Search results for: Security Enhancement
582 A method of Authentication for Quantum Networks
Authors: Stefan Rass
Abstract:
Quantum cryptography offers a way of key agreement, which is unbreakable by any external adversary. Authentication is of crucial importance, as perfect secrecy is worthless if the identity of the addressee cannot be ensured before sending important information. Message authentication has been studied thoroughly, but no approach seems to be able to explicitly counter meet-in-the-middle impersonation attacks. The goal of this paper is the development of an authentication scheme being resistant against active adversaries controlling the communication channel. The scheme is built on top of a key-establishment protocol and is unconditionally secure if built upon quantum cryptographic key exchange. In general, the security is the same as for the key-agreement protocol lying underneath.Keywords: Meet-in-the-middle attack, quantum key distribution, quantum networks, unconditionally secure authentication.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1904581 Students, Knowledge and Employability
Authors: James Moir
Abstract:
Citizens are increasingly are provided with choice and customization in public services and this has now also become a key feature of higher education in terms of policy roll-outs on personal development planning (PDP) and more generally as part of the employability agenda. The goal here is to transform people, in this case graduates, into active, responsible citizen-workers. A key part of this rhetoric and logic is the inculcation of graduate attributes within students. However, there has also been a concern with the issue of student lack of engagement and perseverance with their studies. This paper sets out to explore some of these conceptions that link graduate attributes with citizenship as well as the notion of how identity is forged through the higher education process. Examples are drawn from a quality enhancement project that is being operated within the context of the Scottish higher education system. This is further framed within the wider context of competing and conflicting demands on higher education, exacerbated by the current worldwide economic climate. There are now pressures on students to develop their employability skills as well as their capacity to engage with global issues such as behavioural change in the light of environmental concerns. It is argued that these pressures, in effect, lead to a form of personalization that is concerned with how graduates develop their sense of identity as something that is engineered and re-engineered to meet these demands.Keywords: students, higher education, employability, knowledge, personal development
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1700580 Proposal of Data Collection from Probes
Authors: M. Kebisek, L. Spendla, M. Kopcek, T. Skulavik
Abstract:
In our paper we describe the security capabilities of data collection. Data are collected with probes located in the near and distant surroundings of the company. Considering the numerous obstacles e.g. forests, hills, urban areas, the data collection is realized in several ways. The collection of data uses connection via wireless communication, LAN network, GSM network and in certain areas data are collected by using vehicles. In order to ensure the connection to the server most of the probes have ability to communicate in several ways. Collected data are archived and subsequently used in supervisory applications. To ensure the collection of the required data, it is necessary to propose algorithms that will allow the probes to select suitable communication channel.
Keywords: Communication, computer network, data collection, probe.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1781579 Using Agility in Building Business Process Management Solutions
Authors: Krešimir Fertalj, Mladen Matejaš
Abstract:
In turbulent modern economy, the companies need to properly manage their business processes. Well-defined and stable business processes ensure security of crucial data and applications, and provide a quality product or service to the end customer. On the other side, constant changes on the market, new regulatory provisions, and emerging new technologies require the need of issuing prompt and effective changes of business process. In this article, we explore the use of agile principles in working with business process management (BPM) solutions. We deal with difficulties in BPM development cycle, review the benefits of using agility, and choose the basic agile principles that ensure the success of a BPM project.Keywords: Agile development, BPM environment, Kanban, SCRUM, XP.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1618578 Pushing the Limits of Address Based Authentication: How to Avoid MAC Address Spoofing in Wireless LANs
