Search results for: secure recovery
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2408

Search results for: secure recovery

2288 An Approach to Secure Mobile Agent Communication in Multi-Agent Systems

Authors: Olumide Simeon Ogunnusi, Shukor Abd Razak, Michael Kolade Adu

Abstract:

Inter-agent communication manager facilitates communication among mobile agents via message passing mechanism. Until now, all Foundation for Intelligent Physical Agents (FIPA) compliant agent systems are capable of exchanging messages following the standard format of sending and receiving messages. Previous works tend to secure messages to be exchanged among a community of collaborative agents commissioned to perform specific tasks using cryptosystems. However, the approach is characterized by computational complexity due to the encryption and decryption processes required at the two ends. The proposed approach to secure agent communication allows only agents that are created by the host agent server to communicate via the agent communication channel provided by the host agent platform. These agents are assumed to be harmless. Therefore, to secure communication of legitimate agents from intrusion by external agents, a 2-phase policy enforcement system was developed. The first phase constrains the external agent to run only on the network server while the second phase confines the activities of the external agent to its execution environment. To implement the proposed policy, a controller agent was charged with the task of screening any external agent entering the local area network and preventing it from migrating to the agent execution host where the legitimate agents are running. On arrival of the external agent at the host network server, an introspector agent was charged to monitor and restrain its activities. This approach secures legitimate agent communication from Man-in-the Middle and Replay attacks.

Keywords: agent communication, introspective agent, isolation of agent, policy enforcement system

Procedia PDF Downloads 274
2287 Gas Sweetening Process Simulation: Investigation on Recovering Waste Hydraulic Energy

Authors: Meisam Moghadasi, Hassan Ali Ozgoli, Foad Farhani

Abstract:

In this research, firstly, a commercial gas sweetening unit with methyl-di-ethanol-amine (MDEA) solution is simulated and comprised in an integrated model in accordance with Aspen HYSYS software. For evaluation purposes, in the second step, the results of the simulation are compared with operating data gathered from South Pars Gas Complex (SPGC). According to the simulation results, the considerable energy potential contributed to the pressure difference between absorber and regenerator columns causes this energy driving force to be applied in power recovery turbine (PRT). In the last step, the amount of waste hydraulic energy is calculated, and its recovery methods are investigated.

Keywords: gas sweetening unit, simulation, MDEA, power recovery turbine, waste-to-energy

Procedia PDF Downloads 143
2286 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 148
2285 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing

Authors: Jaimin Patel

Abstract:

Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.

Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack

Procedia PDF Downloads 252
2284 A Robust Implementation of a Building Resources Access Rights Management System

Authors: Eugen Neagoe, Victor Balanica

Abstract:

A Smart Building Controller (SBC) is a server software that offers secured access to a pool of building specific resources, executes monitoring tasks and performs automatic administration of a building, thus optimizing the exploitation cost and maximizing comfort. This paper brings to discussion the issues that arise with the secure exploitation of the SBC administered resources and proposes a technical solution to implement a robust secure access system based on roles, individual rights and privileges (special rights).

Keywords: smart building controller, software security, access rights, access authorization

Procedia PDF Downloads 414
2283 Economic and Environmental Assessment of Heat Recovery in Beer and Spirit Production

Authors: Isabel Schestak, Jan Spriet, David Styles, Prysor Williams

Abstract:

Breweries and distilleries are well-known for their high water usage. The water consumption in a UK brewery to produce one litre of beer reportedly ranges from 3-9 L and in a distillery from 7-45 L to produce a litre of spirit. This includes product water such as mashing water, but also water for wort and distillate cooling and for cleaning of tanks, casks, and kegs. When cooling towers are used, cooling water can be the dominating water consumption in a brewery or distillery. Interlinked to the high water use is a substantial heating requirement for mashing, wort boiling, or distillation, typically met by fossil fuel combustion such as gasoil. Many water and waste water streams are leaving the processes hot, such as the returning cooling water or the pot ales. Therefore, several options exist to optimise water and energy efficiency of spirit production through heat recovery. Although these options are known in the sector, they are often not applied in practice due to planning efforts or financial obstacles. In this study, different possibilities and design options for heat recovery systems are explored in four breweries/distilleries in the UK and assessed from an economic but also environmental point of view. The eco-efficiency methodology, according to ISO 14045, is applied to combine both assessment criteria to determine the optimum solution for heat recovery application in practice. The economic evaluation is based on the total value added (TVA) while the Life Cycle Assessment (LCA) methodology is applied to account for the environmental impacts through the installations required for heat recovery. The four case study businesses differ in a) production scale with mashing volumes ranging from 2500 to 40,000 L, in b) terms of heating and cooling technology used, and in c) the extent to which heat recovery is/is not applied. This enables the evaluation of different cases for heat recovery based on empirical data. The analysis provides guidelines for practitioners in the brewing and distilling sector in and outside the UK for the realisation of heat recovery measures. Financial and environmental payback times are showcased for heat recovery systems in the four distilleries which are operating at different production scales. The results are expected to encourage the application of heat recovery where environmentally and economically beneficial and ultimately contribute to a reduction of the water and energy footprint in brewing and distilling businesses.

