Search results for: flat roof security wall
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1804

Search results for: flat roof security wall

1564 Stress Analysis of Water Wall Tubes of a Coal-fired Boiler during Soot Blowing Operation

Authors: Pratch Kittipongpattana, Thongchai Fongsamootr

Abstract:

This research aimed to study the influences of a soot blowing operation and geometrical variables to the stress characteristic of water wall tubes located in soot blowing areas which caused the boilers of Mae Moh power plant to lose their generation hour. The research method is divided into 2 parts (a) measuring the strain on water wall tubes by using 3-element rosette strain gages orientation during a full capacity plant operation and in periods of soot blowing operations (b) creating a finite element model in order to calculate stresses on tubes and validating the model by using experimental data in a steady state plant operation. Then, the geometrical variables in the model were changed to study stresses on the tubes. The results revealed that the stress was not affected by the soot blowing process and the finite element model gave the results 1.24% errors from the experiment. The geometrical variables influenced the stress, with the most optimum tubes design in this research reduced the average stress from the present design 31.28%.

Keywords: Boiler water wall tube, Finite element, Stress analysis, Strain gage rosette.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1835
1563 Gluability of Bambusa balcooa and Bambusa vulgaris for Development of Laminated Panels

Authors: Daisy Biswas, Samar Kanti Bose, M. Mozaffar Hossain

Abstract:

The development of value added composite products from bamboo with the application of gluing technology can play a vital role in economic development and also in forest resource conservation of any country. In this study, the gluability of Bambusa balcooa and Bambusa vulgaris, two locally grown bamboo species of Bangladesh was assessed. As the culm wall thickness of bamboos decreases from bottom to top, a culm portion of up to 5.4 m and 3.6 m were used from the base of B. balcooa and B. vulgaris, respectively, to get rectangular strips of uniform thickness. The color of the B. vulgaris strips was yellowish brown and that of B. balcooa was reddish brown. The strips were treated in borax-boric, bleaching and carbonization for extending the service life of the laminates. The preservative treatments changed the color of the strips. Borax–boric acid treated strips were reddish brown. When bleached with hydrogen peroxide, the color of the strips turned into whitish yellow. Carbonization produced dark brownish strips having coffee flavor. Chemical constituents for untreated and treated strips were determined. B. vulgaris was more acidic than B. balcooa. Then the treated strips were used to develop three-layered bamboo laminated panel. Urea formaldehyde (UF) and polyvinyl acetate (PVA) were used as binder. The shear strength and abrasive resistance of the panel were evaluated. It was found that the shear strength of the UF-panel was higher than the PVA-panel for all treatments. Between the species, gluability of B. vulgaris was better and in some cases better than hardwood species. The abrasive resistance of B. balcooa is slightly higher than B. vulgaris; however, the latter was preferred as it showed well gluability. The panels could be used as structural panel, floor tiles, flat pack furniture component, and wall panel etc. However, further research on durability and creep behavior of the product in service condition is warranted.

Keywords: Bambusa balcooa, Bambusa vulgaris, polyvinyl acetate, urea formaldehyde.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1118
1562 Smart Security Concept in the East Mediterranean: Anti-Asymmetrical Area Denial (A3D)

Authors: Serkan Tezgel, Osman Gül, İskender Cahit Şafak

Abstract:

This paper proposes the application of the Smart Security Concept in the East Mediterranean. Smart Security aims to secure critical infrastructure, such as hydrocarbon platforms, against asymmetrical threats. The concept is based on Anti Asymmetrical Area Denial (A3D) which necessitates limiting freedom of action of maritime terrorists and piracy by founding safe and secure maritime areas through sea lines of communication using short range capabilities.

