Search results for: authorized
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 101

Search results for: authorized

101 Role of Authorized Agencies to Combat Financial Crime in Bangladesh

Authors: Khan Sarfaraz, Mohammad Ali Mia

Abstract:

Money laundering and other financial crime have become a global threat in recent years, impacting both developed and poor countries. In developing countries like Bangladesh, it is more difficult to combat financial crime than in developing countries because of the inadequate regulatory environment and vulnerable financial system. Bangladesh's central bank issues guidelines to facilitate the implementation of the prevention of the money laundering act. According to the guideline of Bangladesh Bank, all financial institution has to develop anti-money laundering policy to ensure the safety and soundness of their institutions. The paper aims to focus on the role of authorized agencies in combating financial crime. In this paper, the latest trends in financial crimes have been discussed from global and Asian perspectives. The preventive measures for money laundering and other financial crimes have been discussed elaborately. So far, financial crime is a sophisticated and dynamic crime, and criminals continuously took innovative processes to use the financial system to launder money. The study will take a step in pointing out new techniques, effects and challenges of financial crime in Bangladesh.

Keywords: financial crime, illegal money transfer, online gambling, money laundering, authorized agencies

Procedia PDF Downloads 77
100 A Smart Visitors’ Notification System with Automatic Secure Door Lock Using Mobile Communication Technology

Authors: Rabail Shafique Satti, Sidra Ejaz, Madiha Arshad, Marwa Khalid, Sadia Majeed

Abstract:

The paper presents the development of an automated security system to automate the entry of visitors, providing more flexibility of managing their record and securing homes or workplaces. Face recognition is part of this system to authenticate the visitors. A cost effective and SMS based door security module has been developed and integrated with the GSM network and made part of this system to allow communication between system and owner. This system functions in real time as when the visitor’s arrived it will detect and recognizes his face and on the result of face recognition process it will open the door for authorized visitors or notifies and allows the owner’s to take further action in case of unauthorized visitor. The proposed system is developed and it is successfully ensuring security, managing records and operating gate without physical interaction of owner.

Keywords: SMS, e-mail, GSM modem, authenticate, face recognition, authorized

Procedia PDF Downloads 789
99 A Second Look at Gesture-Based Passwords: Usability and Vulnerability to Shoulder-Surfing Attacks

Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier

Abstract:

For security purposes, it is important to detect passwords entered by unauthorized users. With traditional alphanumeric passwords, if the content of a password is acquired and correctly entered by an intruder, it is impossible to differentiate the password entered by the intruder from those entered by the authorized user because the password entries contain precisely the same character set. However, no two entries for the gesture-based passwords, even those entered by the person who created the password, will be identical. There are always variations between entries, such as the shape and length of each stroke, the location of each stroke, and the speed of drawing. It is possible that passwords entered by the unauthorized user contain higher levels of variations when compared with those entered by the authorized user (the creator). The difference in the levels of variations may provide cues to detect unauthorized entries. To test this hypothesis, we designed an empirical study, collected and analyzed the data with the help of machine-learning algorithms. The results of the study are significant.

Keywords: authentication, gesture-based passwords, shoulder-surfing attacks, usability

Procedia PDF Downloads 139
98 Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme

Authors: Nidal F. Shilbayeh, Reem A. Al-Saidi, Ahmed H. Alsswey

Abstract:

In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.

Keywords: e-voting preparation stage, blind signature protocol, Nonce based authentication scheme, Kerberos Authentication Protocol, pseudo voter identity scheme PVID

Procedia PDF Downloads 299
97 The Distribution of Prevalent Supplemental Nutrition Assistance Program-Authorized Food Store Formats Differ by U.S. Region and Rurality: Implications for Food Access and Obesity Linkages

Authors: Bailey Houghtaling, Elena Serrano, Vivica Kraak, Samantha Harden, George Davis, Sarah Misyak

Abstract:

United States (U.S.) Department of Agriculture Supplemental Nutrition Assistance Program (SNAP) participants are low-income Americans receiving federal dollars for supplemental food and beverage purchases. Participants use a variety of (traditional/non-traditional) SNAP-authorized stores for household dietary purchases - also representing food access points for all Americans. Importantly consumers' food and beverage purchases from non-traditional store formats tend to be higher in saturated fats, added sugars, and sodium when compared to purchases from traditional (e.g., grocery/supermarket) formats. Overconsumption of energy-dense and low-nutrient food and beverage products contribute to high obesity rates and adverse health outcomes that differ in severity among urban/rural U.S. locations and high/low-income populations. Little is known about the SNAP-authorized food store format landscape nationally, regionally, or by urban-rural status, as traditional formats are currently used as the gold standard in food access research. This research utilized publicly available U.S. databases to fill this large literature gap and to provide insight into modes of food access for vulnerable U.S. populations: (1) SNAP Retailer Locator which provides a list of all authorized food stores in the U.S., and; (2) Rural-Urban Continuum Codes (RUCC) that categorize U.S. counties as urban (RUCC 1-3) or rural (RUCC 4-9). Frequencies were determined for the highest occurring food store formats nationally and within two regionally diverse U.S. states – Virginia in the east and California in the west. Store format codes were assigned (e.g., grocery, drug, convenience, mass merchandiser, supercenter, dollar, club, or other). RUCC was applied to investigate state-level differences in urbanity-rurality regarding prevalent food store formats and Chi Square test of independence was used to determine if food store format distributions significantly (p < 0.05) differed by region or rurality. The resulting research sample that represented highly prevalent SNAP-authorized food stores nationally included 41.25% of all SNAP stores in the U.S. (N=257,839), comprised primarily of convenience formats (31.94%) followed by dollar (25.58%), drug (19.24%), traditional (10.87%), supercenter (6.85%), mass merchandiser (1.62%), non-food store or restaurant (1.81%), and club formats (1.09%). Results also indicated that the distribution of prevalent SNAP-authorized formats significantly differed by state. California had a lower proportion of traditional (9.96%) and a higher proportion of drug (28.92%) formats than Virginia- 11.55% and 19.97%, respectively (p < 0.001). Virginia also had a higher proportion of dollar formats (26.11%) when compared to California (10.64%) (p < 0.001). Significant differences were also observed for rurality variables (p < 0.001). Prominently, rural Virginia had a significantly higher proportion of dollar formats (41.71%) when compared to urban Virginia (21.78%) and rural California (21.21%). Non-traditional SNAP-authorized formats are highly prevalent and significantly differ in distribution by U.S. region and rurality. The largest proportional difference was observed for dollar formats where the least nutritious consumer purchases are documented in the literature. Researchers/practitioners should investigate non-traditional food stores at the local level using these research findings and similar applied methodologies to determine how access to various store formats impact obesity prevalence. For example, dollar stores may be prime targets for interventions to enhance nutritious consumer purchases in rural Virginia while targeting drug formats in California may be more appropriate.

Keywords: food access, food store format, nutrition interventions, SNAP consumers

Procedia PDF Downloads 141
96 Analysis of Veterinary Drug Residues and Pesticide Residues in Beehive Products

Authors: Alba Luna Jimenez, Maria Dolores Hernando

Abstract:

The administration of veterinary treatments at higher doses than the recommended Varroa mite control in beehive matrices has the potential to generate residues in the honeybee colony and in the derived products for consumption. Honeybee colonies can also be indirectly exposed to residues of plant protection products when foraging in crops, wildflowers near the crops, or in urban gardens just after spraying. The study evaluates the presence of both types of residues, veterinary treatments, and pesticides in beeswax, bee bread, and honey. The study was carried out in apiaries located in agricultural zones and forest areas in Andalusia, Spain. Up to nineteen residues were identified above LOQ using gas chromatography-triple quadrupole-mass spectrometry analysis (GC-MS/MS). Samples were extracted by a modified QuEChERs method. Chlorfenvinphos was detected in beeswax and bee bread despite its use is not authorized for Varroa mite control. Residues of fluvalinate-tau, authorized as veterinary treatment, were detected in most of the samples of beeswax and bee bread, presumably due to overdose or also to its potential for accumulation associated with its marked liposolubility. Residues of plant protection products were also detected in samples of beeswax and bee bread. Pesticide residues were detected above the LOQ that was established at 5 µg.kg⁻¹, which is the minimum concentration that can be quantified with acceptable accuracy and precision, as described in the European guidelines for pesticide residue analysis SANTE/11945/2015. No residues of phytosanitary treatments used in agriculture were detected in honey.

Keywords: honeybee colony, mass spectrometry analysis, pesticide residues, Varroa destructor, veterinary treatment

Procedia PDF Downloads 161
95 Recyclable Household Solid Waste Generation and Collection in Beijing, China

Authors: Tingting Liu, Yufeng Wu, Xi Tian, Yu Gong, Tieyong Zuo

Abstract:

The household solid waste generated by household in Beijing is increasing quickly due to rapid population growth and lifestyle changes. However, there are no rigorous data on the generation and collection of the recyclable household solid wastes. The Beijing city government needs this information to make appropriate policies and plans for waste management. To address this information need, we undertook the first comprehensive study of recyclable household solid waste for Beijing. We carried out a survey of 500 families across sixteen districts in Beijing. We also analyzed the quantities, spatial distribution and categories of collected waste handled by curbside recyclers and permanent recycling centers for 340 of the 9797 city-defined residential areas of Beijing. From our results, we estimate that the total quantity of recyclable household solid waste was 1.8 million tonnes generated by Beijing household in 2013 and 71.6% of that was collected. The main generation categories were waste paper (24.4%), waste glass bottle (23.7%) and waste furniture (14.3%). The recycling rate was varied among different kinds of municipal solid waste. Also based on our study, we estimate there were 22.8 thousand curbside recyclers and 5.7 thousand permanent recycling centers in Beijing. The problems of household solid waste collecting system were inadequacies of authorized collection centers, skewed ratios of curbside recyclers and authorized permanent recycling centers, weak recycling awareness of residents and lack of recycling resources statistics and appraisal system. According to the existing problems, we put forward the suggestions to improve household solid waste management.