Keywords: brewery, distillery, eco-efficiency, heat recovery from process and waste water, life cycle assessment

Procedia PDF Downloads 96
2282 An Experimental Investigation of Chemical Enhanced Oil Recovery (Ceor) for Fractured Carbonate Reservoirs, Case Study: Kais Formation on Wakamuk Field

Authors: Jackson Andreas Theo Pola, Leksono Mucharam, Hari Oetomo, Budi Susanto, Wisnu Nugraha

Abstract:

About half of the world oil reserves are located in carbonate reservoirs, where 65% of the total carbonate reservoirs are oil wet and 12% intermediate wet [1]. Oil recovery in oil wet or mixed wet carbonate reservoirs can be increased by dissolving surfactant to injected water to change the rock wettability from oil wet to more water wet. The Wakamuk Field operated by PetroChina International (Bermuda) Ltd. and PT. Pertamina EP in Papua, produces from main reservoir of Miocene Kais Limestone. First production commenced on August, 2004 and the peak field production of 1456 BOPD occurred in August, 2010. It was found that is a complex reservoir system and until 2014 cumulative oil production was 2.07 MMBO, less than 9% of OOIP. This performance is indicative of presence of secondary porosity, other than matrix porosity which is of low average porosity 13% and permeability less than 7 mD. Implementing chemical EOR in this case is the best way to increase oil production. However, the selected chemical must be able to lower the interfacial tension (IFT), reduce oil viscosity, and alter the wettability; thus a special chemical treatment named SeMAR has been proposed. Numerous laboratory tests such as phase behavior test, core compatibility test, mixture viscosity, contact angle measurement, IFT, imbibitions test and core flooding were conducted on Wakamuk field samples. Based on the spontaneous imbibitions results for Wakamuk field core, formulation of SeMAR with compositional S12A gave oil recovery 43.94% at 1wt% concentration and maximum percentage of oil recovery 87.3% at 3wt% concentration respectively. In addition, the results for first scenario of core flooding test gave oil recovery 60.32% at 1 wt% concentration S12A and the second scenario gave 96.78% of oil recovery at concentration 3 wt% respectively. The soaking time of chemicals has a significant effect on the recovery and higher chemical concentrations affect larger areas for wettability and therefore, higher oil recovery. The chemical that gives best overall results from laboratory tests study will also be a consideration for Huff and Puff injections trial (pilot project) for increasing oil recovery from Wakamuk Field

Keywords: Wakamuk field, chemical treatment, oil recovery, viscosity

Procedia PDF Downloads 660
2281 Heroic Villains: An Exploration of the Use of Narrative Plotlines and Emerging Identities within Recovery Stories of Former Substance Abusers

Authors: Tria Moore Aimee Walker-Clarke

Abstract:

The purpose of the study was to develop a deeper understanding of how self-identity is negotiated and reconstructed by people in recovery from substance abuse. The approach draws on the notion that self-identity is constructed through stories. Specifically, dominant narratives of substance abuse involve the 'addict identity' in which the meaning of being an addict is constructed though social interaction and informed by broader social meanings of substance misuse, which are considered deviant. The addict is typically understood as out of control, weak and feckless. Users may unconsciously embody this addict identity which makes recovery less likely. Typical approaches to treatment employ the notion that recovery is much more likely when users change the way they think and feel about themselves by assembling a new identity. Recovery, therefore, involves a reconstruction of the self in a new light, which may mean rejecting a part of the self (the addict identity). One limitation is that previous research on this topic has been quantitative which, while useful, tells us little about how this process is best managed. Should one, for example, reject the past addict identity completely and move on to the new identity, or, is it more effective to accept the past identity and use this in the formation of the new non-user identity? The purpose of this research, then, is to explore how addicts in recovery have managed the transition between their past and current selves and whether this may inform therapeutic practice. Using a narrative approach, data were analyzed from five in-depth interviews with former addicts who had been abstinent for at least a year, and who were in some form of volunteering role at substance treatment services in the UK. Although participants' identified with a previous ‘addict identity,’ and made efforts to disassociate themselves from this, they also recognized that acceptance was an important part of reconstructing their new identity. The participants' narratives used familiar plot lines to structure their stories, in which they positioned themselves as the heroes in their own stories, rather than as victim of circumstance. Instead of rejecting their former addict identity, which would mean rejecting a part of the self, participants used their experience in a reconstructive and restorative way. The findings suggest that encouraging people to tell their story and accept their addict identity are important factors in successful recovery.

Keywords: addiction, identity, narrative, recovery, substance abuse

Procedia PDF Downloads 283
2280 Phosphorus Recovery Optimization in Microbial Fuel Cell

Authors: Abdullah Almatouq

Abstract:

Understanding the impact of key operational variables on concurrent energy generation and phosphorus recovery in microbial fuel cell is required to improve the process and reduce the operational cost. In this study, full factorial design (FFD) and central composite designs (CCD) were employed to identify the effect of influent COD concentration and cathode aeration flow rate on energy generation and phosphorus (P) recovery and to optimise MFC power density and P recovery. Results showed that influent chemical oxygen demand (COD) concentration and cathode aeration flow rate had a significant effect on power density, coulombic efficiency, phosphorus precipitation efficiency and phosphorus precipitation rate at the cathode. P precipitation was negatively affected by the generated current during the batch duration. The generated energy was reduced due to struvite being precipitated on the cathode surface, which might obstruct the mass transfer of ions and oxygen. Response surface mathematical model was used to predict the optimum operating conditions that resulted in a maximum power density and phosphorus precipitation efficiency of 184 mW/m² and 84%, and this corresponds to COD= 1700 mg/L and aeration flow rate=210 mL/min. The findings highlight the importance of the operational conditions of energy generation and phosphorus recovery.

Keywords: energy, microbial fuel cell, phosphorus, struvite

Procedia PDF Downloads 130
2279 Polymer Spiral Film Gas-Liquid Heat Exchanger for Waste Heat Recovery in Exhaust Gases

Authors: S. R. Parthiban, C. Elajchet Senni

Abstract:

Spiral heat exchangers are known as excellent heat exchanger because of far compact and high heat transfer efficiency. An innovative spiral heat exchanger based on polymer materials is designed for waste heat recovery process. Such a design based on polymer film technology provides better corrosion and chemical resistance compared to conventional metal heat exchangers. Due to the smooth surface of polymer film fouling is reduced. A new arrangement for flow of hot flue gas and cold fluid is employed for design, flue gas flows in axial path while the cold fluid flows in a spiral path. Heat load recovery achieved with the presented heat exchanger is in the range of 1.5 kW thermic but potential heat recovery about 3.5kW might be achievable. To measure the performance of the spiral tube heat exchanger, its model is suitably designed and fabricated so as to perform experimental tests. The paper gives analysis of spiral tube heat exchanger.

Keywords: spiral heat exchanger, polymer based materials, fouling factor, heat load

Procedia PDF Downloads 348
2278 On the Combination of Patient-Generated Data with Data from a Secure Clinical Network Environment: A Practical Example

Authors: Jeroen S. de Bruin, Karin Schindler, Christian Schuh

Abstract:

With increasingly more mobile health applications appearing due to the popularity of smartphones, the possibility arises that these data can be used to improve the medical diagnostic process, as well as the overall quality of healthcare, while at the same time lowering costs. However, as of yet there have been no reports of a successful combination of patient-generated data from smartphones with data from clinical routine. In this paper, we describe how these two types of data can be combined in a secure way without modification to hospital information systems, and how they can together be used in a medical expert system for automatic nutritional classification and triage.