Keywords: Partnership, A3D, Maritime Security, Centers.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1871
1561 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Designing a reliable RoT and guaranteeing its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V RoT at the hardware level. To effectively safeguard the security of the RoT, researches on security safeguard technology on the RoT have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the RoT’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the RoT’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: Root of Trust, secure boot, memory protection, hardware security.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 42
1560 Experimental Measurements of the Mean Flow Field in Wide-Angled Diffusers: A Data Bank Contribution

Authors: Karanja Kibicho, Anthony Sayers

Abstract:

Due to adverse pressure gradient along the diverging walls of wide-angled diffusers, the attached flow separates from one wall and remains attached permanently to the other wall in a process called stalling. Stalled diffusers render the whole fluid flow system, in which they are part of, very inefficient. There is then an engineering need to try to understand the whole process of diffuser stall if any meaningful attempts to improve on diffuser efficiency are to be made. In this regard, this paper provides a data bank contribution for the mean flow-field in wide-angled diffusers where the complete velocity and static pressure fields, and pressure recovery data for diffusers in the fully stalled flow regime are experimentally measured. The measurements were carried out at Reynolds numbers between 1.07×105 and 2.14×105 based on inlet hydraulic diameter and centreline velocity for diffusers whose divergence angles were between 30Ôùª and 50Ôùª. Variation of Reynolds number did not significantly affect the velocity and static pressure profiles. The wall static pressure recovery was found to be more sensitive to changes in the Reynolds number. By increasing the velocity from 10 m/s to 20 m/s, the wall static pressure recovery increased by 8.31%. However, as the divergence angle was increased, a similar increase in the Reynolds number resulted in a higher percentage increase in pressure recovery. Experimental results showed that regardless of the wall to which the flow was attached, both the velocity and pressure fields were replicated with discrepancies below 2%.

Keywords: Two-dimensional, wide-angled, diffuser, stall, separated flows, subsonic flows, diffuser flow regimes

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1903
1559 The Security Trade-Offs in Resource Constrained Nodes for IoT Application

Authors: Sultan Alharby, Nick Harris, Alex Weddell, Jeff Reeve

Abstract:

The concept of the Internet of Things (IoT) has received much attention over the last five years. It is predicted that the IoT will influence every aspect of our lifestyles in the near future. Wireless Sensor Networks are one of the key enablers of the operation of IoTs, allowing data to be collected from the surrounding environment. However, due to limited resources, nature of deployment and unattended operation, a WSN is vulnerable to various types of attack. Security is paramount for reliable and safe communication between IoT embedded devices, but it does, however, come at a cost to resources. Nodes are usually equipped with small batteries, which makes energy conservation crucial to IoT devices. Nevertheless, security cost in terms of energy consumption has not been studied sufficiently. Previous research has used a security specification of 802.15.4 for IoT applications, but the energy cost of each security level and the impact on quality of services (QoS) parameters remain unknown. This research focuses on the cost of security at the IoT media access control (MAC) layer. It begins by studying the energy consumption of IEEE 802.15.4 security levels, which is followed by an evaluation for the impact of security on data latency and throughput, and then presents the impact of transmission power on security overhead, and finally shows the effects of security on memory footprint. The results show that security overhead in terms of energy consumption with a payload of 24 bytes fluctuates between 31.5% at minimum level over non-secure packets and 60.4% at the top security level of 802.15.4 security specification. Also, it shows that security cost has less impact at longer packet lengths, and more with smaller packet size. In addition, the results depicts a significant impact on data latency and throughput. Overall, maximum authentication length decreases throughput by almost 53%, and encryption and authentication together by almost 62%.

Keywords: Internet of Things, IEEE 802.15.4, security cost evaluation, wireless sensor network, energy consumption.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1483
1558 Study Punching Shear of Steel Fiber Reinforced Self Compacting Concrete Slabs by Nonlinear Analysis

Authors: Khaled S. Ragab

Abstract:

This paper deals with behavior and capacity of punching shear force for flat slabs produced from steel fiber reinforced self compacting concrete (SFRSCC) by application nonlinear finite element method. Nonlinear finite element analysis on nine slab specimens was achieved by using ANSYS software. A general description of the finite element method, theoretical modeling of concrete and reinforcement are presented. The nonlinear finite element analysis program ANSYS is utilized owing to its capabilities to predict either the response of reinforced concrete slabs in the post elastic range or the ultimate strength of a flat slabs produced from steel fiber reinforced self compacting concrete (SFRSCC). In order to verify the analytical model used in this research using test results of the experimental data, the finite element analysis were performed then a parametric study of the effect ratio of flexural reinforcement, ratio of the upper reinforcement, and volume fraction of steel fibers were investigated. A comparison between the experimental results and those predicted by the existing models are presented. Results and conclusions may be useful for designers, have been raised, and represented.