Keywords: Municipal waste; Recyclable waste; Waste categories; Waste collection

Procedia PDF Downloads 296
94 A Patient-Centered Approach to Clinical Trial Development: Real-World Evidence from a Canadian Medical Cannabis Clinic

Authors: Lucile Rapin, Cynthia El Hage, Rihab Gamaoun, Maria-Fernanda Arboleda, Erin Prosk

Abstract:

Introduction: Sante Cannabis (SC), a Canadian group of clinics dedicated to medical cannabis, based in Montreal and in the province of Quebec, has served more than 8000 patients seeking cannabis-based treatment over the past five years. As randomized clinical trials with natural medical cannabis are scarce, real-world evidence offers the opportunity to fill research gaps between scientific evidence and clinical practice. Data on the use of medical cannabis products from SC patients were prospectively collected, leading to a large real-world database on the use of medical cannabis. The aim of this study was to report information on the profiles of both patients and prescribed medical cannabis products at SC clinics, and to assess the safety of medical cannabis among Canadian patients. Methods: This is an observational retrospective study of 1342 adult patients who were authorized with medical cannabis products between October 2017 and September 2019. Information regarding demographic characteristics, therapeutic indications for medical cannabis use, patterns in dosing and dosage form of medical cannabis and adverse effects over one-year follow-up (initial and 4 follow-up (FUP) visits) were collected. Results: 59% of SC patients were female, with a mean age of 56.7 (SD= 15.6, range= (19-97)). Cannabis products were authorized mainly for patients with a diagnosis of chronic pain (68.8% of patients), cancer (6.7%), neurological disorders (5.6%), and mood disorders (5.4 %). At initial visit, a large majority (70%) of patients were authorized exclusively medical cannabis products, 27% were authorized a combination of pharmaceutical cannabinoids and medical cannabis and 3% were prescribed only pharmaceutical cannabinoids. This pattern was recurrent over the one-year follow-up. Overall, oil was the preferred formulation (average over visits 72.5%) followed by a combination of oil and dry (average 19%), other routes of administration accounted for less than 4%. Patients were predominantly prescribed products with a balanced THC:CBD ratio (59%-75% across visits). 28% of patients reported at least one adverse effect (AE) at the 3-month follow-up visit and 12% at the six-month FUP visit. 84.8% of total AEs were mild and transient. No serious AE was reported. Overall, the most common side effects reported were dizziness (11.95% of total AEs), drowsiness (11.4%), dry mouth (5.5%), nausea (4.8%), headaches (4.6%), cough (4.4%), anxiety (4.1%) and euphoria (3.5%). Other adverse effects accounted for less than 3% of total AE. Conclusion: Our results confirm that the primary area of clinical use for medical cannabis is in pain management. Patients in this cohort are largely utilizing plant-based cannabis oil products with a balanced ratio of THC:CBD. Reported adverse effects were mild and included dizziness and drowsiness. This real-world data confirms the tolerable safety profile of medical cannabis and suggests medical indications not yet validated in controlled clinical trials. Such data offers an important opportunity for the investigation of the long-term effects of cannabinoid exposure in real-life conditions. Real-world evidence can be used to direct clinical trial research efforts on specific indications and dosing patterns for product development.

Keywords: medical cannabis, safety, real-world data, Canada

Procedia PDF Downloads 132
93 A Study on the Importance and Contributions of Transforming from OEM to ODM in Malaysian Furniture Industry

Authors: Nurul Ain Haron, Saiful Hazmi Bachek, Hafez Zainudin

Abstract:

This study is aimed to establish the importance and contribution of Original Design Manufacturing (ODM) in Malaysian Furniture Industry and to close the gap between the players in the industry. The study confirms that today’s furniture industry favor Original Equipment Manufacturing (OEM) basis. Thus, resulting in the local industry lacking the expertise of designing furniture to a state of no contest. This study method used consists of literature reviews, observation, questionnaire and sessions of interviews. The result shows that the public has from minimum to almost no knowledge of the term Original Design Manufacturing (ODM) concept and the impact towards our current future industry. The manufacturers however, prefers Original Equipment Manufacturing (OEM) concept due to its easy and fast investment returns with the need of product designing process, while the interviews carried out with the authorized council had some convincing urges of doing their part promoting the awareness through trainings and seminars. Findings show that, in the rush of archiving ODM status needs extensive cooperation from many parties that are authorized council, furniture manufacturers, designers and also the public perceptions of labeling local made goods as the black goat. The current mind set of OEM manufacturers need to be change for industry’s future. As Malaysia’s living status constantly increases, so will the demands of a better salary. If these current issues are not resolved, OEM international buyers will definitely have to shift to some other lower cost manufacturer like China or Taiwan. When vendors stopped to order, today’s OEM manufacturers will no longer exist in the future.

