Search results for: IoT security challenges
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7834

Search results for: IoT security challenges

4774 Zero-Knowledge Proof-of-Reserve: A Confidential Approach to Cryptocurrency Asset Verification

Authors: Sam Ng, Lewis Leighton, Sam Atkinson, Carson Yan, Landan Hu, Leslie Cheung, Brian Yap, Kent Lung, Ketat Sarakune

Abstract:

This paper introduces a method for verifying cryptocurrency reserves that balances the need for both transparency and data confidentiality. Our methodology employs cryptographic techniques, including Merkle Trees, Bulletproof, and zkSnark, to verify that total assets equal or exceed total liabilities, represented by customer funds. Importantly, this verification is achieved without disclosing sensitive information such as the total asset value, customer count, or cold wallet addresses. We delve into the construction and implementation of this methodology. While the system is robust and scalable, we also identify areas for potential enhancements to improve its efficiency and versatility. As the digital asset landscape continues to evolve, our approach provides a solid foundation for ensuring continued trust and security in digital asset platforms.

Keywords: cryptocurrency, crypto-currency, proof-of-reserve, por, zero-knowledge, ZKP

Procedia PDF Downloads 64
4773 Understanding the Safety Impacts of Imbalances in Truck Parking Supply and Demand

Authors: Rahil Saeedi

Abstract:

The imbalance in truck parking supply and demand can create important safety issues for truck drivers and the public. Research has shown that breaks at specific intervals can increase drivers’ alertness by reducing the monotony of the task. However, if fatigued truck drivers are unable to find a safe parking spot for rest, they may continue to drive or choose to park at remote and insecure areas or undesignated locations. All of these situations pose serious safety and security risks to truck drivers and other roadway users. This study uses 5-year truck crash data in Ohio to develop and test a framework for identifying crashes that happen as a result of imbalances in truck parking supply and demand. The societal impacts of these crashes are then interpreted as monetary values, calculated using the costs associated with various crash severity levels.

Keywords: truck parking, road safety, crash data, geofencing, driver fatigue, undesignated parking

Procedia PDF Downloads 160
4772 The Web Site Development for E-Commerce Trading in Thailand Customers View

Authors: Ladaporn Pithuk

Abstract:

The purposes of the study were to ascertain the customer requirement, to identify the factors related to online business in Thailand. The sample of this study consisted of 400 customers who are purchasing product and service on E-commerce. To get primary sources, a questionnaire consisting of 31 questions was designed and adapted from previous studies. The data from the questionnaires were collected and analyzed in descriptive forms and (ONE-WAY ANOVA) was conducted. The majority of the respondents showed customer requirement by stating “moderately agree” for questions asking them about customization, connection, content, commerce, context, communication and community, however, they also displayed negative attitudes by identifying “moderately disagree” for security concerns and after-sales services. These important issues need to be improved immediately since it can encourage customers to buy goods and services through the Internet or discourage them, and businesses should offer more channels of payment methods for customers for instance, e-payment.

Keywords: customer requirement, customization, connection, online business

Procedia PDF Downloads 188
4771 A Monitoring System to Detect Vegetation Growth along the Route of Power Overhead Lines

Authors: Eugene Eduful

Abstract:

This paper introduces an approach that utilizes a Wireless Sensor Network (WSN) to detect vegetation encroachment between segments of distribution lines. The WSN was designed and implemented, involving the seamless integration of Arduino Uno and Mega systems. This integration demonstrates a method for addressing the challenges posed by vegetation interference. The primary aim of the study is to improve the reliability of power supply in areas characterized by forested terrain, specifically targeting overhead powerlines. The experimental results validate the effectiveness of the proposed system, revealing its ability to accurately identify and locate instances of vegetation encroachment with a remarkably high degree of precision.

Keywords: wireless sensor network, vegetation encroachment, line of sight, Arduino Uno, XBEE

Procedia PDF Downloads 58
4770 Designing AI-Enabled Smart Maintenance Scheduler: Enhancing Object Reliability through Automated Management

Authors: Arun Prasad Jaganathan

Abstract:

In today's rapidly evolving technological landscape, the need for efficient and proactive maintenance management solutions has become increasingly evident across various industries. Traditional approaches often suffer from drawbacks such as reactive strategies, leading to potential downtime, increased costs, and decreased operational efficiency. In response to these challenges, this paper proposes an AI-enabled approach to object-based maintenance management aimed at enhancing reliability and efficiency. The paper contributes to the growing body of research on AI-driven maintenance management systems, highlighting the transformative impact of intelligent technologies on enhancing object reliability and operational efficiency.

