Search results for: security mechanism
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5641

Search results for: security mechanism

2581 An Integrated Lightweight Naïve Bayes Based Webpage Classification Service for Smartphone Browsers

Authors: Mayank Gupta, Siba Prasad Samal, Vasu Kakkirala

Abstract:

The internet world and its priorities have changed considerably in the last decade. Browsing on smart phones has increased manifold and is set to explode much more. Users spent considerable time browsing different websites, that gives a great deal of insight into user’s preferences. Instead of plain information classifying different aspects of browsing like Bookmarks, History, and Download Manager into useful categories would improve and enhance the user’s experience. Most of the classification solutions are server side that involves maintaining server and other heavy resources. It has security constraints and maybe misses on contextual data during classification. On device, classification solves many such problems, but the challenge is to achieve accuracy on classification with resource constraints. This on device classification can be much more useful in personalization, reducing dependency on cloud connectivity and better privacy/security. This approach provides more relevant results as compared to current standalone solutions because it uses content rendered by browser which is customized by the content provider based on user’s profile. This paper proposes a Naive Bayes based lightweight classification engine targeted for a resource constraint devices. Our solution integrates with Web Browser that in turn triggers classification algorithm. Whenever a user browses a webpage, this solution extracts DOM Tree data from the browser’s rendering engine. This DOM data is a dynamic, contextual and secure data that can’t be replicated. This proposal extracts different features of the webpage that runs on an algorithm to classify into multiple categories. Naive Bayes based engine is chosen in this solution for its inherent advantages in using limited resources compared to other classification algorithms like Support Vector Machine, Neural Networks, etc. Naive Bayes classification requires small memory footprint and less computation suitable for smartphone environment. This solution has a feature to partition the model into multiple chunks that in turn will facilitate less usage of memory instead of loading a complete model. Classification of the webpages done through integrated engine is faster, more relevant and energy efficient than other standalone on device solution. This classification engine has been tested on Samsung Z3 Tizen hardware. The Engine is integrated into Tizen Browser that uses Chromium Rendering Engine. For this solution, extensive dataset is sourced from dmoztools.net and cleaned. This cleaned dataset has 227.5K webpages which are divided into 8 generic categories ('education', 'games', 'health', 'entertainment', 'news', 'shopping', 'sports', 'travel'). Our browser integrated solution has resulted in 15% less memory usage (due to partition method) and 24% less power consumption in comparison with standalone solution. This solution considered 70% of the dataset for training the data model and the rest 30% dataset for testing. An average accuracy of ~96.3% is achieved across the above mentioned 8 categories. This engine can be further extended for suggesting Dynamic tags and using the classification for differential uses cases to enhance browsing experience.

Keywords: chromium, lightweight engine, mobile computing, Naive Bayes, Tizen, web browser, webpage classification

Procedia PDF Downloads 148
2580 Beliefs in Auspicious Materials of Shop Entrepreneurs in Maung Hat Yai, Thailand

Authors: Punya Tepsing

Abstract:

This research aimed to study the beliefs in auspicious materials of entrepreneurs in Muang Hat Yai. The data were collected via documentary research and field work including interviews, observations shops in Hat Yai which used auspicious materials to bring lucks to the shops. The results were as follows. The beliefs in auspicious materials that the entrepreneurs had were of three areas: 1) The auspicious materials could correct the improperness of the shop location, for example, the shop situated opposite a branch road, a shrine, or a bank. The owner usually corrected it by putting Chinese auspicious materials in front of or in the shop, for example, a lion holding a sword in his mouth, or a mirror, etc. 2) The auspicious materials could bring in more income. The owner of the shop usually put the auspicious materials such as a cat beckoning and a bamboo fish trap believed to trap money in front of or inside the shop. 3) The auspicious materials like turtles, paired fish and a monster holding the moon in his mouth could solve life problems including health, family, and safety problems. The use of these auspicious materials showed the blending of the beliefs of the Chinese shop entrepreneurs with the Thai folk beliefs. What is interesting is that Hat Yai is located near the three southern border provinces which are the unrest area and this may cause the number of tourists to decline. This prompted them to build a mechanism in adjusting themselves both to save their lives and to increase the number of customers. Auspicious materials can make them feel more confident.