Authors: Kemal Bicakci, Yusuf Uzunay
Abstract:
It is well-known that in wireless local area networks, authenticating nodes by their MAC addresses is not secure since it is very easy for an attacker to learn one of the authorized addresses and change his MAC address accordingly. In this paper, in order to prevent MAC address spoofing attacks, we propose to use dynamically changing MAC addresses and make each address usable for only one session. The scheme we propose does not require any change in 802.11 protocols and incurs only a small performance overhead. One of the nice features of our new scheme is that no third party can link different communication sessions of the same user by monitoring MAC addresses therefore our scheme is preferable also with respect to user privacy.Keywords: Authentication, MAC address spoofing, security, wireless networks.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2575577 Integrating Competences into Work Planning – The Influence of Competence-Based Parameters on Strategic Business Objectives
Authors: G. Meyer, M. Klewer, P. Nyhuis
Abstract:
Constantly changing economic conditions require companies to design their production to be more economical, innovative, and flexible. Since workers have a decisive influence on cost, time, and quality, e.g. by monitoring indicators that determine quality, by developing processes more resistant to disturbances, or by monitoring environmental standards, a focus on personnel as a production factor is needed. This presupposes the efficient use and systematic enhancement of employees’ existing competences since greater consideration of these aspects in work planning will help to enhance competitiveness. The aim of the research project ‘Integrated Technology- and Competence-based Work Planning in Socio-Technical Systems’ is to develop a new work planning method that combines technology with work science by incorporating employees’ skills as a quality indicator. For employee competences to increase competitiveness, it is first of all necessary to assess how competences affect cost, time, and quality. A model for deriving predictions about the effects of competence-based parameters on these strategic business objectives is developed in this paper.
Keywords: Competence management, education and training, employee competences, one-factor-at-a-time method, work planning.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1541576 Solid Dispersions of Cefixime Using β-Cyclodextrin: Characterization and in vitro Evaluation
Authors: Nagasamy Venkatesh Dhandapani, Amged Awad El-Gied
Abstract:
Cefixime, a BCS class II drug, is insoluble in water but freely soluble in acetone and in alcohol. The aqueous solubility of cefixime in water is poor and exhibits exceptionally slow and intrinsic dissolution rate. In the present study, cefixime and β-Cyclodextrin (β-CD) solid dispersions were prepared with a view to study the effect and influence of β-CD on the solubility and dissolution rate of this poorly aqueous soluble drug. Phase solubility profile revealed that the solubility of cefixime was increased in the presence of β-CD and was classified as AL-type. Effect of variable, such as drug:carrier ratio, was studied. Physical characterization of the solid dispersion was characterized by Fourier transform infrared spectroscopy (FT-IR) and Differential scanning calorimetry (DSC). These studies revealed that a distinct loss of drug crystallinity in the solid molecular dispersions is ostensibly accounting for enhancement of dissolution rate in distilled water. The drug release from the prepared solid dispersion exhibited a first order kinetics. Solid dispersions of cefixime showed a 6.77 times fold increase in dissolution rate over the pure drug.Keywords: Cefixime, β-Cyclodextrin, solid dispersions, kneading method, dissolution, release kinetics.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1610575 Smart Trust Management for Vehicular Networks
Authors: Amel Ltifi, Ahmed Zouinkhi, Med Salim Bouhlel
Abstract:
Spontaneous networks such as VANET are in general deployed in an open and thus easily accessible environment. Therefore, they are vulnerable to attacks. Trust management is one of a set of security solutions dedicated to this type of networks. Moreover, the strong mobility of the nodes (in the case of VANET) makes the establishment of a trust management system complex. In this paper, we present a concept of ‘Active Vehicle’ which means an autonomous vehicle that is able to make decision about trustworthiness of alert messages transmitted about road accidents. The behavior of an “Active Vehicle” is modeled using Petri Nets.
