical photocapacitors were studied. A three-terminal photocapacitor was integrated by using perovskite solar cell as solar conversion module and symmetrical supercapacitor as energy storage module. A function portfolio management concept was proposed the relationship among various efficiencies during photovoltaic conversion and energy storage process were clarified. By harmonizing the energy matching between conversion and storage modules and seeking the maximum power points coincide and the maximum efficiency points synchronize, the overall efficiency of the photocapacitor surpassed 18 %, and Joule efficiency was closed to 90%. A voltage adjustable hybrid supercapacitor (VAHSC) was designed as energy storage module, and two Si wafers in series as solar conversion module, a three-terminal photocapacitor was fabricated. The VAHSC effectively harmonizes the energy harvest and storage modules, resulting in the current, voltage, power, and energy match between both modules. The optimal photocapacitor achieved an overall efficiency of 15.49% and Joule efficiency of 86.01%, along with excellent charge/discharge cycle stability. In addition, the Joule efficiency (ηJoule) was defined as the energy ratio of discharge/charge of the devices for the first time.

Keywords: joule efficiency, perovskite solar cell, photocapacitor, silicon solar cell, supercapacitor

Procedia PDF Downloads 50
25740 Application of PSK Modulation in ADS-B 1090 Extended Squitter Authentication

Authors: A-Q. Nguyen. A. Amrhar, J. Zambrano, G. Brown, O.A. Yeste-Ojeda, R. Jr. Landry

Abstract:

Since the presence of Next Generation Air Transportation System (NextGen), Automatic Dependent Surveillance-Broadcast (ADS-B) has raised specific concerns related to the privacy and security, due to its vulnerable, low-level of security and limited payload. In this paper, the authors introduce and analyze the combination of Pulse Amplitude Modulation (PAM) and Phase Shift Keying (PSK) Modulation in conventional ADS-B, forming Secure ADS-B (SADS-B) avionics. In order to demonstrate the potential of this combination, Hardware-in-the-loop (HIL) simulation was used. The tests' results show that, on the one hand, SADS-B can offer five times the payload as its predecessor. This additional payload of SADS-B can be used in various applications, therefore enhancing the ability and efficiency of the current ADS-B. On the other hand, by using the extra phase modulated bits as a digital signature to authenticate ADS-B messages, SADS-B can increase the security of ADS-B, thus ensure a more secure aviation as well. More importantly, SADS-B is compatible with the current ADS-B In and Out. Hence, no significant modifications will be needed to implement this idea. As a result, SADS-B can be considered the most promising approach to enhance the capability and security of ADS-B.

Keywords: ADS-B authentication, ADS-B security, NextGen ADS-B, PSK signature, secure ADS-B

Procedia PDF Downloads 290
25739 Arduino-Based Laser Communication

Authors: Simon Bambey, Edward Lim, Kai Corley-Jory, Pooya Taheri

Abstract:

The main goal of this paper is to propose a simple and low-cost microcontroller-based laser communication link. To demonstrate that laser communication is a viable and efficient means for transmitting data, a transceiver capable of transfer rates of approximately 0.7 kB/s is prototyped. The hardware used for the transceiver consists of Commercial Off-The-Shelf (COTS) lasers, photodiodes, and the Arduino Mega 2560 which is an open-source and easy-to-use microcontroller-based platform intended for making interactive projects. A graphic user interface utilizing the Meteor framework is developed to facilitate the communication between the user and transceiver. The developed transceiver prototype is capable of receiving and transmitting data at significant ranges with no loss of information. Furthermore, stable and secure communication is achieved through several mechanisms developed to manage simultaneous sending and receiving, in addition to detecting physical interruptions during transmission. The design setup is scalable and with further development can be transformed into a fiber-optic transmission system. Due to its nature, laser communication is very secure and can provide a safe and private communication link. Overall, this paper demonstrates how laser communication can be an economical, durable, and effective means of information transfer.