Keywords: AI, machine learning, predictive maintenance, object-based maintenance, expert team scheduling

Procedia PDF Downloads 45
4769 'Bemo' (Beras Moringa) as Commodity Innovation Cost of Food Ingredients: In Dealing with Afta Competition

Authors: Isma Alfia Novita

Abstract:

Indonesia is one country with the largest agricultural producer in the world but still can not meet the needs of the national rice. In addition, Indonesia was ranked the second-largest rice importer after the Philippines. Indonesia's rice consumption reached 102 kg per capita, or almost twice the average global rice consumption is only 60 kg per capita per year. One of the government's efforts in developing national food consumption is to invite people to improve diversification and food security. This is done considering the diet of Indonesia is still high consumption of rice. Therefore, this program made innovations Rice Moringa namely imitation rice with the addition of Moringa (Moringa oleifera). Moringa is a plant that is widely grown and easily found. In addition, Moringa has many benefits because it contains vitamin A, vitamin B, vitamin C, calcium, protein, and potassium. Based on the analysis of the nutrient content, it is known that the Moringa leaves have good potential to maintain the balance of nutrients in the body

Keywords: imitation rice, Moringa oliefera, Moringa, AFTA

Procedia PDF Downloads 116
4768 The Forensic Handwriting Analysis of a Painter’s Signature: Claude Monet’s Case

Authors: Olivia Rybak-Karkosz

Abstract:

This paper's purpose was to present a case study on a questioned Claude Monet's signature forensic handwriting analysis. It is an example taken from the author’s experience as a court handwriting expert. A comparative study was conducted to determine whether the signature resembles similarities (and if so, to what measure) with the features representing the writing patterns and their natural variability typical for Claude Monet. It was conducted to check whether all writing features are within the writer's normal range of variation. The paper emphasizes the difficulties and challenges encountered by the forensic handwriting expert while analysing the questioned signature.

Keywords: artist’s signatures, authenticity of an artwork, forensic handwriting analysis, graphic-comparative method

Procedia PDF Downloads 101
4767 The Impact of Non State Actor’s to Protect Refugees in Kurdistan Region of Iraq

Authors: Rozh Abdulrahman Kareem

Abstract:

The displacement of individuals has become a common interest for international players. Mostly occurs in Islamic states, as religion is considered the most common cause of this form of displacement. Therefore, this thesis aims to depict the reality of the situations of the refugees, particularly in KRI, illustrating how they are treated and protected and if the treatment merits the protection clause as envisaged in the 1951 Refugee Convention. Overall, the aim is to touch on the issue of protection by non-governmental organizations and government towards the refugees here. In light of this, it focused on the adequate protection of refugees in relation to the refugee law. In the Middle East, including Iraq, there have been multiple reports on violations of these refugee laws and human rights. Protection involves providing physical security to the concerned parties, functional administration with legal structures, and infrastructural setup that could help citizens exercise rights. The KRI has provided the refugees with various benefits, including education, access to residency, and employment. It also provided transitionary in various social dimensions like gender-based violence. The Convention on Status of Refugees 1951 tried to resolve this problem, whereby the principle of ‘nonrefoulement’ under Article 33 was passed. The ‘nonrefoulement’, an exceptional reference, was enacted to protect refugees from forcible return to their countries of the original. However, the convention never addressed an unusual scenario regarding the application of this principle, ‘Extradition Treaties.’ Even though some scholarly article exists regarding the problems of refugees, the topic of interplay between Nonrefoulement and Extradition Treaties has never been explained in detail in the available books on refugee laws and practices. Each year, millions of refugees seek protection from foreign countries for fear of being tortured, victimized, or executed. People seeking international protection are susceptible and insecure. The main objective of the prevention is to provide security to citizens susceptible to inhuman treatment, distress, oppression, or other human rights defilements when they arrive back in their own countries. The refugee situation may get worse in the near future. Just like several nations within the Middle East, Iraq is not a signatory to the globally acknowledged legal structure for the protection of refugees. The first law of 1971 in Iraq was issued only for military or political causes. This law also establishes benefits such as the right to education and health services and the right to acquire employment just as the Iraqi nationals. The other legislative instrument is the 21st law from the ministry of migration of Iraq widened the description of an immigrant to incorporate the definition from the refugee resolution. Nonetheless, there is a lack of overall consistency in the protection provided under these legislations regarding rights and entitlement. A Memorandum of Understanding was signed in October 2016 by the UNHCR and the Iraq government to develop the protection of refugees. Under the term of this MoU, the Iraqi Government is obligated to provide identity documents to asylum seekers beside that UNHCR provides more guidance.