Keywords: belief, auspicious materials, shop, entrepreneur, Maung Hat Yai

Procedia PDF Downloads 229
2579 The Use of Learning Management Systems during Emerging the Tacit Knowledge

Authors: Ercan Eker, Muhammer Karaman, Akif Aslan, Hakan Tanrikuluoglu

Abstract:

Deficiency of institutional memory and knowledge management can result in information security breaches, loss of prestige and trustworthiness and the worst the loss of know-how and institutional knowledge. Traditional learning management within organizations is generally handled by personal efforts. That kind of struggle mostly depends on personal desire, motivation and institutional belonging. Even if an organization has highly motivated employees at a certain time, the institutional knowledge and memory life cycle will generally remain limited to these employees’ spending time in this organization. Having a learning management system in an organization can sustain the institutional memory, knowledge and know-how in the organization. Learning management systems are much more needed especially in public organizations where the job rotation is frequently seen and managers are appointed periodically. However, a learning management system should not be seen as an organizations’ website. It is a more comprehensive, interactive and user-friendly knowledge management tool for organizations. In this study, the importance of using learning management systems in the process of emerging tacit knowledge is underlined.

Keywords: knowledge management, learning management systems, tacit knowledge, institutional memory

Procedia PDF Downloads 362
2578 Benchmarking of Pentesting Tools

Authors: Esteban Alejandro Armas Vega, Ana Lucila Sandoval Orozco, Luis Javier García Villalba

Abstract:

The benchmarking of tools for dynamic analysis of vulnerabilities in web applications is something that is done periodically, because these tools from time to time update their knowledge base and search algorithms, in order to improve their accuracy. Unfortunately, the vast majority of these evaluations are made by software enthusiasts who publish their results on blogs or on non-academic websites and always with the same evaluation methodology. Similarly, academics who have carried out this type of analysis from a scientific approach, the majority, make their analysis within the same methodology as well the empirical authors. This paper is based on the interest of finding answers to questions that many users of this type of tools have been asking over the years, such as, to know if the tool truly test and evaluate every vulnerability that it ensures do, or if the tool, really, deliver a real report of all the vulnerabilities tested and exploited. This kind of questions have also motivated previous work but without real answers. The aim of this paper is to show results that truly answer, at least on the tested tools, all those unanswered questions. All the results have been obtained by changing the common model of benchmarking used for all those previous works.

Keywords: cybersecurity, IDS, security, web scanners, web vulnerabilities

Procedia PDF Downloads 305
2577 Somatosensory-Evoked Blink Reflex in Peripheral Facial Palsy

Authors: Sarah Sayed El- Tawab, Emmanuel Kamal Azix Saba

Abstract:

Objectives: Somatosensory blink reflex (SBR) is an eye blink response obtained from electrical stimulation of peripheral nerves or skin area of the body. It has been studied in various neurological diseases as well as among healthy subjects in different population. We designed this study to detect SBR positivity in patients with facial palsy and patients with post facial syndrome, to relate the facial palsy severity and the presence of SBR, and to associate between trigeminal BR changes and SBR positivity in peripheral facial palsy patients. Methods: 50 patients with peripheral facial palsy and post-facial syndrome 31 age and gender matched healthy volunteers were enrolled to this study. Facial motor conduction studies, trigeminal BR, and SBR were studied in all. Results: SBR was elicited in 67.7% of normal subjects, in 68% of PFS group, and in 32% of PFP group. On the non-paralytic side SBR was found in 28% by paralyzed side stimulation and in 24% by healthy side stimulation among PFP patients. For PFS group SBR was found on the non- paralytic side in 48%. Bilateral SBR elicitability was higher than its unilateral elicitability. Conclusion: Increased brainstem interneurons excitability is not essential to generate SBR. The hypothetical sensory-motor gating mechanism is responsible for SBR generation.

Keywords: somatosensory evoked blink reflex, post facial syndrome, blink reflex, enchanced gain

Procedia PDF Downloads 604
2576 Tribological Properties of Different Mass Ratio High Velocity Oxygen Fuel-Sprayed Al₂O₃-TiO₂ Coatings on Ti-6Al-4V Alloy

Authors: Mehmet Fahri Sarac, Gokcen Akgun

Abstract:

Ti–6Al–4V alloys are widely used in biomedical industries because of its attractive mechanical and physicochemical properties. However, they have poor wear resistance. High velocity oxygen fuel (HVOF) coatings were investigated as a way to improve the wear resistance of this alloy. In this paper, different mass ratio of Al₂O₃-TiO₂ powders (60/40, 87/13 and 97/3) was employed to enhance the tribological properties of Ti–6Al–4V. The tribological behavior was investigated by wear tests using ball-on-disc and pin-on-disc tribometer. The microstructures of the contact surfaces were determined by a scanning electron microscopy before and after the test to study the wear mechanism. Uncoated and coated surfaces after wear test are also subjected to micro-hardness tests. The tribological test results showed that the microhardness, friction and wear resistance of coated Ti-6Al-4V alloys increases by increasing TiO₂ content in the powder composite when other experimental conditions were constant. Finally, Al₂O₃-TiO₂ powder composites for the investigated conditions, both coating samples had satisfactory values of friction and wear resistance, and they could be suitable candidates for Ti–6Al–4V material.