Keywords: Arduino microcontrollers, laser applications, user interfaces, wireless communication

Procedia PDF Downloads 263
25738 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme

Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme

Procedia PDF Downloads 441
25737 The Internet of Things: A Survey of Authentication Mechanisms, and Protocols, for the Shifting Paradigm of Communicating, Entities

Authors: Nazli Hardy

Abstract:

Multidisciplinary application of computer science, interactive database-driven web application, the Internet of Things (IoT) represents a digital ecosystem that has pervasive technological, social, and economic, impact on the human population. It is a long-term technology, and its development is built around the connection of everyday objects, to the Internet. It is estimated that by 2020, with billions of people connected to the Internet, the number of connected devices will exceed 50 billion, and thus IoT represents a paradigm shift in in our current interconnected ecosystem, a communication shift that will unavoidably affect people, businesses, consumers, clients, employees. By nature, in order to provide a cohesive and integrated service, connected devices need to collect, aggregate, store, mine, process personal and personalized data on individuals and corporations in a variety of contexts and environments. A significant factor in this paradigm shift is the necessity for secure and appropriate transmission, processing and storage of the data. Thus, while benefits of the applications appear to be boundless, these same opportunities are bounded by concerns such as trust, privacy, security, loss of control, and related issues. This poster and presentation look at a multi-factor authentication (MFA) mechanisms that need to change from the login-password tuple to an Identity and Access Management (IAM) model, to the more cohesive to Identity Relationship Management (IRM) standard. It also compares and contrasts messaging protocols that are appropriate for the IoT ecosystem.

Keywords: Internet of Things (IoT), authentication, protocols, survey

Procedia PDF Downloads 272
25736 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption

Authors: Waziri Victor Onomza, John K. Alhassan, Idris Ismaila, Noel Dogonyaro Moses

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy, confidentiality, availability of the users. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute theoretical presentations in high-level computational processes that are based on number theory and algebra that can easily be integrated and leveraged in the Cloud computing with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, homomorphic, homomorphic encryption scheme

Procedia PDF Downloads 337
25735 Hybrid Renewable Energy System Development Towards Autonomous Operation: The Deployment Potential in Greece

Authors: Afroditi Zamanidou, Dionysios Giannakopoulos, Konstantinos Manolitsis

Abstract:

A notable amount of electrical energy demand in many countries worldwide is used to cover public energy demand for road, square and other public spaces’ lighting. Renewable energy can contribute in a significant way to the electrical energy demand coverage for public lighting. This paper focuses on the sizing and design of a hybrid energy system (HES) exploiting the solar-wind energy potential to meet the electrical energy needs of lighting roads, squares and other public spaces. Moreover, the proposed HES provides coverage of the electrical energy demand for a Wi-Fi hotspot and a charging hotspot for the end-users. Alongside the sizing of the energy production system of the proposed HES, in order to ensure a reliable supply without interruptions, a storage system is added and sized. Multiple scenarios of energy consumption are assumed and applied in order to optimize the sizing of the energy production system and the energy storage system. A database with meteorological prediction data for 51 areas in Greece is developed in order to assess the possible deployment of the proposed HES. Since there are detailed meteorological prediction data for all 51 areas under investigation, the use of these data is evaluated, comparing them to real meteorological data. The meteorological prediction data are exploited to form three hourly production profiles for each area for every month of the year; minimum, average and maximum energy production. The energy production profiles are combined with the energy consumption scenarios and the sizing results of the energy production system and the energy storage system are extracted and presented for every area. Finally, the economic performance of the proposed HES in terms of Levelized cost of energy is estimated by calculating and assessing construction, operation and maintenance costs.

Keywords: energy production system sizing, Greece’s deployment potential, meteorological prediction data, wind-solar hybrid energy system, levelized cost of energy

Procedia PDF Downloads 124
25734 The Heating Prosumer: Optimal Simultaneous Use of Heat-Pumps and Solar Panels

Authors: Youssef El Makhrout, Aude Pommeret, Tunç Durmaz

Abstract:

This paper analyses the consequences of a heat pump on the optimal behavior of a prosumer. A theoretical microeconomic model is developed for household heating and electricity consumption to analyze the profitability of installing a solar PV system with a heat pump, battery storage, and grid use. The aim is to present the optimal scenario of investment in renewable energy equipment to cover domestic and heating needs. Simulation data of a French house of 170m² in Chambery are used in this paper. The house is divided into 5 zones with 3 heated zones of 89.4 m² occupied by two people. The analysis is based on hourly data for one year, from 00:00 01/01/2021 to 23:00 31/12/2021. Results indicate that without taking the cost of materials and no financial aid, the most profitable scenario for a household is when he owns solar panels, a heat pump, and battery storage. However, with the costs and financial aid of the French government for energy renovation, the net economic surplus change and the profitability during 20 years are important when the household decides to add a heat pump to existing solar panels. In this scenario, the household can realize 35.84% as a surplus change improvement, but this cannot cover all installation costs. The household can get benefits and cover all installation costs after exploiting financial support in the case of adopting a heat pump. The investment in a battery is still not profitable because of its high cost and the lack of financial aid. Some public policy recommendations are proposed, especially for solar panels and battery storage.