Keywords: law, refugee, protection, Kurdistan

Procedia PDF Downloads 57
4766 Educational Challenges: Cultural Behaviours, Psychopathology and Psychological Intervention

Authors: Sandra Figueiredo, Alexandra Pereira, Ana Oliveira, Idia Brito, Ivaniltan Jones, Joana Moreira, Madalena Silva, Maria Paraíba, Milene Silva, Tânia Pinho

Abstract:

In the present society, we are facing behaviours mainly in young individuals that might be considered trends of culture or psychopathology. Both contexts are challenges for Education, Psychology and Health. This paper examines nine case studies specifically in Educational Psychology with the main goal to identify and define phenomena contexts in school culture, the psychopathology involved and to present a psychological intervention for each case. The research was conducted by university students in the period of March 2017-June 2017, in Portugal, and the childhood was focused. The case studies explored the cyberbullying; the bullying - victims and bullies’ perspectives; the obsessive compulsive disorder; perception and inclusion of children from homoparental families; inclusion of foreign students in the higher education system; blindness and the inclusion in physical curricular activities; influence of doc-reality and media in attitudes and self-esteem; and the morningness and eveningness types learning in the same school timetables. The university students were supervised during their research analysis and two methods were available for the intervention research study: the meta-analysis and the empirical study. In the second phase, the pedagogical intervention was designed for the different educational contexts in analysis, especially concerning the school environments. The evidence of literature and the empirical studies showed new trends of school’ behaviours and educational disturbances that require further research and effective (and adequate to age, gender, nationality and culture) pedagogical instruments. Respecting the instruments, on the one hand, to identify behaviors, habits or pathologies and highlight the role and training of teachers, psychologists and health professionals, on the other hand, to promote the early intervention and to enhance healthy child development and orientation of the families. To respond to both milestones, this paper present nine pedagogical techniques and measures that will be discussed on their impact concerning advances for the psychological and educational intervention, centered in the individual and in the new generations of family’ cultures.

Keywords: behaviour, culture trends, educational intervention, psychopathology, obsessive compulsive disorder, cyberbullying, bullying, homoparental families, sleep influence, blindness and sports at school, inclusion of foreign students, media influence in behaviour

Procedia PDF Downloads 212
4765 Next-Viz: A Literature Review and Web-Based Visualization Tool Proposal

Authors: Railly Hugo, Igor Aguilar-Alonso

Abstract:

Software visualization is a powerful tool for understanding complex software systems. However, current visualization tools often lack features or are difficult to use, limiting their effectiveness. In this paper, we present next-viz, a proposed web-based visualization tool that addresses these challenges. We provide a literature review of existing software visualization techniques and tools and describe the architecture of next-viz in detail. Our proposed tool incorporates state-of-the-art visualization techniques and is designed to be user-friendly and intuitive. We believe next-viz has the potential to advance the field of software visualization significantly.

Keywords: software visualization, literature review, tool proposal, next-viz, web-based, architecture, visualization techniques, user-friendly, intuitive

Procedia PDF Downloads 73
4764 Trust Management for an Authentication System in Ubiquitous Computing

Authors: Malika Yaici, Anis Oussayah, Mohamed Ahmed Takerrabet

Abstract:

Security of context-aware ubiquitous systems is paramount, and authentication plays an important aspect in cloud computing and ubiquitous computing. Trust management has been identified as vital component for establishing and maintaining successful relational exchanges between trading partners in cloud and ubiquitous systems. Establishing trust is the way to build good relationship with both client and provider which positive activates will increase trust level, otherwise destroy trust immediately. We propose a new context-aware authentication system using a trust management system between client and server, and between servers, a trust which induces partnership, thus to a close cooperation between these servers. We defined the rules (algorithms), as well as the formulas to manage and calculate the trusting degrees depending on context, in order to uniquely authenticate a user, thus a single sign-on, and to provide him better services.