Keywords: design manufacturing, furniture design, original design manufacturing, original equipment manufacturing

Procedia PDF Downloads 445
92 Child Marriage in Indonesian Law Perspective

Authors: Sonny Dewi Judiasih

Abstract:

Every person retains the right to marry and starts a family through a legitimized marriage. Indonesian Marriage Act has regulated the minimum age for boys to marry is 19 while the girls is 16, with an exception that the parents could ask for an exemption to the court or to the authorized official. Despite the age limit is set by the Marriage Act, however, with the influences from adat law and islamic law which allows younger persons to marry, the child marriage phenomenon is inevitable to happen in Indonesia. Child marriages in Indonesia have shown such alarming fact where 4.8 percentage of total marriage number come from persons with the age of 10 to 14 years old. The percentage was the result from a research conducted by the National Population and Family Planning Board (BKKBN). The result shows 41.9 percent of child marriages was contributed by girls who marry in the age of 15 to 19, which mostly comes from villagers. Other fact shows 50 percent of child marriages end in divorce with grounds varied from the mental health of the children, economic situation, and so on. With more children committed early marriages, more babies will be borned from indebted families. Subsequently, the government’s program to alleviate poverty will be short of expectations. Other risk for child marriages includes death of the mother and the child after giving birth. The people have challenged the legality of child marriages through judicial review filed to the Constitutional Court. The Court decided to reinforce the age limitation previously set by the Marriage Act by issuing judicial decision no: 30-74/PUU-Xii/2014. The Court stated that changes to the age limit must be in conform with cultural and traditional situation. Further, it stated child marriages are allowed to be arranged as an “emergency exit” if the parents filed such request to an exemption on the grounds of coercive situation and after the court or the authorized officials issued its approval.

Keywords: child, marriage, court, Indonesia

Procedia PDF Downloads 359
91 Improving Electrical Safety through Enhanced Work Permits

Authors: Nuwan Karunarathna, Hemali Seneviratne

Abstract:

Distribution Utilities inherently present electrical hazards for their workers in addition to the general public especially due to bare overhead lines spreading out over a large geographical area. Therefore, certain procedures such as; de-energization, verification of de-energization, isolation, lock-out tag-out and earthing are carried out to ensure safe working conditions when conducting maintenance work on de-energized overhead lines. However, measures must be taken to coordinate the above procedures and to ensure successful and accurate execution of those procedures. Issuing of 'Work Permits' is such a measure that is used by the Distribution Utility considered in this paper. Unfortunately, the Work Permit method adopted by the Distribution Utility concerned here has not been successful in creating the safe working conditions as expected which was evidenced by four (4) number of fatalities of workers due to electrocution occurred in the Distribution Utility from 2016 to 2018. Therefore, this paper attempts to identify deficiencies in the Work Permit method and related contributing factors through careful analysis of the four (4) fatalities and work place practices to rectify the short comings to prevent future incidents. The analysis shows that the present level of coordination between the 'Authorized Person' who issues the work permit and the 'Competent Person' who performs the actual work is grossly inadequate to achieve the intended safe working conditions. The paper identifies the need of active participation of a 'Control Person' who oversees the whole operation from a bird’s eye perspective and recommends further measures that are derived through the analysis of the fatalities to address the identified lapses in the current work permit system.

Keywords: authorized person, competent person, control person, de-energization, distribution utility, isolation, lock-out tag-out, overhead lines, work permit

Procedia PDF Downloads 131
90 Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya

Authors: Samuel Mwangi, Josephine K. Mule

Abstract:

Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities.

Keywords: facial recognition, access control, technology, learning

Procedia PDF Downloads 125
89 Environment Management Practices at Oil and Natural Gas Corporation Hazira Gas Processing Complex

Authors: Ashish Agarwal, Vaibhav Singh

Abstract:

Harmful emissions from oil and gas processing facilities have long remained a matter of concern for governments and environmentalists throughout the world. This paper analyses Oil and Natural Gas Corporation (ONGC) gas processing plant in Hazira, Gujarat, India. It is the largest gas-processing complex in the country designed to process 41MMSCMD sour natural gas & associated sour condensate. The complex, sprawling over an area of approximate 705 hectares is the mother plant for almost all industries at Hazira and enroute Hazira Bijapur Jagdishpur pipeline. Various sources of pollution from each unit starting from Gas Terminal to Dew Point Depression unit and Caustic Wash unit along the processing chain were examined with the help of different emission data obtained from ONGC. Pollution discharged to the environment was classified into Water, Air, Hazardous Waste and Solid (Non-Hazardous) Waste so as to analyze each one of them efficiently. To protect air environment, Sulphur recovery unit along with automatic ambient air quality monitoring stations, automatic stack monitoring stations among numerous practices were adopted. To protect water environment different effluent treatment plants were used with due emphasis on aquaculture of the nearby area. Hazira plant has obtained the authorization for handling and disposal of five types of hazardous waste. Most of the hazardous waste were sold to authorized recyclers and the rest was given to Gujarat Pollution Control Board authorized vendors. Non-Hazardous waste was also handled with an overall objective of zero negative impact on the environment. The effect of methods adopted is evident from emission data of the plant which was found to be well under Gujarat Pollution Control Board limits.