Keywords: household’s heating, prosumer, electricity consumption, renewable energy, welfare gain, comfort, solar PV, heat pumps, storage

Procedia PDF Downloads 34
25733 Assessment of Routine Health Information System (RHIS) Quality Assurance Practices in Tarkwa Sub-Municipal Health Directorate, Ghana

Authors: Richard Okyere Boadu, Judith Obiri-Yeboah, Kwame Adu Okyere Boadu, Nathan Kumasenu Mensah, Grace Amoh-Agyei

Abstract:

Routine health information system (RHIS) quality assurance has become an important issue, not only because of its significance in promoting a high standard of patient care but also because of its impact on government budgets for the maintenance of health services. A routine health information system comprises healthcare data collection, compilation, storage, analysis, report generation, and dissemination on a routine basis in various healthcare settings. The data from RHIS give a representation of health status, health services, and health resources. The sources of RHIS data are normally individual health records, records of services delivered, and records of health resources. Using reliable information from routine health information systems is fundamental in the healthcare delivery system. Quality assurance practices are measures that are put in place to ensure the health data that are collected meet required quality standards. Routine health information system quality assurance practices ensure that data that are generated from the system are fit for use. This study considered quality assurance practices in the RHIS processes. Methods: A cross-sectional study was conducted in eight health facilities in Tarkwa Sub-Municipal Health Service in the western region of Ghana. The study involved routine quality assurance practices among the 90 health staff and management selected from facilities in Tarkwa Sub-Municipal who collected or used data routinely from 24th December 2019 to 20th January 2020. Results: Generally, Tarkwa Sub-Municipal health service appears to practice quality assurance during data collection, compilation, storage, analysis and dissemination. The results show some achievement in quality control performance in report dissemination (77.6%), data analysis (68.0%), data compilation (67.4%), report compilation (66.3%), data storage (66.3%) and collection (61.1%). Conclusions: Even though the Tarkwa Sub-Municipal Health Directorate engages in some control measures to ensure data quality, there is a need to strengthen the process to achieve the targeted percentage of performance (90.0%). There was a significant shortfall in quality assurance practices performance, especially during data collection, with respect to the expected performance.

Keywords: quality assurance practices, assessment of routine health information system quality, routine health information system, data quality

Procedia PDF Downloads 41
25732 Enhancement of Seed Longevity in Japonica Rice Cultivars Using Weed Rice

Authors: Jun-Hyeon Cho, Ji-Yoon Lee, Young-Bo Sohn, Dong-Jin Shin, You-Chun Song, Dong-Soo Park, Min-Hee Nam, Young-Up Kwon

Abstract:

Seed germination is a main factor in japonica rice cultivation. For japonica strains unlike indica lines, fast loss of germination ability during storage leads to risk of seeding and deterioration in the quality. To resolve these problems, germplasms screening for longevity was conducted using six days of compulsory aging stress of high temperature (50℃) and humidity (~95% RH). ‘Dharial’, a weedy rice collected in Bangladesh, was chosen as a source of seed longevity for long term storage. The strong germination trait originated from ‘Dharial’ was incorporated into Korean elite japonica cultivars, ‘Ilmi’ and ‘Gopum’, through backcross method. The germination ratio was evaluated after two years of room temperature storage conditions. A high germination ratio of 80.5% in donor plant of ‘Dharial’ and 77.3% in an introgression line were observed based on the two years of storage while the recurrent japonica cultivars, ‘Ilmi’ and ‘Gopum’, were failed in germination. As a result, we investigated the changes of quality affected by germination ability during storage. A gentle slope of palatability which is one of the measurement items for indirect selection indicator of high eating quality in japonica varieties was studied in a high germination ratio introgression line during storage. The introgression line could be useful to increase longevity and quality of japonica rice seed if molecular breeding strategy such as QTLs analysis is combined.