Keywords: Nonlinear FEM, Punching shear behavior, Flat slabs and Steel fiber reinforced self compacting concrete (SFRSCC).

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4250
1557 A Security Module for Car Appliances

Authors: Pang-Chieh Wang, Ting-Wei Hou, Jung-Hsuan Wu, Bo-Chiuan Chen

Abstract:

In this paper we discuss on the security module for the car appliances to prevent stealing and illegal use on other cars. We proposed an open structure including authentication and encryption by embed a security module in each to protect car appliances. Illegal moving and use a car appliance with the security module without permission will lead the appliance to useless. This paper also presents the component identification and deal with relevant procedures. It is at low cost to recover from destroys by the burglar. Expect this paper to offer the new business opportunity to the automotive and technology industry.

Keywords: Automotive, component identification, electronic immobilizer, key management.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1837
1556 A 10 Giga VPN Accelerator Board for Trust Channel Security System

Authors: Ki Hyun Kim, Jang-Hee Yoo, Kyo Il Chung

Abstract:

This paper proposes a VPN Accelerator Board (VPN-AB), a virtual private network (VPN) protocol designed for trust channel security system (TCSS). TCSS supports safety communication channel between security nodes in internet. It furnishes authentication, confidentiality, integrity, and access control to security node to transmit data packets with IPsec protocol. TCSS consists of internet key exchange block, security association block, and IPsec engine block. The internet key exchange block negotiates crypto algorithm and key used in IPsec engine block. Security Association blocks setting-up and manages security association information. IPsec engine block treats IPsec packets and consists of networking functions for communication. The IPsec engine block should be embodied by H/W and in-line mode transaction for high speed IPsec processing. Our VPN-AB is implemented with high speed security processor that supports many cryptographic algorithms and in-line mode. We evaluate a small TCSS communication environment, and measure a performance of VPN-AB in the environment. The experiment results show that VPN-AB gets a performance throughput of maximum 15.645Gbps when we set the IPsec protocol with 3DES-HMAC-MD5 tunnel mode.

Keywords: TCSS(Trust Channel Security System), VPN(VirtualPrivate Network), IPsec, SSL, Security Processor, Securitycommunication.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2092
1555 A Proposal for Systematic Mapping Study of Software Security Testing, Verification and Validation

Authors: Adriano Bessa Albuquerque, Francisco Jose Barreto Nunes

Abstract:

Software vulnerabilities are increasing and not only impact services and processes availability as well as information confidentiality, integrity and privacy, but also cause changes that interfere in the development process. Security test could be a solution to reduce vulnerabilities. However, the variety of test techniques with the lack of real case studies of applying tests focusing on software development life cycle compromise its effective use. This paper offers an overview of how a Systematic Mapping Study (MS) about security verification, validation and test (VVT) was performed, besides presenting general results about this study.

Keywords: Software test, software security verification validation and test, security test institutionalization, systematic mapping study.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1615
1554 Influence of Dynamic Loads in the Structural Integrity of Underground Rooms

Authors: M. Inmaculada Alvarez-Fernández, Celestino González-Nicieza, M. Belén Prendes-Gero, Fernando López-Gayarre

Abstract:

Among many factors affecting the stability of mining excavations, rock-bursts and tremors play a special role. These dynamic loads occur practically always and have different sources of generation. The most important of them is the commonly used mining technique, which disintegrates a certain area of the rock mass not only in the area of the planned mining, but also creates waves that significantly exceed this area affecting the structural elements. In this work it is analysed the consequences of dynamic loads over the structural elements in an underground room and pillar mine to avoid roof instabilities. With this end, dynamic loads were evaluated through in situ and laboratory tests and simulated with numerical modelling. Initially, the geotechnical characterization of all materials was carried out by mean of large-scale tests. Then, drill holes were done on the roof of the mine and were monitored to determine possible discontinuities in it. Three seismic stations and a triaxial accelerometer were employed to measure the vibrations from blasting tests, establish the dynamic behaviour of roof and pillars and develop the transmission laws. At last, computer simulations by FLAC3D software were done to check the effect of vibrations on the stability of the roofs. The study shows that in-situ tests have a greater reliability than laboratory samples because of eliminating the effect of heterogeneities, that the pillars work decreasing the amplitude of the vibration around them, and that the tensile strength of a beam and depending on its span is overcome with waves in phase and delayed. The obtained transmission law allows designing a blasting which guarantees safety and prevents the risk of future failures.

Keywords: Dynamic modelling, long term instability risks, room and pillar, seismic collapse.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 471
1553 The Design of Axisymmetric Ducts for Incompressible Flow with a Parabolic Axial Velocity Inlet Profile

Authors: V.Pavlika

Abstract:

In this paper a numerical algorithm is described for solving the boundary value problem associated with axisymmetric, inviscid, incompressible, rotational (and irrotational) flow in order to obtain duct wall shapes from prescribed wall velocity distributions. The governing equations are formulated in terms of the stream function ψ (x,y)and the function φ (x,y)as independent variables where for irrotational flow φ (x,y)can be recognized as the velocity potential function, for rotational flow φ (x,y)ceases being the velocity potential function but does remain orthogonal to the stream lines. A numerical method based on the finite difference scheme on a uniform mesh is employed. The technique described is capable of tackling the so-called inverse problem where the velocity wall distributions are prescribed from which the duct wall shape is calculated, as well as the direct problem where the velocity distribution on the duct walls are calculated from prescribed duct geometries. The two different cases as outlined in this paper are in fact boundary value problems with Neumann and Dirichlet boundary conditions respectively. Even though both approaches are discussed, only numerical results for the case of the Dirichlet boundary conditions are given. A downstream condition is prescribed such that cylindrical flow, that is flow which is independent of the axial coordinate, exists.

Keywords: Inverse problem, irrotational incompressible flow, Boundary value problem.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1637
1552 The Effect of Shear Wall Positions on the Seismic Response of Frame-Wall Structures

Authors: Anas M. Fares

Abstract:

The configuration of shear walls in plan of building will affect the seismic design of structure. The position of these walls will change the stiffness of each floor in the structure, the diaphragm center of mass displacement, and the drift of floor. Structural engineers preferred to distribute the walls in buildings to make the center of mass almost close enough to the center of rigidity, but to make this condition satisfied, they have many choices: construct the walls on the perimeter, or use intermediate walls, or use walls as core. In this paper and by using ETABS, each case is studied and compared to other cases according to three parameters: lateral stiffness, diaphragm displacement, and drift. It is found that the core walls are the best choice for the position of the walls in the buildings to resist earthquake loads.

Keywords: Lateral loads, lateral displacement, reinforced concrete, shear wall, seismic, ASCE7-16 code, ACI code, stiffness, drift.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1135
1551 Polymorphic Marker Designed from Bioinformatics Sequences Related to Cell Wall Strength for Discrimination of Mangosteen (Garcinia mangostana L.) Clones Resistant to Gamboge Disorder

Authors: E. Mansyah, Sobir, E. Santosa, A. Sisharmini, Sulassih

Abstract:

Gamboge disorder (GD) or fruit damage by the yellow sap is a major problem in mangosteen. Mangosteen plants varied in the level of GD, from very low or non GD to low, moderate and high GD. However it was difficult to differentiate between GD and non GD plants because evaluation of the disorder is strongly influenced by environment. In this study we investigated the usefulness of primer designed from bioinformatics related to cell wall strength, termed as MCWS, to predict GD. Plant materials used were 28 mangosteen plants selected based on percentage of GD categorized as high, moderate, low and very low or non GD. The result showed that the specific DNA fragments were absent in the high GD accessions. The MCWS marker suggests as a novel polymorphic marker for GD in mangosteen as well as a marker for detect variability in mangosteen as apomictic plant.