Keywords: Component, active vehicle, cooperation, petri nets, trust management, VANET.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1123574 A Fair Non-transfer Exchange Protocol
Authors: Cheng-Chi Lee, Min-Shiang Hwang, Shu-Yin Hsiao
Abstract:
Network exchange is now widely used. However, it still cannot avoid the problems evolving from network exchange. For example. A buyer may not receive the order even if he/she makes the payment. For another example, the seller possibly get nothing even when the merchandise is sent. Some studies about the fair exchange have proposed protocols for the design of efficiency and exploited the signature property to specify that two parties agree on the exchange. The information about purchased item and price are disclosed in this way. This paper proposes a new fair network payment protocol with off-line trusted third party. The proposed protocol can protect the buyers- purchase message from being traced. In addition, the proposed protocol can meet the proposed requirements. The most significant feature is Non-transfer property we achieved.Keywords: E-commerce, digital signature, fair exchange, security.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1346573 Bond-Slip Response of Reinforcing Bars Embedded in High Performance Fiber Reinforced Cement Composites
Authors: Siong W. Lee, Kang H. Tan, En H. Yang
Abstract:
This paper presents the results of an experimental study undertaken to evaluate the local bond stress-slip response of short embedment of reinforcing bars in normal concrete (NC) and high performance fiber reinforced cement composites (HPFRCC) blocks. Long embedment was investigated as well to gain insights on the distribution of strain, slip, bar stress and bond stress along the bar especially in post-yield range. A total of 12 specimens were tested, by means of pull-out of the reinforcing bars from concrete blocks. It was found that the enhancement of local bond strength can be reached up to 50% and ductility of the bond behavior was improved significantly if HPFRCC is used. Also, under a constant strain at loaded end, HPFRCC has delayed yielding of bars at other location from the loaded end. Hence, the reduction of bond stress was slower for HPFRCC in comparison with NC. Due to the same reason, the total slips at loaded end for HPFRCC was smaller than NC as expected. Test results indicated that HPFRCC has better bond slip behavior which makes it a suitable material to be employed in anchorage zone such as beam-column joints.Keywords: Bond stress, high performance fiber reinforced cement composites, slip, strain.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2280572 Parallel Hybrid Honeypot and IDS Architecture to Detect Network Attacks
Authors: Hafiz Gulfam Ahmad, Chuangdong Li, Zeeshan Ahmad
Abstract:
In this paper, we have proposed a parallel IDS and honeypot based approach to detect and analyze the unknown and known attack taxonomy for improving the IDS performance and protecting the network from intruders. The main theme of our approach is to record and analyze the intruder activities by using both the low and high interaction honeypots. Our architecture aims to achieve the required goals by combing signature based IDS, honeypots and generate the new signatures. The paper describes the basic component, design and implementation of this approach and also demonstrates the effectiveness of this approach to reduce the probability of network attacks.
Keywords: Network security, Intrusion detection, Honeypot, Snort, Nmap.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2527571 Improving the Compaction Properties and Shear Resistance of Sand Reinforced with COVID-19 Waste Mask Fibers
Authors: Samah Said, Muhsin Elie Rahhal
Abstract:
Due to the COVID-19 pandemic, disposable plastic-based face-masks were excessively used worldwide. Therefore, the production and consumption rates of these masks were significantly brought up, which led to severe environmental problems. The main purpose of this research is to test the possibility of reinforcing soil deposits with mask fibers to reuse pandemic-generated waste materials. When testing the compaction properties, the sand was reinforced with a fiber content that increased from 0% to 0.5%, with successive small increments of 0.1%. The optimum content of 0.1% remarkably increased the maximum dry density of the soil and dropped its optimum moisture content. Added to that, it was noticed that 15 mm and rectangular chips were, respectively, the optimum fiber length and shape to maximize the improvement of the sand compaction properties. Regarding the shear strength, fiber contents of 0.1%, 0.25%, and 0.5% were adopted. The direct shear tests have shown that the highest enhancement was observed for the optimum fiber content of 0.25%. Similar to compaction tests, 15 mm and rectangular chips were respectively the optimum fiber length and shape to extremely enhance the shear resistance of the tested sand.