Keywords: mobile health, data integration, expert systems, disease-related malnutrition

Procedia PDF Downloads 456
2277 Secure Watermarking not at the Cost of Low Robustness

Authors: Jian Cao

Abstract:

This paper describes a novel watermarking technique which we call the random direction embedding (RDE) watermarking. Unlike traditional watermarking techniques, the watermark energy after the RDE embedding does not focus on a fixed direction, leading to the security against the traditional unauthorized watermark removal attack. In addition, the experimental results show that when compared with the existing secure watermarking, namely natural watermarking (NW), the RDE watermarking gains significant improvement in terms of robustness. In fact, the security of the RDE watermarking is not at the cost of low robustness, and it can even achieve more robust than the traditional spread spectrum watermarking, which has been shown to be very insecure.

Keywords: robustness, spread spectrum watermarking, watermarking security, random direction embedding (RDE)

Procedia PDF Downloads 357
2276 Numerical Modelling of Immiscible Fluids Flow in Oil Reservoir Rocks during Enhanced Oil Recovery Processes

Authors: Zahreddine Hafsi, Manoranjan Mishra , Sami Elaoud

Abstract:

Ensuring the maximum recovery rate of oil from reservoir rocks is a challenging task that requires preliminary numerical analysis of different techniques used to enhance the recovery process. After conventional oil recovery processes and in order to retrieve oil left behind after the primary recovery phase, water flooding in one of several techniques used for enhanced oil recovery (EOR). In this research work, EOR via water flooding is numerically modeled, and hydrodynamic instabilities resulted from immiscible oil-water flow in reservoir rocks are investigated. An oil reservoir is a porous medium consisted of many fractures of tiny dimensions. For modeling purposes, the oil reservoir is considered as a collection of capillary tubes which provides useful insights into how fluids behave in the reservoir pore spaces. Equations governing oil-water flow in oil reservoir rocks are developed and numerically solved following a finite element scheme. Numerical results are obtained using Comsol Multiphysics software. The two phase Darcy module of COMSOL Multiphysics allows modelling the imbibition process by the injection of water (as wetting phase) into an oil reservoir. Van Genuchten, Brooks Corey and Levrett models were considered as retention models and obtained flow configurations are compared, and the governing parameters are discussed. For the considered retention models it was found that onset of instabilities viz. fingering phenomenon is highly dependent on the capillary pressure as well as the boundary conditions, i.e., the inlet pressure and the injection velocity.

Keywords: capillary pressure, EOR process, immiscible flow, numerical modelling

Procedia PDF Downloads 106
2275 Application of a Modified Crank-Nicolson Method in Metallurgy

Authors: Kobamelo Mashaba

Abstract:

The molten slag has a high substantial temperatures range between 1723-1923, carrying a huge amount of useful energy for reducing energy consumption and CO₂ emissions under the heat recovery process. Therefore in this study, we investigated the performance of the modified crank Nicolson method for a delayed partial differential equation on the heat recovery of molten slag in the metallurgical mining environment. It was proved that the proposed method converges quickly compared to the classic method with the existence of a unique solution. It was inferred from numerical result that the proposed methodology is more viable and profitable for the mining industry.

Keywords: delayed partial differential equation, modified Crank-Nicolson Method, molten slag, heat recovery, parabolic equation

Procedia PDF Downloads 80
2274 Energy Conversion from Waste Paper Industry Using Fluidized Bed Combustion

Authors: M. Dyah Ayu Yuli, S. Faisal Dhio, P. Johandi, P. Muhammad Sofyan

Abstract:

Pulp and paper mills generate various quantities of energy-rich biomass as wastes, depending on technological level, pulp and paper grades and wood quality. These wastes are produced in all stages of the process: wood preparation, pulp and paper manufacture, chemical recovery, recycled paper processing, waste water treatment. Energy recovery from wastes of different origin has become a generally accepted alternative to their disposal. Pulp and paper industry expresses an interest in adapting and integrating advanced biomass energy conversion technologies into its mill operations using Fluidized Bed Combustion. Industrial adoption of these new technologies has the potential for higher efficiency, lower capital cost, and safer operation than conventional operations that burn fossil fuels for energy. Incineration with energy recovery has the advantage of hygienic disposal, volume reduction, and the recovery of thermal energy by means of steam or super heated water that can be used for heating and power generation.