Keywords: sulphur recovery unit, effluent treatment plant, hazardous waste, sour gas

Procedia PDF Downloads 226
88 Security of Database Using Chaotic Systems

Authors: Eman W. Boghdady, A. R. Shehata, M. A. Azem

Abstract:

Database (DB) security demands permitting authorized users and prohibiting non-authorized users and intruders actions on the DB and the objects inside it. Organizations that are running successfully demand the confidentiality of their DBs. They do not allow the unauthorized access to their data/information. They also demand the assurance that their data is protected against any malicious or accidental modification. DB protection and confidentiality are the security concerns. There are four types of controls to obtain the DB protection, those include: access control, information flow control, inference control, and cryptographic. The cryptographic control is considered as the backbone for DB security, it secures the DB by encryption during storage and communications. Current cryptographic techniques are classified into two types: traditional classical cryptography using standard algorithms (DES, AES, IDEA, etc.) and chaos cryptography using continuous (Chau, Rossler, Lorenz, etc.) or discreet (Logistics, Henon, etc.) algorithms. The important characteristics of chaos are its extreme sensitivity to initial conditions of the system. In this paper, DB-security systems based on chaotic algorithms are described. The Pseudo Random Numbers Generators (PRNGs) from the different chaotic algorithms are implemented using Matlab and their statistical properties are evaluated using NIST and other statistical test-suits. Then, these algorithms are used to secure conventional DB (plaintext), where the statistical properties of the ciphertext are also tested. To increase the complexity of the PRNGs and to let pass all the NIST statistical tests, we propose two hybrid PRNGs: one based on two chaotic Logistic maps and another based on two chaotic Henon maps, where each chaotic algorithm is running side-by-side and starting from random independent initial conditions and parameters (encryption keys). The resulted hybrid PRNGs passed the NIST statistical test suit.

Keywords: algorithms and data structure, DB security, encryption, chaotic algorithms, Matlab, NIST

Procedia PDF Downloads 265
87 Stun Practices in Swine in the Valle De Aburrá and Animal Welfare

Authors: Natalia Uribe Corrales, Carolina Cano Arroyave, Santiago Henao Villegas

Abstract:

Introduction: Stunning is an important stage in the meat industry due to the repercussions on the characteristics of the carcass. It has been demonstrated that inadequate stun can lead to hematomas, fractures and promote the appearance of pale, soft and exudative meat due to the stress caused in animals. In Colombia, gas narcosis and electrical stunning are the two authorized methods in pigs. Objective: To describe the practices of stunning in the Valle de Aburrá and its relation with animal welfare. Methods: A descriptive cross - sectional study was carried out in Valle de Aburrá slaughterhouses, which were authorized by National Institute for Food and Medicine Surveillance (INVIMA). Variables such as stunning method, presence of vocalization, falls, slips, rhythmic breathing, corneal reflex and attempts to incorporate after stunning, stun time and time between stun and bleeding were analyzed. Results: 225 pigs were analyzed, finding that 50.2% had electrical stun, whose amperage and voltage were 1.23 (A) and 120 (V) respectively; 49.8% of the animals were stunned with CO2 chamber whose concentration was always above 95%, the mean desensitization time was 16.8 seconds (d.e.5.37); the mean time of stunning - bleeding was 47.9 seconds (d.e.13.9); similarly, it was found that 27.1% had vocalizations after stunning; 12% had falls; 10.7% showed rhythmic breathing; 33.3% exhibited corneal reflex; and 10.7% had reincorporation attempts. Conclusions: The methods of stunning used in the Valle de Aburrá, although performed with those permitted by law, are shortcomings in relation to the amperage and voltage used for each type of pig, as well, it is found that welfare animal is being violated to find signology of an inadequate desensitization. It is necessary to promote compliance with the principles of stunning according to Animal Welfare, and keep in mind that in electrical desensitization, the calibration of the equipment must be guaranteed (pressure according to the type of animal or current applied and the position where the electrodes are) and in the narcosis the equipment should be calibrated to ensure proper gas concentration and exposure time.

Keywords: animal welfare, pigs, quality of meat, stun methods

Procedia PDF Downloads 223
86 Hybrid Knowledge Approach for Determining Health Care Provider Specialty from Patient Diagnoses

Authors: Erin Lynne Plettenberg, Jeremy Vickery

Abstract:

In an access-control situation, the role of a user determines whether a data request is appropriate. This paper combines vetted web mining and logic modeling to build a lightweight system for determining the role of a health care provider based only on their prior authorized requests. The model identifies provider roles with 100% recall from very little data. This shows the value of vetted web mining in AI systems, and suggests the impact of the ICD classification on medical practice.