Keywords: COVID-19, mask fibers, compaction properties, soil reinforcement, shear resistance.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 341570 Community Based Tourism and Development in Third World Countries: The Case of the Bamileke Region of Cameroon
Authors: Ngono Mindzeng Terencia
Abstract:
Community based tourism, as a sustainable tourism approach, has been adopted as a tool for development among local communities in third world countries with income generation as the main driver. However, an analysis of community based tourism and development brings to light another driving force which is paramount to development strategies in the difficult conditions of third world countries: this driving force is “place revitalization”. This paper seeks to assess the relevance of “place revitalization” to the enhancement of development within the challenging context of developing countries. The research provides a community based tourism model to development in third world countries through a three step process based on awareness, mentoring and empowerment at the local level. It also tries to examine how effectively this model can address the development problems faced by the local communities of third world countries. The case study for this research is the Bamiléké region of Cameroon, the breeding ground of community based tourism initiatives and a region facing the difficulties of third world countries that are great impediments to community based tourism.Keywords: Awareness, empowerment, local communities, mentoring, place revitalization, third world countries.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1088569 The Enhancement of Training of Military Pilots Using Psychophysiological Methods
Authors: G. Kloudova, M. Stehlik
Abstract:
Optimal human performance is a key goal in the professional setting of military pilots, which is a highly challenging atmosphere. The aviation environment requires substantial cognitive effort and is rich in potential stressors. Therefore, it is important to analyze variables such as mental workload to ensure safe conditions. Pilot mental workload could be measured using several tools, but most of them are very subjective. This paper details research conducted with military pilots using psychophysiological methods such as electroencephalography (EEG) and heart rate (HR) monitoring. The data were measured in a simulator as well as under real flight conditions. All of the pilots were exposed to highly demanding flight tasks and showed big individual response differences. On that basis, the individual pattern for each pilot was created counting different EEG features and heart rate variations. Later on, it was possible to distinguish the most difficult flight tasks for each pilot that should be more extensively trained. For training purposes, an application was developed for the instructors to decide which of the specific tasks to focus on during follow-up training. This complex system can help instructors detect the mentally demanding parts of the flight and enhance the training of military pilots to achieve optimal performance.
Keywords: Cognitive effort, human performance, military pilots, psychophysiological methods.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1179568 Managing of Work Risk in Small and Medium-Size Companies
Authors: Janusz K. Grabara, Bartłomiej Okwiet, Sebastian Kot
Abstract:
The purpose of the article is presentation and analysis of the aspect of job security in small and medium-size enterprises in Poland with reference to other EU countries. We show the theoretical aspects of the risk with reference to managing small and medium enterprises, next risk management in small and medium enterprises in Poland, which were subjected to a detailed analysis. We show in detail the risk associated with the operation of the mentioned above companies, as well as analyses its levels on various stages and for different kinds of conducted activity.Keywords: Job safety, small and medium-size companies, SME, work risk, risk management.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1308567 Optic Disc Detection by Earth Mover's Distance Template Matching
Authors: Fernando C. Monteiro, Vasco Cadavez
Abstract:
This paper presents a method for the detection of OD in the retina which takes advantage of the powerful preprocessing techniques such as the contrast enhancement, Gabor wavelet transform for vessel segmentation, mathematical morphology and Earth Mover-s distance (EMD) as the matching process. The OD detection algorithm is based on matching the expected directional pattern of the retinal blood vessels. Vessel segmentation method produces segmentations by classifying each image pixel as vessel or nonvessel, based on the pixel-s feature vector. Feature vectors are composed of the pixel-s intensity and 2D Gabor wavelet transform responses taken at multiple scales. A simple matched filter is proposed to roughly match the direction of the vessels at the OD vicinity using the EMD. The minimum distance provides an estimate of the OD center coordinates. The method-s performance is evaluated on publicly available DRIVE and STARE databases. On the DRIVE database the OD center was detected correctly in all of the 40 images (100%) and on the STARE database the OD was detected correctly in 76 out of the 81 images, even in rather difficult pathological situations.