Keywords: ubiquitous computing, authentication, context-awareness, trust management

Procedia PDF Downloads 232
4763 Artificial Intelligence in Enterprise Information Systems: A Review

Authors: Danah S. Alabdulmohsin

Abstract:

Due to the fast growth of organizational data as well as the emergence of new technologies such as artificial intelligence (AI), organizations tend to utilize these new technologies in their enterprise information systems (EIS) either to overcome the issues they struggle with or to enhance their functions. The aim of this paper is to review the potential role of AI technologies in EIS, namely: enterprise resource planning systems (ERP), customer relation management systems (CRM), supply chain management systems (SCM), knowledge systems (KM), and human resources management systems (HRM). The paper provided the definitions of these systems as well as the definitions of AI technologies that have been used in EIS. In addition, the paper discussed the challenges that organizations might face while integrating AI with their information systems and explained why some organizations fail in achieving successful implementations of the integration.

Keywords: artificial intelligence, AI, enterprise information system, EIS, integration

Procedia PDF Downloads 86
4762 Poetry as Valuable Tool for Tackling Climate Change and Environmental Pollution

Authors: Benjamin Anabaraonye

Abstract:

Our environment is our entitlement, and it is our duty to guard it for the safety of our society. It is, therefore, in our best interest to explore the necessary tools required to tackle the issues of environmental pollution which are major causes of climate change. Poetry has been discovered through our study as a valuable tool for tackling climate change and environmental pollution. This study explores the science of poetry and how important it is for scientists and engineers to develop their creativity to obtain relevant skills needed to tackle these global challenges. Poetry has been discovered as a great tool for climate change education which in turn brings about climate change adaptation and mitigation. This paper is, therefore, a clarion and urgent call for us to rise to our responsibility for a sustainable future.

Keywords: climate change, education, environment, poetry

Procedia PDF Downloads 195
4761 Strategies to Achieve Deep Decarbonisation in Power Generation: A Review

Authors: Abdullah Alotaiq

Abstract:

The transition to low-carbon power generation is essential for mitigating climate change and achieving sustainability. This process, however, entails considerable costs, and understanding the factors influencing these costs is critical. This is necessary to cater to the increasing demand for low-carbon electricity across the heating, industry, and transportation sectors. A crucial aspect of this transition is identifying cost-effective and feasible paths for decarbonization, which is integral to global climate mitigation efforts. It is concluded that hybrid solutions, combining different low-carbon technologies, are optimal for minimizing costs and enhancing flexibility. These solutions also address the challenges associated with phasing out existing fossil fuel-based power plants and broadening the spectrum of low-carbon power generation options.

Keywords: review, power generation, energy transition, decarbonisation

Procedia PDF Downloads 43
4760 The Impact of Technology on Human Rights Principles and Rules

Authors: Hosam Gamil Sharoubim Abdalla

Abstract:

The interface between development and human rights has long been the subject of academic debate. Therefore, to understand the dynamics between the two concepts, a number of principles have been adopted, ranging from the right to development to a human rights-based approach to development. Despite these attempts, the exact connection between development and human rights is not yet fully understood. However, the inherent interdependence between these two concepts and the idea that development efforts should be undertaken with respect for human rights guarantees have gained momentum in recent years. It will then be examined whether the right to sustainable development is recognized. The article, therefore, concludes that the principles of sustainable development are recognized, directly or indirectly, in various human rights instruments, which represents a positive answer to the question posed above. Therefore, this work discusses international and regional human rights instruments as well as case law and interpretative guidelines from human rights bodies to demonstrate this hypothesis.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 47
4759 Evaluating Electronic Service Quality in Banking Iran

Authors: Vahid Bairami Rad

Abstract:

With the rapid growth of the Internet and the globalization of the market, most enterprises are trying to attract and win customers in the highly competitive electronic market. Better e-service quality will enhance the relationship with customers and their satisfaction. So the measurement of eservice quality is very important but it is a complex process due to the complex nature of services. Literature predicts that there is a lack of universal definition of e-service quality. The e-service quality measures in banking have great importance in achieving high customer base. This paper proposes a conceptual model for measuring e-service quality in Iranian Banking Iran. Nine dimensions reliability, ease of use, personalization, security and trust, website aesthetic, responsiveness, contact and speed of delivery had been identified. The results of this paper may help to develop a proper scale to measure the e-service quality in Iranian Banking Industry, which may assist to maintain and improve the performance and effectiveness of e-service quality to retain customers.