Keywords: electronic medical records, information extraction, logic modeling, ontology, vetted web mining

Procedia PDF Downloads 172
85 Implementation of Chlorine Monitoring and Supply System for Drinking Water Tanks

Authors: Ugur Fidan, Naim Karasekreter

Abstract:

Healthy and clean water should not contain disease-causing micro-organisms and toxic chemicals and must contain the necessary minerals in a balanced manner. Today, water resources have a limited and strategic importance, necessitating the management of water reserves. Water tanks meet the water needs of people and should be regularly chlorinated to prevent waterborne diseases. For this purpose, automatic chlorination systems placed in water tanks for killing bacteria. However, the regular operation of automatic chlorination systems depends on refilling the chlorine tank when it is empty. For this reason, there is a need for a stock control system, in which chlorine levels are regularly monitored and supplied. It has become imperative to take urgent measures against epidemics caused by the fact that most of our country is not aware of the end of chlorine. The aim of this work is to rehabilitate existing water tanks and to provide a method for a modern water storage system in which chlorination is digitally monitored by turning the newly established water tanks into a closed system. A sensor network structure using GSM/GPRS communication infrastructure has been developed in the study. The system consists of two basic units: hardware and software. The hardware includes a chlorine level sensor, an RFID interlock system for authorized personnel entry into water tank, a motion sensor for animals and other elements, and a camera system to ensure process safety. It transmits the data from the hardware sensors to the host server software via the TCP/IP protocol. The main server software processes the incoming data through the security algorithm and informs the relevant unit responsible (Security forces, Chlorine supply unit, Public health, Local Administrator) by e-mail and SMS. Since the software is developed base on the web, authorized personnel are also able to monitor drinking water tank and report data on the internet. When the findings and user feedback obtained as a result of the study are evaluated, it is shown that closed drinking water tanks are built with GRP type material, and continuous monitoring in digital environment is vital for sustainable health water supply for people.

Keywords: wireless sensor networks (WSN), monitoring, chlorine, water tank, security

Procedia PDF Downloads 160
84 Evolution of Propiconazole and Tebuconazole Residues through the Post-Harvest Application in 'Angeleno' Plum

Authors: M. J. Rodríguez, F. M. Sánchez, B. Velardo, P. Calvo, M. J. Serradilla, J. Delgado, J. M. López

Abstract:

The main problems in storage and later transport of fruits, are the decays developed that reduce the quality on destination’s markets. Nowadays, there is an increasing interest in the use of compounds to avoid decays in post-harvest. Triazole fungicides are agrochemicals widely used in the agricultural industry due to their wide spectrum of actions, and in some case, they are used in citrus fruit post-harvest. Moreover, its use is not authorized in plum post-harvest, but in order to a future possible authorization, the evolutions of propiconazole and tebuconazole residues are studied after its post-harvest application in ‘Angeleno’ plum.

Keywords: maximum residue limit (MRL), triazole fungicides, decay, Prunus salicina

Procedia PDF Downloads 316
83 A Quantitative Case Study Analysis of Store Format Contributors to U.S. County Obesity Prevalence in Virginia

Authors: Bailey Houghtaling, Sarah Misyak

Abstract:

Food access; the availability, affordability, convenience, and desirability of food and beverage products within communities, is influential on consumers’ purchasing and consumption decisions. These variables may contribute to lower dietary quality scores and a higher obesity prevalence documented among rural and disadvantaged populations in the United States (U.S.). Current research assessing linkages between food access and obesity outcomes has primarily focused on distance to a traditional grocery/supermarket store as a measure of optimality. However, low-income consumers especially, including U.S. Department of Agriculture’s Supplemental Nutrition Assistance Program (SNAP) participants, seem to utilize non-traditional food store formats with greater frequency for household dietary needs. Non-traditional formats have been associated with less nutritious food and beverage options and consumer purchases that are high in saturated fats, added sugars, and sodium. Authors’ formative research indicated differences by U.S. region and rurality in the distribution of traditional and non-traditional SNAP-authorized food store formats. Therefore, using Virginia as a case study, the purpose of this research was to determine if a relationship between store format, rurality, and obesity exists. This research applied SNAP-authorized food store data (food access points for SNAP as well as non-SNAP consumers) and obesity prevalence data by Virginia county using publicly available databases: (1) SNAP Retailer Locator, and; (2) U.S. County Health Rankings. The alpha level was set a priori at 0.05. All Virginia SNAP-authorized stores (n=6,461) were coded by format – grocery, drug, mass merchandiser, club, convenience, dollar, supercenter, specialty, farmers market, independent grocer, and non-food store. Simple linear regression was applied primarily to assess the relationship between store format and obesity. Thereafter, multiple variables were added to the regression to account for potential moderating relationships (e.g., county income, rurality). Convenience, dollar, non-food or restaurant, mass merchandiser, farmers market, and independent grocer formats were significantly, positively related to obesity prevalence. Upon controlling for urban-rural status and income, results indicated the following formats to be significantly related to county obesity prevalence with a small, positive effect: convenience (p=0.010), accounting for 0.3% of the variance in obesity prevalence; dollar (p=0.005; 0.5% of the variance), and; non-food (p=0.030; 1.3% of the variance) formats. These results align with current literature on consumer behavior at non-traditional formats. For example, consumers’ food and beverage purchases at convenience and dollar stores are documented to be high in saturated fats, added sugars, and sodium. Further, non-food stores (i.e., quick-serve restaurants) often contribute to a large portion of U.S. consumers’ dietary intake and thus poor dietary quality scores. Current food access research investigates grocery/supermarket access and obesity outcomes. These results suggest more research is needed that focuses on non-traditional food store formats. Nutrition interventions within convenience, dollar, and non-food stores, for example, that aim to enhance not only healthy food access but the affordability, convenience, and desirability of nutritious food and beverage options may impact obesity rates in Virginia. More research is warranted utilizing the presented investigative framework in other U.S. and global regions to explore the role and the potential of non-traditional food store formats to prevent and reduce obesity.