Keywords: Diabetic retinopathy, Earth Mover's distance, Gabor wavelets, optic disc detection, retinal images
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2005566 Differential Analysis: Crew Resource Management and Profiles on the Balanced Inventory of Desirable Responding
Authors: Charalambos C. Cleanthous, Ryan Sain, Tabitha Black, Stephen Vera, Suzanne Milton
Abstract:
A concern when administering questionnaires is whether the participant is providing information that is accurate. The results may be invalid because the person is trying to present oneself in an unrealistic positive manner referred to as ‘faking good’, or in an unrealistic negative manner known as ‘faking bad’. The Balanced Inventory of Desirable Responding (BIDR) was used to assess commercial pilots’ responses on the two subscales of the BIDR: impression management (IM) and self-deceptive enhancement (SDE) that result in high or low scores. Thus, the BIDR produces four valid profiles: IM low and SDE low, IM high and SDE low, IM low and SDE high, and IM high and SDE high. The various profiles were used to compare the respondents’ answers to crew resource management (CRM) items developed from the USA Federal Aviation Administration’s (FAA) guidelines for CRM composition and training. Of particular interest were the results on the IM subscale. The comparisons between those scoring high (lying or faking) versus those low on the IM suggest that there were significant differences regarding their views of the various dimensions of CRM. One of the more disconcerting conclusions is that the high IM scores suggest that the pilots were trying to impress rather than honestly answer the questions regarding their CRM training and practice.
Keywords: USA commercial pilots, crew resource management, faking, social desirability.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 933565 Cryptanalysis of Yang-Li-Liao’s Simple Three-Party Key Exchange (S-3PAKE) Protocol
Authors: Hae-Soon Ahn, Eun-Jun Yoon
Abstract:
Three-party password authenticated key exchange (3PAKE) protocols are widely deployed on lots of remote user authentication system due to its simplicity and convenience of maintaining a human-memorable password at client side to achieve secure communication within a hostile network. Recently, an improvement of 3PAKE protocol by processing a built-in data attached to other party for identity authentication to individual data was proposed by some researchers. However, this paper points out that the improved 3PAKE protocol is still vulnerable to undetectable on-line dictionary attack and off-line dictionary attack.
Keywords: Three-party key exchange, 3PAKE, Passwordauthenticated key exchange, Network security, Dictionary attack
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2121564 Smart and Connected Aircraft Cabin: A Balancing Act between Operational Cabin Management, Airline Business and Passenger Expectations
Authors: Ralf God, Lothar Kerschgens, Leonardo Goratti, Steven Lemaire
Abstract:
Ubiquitous connectivity is a reality and a basic need for users on ground. Air travel connectivity in the cabin is also becoming increasingly important for passengers during cabin use. Wireless sensor networks that provide information to cabin management systems are being used by airlines to optimize cabin crew workload. In networked cabin systems, communications and digitally transmitted data must be managed by airlines in every direction. Security and privacy, information processing and knowledge management are the current and future requirements for a smart and connected cabin.