Keywords: Bioinformatics, cell wall strength, gamboge disorder, mangosteen, polymorphic marker.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2411
1550 Future Outlook and Current Situation for Security of Gas Supply in Eastern Baltic Region

Authors: Ando Leppiman, Kati Kõrbe Kaare, Ott Koppel

Abstract:

Growing demand for gas has rekindled a debate on gas security of supply due to supply interruptions, increasing gas prices, cross-border bottlenecks and a growing reliance on imports over longer distances. Security of supply is defined mostly as an infrastructure package to satisfy N-1 criteria. In case of Estonia, Finland, Latvia and Lithuania all the gas infrastructure is built to supply natural gas only from one single supplier, Russia. In 2012 almost 100% of natural gas to the Eastern Baltic Region was supplied by Gazprom. Under such circumstances infrastructure N-1 criteria does not guarantee security of supply. In the Eastern Baltic Region, the assessment of risk of gas supply disruption has been worked out by applying the method of risk scenarios. There are various risks to be tackled in Eastern Baltic States in terms of improving security of supply, such as single supplier risk, physical infrastructure risk, regulatory gap, fair price and competition. The objective of this paper is to evaluate the energy security of the Eastern Baltic Region within the framework of the European Union’s policies and to make recommendations on how to better guarantee the energy security of the region.

Keywords: Security of supply, supply routes for natural gas, energy balance, diversified supply options, common regulative package.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1896
1549 New Hybrid Method to Correct for Wind Tunnel Wall- and Support Interference On-line

Authors: B. J. C. Horsten, L. L. M. Veldhuis

Abstract:

Because support interference corrections are not properly understood, engineers mostly rely on expensive dummy measurements or CFD calculations. This paper presents a method based on uncorrected wind tunnel measurements and fast calculation techniques (it is a hybrid method) to calculate wall interference, support interference and residual interference (when e.g. a support member closely approaches the wind tunnel walls) for any type of wind tunnel and support configuration. The method provides with a simple formula for the calculation of the interference gradient. This gradient is based on the uncorrected measurements and a successive calculation of the slopes of the interference-free aerodynamic coefficients. For the latter purpose a new vortex-lattice routine is developed that corrects the slopes for viscous effects. A test case of a measurement on a wing proves the value of this hybrid method as trends and orders of magnitudes of the interference are correctly determined.

Keywords: Hybrid method, support interference, wall interference, wind tunnel corrections.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1940
1548 Domain-based Key Management Scheme for Active Network

Authors: Jong-Whoi Shin, Soon-Tai Park, Chong-Sun Hwang

Abstract:

Active network was developed to solve the problem of the current sharing-based network–difficulty in applying new technology, service or standard, and duplicated operation at several protocol layers. Active network can transport the packet loaded with the executable codes, which enables to change the state of the network node. However, if the network node is placed in the sharing-based network, security and safety issues should be resolved. To satisfy this requirement, various security aspects are required such as authentication, authorization, confidentiality and integrity. Among these security components, the core factor is the encryption key. As a result, this study is designed to propose the scheme that manages the encryption key, which is used to provide security of the comprehensive active directory, based on the domain.

Keywords: Active Network, Domain-based Key Management, Security Components.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1666
1547 Behaviour of Masonry Wall Constructed using Interlocking Soil Cement Bricks

Authors: Ahmad Z., Othman S. Z., Md Yunus B., Mohamed A.