Keywords: electronic banking, Dimensions, customer service quality, electronic, communication

Procedia PDF Downloads 488
4758 Unlocking Synergy: Exploring the Impact of Integrating Knowledge Management and Competitive Intelligence for Synergistic Advantage for Efficient, Inclusive and Optimum Organizational Performance

Authors: Godian Asami Mabindah

Abstract:

The convergence of knowledge management (KM) and competitive intelligence (CI) has gained significant attention in recent years as organizations seek to enhance their competitive advantage in an increasingly complex and dynamic business environment. This research study aims to explore and understand the synergistic relationship between KM and CI and its impact on organizational performance. By investigating how the integration of KM and CI practices can contribute to decision-making, innovation, and competitive advantage, this study seeks to unlock the potential benefits and challenges associated with this integration. The research employs a mixed-methods approach to gather comprehensive data. A quantitative analysis is conducted using survey data collected from a diverse sample of organizations across different industries. The survey measures the extent of integration between KM and CI practices and examines the perceived benefits and challenges associated with this integration. Additionally, qualitative interviews are conducted with key organizational stakeholders to gain deeper insights into their experiences, perspectives, and best practices regarding the synergistic relationship. The findings of this study are expected to reveal several significant outcomes. Firstly, it is anticipated that organizations that effectively integrate KM and CI practices will outperform those that treat them as independent functions. The study aims to highlight the positive impact of this integration on decision-making, innovation, organizational learning, and competitive advantage. Furthermore, the research aims to identify critical success factors and enablers for achieving constructive interaction between KM and CI, such as leadership support, culture, technology infrastructure, and knowledge-sharing mechanisms. The implications of this research are far-reaching. Organizations can leverage the findings to develop strategies and practices that facilitate the integration of KM and CI, leading to enhanced competitive intelligence capabilities and improved knowledge management processes. Additionally, the research contributes to the academic literature by providing a comprehensive understanding of the synergistic relationship between KM and CI and proposing a conceptual framework that can guide future research in this area. By exploring the synergies between KM and CI, this study seeks to help organizations harness their collective power to gain a competitive edge in today's dynamic business landscape. The research provides practical insights and guidelines for organizations to effectively integrate KM and CI practices, leading to improved decision-making, innovation, and overall organizational performance.

Keywords: Competitive Intelligence, Knowledge Management, Organizational Performance, Incusivity, Optimum Performance

Procedia PDF Downloads 79
4757 Security in Resource Constraints Network Light Weight Encryption for Z-MAC

Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy

Abstract:

Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios.

Keywords: hybrid MAC protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node dataprocessing, Z-MAC

Procedia PDF Downloads 134
4756 Feasibility Study of Wireless Communication for the Control and Monitoring of Rotating Electrical Machine

Authors: S. Ben Brahim, T. H. Vuong, J. David, R. Bouallegue, M. Pietrzak-David

Abstract:

Electrical machine monitoring is important to protect motor from unexpected problems. Today, using wireless communication for electrical machines is interesting for both real time monitoring and diagnostic purposes. In this paper, we propose a system based on wireless communication IEEE 802.11 to control electrical machine. IEEE 802.11 standard is recommended for this type of applications because it provides a faster connection, better range from the base station, and better security. Therefore, our contribution is to study a new technique to control and monitor the rotating electrical machines (motors, generators) using wireless communication. The reliability of radio channel inside rotating electrical machine is also discussed. Then, the communication protocol, software and hardware design used for the proposed system are presented in detail and the experimental results of our system are illustrated.

Keywords: control, DFIM machine, electromagnetic field, EMC, IEEE 802.11, monitoring, rotating electrical machines, wireless communication

Procedia PDF Downloads 688
4755 Health Monitoring of Concrete Assets in Refinery

Authors: Girish M. Bhatia

Abstract:

Most of the important structures in refinery complex are RCC Structures for which in-depth structural monitoring and inspection is required for incessant service. Reinforced concrete structures can be under threat from a combination of insidious challenges due to environmental conditions, including temperature and humidity that lead to accelerated deterioration mechanisms like carbonation, as well as marine exposure, above and below ground structures can experience ingress from aggressive ground waters carrying chlorides and sulphates leading to unexpected deterioration that threaten the integrity of a vital structural asset. By application of health monitoring techniques like corrosion monitoring with help of sensor probes, visual inspection of high rise structures with help of drones, it is possible to establish an early warning at the onset of these destructive processes.