Keywords: food access, food store format, non-traditional food stores, obesity prevalence

Procedia PDF Downloads 142
82 Secrecy Analysis in Downlink Cellular Networks in the Presence of D2D Pairs and Hardware Impairment

Authors: Mahdi Rahimi, Mohammad Mahdi Mojahedian, Mohammad Reza Aref

Abstract:

In this paper, a cellular communication scenario with a transmitter and an authorized user is considered to analyze its secrecy in the face of eavesdroppers and the interferences propagated unintentionally through the communication network. It is also assumed that some D2D pairs and eavesdroppers are randomly located in the cell. Assuming hardware impairment, perfect connection probability is analytically calculated, and upper bound is provided for the secrecy outage probability. In addition, a method based on random activation of D2Ds is proposed to improve network security. Finally, the analytical results are verified by simulations.

Keywords: physical layer security, stochastic geometry, device-to-device, hardware impairment

Procedia PDF Downloads 182
81 A Non-Invasive Blood Glucose Monitoring System Using near-Infrared Spectroscopy with Remote Data Logging

Authors: Bodhayan Nandi, Shubhajit Roy Chowdhury

Abstract:

This paper presents the development of a portable blood glucose monitoring device based on Near-Infrared Spectroscopy. The system supports Internet connectivity through WiFi and uploads the time series data of glucose concentration of patients to a server. In addition, the server is given sufficient intelligence to predict the future pathophysiological state of a patient given the current and past pathophysiological data. This will enable to prognosticate the approaching critical condition of the patient much before the critical condition actually occurs.The server hosts web applications to allow authorized users to monitor the data remotely.

Keywords: non invasive, blood glucose concentration, microcontroller, IoT, application server, database server

Procedia PDF Downloads 218
80 Multi-Level Security Measures in Cloud Computing

Authors: Shobha G. Ranjan

Abstract:

Cloud computing is an emerging, on-demand and internet- based technology. Varieties of services like, software, hardware, data storage and infrastructure can be shared though the cloud computing. This technology is highly reliable, cost effective and scalable in nature. It is a must only the authorized users should access these services. Further the time granted to access these services should be taken into account for proper accounting purpose. Currently many organizations do the security measures in many different ways to provide the best cloud infrastructure to their clients, but that’s not the limitation. This paper presents the multi-level security measure technique which is in accordance with the OSI model. In this paper, details of proposed multilevel security measures technique are presented along with the architecture, activities, algorithms and probability of success in breaking authentication.

Keywords: cloud computing, cloud security, integrity, multi-tenancy, security

Procedia PDF Downloads 501
79 Determination of Complexity Level in Merged Irregular Transposition Cipher

Authors: Okike Benjamin, Garba Ejd

Abstract:

Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In order to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often easily decrypted by adversaries. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.

Keywords: transposition cipher, merged irregular cipher, encryption, complexity level

Procedia PDF Downloads 344
78 A User Identification Technique to Access Big Data Using Cloud Services

Authors: A. R. Manu, V. K. Agrawal, K. N. Balasubramanya Murthy

Abstract:

Authentication is required in stored database systems so that only authorized users can access the data and related cloud infrastructures. This paper proposes an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. The proposed technique is likely to be more robust as the probability of breaking the password is extremely low. This framework uses a multi-modal biometric approach and SMS to enforce additional security measures with the conventional Login/password system. The robustness of the technique is demonstrated mathematically using a statistical analysis. This work presents the authentication system along with the user authentication architecture diagram, activity diagrams, data flow diagrams, sequence diagrams, and algorithms.

Keywords: design, implementation algorithms, performance, biometric approach

Procedia PDF Downloads 476
77 Use of Cloud Computing and Smart Devices in Healthcare

Authors: Nikunj Agarwal, M. P. Sebastian

Abstract:

Cloud computing can reduce the start-up expenses of implementing EHR (Electronic Health Records). However, many of the healthcare institutions are yet to implement cloud computing due to the associated privacy and security issues. In this paper, we analyze the challenges and opportunities of implementing cloud computing in healthcare. We also analyze data of over 5000 US hospitals that use Telemedicine applications. This analysis helps to understand the importance of smart phones over the desktop systems in different departments of the healthcare institutions. The wide usage of smartphones and cloud computing allows ubiquitous and affordable access to the health data by authorized persons, including patients and doctors. Cloud computing will prove to be beneficial to a majority of the departments in healthcare. Through this analysis, we attempt to understand the different healthcare departments that may benefit significantly from the implementation of cloud computing.