Abstract:

According to the masonry standard the compressive strength is basically dependent on factors such as the mortar strength and the relative values of unit and mortar strength. However interlocking brick has none or less use of mortar. Therefore there is a need to investigate the behavior of masonry walls using interlocking bricks. In this study a series of tests have been conducted; physical properties and compressive strength of brick units and masonry walls were constructed from interlocking bricks and tested under constant vertical load at different eccentricities. The purpose of the experimental investigations is to obtain the force displacement curves, analyze the behavior of masonry walls. The results showed that the brick is categorized as common brick (BS 3921:1985) and severe weathering grade (ASTM C62). The maximum compressive stress of interlocking brick wall is 3.6 N/mm2 and fulfilled the requirement of standard for residential building.

Keywords: Interlocking brick, soil-cement brick, masonry wall, compressive strength, eccentricities

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 6188
1546 Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in our Modern Threat Landscape

Authors: Sandesh Achar

Abstract:

Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, including identity and access management, data at rest and in transit, egress and ingress traffic control, vulnerability and threat management, and auditing. This paper explores each of these aspects of cloud security in detail and provides recommendations for best practices for multi-cloud service providers. It also discusses the challenges inherent in securing a multi-cloud environment and offers solutions for overcoming these challenges. By the end of this paper, readers should have a good understanding of the various security concerns associated with multi-cloud environments in the context of today’s modern cyber threats and how to address them.

Keywords: Multi-cloud service, SOC, system organization control, data loss prevention, DLP, identity and access management, IAM.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 684
1545 Photocatalytic Detoxification Method for Zero Effluent Discharge in Dairy Industry: Effect of Operational Parameters

Authors: Janhavi Inamdar, S.K. Singh

Abstract:

Laboratory experiments have been performed to investigate photocatalytic detoxification by using TiO2 photocatalyst for treating dairy effluent. Various operational parameters such as catalyst concentration, initial concentration, angle of tilt of solar flat plate reactor and flow rate were investigated. Results indicated that the photocatalytic detoxification process can efficiently treat dairy effluent. Experimental runs with dairy wastewater can be used to identify the optimum operational parameters to perform wastewater degradation on large scale for recycling purpose. Also effect of two different types of reactors on degradation process was analyzed.

Keywords: Photocatalytic detoxification, TiO2 photocatalyst, solar flat plate reactor, Zero effluent discharge.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1921
1544 A Study on the Secure ebXML Transaction Models

Authors: Dongkyoo Shin, Dongil Shin, Sukil Cha, Seyoung Kim

Abstract:

ebXML (Electronic Business using eXtensible Markup Language) is an e-business standard, sponsored by UN/CEFACT and OASIS, which enables enterprises to exchange business messages, conduct trading relationships, communicate data in common terms and define and register business processes. While there is tremendous e-business value in the ebXML, security remains an unsolved problem and one of the largest barriers to adoption. XML security technologies emerging recently have extensibility and flexibility suitable for security implementation such as encryption, digital signature, access control and authentication. In this paper, we propose ebXML business transaction models that allow trading partners to securely exchange XML based business transactions by employing XML security technologies. We show how each XML security technology meets the ebXML standard by constructing the test software and validating messages between the trading partners.

Keywords: Electronic commerce, e-business standard, ebXML, XML security, secure business transaction.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1739
1543 Implementation of SSL Using Information Security Component Interface

Authors: Jong-Whoi Shin, Chong-Sun Hwang

Abstract:

Various security APIs (Application Programming Interfaces) are being used in a variety of application areas requiring the information security function. However, these standards are not compatible, and the developer must use those APIs selectively depending on the application environment or the programming language. To resolve this problem, we propose the standard draft of the information security component, while SSL (Secure Sockets Layer) using the confidentiality and integrity component interface has been implemented to verify validity of the standard proposal. The implemented SSL uses the lower-level SSL component when establishing the RMI (Remote Method Invocation) communication between components, as if the security algorithm had been implemented by adding one more layer on the TCP/IP.