Keywords: concrete structures, corrosion sensors, drones, health monitoring

Procedia PDF Downloads 391
4754 Rural Women in Serbia: Key Challenges in Enjoyment of Economic and Social Rights

Authors: Mirjana Dokmanovic

Abstract:

In recent years, the disadvantaged and marginalised position of rural women in the Republic of Serbia has been recognised in a number of national strategies and policy papers. A number of measures have been adopted by the government aimed at economic empowerment of rural women and eliminating barriers to accessing decision making and economic and social opportunities. However, their implementation pace is still slow. The aim of the paper is to indicate the necessity of a comprehensive policy approach to eliminating discrimination against rural women that would include policy and financial commitments for enhancing agricultural and rural development as a whole, instead of taking fragmented measures targeting consequences instead of causes. The paper introduces main findings of the study of challenges, constraints, and opportunities of rural women in Serbia to enjoy their economic and social rights. The research methodology included the desk research and the qualitative analysis of the available data, statistics, policy papers, studies, and reports produced by the government, ministries and other governmental bodies, independent human rights bodies, and civil society organizations (CSOs). The findings of the study reveal that rural women are at great risk of poverty, particularly in remote areas, and when getting old or widowed. Young rural women working in agriculture are also in unfavorable position, as they do not have opportunities to enjoy their rights during pregnancy and maternity leave, childcare leave and leave due to the special care of a child. The study indicates that the main causes of their unfavorable position are related to the prevalent patriarchal surrounding and economic and social underdevelopment of rural areas in Serbia. Gender inequalities have been particularly present in accessing land and property rights, inheritance, education, social protection, healthcare, and decision making. Women living in the rural areas are exposed at high risk of discrimination in all spheres of public and private life that undermine their enjoyment of basic economic, social and cultural rights. The vulnerability of rural women to discrimination increases in cases of the intersectionality of other grounds of discrimination, such as disability, ethnicity, age, health condition and sexual discrimination. If they are victims of domestic violence, their experience lack of access to shelters and protection services. Despite the State’s recognition of the marginalized position of rural women, there is still a lack of a comprehensive policy approach to improving the economic and social position of rural women.

Keywords: agricultural and rural development, care economy, discrimination against women, economic and social rights, feminization of poverty, Republic of Serbia, rural women

Procedia PDF Downloads 247
4753 Role of Water Supply in the Functioning of the MLDB Systems

Authors: Ramanpreet Kaur, Upasana Sharma

Abstract:

The purpose of this paper is to address the challenges faced by MLDB system at the piston foundry plant due to interruption in supply of water. For the MLDB system to work in Model, two sub-units must be connected to the robotic main unit. The system cannot function without robotics and water supply by the fan (WSF). Insufficient water supply is the cause of system failure. The system operates at top performance using two sub-units. If one sub-unit fails, the system capacity is reduced. Priority of repair is given to the main unit i.e. Robotic and WSF. To solve the problem, semi-Markov process and regenerative point technique are used. Relevant graphs are also included to particular case.

Keywords: MLDB system, robotic, semi-Markov process, regenerative point technique

Procedia PDF Downloads 65
4752 Key Affecting Factors for Social Sustainability through Urban Green Space Planning

Authors: Raziyeh Teimouri, Sadasivam Karuppannan, Alpana Sivam, Ning Gu

Abstract:

Urban Green Space (UGS) is one of the most critical components of urban systems to create sustainable cities. UGS has valuable social benefits that closely correlate with people's life quality. Studying social sustainability factors that can be achieved by green spaces is required for optimal UGS planning to increase urban social sustainability. This paper aims to identify key factors that enhance urban social sustainability through UGS planning. To reach the goal of the study international experts’ survey has been conducted. According to the results of the survey analysis, factors of proper distribution, links to public transportation, walkable access, sense of place, social interactions, public education, safety and security, walkability and cyclability, physical activity and recreational facilities, suitability for all ages, disabled people, women, and children are among the key factors that should consider in UGS planning programs to promote urban social sustainability.