Keywords: Smart and connected cabin management, Internet of Things, power management, airline business.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 435563 Israeli Households Caring for Children and Adults with Intellectual and Developmental Disabilities: An Explorative Study
Authors: Ayelet Gur
Abstract:
Background: In recent years we are witnessing a welcome trend in which more children/persons with disabilities are living at home with their families and within their communities. This trend is related to various policy innovations as the UN Convention on the Rights of People with Disabilities that reflect a shift from the medical-institutional model to a human rights approach. We also witness the emergence of family centered approaches that perceive the family and not just the individual with the disability as a worthy target of policy planning, implementation and evaluation efforts. The current investigation aims to explore economic, psychological and social factors among households of families of children or adults with intellectual disabilities in Israel and to present policy recommendation. Methods: A national sample of 301 households was recruited through the education and employment settings of persons with intellectual disability. The main caregiver of the person with the disability (a parent) was interviewed. Measurements included the income and expense surveys; assets and debts questionnaire; the questionnaire on resources and stress; the social involvement questionnaire and Personal Wellbeing Index. Results: Findings indicate significant gaps in financial circumstances between households of families of children with intellectual disabilities and households of the general Israeli society. Households of families of children with intellectual disabilities report lower income and higher expenditures and loans than the general society. They experience difficulties in saving and coping with unexpected expenses. Caregivers (the parents) experience high stress, low social participation, low financial support from family, friend and non-governmental organizations and decreased well-being. They are highly dependent on social security allowances which constituted 40% of the household's income. Conclusions: Households' dependency on social security allowances may seem contradictory to the encouragement of persons with intellectual disabilities to favor independent living in light of the human rights approach to disability. New policy should aim at reducing caregivers' stress and enhance their social participation and support, with special emphasis on families of lower socio-economic status. Finally, there is a need to continue monitoring the economic and psycho-social needs of households of families of children with intellectual disabilities and other developmental disabilities.
Keywords: Disability policy, family policy, intellectual and developmental disabilities, Israel, households study, parents of children with disabilities.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 762562 Real-time Detection of Space Manipulator Self-collision
Authors: Zhang Xiaodong, Tang Zixin, Liu Xin
Abstract:
In order to avoid self-collision of space manipulators during operation process, a real-time detection method is proposed in this paper. The manipulator is fitted into a cylinder-enveloping surface, and then, a kind of detection algorithm of collision between cylinders is analyzed. The collision model of space manipulator self-links can be detected by using this algorithm in real-time detection during the operation process. To ensure security of the operation, a safety threshold is designed. The simulation and experiment results verify the effectiveness of the proposed algorithm for a 7-DOF space manipulator.Keywords: Space manipulator, Collision detection, Self-collision, the real-time collision detection.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2033561 System Detecting Border Gateway Protocol Anomalies Using Local and Remote Data
Authors: A. Starczewska, A. Nawrat, K. Daniec, J. Homa, K. Hołda
Abstract:
Border Gateway Protocol (BGP) is the main routing protocol that enables routing establishment between all autonomous systems, which are the basic administrative units of the internet. Due to the poor protection of BGP, it is important to use additional BGP security systems. Many solutions to this problem have been proposed over the years, but none of them have been implemented on a global scale. This article describes a system capable of building images of real-time BGP network topology in order to detect BGP anomalies. Our proposal performs a detailed analysis of BGP messages that come into local network cards supplemented by information collected by remote collectors in different localizations.
Keywords: Border Gateway Protocol, BGP, BGP hijacking, cybersecurity, detection.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 90560 Image Clustering Framework for BAVM Segmentation in 3DRA Images: Performance Analysis
Authors: FH. Sarieddeen, R. El Berbari, S. Imad, J. Abdel Baki, M. Hamad, R. Blanc, A. Nakib, Y.Chenoune
Abstract:
Brain ArterioVenous Malformation (BAVM) is an abnormal tangle of brain blood vessels where arteries shunt directly into veins with no intervening capillary bed which causes high pressure and hemorrhage risk. The success of treatment by embolization in interventional neuroradiology is highly dependent on the accuracy of the vessels visualization. In this paper the performance of clustering techniques on vessel segmentation from 3- D rotational angiography (3DRA) images is investigated and a new technique of segmentation is proposed. This method consists in: preprocessing step of image enhancement, then K-Means (KM), Fuzzy C-Means (FCM) and Expectation Maximization (EM) clustering are used to separate vessel pixels from background and artery pixels from vein pixels when possible. A post processing step of removing false-alarm components is applied before constructing a three-dimensional volume of the vessels. The proposed method was tested on six datasets along with a medical assessment of an expert. Obtained results showed encouraging segmentations.