Keywords: biomass, fluidized bed combustion, pulp and paper mills, waste

Procedia PDF Downloads 445
2273 Influence of Security Attributes in Component-Based Software Development

Authors: Somayeh Zeinali

Abstract:

A component is generally defined as a piece of executable software with a published interface. Component-based software engineering (CBSE) has become recognized as a new sub-discipline of software engineering. In the component-based software development, components cannot be completely secure and thus easily become vulnerable. Some researchers have investigated this issue and proposed approaches to detect component intrusions or protect distributed components. Software security also refers to the process of creating software that is considered secure.The terms “dependability”, “trustworthiness”, and “survivability” are used interchangeably to describe the properties of software security.

Keywords: component-based software development, component-based software engineering , software security attributes, dependability, component

Procedia PDF Downloads 521
2272 Efficient Signcryption Scheme with Provable Security for Smart Card

Authors: Jayaprakash Kar, Daniyal M. Alghazzawi

Abstract:

The article proposes a novel construction of signcryption scheme with provable security which is most suited to implement on smart card. It is secure in random oracle model and the security relies on Decisional Bilinear Diffie-Hellmann Problem. The proposed scheme is secure against adaptive chosen ciphertext attack (indistiguishbility) and adaptive chosen message attack (unforgebility). Also, it is inspired by zero-knowledge proof. The two most important security goals for smart card are Confidentiality and authenticity. These functions are performed in one logical step in low computational cost.

Keywords: random oracle, provable security, unforgebility, smart card

Procedia PDF Downloads 568
2271 Analyzing the Potential of Job Creation by Taking the First Step Towards Circular Economy: Case Study of Brazil

Authors: R. Conde

Abstract:

The Brazilian economic projections and social indicators show a future of crisis for the country. Solutions to avoid this crisis scenario are necessary. Several developed countries implement initiatives linked to sustainability, mainly related to the circular economy, to solve their crises quickly - green recovery. This article aims to assess social gains if Brazil followed the same recovery strategy. Furthermore, with the use of data presented and recognized in the international academic society, the number of jobs that can be created, if Brazil took the first steps towards a more circular economy, was found. Moreover, in addition to the gross value in the number of jobs created, this article also detailed the number of these jobs by type of activity (collection, processing, and manufacturing) and by type of material.

Keywords: circular economy, green recovery, job creation, social gains

Procedia PDF Downloads 123
2270 Prediction of Oil Recovery Factor Using Artificial Neural Network

Authors: O. P. Oladipo, O. A. Falode

Abstract:

The determination of Recovery Factor is of great importance to the reservoir engineer since it relates reserves to the initial oil in place. Reserves are the producible portion of reservoirs and give an indication of the profitability of a field Development. The core objective of this project is to develop an artificial neural network model using selected reservoir data to predict Recovery Factors (RF) of hydrocarbon reservoirs and compare the model with a couple of the existing correlations. The type of Artificial Neural Network model developed was the Single Layer Feed Forward Network. MATLAB was used as the network simulator and the network was trained using the supervised learning method, Afterwards, the network was tested with input data never seen by the network. The results of the predicted values of the recovery factors of the Artificial Neural Network Model, API Correlation for water drive reservoirs (Sands and Sandstones) and Guthrie and Greenberger Correlation Equation were obtained and compared. It was noted that the coefficient of correlation of the Artificial Neural Network Model was higher than the coefficient of correlations of the other two correlation equations, thus making it a more accurate prediction tool. The Artificial Neural Network, because of its accurate prediction ability is helpful in the correct prediction of hydrocarbon reservoir factors. Artificial Neural Network could be applied in the prediction of other Petroleum Engineering parameters because it is able to recognise complex patterns of data set and establish a relationship between them.

Keywords: recovery factor, reservoir, reserves, artificial neural network, hydrocarbon, MATLAB, API, Guthrie, Greenberger

Procedia PDF Downloads 408
2269 Recovery of Damages by General Cargo Interest under Bill of Lading Carriage Contract

Authors: Eunice Chiamaka Allen-Ngbale

Abstract:

Cargo claims are brought by cargo interests against carriers when the goods are not delivered or delivered short or mis-delivered or delivered damaged. The objective of the cargo claimant is to seek recovery for the loss suffered through the award of damages against the carrier by a court of competent jurisdiction. Moreover, whether the vessel on which the goods were carried is or is not under charter, the bill of lading plays a central role in the cargo claim. Since the bill of lading is an important international transport document, this paper examines, by chronicling the progress of a cargo claim as governed by the English law of contract. It finds that other than by contract, there are other modes of recovery available to a consignee or endorsee of a bill of lading to obtain a remedy under the sui generis contract of carriage contained in or evidenced by a bill of lading.