Keywords: Component Based Design, Application Programming Interface, Secure Socket Layer, Remote Method Invocation.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1502
1542 Web Application Security, Attacks and Mitigation

Authors: Ayush Chugh, Gaurav Gupta

Abstract:

Today’s technology is heavily dependent on web applications. Web applications are being accepted by users at a very rapid pace. These have made our work efficient. These include webmail, online retail sale, online gaming, wikis, departure and arrival of trains and flights and list is very long. These are developed in different languages like PHP, Python, C#, ASP.NET and many more by using scripts such as HTML and JavaScript. Attackers develop tools and techniques to exploit web applications and legitimate websites. This has led to rise of web application security; which can be broadly classified into Declarative Security and Program Security. The most common attacks on the applications are by SQL Injection and XSS which give access to unauthorized users who totally damage or destroy the system. This paper presents a detailed literature description and analysis on Web Application Security, examples of attacks and steps to mitigate the vulnerabilities.

Keywords: Attacks, Injection, JavaScript, SQL, Vulnerability, XSS.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 4962
1541 Numerical Analysis of Air Flow and Conjugated Heat Transfer in Internally Grooved Parallel- Plate Channels

Authors: Hossein Shokouhmand , Koohyar Vahidkhah, Mohammad A. Esmaeili

Abstract:

A numerical investigation of surface heat transfer characteristics of turbulent air flows in different parallel plate grooved channels is performed using CFD code. The results are obtained for Reynolds number ranging from 10,000 to 30,000 and for arc-shaped and rectangular grooved channels. The influence of different geometric parameters of dimples as well as the number of them and the geometric and thermophysical properties of channel walls are studied. It is found that there exists an optimum value for depth of dimples in which the largest wall heat flux can be achieved. Also, the results show a critical value for the ratio of wall thermal conductivity to the one of fluid in which the dependence of wall heat flux to this ratio almost vanishes. In most cases examined, heat transfer enhancement is larger for arc-shaped grooved channels than rectangular ones.

Keywords: dimple, heat transfer enhancement, Numerical, optimum value, turbulent air flow.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1881
1540 Laminar Impinging Jet Heat Transfer for Curved Plates

Authors: A. M. Tahsini, S. Tadayon Mousavi

Abstract:

The purpose of the present study is to analyze the effect of the target plate-s curvature on the heat transfer in laminar confined impinging jet flows. Numerical results from two dimensional compressible finite volume solver are compared between three different shapes of impinging plates: Flat, Concave and Convex plates. The remarkable result of this study proves that the stagnation Nusselt number in laminar range of Reynolds number based on the slot width is maximum in convex surface and is minimum in concave plate. These results refuse the previous data in literature stating the amount of the stagnation Nusselt number is greater in concave surface related to flat plate configuration.

Keywords: Concave, Convex, Heat transfer, Impinging jet, Laminar flow.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2991
1539 The Acceptance of E-Assessment Considering Security Perspective: Work in Progress

Authors: Kavitha Thamadharan, Nurazean Maarop

Abstract:

The implementation of e-assessment as tool to support the process of teaching and learning in university has become a popular technological means in universities. E-Assessment provides many advantages to the users especially the flexibility in teaching and learning. The e-assessment system has the capability to improve its quality of delivering education. However, there still exists a drawback in terms of security which limits the user acceptance of the online learning system. Even though there are studies providing solutions for identified security threats in e-learning usage, there is no particular model which addresses the factors that influences the acceptance of e-assessment system by lecturers from security perspective. The aim of this study is to explore security aspects of eassessment in regard to the acceptance of the technology. As a result a conceptual model of secure acceptance of e-assessment is proposed. Both human and security factors are considered in formulation of this conceptual model. In order to increase understanding of critical issues related to the subject of this study, interpretive approach involving convergent mixed method research method is proposed to be used to execute the research. This study will be useful in providing more insightful understanding regarding the factors that influence the user acceptance of e-assessment system from security perspective.