Keywords: Brain arteriovenous malformation (BAVM), 3-D rotational angiography (3DRA), K-Means (KM) clustering, Fuzzy CMeans (FCM) clustering, Expectation Maximization (EM) clustering, volume rendering.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1908559 FPGA Implementation of RSA Encryption Algorithm for E-Passport Application
Authors: Khaled Shehata, Hanady Hussien, Sara Yehia
Abstract:
Securing the data stored on E-passport is a very important issue. RSA encryption algorithm is suitable for such application with low data size. In this paper the design and implementation of 1024 bit-key RSA encryption and decryption module on an FPGA is presented. The module is verified through comparing the result with that obtained from MATLAB tools. The design runs at a frequency of 36.3 MHz on Virtex-5 Xilinx FPGA. The key size is designed to be 1024-bit to achieve high security for the passport information. The whole design is achieved through VHDL design entry which makes it a portable design and can be directed to any hardware platform.
Keywords: RSA, VHDL, FPGA, modular multiplication, modular exponential.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 5415558 Hardware Approach to Solving Password Exposure Problem through Keyboard Sniff
Authors: Kyungroul Lee, Kwangjin Bae, Kangbin Yim
Abstract:
This paper introduces a hardware solution to password exposure problem caused by direct accesses to the keyboard hardware interfaces through which a possible attacker is able to grab user-s password even where existing countermeasures are deployed. Several researches have proposed reasonable software based solutions to the problem for years. However, recently introduced hardware vulnerability problems have neutralized the software approaches and yet proposed any effective software solution to the vulnerability. Hardware approach in this paper is expected as the only solution to the vulnerabilityKeywords: Keyboard sniff, password exposure, hardware vulnerability, privacy problem, insider security.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1577557 FACTS Impact on Grid Stability and Power Markets
Authors: Abdulrahman Alsuhaibani, Martin Macken
Abstract:
FACTS devices have great influence on the grid stability and power markets price. Recently, there is intent to integrate a large scale of renewable energy sources to the power system which in turn pushes the power system to operate closer to the security limits. This paper discusses the power system stability and reliability improvement that could be achieved by using FACTS. There is a comparison between FACTS devices to evaluate their performance for different functions. A case study has also been made about its effect on reducing generation cost and minimizing transmission losses which have good impact on efficient and economic operation of electricity markets.
Keywords: FACTS, grid stability, spot price, Optimal Power Flow.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 371556 Dynamic Admission Control Based on Effective Demand for Next Generation Wireless Networks
Authors: Somenath Mukherjee, Rajdeep Ray, Raj Kumar Samanta, Mofazzal H. Khondekar, Gautam Sanyal
Abstract:
In next generation wireless networks (i.e., 4G and beyond), one of the main objectives is to ensure highest level of customer satisfaction in terms of data transfer speed, decrease in cost and delay, non-rejection and no drop of calls, availability of ‘always-on’ connectivity and services, continuity of connected services, hastle-free roaming in addition to the convenience of use of network services from anywhere and anytime. To take care of these requirements effectively, internet service providers (ISPs) and network planners have to go for major capacity enhancement of network resources and at the same time these resources are to be used effectively and efficiently to reduce cost and to increase revenue. In this work, the effective bandwidth available in a Mobile Switching Center (MSC) of a wireless network providing multi-class multimedia services is analyzed. Bandwidth requirement of the users for a customized Quality of Service (QoS) is estimated. The findings of the QoS estimation are applied for the capacity planning and admission control of the multi-class traffic flows coming into the MSC.