Keywords: bill of lading, cargo interests, carriage contract, transfer of right of suit

Procedia PDF Downloads 117
2268 Practical Experiences in the Development of a Lab-Scale Process for the Production and Recovery of Fucoxanthin

Authors: Alma Gómez-Loredo, José González-Valdez, Jorge Benavides, Marco Rito-Palomares

Abstract:

Fucoxanthin is a carotenoid that exerts multiple beneficial effects on human health, including antioxidant, anti-cancer, antidiabetic and anti-obesity activity; making the development of a whole process for its production and recovery an important contribution. In this work, the lab-scale production and purification of fucoxanthin in Isocrhysis galbana have been studied. In batch cultures, low light intensities (13.5 μmol/m2s) and bubble agitation were the best conditions for production of the carotenoid with product yields of up to 0.143 mg/g. After fucoxanthin ethanolic extraction from biomass and hexane partition, further recovery and purification of the carotenoid has been accomplished by means of alcohol – salt Aqueous Two-Phase System (ATPS) extraction followed by an ultrafiltration (UF) step. An ATPS comprised of ethanol and potassium phosphate (Volume Ratio (VR) =3; Tie-line Length (TLL) 60% w/w) presented a fucoxanthin recovery yield of 76.24 ± 1.60% among the studied systems and was able to remove 64.89 ± 2.64% of the carotenoid and chlorophyll pollutants. For UF, the addition of ethanol to the original recovered ethanolic ATPS stream to a final relation of 74.15% (w/w) resulted in a reduction of approximately 16% of the protein contents, increasing product purity with a recovery yield of about 63% of the compound in the permeate stream. Considering the production, extraction and primary recovery (ATPS and UF) steps, around a 45% global fucoxanthin recovery should be expected. Although other purification technologies, such as Centrifugal Partition Chromatography are able to obtain fucoxanthin recoveries of up to 83%, the process developed in the present work does not require large volumes of solvents or expensive equipment. Moreover, it has a potential for scale up to commercial scale and represents a cost-effective strategy when compared to traditional separation techniques like chromatography.

Keywords: aqueous two-phase systems, fucoxanthin, Isochrysis galbana, microalgae, ultrafiltration

Procedia PDF Downloads 391
2267 A Case Study at Lara's Landfill: Solid Waste Management and Energy Recovery

Authors: Kelly Danielly Da Silva Alcantara, Daniel Fernando Molina Junqueira, Graziella Colato Antonio

Abstract:

The Law No. 12,305/10, established by the National Solid Waste Policy (PNRS), provides major changes in the management and managing scenario of solid waste in Brazil. The PNRS established since changes from population behavior as environmental and the consciousness and commitment of the companies with the waste produced. The objective of this project is to conduct a benchmarking study of the management models of Waste Management Municipal Solid (MSW) in national and international levels emphasizing especially in the European Union (Portugal, France and Germany), which are reference countries in energy development, sustainability and consequently recovery of waste generated. The management that encompasses all stages that are included in this sector will be analyzed by benchmarking, as the collection, transportation, processing/treatment and final disposal of waste. Considering the needs to produce clean energy in Brazil, this study will allow the determination to the best treatment of the waste in order to reduce the amount of waste and increase the lifetime of the landfill. Finally, it intends to identify the energy recovery potential through a study analysis of economic viability, energy and sustainable based on a holistic approach.

Keywords: benchmarking, energy recovery, landfill, municipal solid waste

Procedia PDF Downloads 383
2266 A Study of Issues and Mitigations on Distributed Denial of Service and Medical Internet of Things Devices

Authors: Robin Singh, Jing-Chiou Liou

Abstract:

The Internet of Things (IoT) devices are being used heavily as part of our everyday routines. Through improved communication and automated procedures, its popularity has assisted users in raising the quality of work. These devices are used in healthcare in order to better collect the patient’s data for their treatment. They are generally considered safe and secure. However, there is some possibility that some loopholes do exist which manufacturers do need to identify before some hacker takes advantage of them. For this study, we focused on two medical IoT devices which are pacemakers and hearing aids. The aim of this paper is to identify if there is any likelihood of these medical devices being hijacked and used as a botnet in Distributed Denial-Of Service attacks. Moreover, some mitigation strategies are being proposed to better secure