Keywords: cloud computing, smart devices, healthcare, telemedicine

Procedia PDF Downloads 396
76 Determination of Complexity Level in Okike's Merged Irregular Transposition Cipher

Authors: Okike Benjami, Garba Ejd

Abstract:

Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In other to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often decrypted by adversaries with ease. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Okike’s Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.

Keywords: transposition cipher, merged irregular cipher, encryption, complexity level

Procedia PDF Downloads 289
75 Therapeutic Potential of Cannabis in Cancer: Advances in Clinical Research and Pharmacogenomic Aspects

Authors: Bouchaïb Gazzaz, Hamid El Amri, Hind Dehbi, Abderraouf Hilali

Abstract:

Medical cannabis has been cultivated and used in many countries around the world. The story of the use of cannabis as a therapeutic agent is difficult to trace, in particular, because the laws regulating its production, distribution, possession, and consumption are relatively recent. Nowadays, in countries where it is authorized, medical cannabis is used in a very wide variety of illnesses and pathologies, particularly in cancer cures. Presently, cannabinoid receptor agonists (like nabilone and dronabinol) are used for reducing chemotherapy induced vomiting. This review aims to discuss a recent finding on the use of therapeutic cannabis in patients with cancer. First, this work addresses the progress made in the use of cannabinoids as therapeutic agent and their application in the treatment of different types of cancer. Secondly, a detailed analysis of the pharmacogenetic aspect of cannabis will be discussed.

Keywords: cannabinoids, endocannabinoids system, cancer treatment, cannabinoid receptors, genetic polymorphism, pharmacogenomics

Procedia PDF Downloads 144
74 Making a ‘Once-upon-a-Time’ Mythology in Kazuo Ishiguro’s The Buried Giant

Authors: Masami Usui

Abstract:

Kazuo Ishiguro’s challenging novel, The Buried Giant, embodies how contemporary writers and readers have to discover the voices buried in our history. By avoiding setting or connecting the modern and contemporary historical incidents such as World War II this time, Ishiguro ventures into retelling myth, transfiguring historical facts, and revealing what has been forgotten in a process of establishing history and creating mythology. As generally known, modernist writers in the twentieth century employed materials from authorized classical mythologies, especially Greek mythology. As an heir of this tradition, Ishiguro imposes his mission of criticizing the repeatedly occurring yet easily-forgotten history of dictatorship and a slaughter on mythology based on King Arthur and its related heroes and myths in Britain. On an open ground, Ishiguro can start his own mythical story and space.

Keywords: English literature, fantasy, globalism, history

Procedia PDF Downloads 338
73 Efficient Position Based Operation Code Authentication

Authors: Hashim Ali, Sheheryar Khan

Abstract:

Security for applications is always been a keen issue of concern. In general, security is to allow access of grant to legal user or to deny non-authorized access to the system. Shoulder surfing is an observation technique to hack an account or to enter into a system. When a malicious observer is capturing or recording the fingers of a user while he is entering sensitive inputs (PIN, Passwords etc.) and may be able to observe user’s password credential. It is very rigorous for a novice user to prevent himself from shoulder surfing or unaided observer in a public place while accessing his account. In order to secure the user account, there are five factors of authentication; they are: “(i) something you have, (ii) something you are, (iii) something you know, (iv) somebody you know, (v) something you process”. A technique has been developed of fifth-factor authentication “something you process” to provide novel approach to the user. In this paper, we have applied position based operational code authentication in such a way to more easy and user friendly to the user.

Keywords: shoulder surfing, malicious observer, sensitive inputs, authentication

Procedia PDF Downloads 272
72 Management and Agreement Protocol in Computer Security

Authors: Abdulameer K. Hussain

Abstract:

When dealing with a cryptographic system we note that there are many activities performed by parties of this cryptographic system and the most prominent of these activities is the process of agreement between the parties involved in the cryptographic system on how to deal and perform the cryptographic system tasks to be more secure, more confident and reliable. The most common agreement among parties is a key agreement and other types of agreements. Despite the fact that there is an attempt from some quarters to find other effective agreement methods but these methods are limited to the traditional agreements. This paper presents different parameters to perform more effectively the task of the agreement, including the key alternative, the agreement on the encryption method used and the agreement to prevent the denial of the services. To manage and achieve these goals, this method proposes the existence of an control and monitoring entity to manage these agreements by collecting different statistical information of the opinions of the authorized parties in the cryptographic system. These statistics help this entity to take the proper decision about the agreement factors. This entity is called Agreement Manager (AM).

Keywords: agreement parameters, key agreement, key exchange, security management

Procedia PDF Downloads 421