Keywords: UGS, planning, social sustainability, key factors

Procedia PDF Downloads 67
4751 Improvement of Mechanical Properties of Recycled High-Density and Low-Density Polyethylene Blends through Extrusion, Reinforcement, and Compatibilization Approaches

Authors: H. Kharmoudi, S. Elkoun, M. Robert, C. Diez

Abstract:

In the literature, the elaboration of polymer blends based on recycled HDPE and LDPE is challenging because of the non-miscibility. Ensuring the compatibility of blends is one of the challenges; this study will discuss the different methods to be adopted to assess the compatibility of polymer blends. The first one aims to act on the extrusion process while varying the speed, flow rate, and residence time. The second method has as its purpose the use of grafted anhydride maleic elastomer chains as a compatibilizer. The results of the formulations will be characterized by means of differential scanning calorimetric (DSC) as well as mechanical tensile and bending tests to assess whether pipes made from recycled polyethylene meet the standards.

Keywords: recycled HDPE, LDPE, compatibilizer, mechanical tests

Procedia PDF Downloads 184
4750 Authentication of Physical Objects with Dot-Based 2D Code

Authors: Michał Glet, Kamil Kaczyński

Abstract:

Counterfeit goods and documents are a global problem, which needs more and more sophisticated methods of resolving it. Existing techniques using watermarking or embedding symbols on objects are not suitable for all use cases. To address those special needs, we created complete system allowing authentication of paper documents and physical objects with flat surface. Objects are marked using orientation independent and resistant to camera noise 2D graphic codes, named DotAuth. Based on the identifier stored in 2D code, the system is able to perform basic authentication and allows to conduct more sophisticated analysis methods, e.g., relying on augmented reality and physical properties of the object. In this paper, we present the complete architecture, algorithms and applications of the proposed system. Results of the features comparison of the proposed solution and other products are presented as well, pointing to the existence of many advantages that increase usability and efficiency in the means of protecting physical objects.

Keywords: anti-forgery, authentication, paper documents, security

Procedia PDF Downloads 126
4749 Review of Suitable Advanced Oxidation Processes for Degradation of Organic Compounds in Produced Water during Enhanced Oil Recovery

Authors: Smita Krishnan, Krittika Chandran, Chandra Mohan Sinnathambi

Abstract:

Produced water and its treatment and management are growing challenges in all producing regions. This water is generally considered as a nonrevenue product, but it can have significant value in enhanced oil recovery techniques if it meets the required quality standards. There is also an interest in the beneficial uses of produced water for agricultural and industrial applications. Advanced Oxidation Process is a chemical technology that has been growing recently in the wastewater treatment industry, and it is highly recommended for non-easily removal of organic compounds. The efficiency of AOPs is compound specific, therefore, the optimization of each process should be done based on different aspects.

Keywords: advanced oxidation process, photochemical processes, degradation, organic contaminants

Procedia PDF Downloads 497
4748 Nigeria Rural Water Supply Management: Participatory Process as the Best Option

Authors: E. O. Aluta, C. A. Booth, D. G. Proverbs, T. Appleby

Abstract:

Challenges in the effective management of potable water have attracted global attention in recent years and remain many world regions’ major priorities. Scarcity and unavailability of potable water may potentially escalate poverty, obviate democratic expression of views and militate against inter-sectoral development. These challenges contra-indicate the inherent potentials of the resource. Thus, while creation of poverty may be regarded as a broad-based problem, it is capable of reflecting life-span reduction diseases, the friction of interests manifesting in threats and warfare, the relegation of democratic principles for authoritarian definitions and Human Rights abuse. The challenges may be identified as manifestations of ineffective management of potable water resource and therefore, regarded as major problems in environmental protection. In reaction, some nations have re-examined their laws and policies, while others have developed innovative projects, which seek to ameliorate difficulties of providing sustainable potable water. The problems resonate in Nigeria, where the legal framework supporting the supply and management of potable water has been criticized as ineffective. This has impacted more on rural community members, often regarded as ‘voiceless’. At that level, the participation of non-state actors has been identified as an effective strategy, which can improve water supply. However, there are indications that there is no pragmatic application of this, resulting in over-centralization and top-down management. Thus, this study focuses on how the participatory process may enable the development of participatory water governance framework, for use in Nigeria rural communities. The Rural Advisory Board (RAB) is proposed as a governing body to promote proximal relationships, institute democratisation borne out of participation, while enabling effective accountability and information. The RAB establishes mechanisms for effectiveness, taking into consideration Transparency, Accountability and Participation (TAP), advocated as guiding principles of decision-makers. Other tools, which may be explored in achieving these are, Laws and Policies supporting the water sector, under the direction of the Ministries and Law Courts, which ensure non-violation of laws. Community norms and values, consisting of Nigerian traditional belief system, perceptions, attitude and reality (often undermined in favour of legislations), are relied on to pave the way for enforcement. While the Task Forces consist of community members with specific designation of duties, which ensure compliance and enforceability, a cross-section of community members are assigned duties. Thus, the principle of participation is pragmatically reflected. A review of the literature provided information on the potentials of the participatory process, in potable water governance. Qualitative methodology was explored by using the semi-structured interview as strategy for inquiry. The purposive sampling strategy, consisting of homogeneous, heterogeneous and criterion techniques was applied to enable sampling. The samples, sourced from diverse positions of life, were from the study area of Delta State of Nigeria, involving three local governments of Oshimili South, Uvwie and Warri South. From the findings, there are indications that the application of the participatory process is inhered with empowerment of the rural community members to make legitimate demands for TAP. This includes the obviation of mono-decision making for the supply and management of potable water. This is capable of restructuring the top-down management to a top-down/bottom-up system.

Keywords: participation, participatory process, participatory water governance, rural advisory board

Procedia PDF Downloads 370
4747 Artificial Intelligence and Police

Authors: Mehrnoosh Abouzari

Abstract:

Artificial intelligence has covered all areas of human life and has helped or replaced many jobs. One of the areas of application of artificial intelligence in the police is to detect crime, identify the accused or victim and prove the crime. It will play an effective role in implementing preventive justice and creating security in the community, and improving judicial decisions. This will help improve the performance of the police, increase the accuracy of criminal investigations, and play an effective role in preventing crime and high-risk behaviors in society. This article presents and analyzes the capabilities and capacities of artificial intelligence in police and similar examples used worldwide to prove the necessity of using artificial intelligence in the police. The main topics discussed include the performance of artificial intelligence in crime detection and prediction, the risk capacity of criminals and the ability to apply arbitray institutions, and the introduction of artificial intelligence programs implemented worldwide in the field of criminal investigation for police.

Keywords: police, artificial intelligence, forecasting, prevention, software

Procedia PDF Downloads 195
4746 Parallel Computing: Offloading Matrix Multiplication to GPU

Authors: Bharath R., Tharun Sai N., Bhuvan G.

Abstract:

This project focuses on developing a Parallel Computing method aimed at optimizing matrix multiplication through GPU acceleration. Addressing algorithmic challenges, GPU programming intricacies, and integration issues, the project aims to enhance efficiency and scalability. The methodology involves algorithm design, GPU programming, and optimization techniques. Future plans include advanced optimizations, extended functionality, and integration with high-level frameworks. User engagement is emphasized through user-friendly interfaces, open- source collaboration, and continuous refinement based on feedback. The project's impact extends to significantly improving matrix multiplication performance in scientific computing and machine learning applications.

Keywords: matrix multiplication, parallel processing, cuda, performance boost, neural networks

Procedia PDF Downloads 41
4745 Challenges in Anti-Counterfeiting of Cyber-Physical Systems

Authors: Daniel Kliewe, Arno Kühn, Roman Dumitrescu, Jürgen Gausemeier

Abstract:

This paper examines the system protection for cyber-physical systems (CPS). CPS are particularly characterized by their networking system components. This means they are able to adapt to the needs of their users and its environment. With this ability, CPS have new, specific requirements on the protection against anti-counterfeiting, know-how loss and manipulation. They increase the requirements on system protection because piracy attacks can be more diverse, for example because of an increasing number of interfaces or through the networking abilities. The new requirements were identified and in a next step matched with existing protective measures. Due to the found gap the development of new protection measures has to be forced to close this gap. Moreover a comparison of the effectiveness between selected measures was realized and the first results are presented in the paper.

Keywords: anti-counterfeiting, cyber physical systems, intellectual property (IP), knowledge management, system protection

Procedia PDF Downloads 486