Keywords: cybersecurity, DDoS, IoT, medical devices

Procedia PDF Downloads 56
2265 Pre-Exsisting Attitude, Service Failure, and Recovery: Effect, Attributes, and Process in an Islamic Country

Authors: Niloofar Mobasem, Kambiz Heidarzadeh Hanzaee

Abstract:

Purpose: The study aimed to measure the customer satisfaction with service recovery through the conflict management framework, especially assessing the role of pre-existing attitudes for measuring the customer response to the service failure. Design/ methodology/ approach: The study is based on the experimental research method. The factorial designs are used in the research that measures the variables in two separate studies. In the first study, the factorial design is 3 conflict management style: cooperative, competitive, avoiding; - 3 service performance: exceed expectation, meet expectation, fail to meet expectation; and in the second study includes: - 3 conflict management style: cooperative, competitive, avoiding; - 2 service performance: exceed expectation, fail to meet expectation; - 2 pre-existing attitude: positive, negative. Finding: The results of study based on a scenario indicate that the conflict management style affected on customer satisfaction by service recovery efforts as well as the pre-existing attitudes affected the customer interpretation for service providers (conflict management style) and those who have positive pre-existing attitudes are interested to response to the cooperative approach in dealing with service failure. Research limitation/ implication: According to all researches, the study has several limitations. The nature of scenario in this study may cause to hit the reality of life. Although, the similar scenario approaches commonly are used for such researches, but the approaches are not without criticism. Practical implications: Given the importance of service recovery, companies can understand the importance of creating customer satisfaction achieved by the positive results due to the service recovery during the shortness or service failure by the mentioned companies. Originality/ value: The study highlights the importance of service failure and providing the education in relation to the service recovery.

Keywords: service recovery, pre-existing attitude, service failure, customer satisfaction

Procedia PDF Downloads 517
2264 Estimation of Eucalyptus Wood Calorific Potential for Energy Recovering

Authors: N. Ouslimani, N. Hakimi, H. Aksas

Abstract:

The reduction of oil reserves in the world makes that many countries are directed towards the study and the use of local and renewable energies. For this purpose, wood energy represents the material of choice. The energy production is primarily thermal and corresponds to a heating of comfort, auxiliary or principal. Wood is generally conditioned in the form of logs, of pellets, even of plates. In Algeria, this way of energy saving could contribute to the safeguarding of the environment, as to the recovery of under wood products (branches, barks and various wastes on the various transformation steps). This work is placed within the framework general of the search for new sources of energy starting from the recovery of the lignocellulosic matter. In this direction, we proposed various sources of products (biomass, under product and by-products) relating to the ‘Eucalyptus species’ being able to be developed, of which we carried out a preliminary physicochemical study, necessary to the development of the densified products with high calorific value.

Keywords: biomass, calorific value, combustion, energy recovery

Procedia PDF Downloads 253
2263 Efficient Control of Some Dynamic States of Wheeled Robots

Authors: Boguslaw Schreyer

Abstract:

In some types of wheeled robots it is important to secure starting acceleration and deceleration maxima while at the same time maintaining transversal stability. In this paper torque distribution between the front and rear wheels as well as the timing of torque application have been calculated. Both secure an optimum traction coefficient. This paper also identifies required input signals to a control unit, which controls the torque values and timing. Using a three dimensional, two mass model of a robot developed by the author a computer simulation was performed confirming the calculations presented in this paper. These calculations were also implemented and confirmed during military robot testing.

Keywords: robot dynamics, torque distribution, traction coefficient, wheeled robots

Procedia PDF Downloads 293
2262 Recovery of Polymers from Electronic Waste - An Analysis

Authors: Anis A. Ansari, Syed Javed Arif

Abstract:

From the last two-three decades, all countries are continuously generating huge quantities of electronic waste in the form of obsolete computers, gadgets and other discarded electronic instruments mainly due to evolution of newer technologies as a result of constant efforts in research and development in this area. This is the primary reason why waste from the electronic industry is increasing exponentially day by day. Thermoset and thermoplastic polymers, which are the major constituents in every electronic waste, may create a new business opportunity if these are recovered and recycled properly. This may reduce our directly dependency on petroleum and petro-products for polymer materials and also create a potential market for recycled polymers to improve economy. The main theme of this paper is to evolve the potential of recovery and recycling of polymers from the waste being generated globally in the form of discarded electronic products.