Keywords: Secure Technology Acceptance, E-Assessment Security, E-Assessment, Education Technology.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2431
1538 Enhancing IoT Security: A Blockchain-Based Approach for Preventing Spoofing Attacks

Authors: Salha Alshamrani, Maha Aljohni, Eman Aldhaheri

Abstract:

With the proliferation of Internet of Things (IoT) devices in various industries, there has been a concurrent rise in security vulnerabilities, particularly spoofing attacks. This study explores the potential of blockchain technology in enhancing the security of IoT systems and mitigating these attacks. Blockchain's decentralized and immutable ledger offers significant promise for improving data integrity, transaction transparency, and tamper-proofing. This research develops and implements a blockchain-based IoT architecture and a reference network to simulate real-world scenarios and evaluate a blockchain-integrated intrusion detection system. Performance measures including time delay, security, and resource utilization are used to assess the system's effectiveness, comparing it to conventional IoT networks without blockchain. The results provide valuable insights into the practicality and efficacy of employing blockchain as a security mechanism, shedding light on the trade-offs between speed and security in blockchain deployment for IoT. The study concludes that despite minor increases in time consumption, the security benefits of incorporating blockchain technology into IoT systems outweigh potential drawbacks, demonstrating a significant potential for blockchain in bolstering IoT security.

Keywords: Internet of Thing, Spoofing, IoT, Access control, Blockchain, Raspberry pi.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 100
1537 Maintaining User-Level Security in Short Message Service

Authors: T. Arudchelvam, W. W. E. N. Fernando

Abstract:

Mobile phone has become as an essential thing in our life. Therefore, security is the most important thing to be considered in mobile communication. Short message service is the cheapest way of communication via the mobile phones. Therefore, security is very important in the short message service as well. This paper presents a method to maintain the security at user level. Different types of encryption methods are used to implement the user level security in mobile phones. Caesar cipher, Rail Fence, Vigenere cipher and RSA are used as encryption methods in this work. Caesar cipher and the Rail Fence methods are enhanced and implemented. The beauty in this work is that the user can select the encryption method and the key. Therefore, by changing the encryption method and the key time to time, the user can ensure the security of messages. By this work, while users can safely send/receive messages, they can save their information from unauthorised and unwanted people in their own mobile phone as well.

Keywords: SMS, user level security, encryption, mobile communication.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1059
1536 Analysis of Threats in Interoperability of Medical Devices

Authors: M. Sandhya, R. M. Madhumitha, Sharmila Sankar

Abstract:

Interoperable medical devices (IMDs) face threats due to the increased attack surface accessible by interoperability and the corresponding infrastructure. Initiating networking and coordination functionalities primarily modify medical systems' security properties. Understanding the threats is a vital first step in ultimately crafting security solutions for such systems. The key to this problem is coming up with some common types of threats or attacks with those of security and privacy, and providing this information as a roadmap. This paper analyses the security issues in interoperability of devices and presents the main types of threats that have to be considered to build a secured system.

Keywords: Interoperability, threats, attacks, medical devices.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1521
1535 Flow and Heat Transfer Mechanism Analysis in Outward Convex Asymmetrical Corrugated Tubes

Authors: Huaizhi Han, Bingxi Li, Yurong He, Rushan Bie, Zhao Wu

Abstract:

The flow and heat transfer mechanism in convex corrugated tubes have been investigated through numerical simulations in this paper. Two kinds of tube types named as symmetric corrugated tube (SCT) and asymmetric corrugated tube (ACT) are modeled and studied numerically based on the RST model. The predictive capability of RST model is examined in the corrugation wall in order to check the reliability of RST model under the corrugation wall condition. We propose a comparison between the RST modelling the corrugation wall with existing direct numerical simulation of Maaß C and Schumann U [14]. The numerical results pressure coefficient at different profiles between RST and DNS are well matched. The influences of large corrugation tough radii to heat transfer and flow characteristic had been considered. Flow and heat transfer comparison between SCT and ACT had been discussed. The numerical results show that ACT exhibits higher overall heat transfer performance than SCT.

Keywords: Asymmetric corrugated tube, RST, DNS, flow and heat transfer mechanism.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1993