Keywords: Next generation wireless network, mobile switching center, multi-class traffic, quality of service, admission control, effective bandwidth.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 840555 Fluid Flow and Heat Transfer Structures of Oscillating Pipe Flows
Authors: Yan Su, Jane H. Davidson, F. A. Kulacki
Abstract:
The RANS method with Saffman-s turbulence model was employed to solve the time-dependent turbulent Navier-Stokes and energy equations for oscillating pipe flows. The method of partial sums of the Fourier series is used to analyze the harmonic velocity and temperature results. The complete structures of the oscillating pipe flows and the averaged Nusselt numbers on the tube wall are provided by numerical simulation over wide ranges of ReA and ReR. Present numerical code is validated by comparing the laminar flow results to analytic solutions and turbulence flow results to published experimental data at lower and higher Reynolds numbers respectively. The effects of ReA and ReR on the velocity, temperature and Nusselt number distributions have been di scussed. The enhancement of the heat transfer due to oscillating flows has also been presented. By the way of analyzing the overall Nusselt number over wide ranges of the Reynolds number Re and Keulegan- Carpenter number KC, the optimal ratio of the tube diameter over the oscillation amplitude is obtained based on the existence of a nearly constant optimal KC number. The potential application of the present results in sea water cooling has also been discussed.Keywords: Keulegan-Carpenter number, Nusselt number, Oscillating pipe flows, Reynolds number
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2474554 An Investigation of the Effect of the Different Mix Constituents on Concrete Electric Resistivity
Authors: H. M. Ghasemzadeh, Y. Mohammadi, Gh. Nouri, S. E. Nabavi
Abstract:
Steel corrosion in concrete is considered as a main engineering problems for many countries and lots of expenses has been paid for their repair and maintenance annually. This problem may occur in all engineering structures whether in coastal and offshore or other areas. Hence, concrete structures should be able to withstand corrosion factors existing in water or soil. Reinforcing steel corrosion enhancement can be measured by use of concrete electrical resistance; and maintaining high electric resistivity in concrete is necessary for steel corrosion prevention. Lots of studies devoted to different aspects of the subjects worldwide. In this paper, an evaluation of the effects of W/C ratio, cementitious materials, and percent increase in silica fume were investigated on electric resistivity of high strength concrete. To do that, sixteen mix design with one aggregate grading was planned. Five of them had varying amount of W/C ratio and other eleven mixes was prepared with constant W/C ratio but different amount of cementitious materials. Silica fume and super plasticizer were used with different proportions in all specimens. Specimens were tested after moist curing for 28 days. A total of 80 cube specimens (50 mm) were tested for concrete electrical resistance. Results show that concrete electric resistivity can be increased with increasing amount of cementitious materials and silica fume.Keywords: Corrosion, Electric resistivity, Mix design, Silica fume
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1557553 Synthesis and Physicochemical Characterization of Biomimetic Scaffold of Gelatin/Zn-Incorporated 58S Bioactive Glass
Authors: Seyed Mohammad Hosseini, Amirhossein Moghanian
Abstract:
The main purpose of this research was to design a biomimetic system by freeze-drying method for evaluating the effect of adding 5 and 10 mol. % of zinc (Zn) in 58S bioactive glass and gelatin (5ZnBG/G and 10ZnBG/G) in terms of structural and biological changes. The structural analyses of samples were performed by X-Ray Diffraction (XRD), scanning electron microscopy (SEM) and Fourier-transform infrared (FTIR) spectroscopy. Also, 3-(4,5dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide (MTT) and alkaline phosphatase (ALP) activity tests were carried out for investigation of MC3T3-E1 cell behaviors. The SEM results demonstrated the spherical shape of the formed hydroxyapatite (HA) phases and also HA characteristic peaks were detected by XRD spectroscopy after 3 days of immersion in the simulated body fluid (SBF) solution. Meanwhile, FTIR spectra proved that the intensity of P–O peaks for 5ZnBG/G was more than 10ZnBG/G and control samples. Moreover, the results of ALP activity test illustrated that the optimal amount of Zn (5ZnBG/G) caused a considerable enhancement in bone cell growth. Taken together, the scaffold with 5 mol.% Zn was introduced as an optimal sample because of its higher biocompatibility, in vitro bioactivity and growth of MC3T3-E1 cells in comparison with other samples in bone tissue engineering.
Keywords: Scaffold, gelatin, modified bioactive glass, ALP, bone tissue engineering.
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 408