Keywords: polymer recovery, electronic waste, petroleum, thermoplastics

Procedia PDF Downloads 470
2261 Athlete Coping: Personality Dimensions of Recovery from Injury

Authors: Randall E. Osborne, Seth A. Doty

Abstract:

As participation in organized sports increases, so does the risk of sustaining an athletic injury. These unfortunate injuries result in missed time from practice and, inevitably, the field of competition. Recovery time plays a pivotal role in the overall rehabilitation of the athlete. With time and rehabilitation, an athlete’s physical injury can be properly treated. However, there seem to be few measures assessing psychological recovery from injury. Although an athlete has been cleared to return to play, there may still be lingering doubt about their injury. Overall, there is a vast difference between being physically cleared to play and being psychologically ready to return to play. Certain personality traits might serve as predictors of an individual’s rate of psychological recovery from an injury. The purpose of this research study is to explore the correlations between athletes’ personality and their recovery from an athletic injury, specifically, examining how locus of control has been utilized through other studies and can be beneficial to the current study. Additionally, this section will examine the link between hardiness and coping strategies. In the current study, mental toughness is being tested, but it is important to determine the link between these two concepts. Hardiness and coping strategies are closely related and can play a major role in an athlete’s mental toughness. It is important to examine competitive trait anxiety to illustrate perceived anxiety during athletic competition. The Big 5 and Social Support will also be examined in conjunction with recovery from athletic injury. Athletic injury is a devastating and common occurrence that can happen in any sport. Injured athletes often require resources and treatment to be able to return to the field of play. Athletes become more involved with physical and mental treatment as the length of recovery time increases. It is very reasonable to assume that personality traits would be predictive of athlete recovery from injury. The current study investigated the potential relationship between personality traits and recovery time; more specifically, the personality traits of locus of control, hardiness, social support, competitive trait anxiety, and the “Big 5” personality traits. Results indicated that athletes with a higher internal locus of control tend to report being physically ready to return to play and “ready” to return to play faster than those with an external locus of control. Additionally, Openness to Experience (among the Big 5 personality dimensions) was also related to the speed of return to play.

Keywords: athlete, injury, personality, readiness to play, recovery

Procedia PDF Downloads 103
2260 Technical and Economic Analysis Effects of Various Parameters on the Performance of Heat Recovery System on Gas Complex Turbo Generators

Authors: Hefzollah Mohammadian, Mohammad Bagher Heidari

Abstract:

This paper deals with the technical and economic effects of various parameters on the performance of heat recovery system on gas complex turbo generator. Given the importance of this issue, that is the main goal of economic efficiency and reduces costs; this project has been implemented similar plans in which the target is the implementation of specific patterns. The project will also help us in the process of gas refineries and the actual efficiency of the process after adding a system to analyze the turbine and predict potential problems and fix them and take appropriate measures according to the results of simulation analysis and results of the process gain. The results of modeling and the effect of different parameters on this line, have been done using Thermo Flow.

Keywords: turbo compressor, turbo generator, heat recovery boiler, gas turbines

Procedia PDF Downloads 275
2259 New Practical and Non-Malleable Elgamal Encryption for E-Voting Protoco

Authors: Karima Djebaili, Lamine Melkemi

Abstract:

Elgamal encryption is a fundamental public-key encryption in cryptography, which is based on the difficulty of discrete logarithm problem and the Diffie-Hellman problem. Supposing the Diffie–Hellman problem is computationally infeasible then Elgamal is secure under a chosen plaintext attack, where security indicates it is difficult for the attacker, given the ciphertext, to restore the whole of the plaintext. However, although it is secure against chosen plaintext attack, Elgamal is absolutely malleable i.e. is not secure against an adaptive chosen ciphertext attack, where the attacker can recover the plaintext. We present a extension on Elgamal encryption which result in non-malleability against adaptive chosen plaintext attack using concatenation and a cryptographic hash function, our evidence utilizes the device of plaintext aware. The algorithm proposed can be used in cryptography voting protocol given its level security. Our protocol protects the confidentiality of voters because each voter encrypts their choice before casting their vote, offers public verifiability using a signing algorithm, the final result is correctly computed using homomorphic property, and works even in the presence of an adversary due to the propriety of non-malleability. Moreover, the protocol prevents some parties colluding to fix the vote results.

Keywords: Elgamal encryption, non-malleability, plaintext aware, e-voting

Procedia PDF Downloads 423