Keywords: rice, longevity, germination, storage

Procedia PDF Downloads 400
25731 Distributed Energy Storage as a Potential Solution to Electrical Network Variance

Authors: V. Rao, A. Bedford

Abstract:

As the efficient performance of national grid becomes increasingly important to maintain the electrical network stability, the balance between the generation and the demand must be effectively maintained. To do this, any losses that occur in the power network must be reduced by compensating for it. In this paper, one of the main cause for the losses in the network is identified as the variance, which hinders the grid’s power carrying capacity. The reason for the variance in the grid is investigated and identified as the rise in the integration of renewable energy sources (RES) such as wind and solar power. The intermittent nature of these RES along with fluctuating demands gives rise to variance in the electrical network. The losses that occur during this process is estimated by analyzing the network’s power profiles. Whilst researchers have identified different ways to tackle this problem, little consideration is given to energy storage. This paper seeks to redress this by considering the role of energy storage systems as potential solutions to reduce variance in the network. The implementation of suitable energy storage systems based on different applications is presented in this paper as part of variance reduction method and thus contribute towards maintaining a stable and efficient grid operation.

Keywords: energy storage, electrical losses, national grid, renewable energy, variance

Procedia PDF Downloads 285
25730 Storage Influence on Physico-Chemical Composition and Antioxidant Activity of Jamun Drink Prepared From Two Types of Pulp

Authors: Muhammad Atif Randhawa, Mahreen Akhtar, Sidrah

Abstract:

In this paper, Jamun (Syzygium cumini; Myrtaceae) drink enriched with jamun pulp and seed was assessed for different physicochemical parameters (titratable acidity, pH, TSS, ascorbic acid, and total sugars and reducing sugars) and phytochemical aspects at every 15 days interval till 60 days storage period. Jamun pulp both with seed and without seed were used at levels of 7, 10 and 13 percent to prepare jamun drink in six combinations; T1 (7% pulp without seed), T2 (10% pulp without seed), T3 (13% pulp without seed), T4 (7% pulp with seed), T5 (10% pulp with seed), T6 (13% pulp with seed). Storage period resulted decrease in pH (4.18 to 4.08) and ascorbic acid (21.92%) significantly along with phenolic contents (6.13 to 4.85g of GAE/kg) and antioxidant activity (70.68 to 48.62 percent) within treatments. All treatments showed significant increases in total sugars (11.59 to 11.80%), reducing sugars (2.30 to 2.50%), TSS (12.2 to 13.32 °B) and acidity (0.23% to 0.31%) during storage. Treatments T3, T5 and T6 showed best results in terms of all physicochemical parameters during storage. Statistically significant differences were obtained among sensory parameters as a function of pulp type and concentration, while treatment T5 (10% pulp with seed) obtained highest score (7.16) in terms of all sensory parameters. It can be concluded that nutrient rich jamun drink can be prepared as an attempt to add value to the underutilized jamun fruit of Pakistan.

Keywords: antioxidant activity, Jamun beverage, physicochemical, storage

Procedia PDF Downloads 277
25729 The Relationship between Knowledge Management Processes and Strategic Thinking at the Organization Level

Authors: Bahman Ghaderi, Hedayat Hosseini, Parviz Kafche

Abstract:

The role of knowledge management processes in achieving the strategic goals of organizations is crucial. To this end, understanding the relationship between knowledge management processes and different aspects of strategic thinking (followed by long-term organizational planning) should be considered. This research examines the relationship between each of the five knowledge management processes (creation, storage, transfer, audit, and deployment) with each dimension of strategic thinking (vision, creativity, thinking, communication and analysis) in one of the major sectors of the food industry in Iran. In this research, knowledge management and its dimensions (knowledge acquisition, knowledge storage, knowledge transfer, knowledge auditing, and finally knowledge utilization) as independent variables and strategic thinking and its dimensions (creativity, systematic thinking, vision, strategic analysis, and strategic communication) are considered as the dependent variable. The statistical population of this study consisted of 245 managers and employees of Minoo Food Industrial Group in Tehran. In this study, a simple random sampling method was used, and data were collected by a questionnaire designed by the research team. Data were analyzed using SPSS 21 software. LISERL software is also used for calculating and drawing models and graphs. Among the factors investigated in the present study, knowledge storage with 0.78 had the most effect, and knowledge transfer with 0.62 had the least effect on knowledge management and thus on strategic thinking.

Keywords: knowledge management, strategic thinking, knowledge management processes, food industry

Procedia PDF Downloads 142
25728 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

Authors: N. Nalini, Bhanu Prakash Gopularam

Abstract:

The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.

Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping

Procedia PDF Downloads 348