Keywords: HVOF (High Velocity Oxygen Fuel), Al₂O₃-TiO₂, Ti-6Al-4V, tribology

Procedia PDF Downloads 174
2575 The Capacity Building in the Natural Disaster Management of Thailand

Authors: Eakarat Boonreang

Abstract:

The past two decades, Thailand faced the natural disasters, for instance, Gay typhoon in 1989, tsunami in 2004, and huge flood in 2011. The disaster management in Thailand was improved both structure and mechanism for cope with the natural disaster since 2007. However, the natural disaster management in Thailand has various problems, for examples, cooperation between related an organizations have not unity, inadequate resources, the natural disaster management of public sectors not proactive, people has not awareness the risk of the natural disaster, and communities did not participate in the natural disaster management. Objective of this study is to find the methods for capacity building in the natural disaster management of Thailand. The concept and information about the capacity building and the natural disaster management of Thailand were reviewed and analyzed by classifying and organizing data. The result found that the methods for capacity building in the natural disaster management of Thailand should be consist of 1)link operation and information in the natural disaster management between nation, province, local and community levels, 2)enhance competency and resources of public sectors which relate to the natural disaster management, 3)establish proactive natural disaster management both planning and implementation, 4)decentralize the natural disaster management to local government organizations, 5)construct public awareness in the natural disaster management to community, 6)support Community Based Disaster Risk Management (CBDRM) seriously, and 7)emphasis on participation in the natural disaster management of all stakeholders.

Keywords: capacity building, Community Based Disaster Risk Management (CBDRM), Natural Disaster Management, Thailand

Procedia PDF Downloads 542
2574 WebAppShield: An Approach Exploiting Machine Learning to Detect SQLi Attacks in an Application Layer in Run-time

Authors: Ahmed Abdulla Ashlam, Atta Badii, Frederic Stahl

Abstract:

In recent years, SQL injection attacks have been identified as being prevalent against web applications. They affect network security and user data, which leads to a considerable loss of money and data every year. This paper presents the use of classification algorithms in machine learning using a method to classify the login data filtering inputs into "SQLi" or "Non-SQLi,” thus increasing the reliability and accuracy of results in terms of deciding whether an operation is an attack or a valid operation. A method Web-App auto-generated twin data structure replication. Shielding against SQLi attacks (WebAppShield) that verifies all users and prevents attackers (SQLi attacks) from entering and or accessing the database, which the machine learning module predicts as "Non-SQLi" has been developed. A special login form has been developed with a special instance of data validation; this verification process secures the web application from its early stages. The system has been tested and validated, up to 99% of SQLi attacks have been prevented.

Keywords: SQL injection, attacks, web application, accuracy, database

Procedia PDF Downloads 131
2573 Improved Throttled Load Balancing Approach for Cloud Environment

Authors: Sushant Singh, Anurag Jain, Seema Sabharwal

Abstract:

Cloud computing is advancing with a rapid speed. Already, it has been adopted by a huge set of users. Easy to use and anywhere access like potential of cloud computing has made it more attractive relative to other technologies. This has resulted in reduction of deployment cost on user side. It has also allowed the big companies to sell their infrastructure to recover the installation cost for the organization. Roots of cloud computing have extended from Grid computing. Along with the inherited characteristics of its predecessor technologies it has also adopted the loopholes present in those technologies. Some of the loopholes are identified and corrected recently, but still some are yet to be rectified. Two major areas where still scope of improvement exists are security and performance. The proposed work is devoted to performance enhancement for the user of the existing cloud system by improving the basic throttled mapping approach between task and resources. The improved procedure has been tested using the cloud analyst simulator. The results are compared with the original and it has been found that proposed work is one step ahead of existing techniques.

Keywords: cloud analyst, cloud computing, load balancing, throttled

Procedia PDF Downloads 235
2572 Securing Internet of Things Devices in Healthcare industry: An Investigation into Efficient and Effective Authorization Procedures

Authors: Maruf Farhan, Abdul Salih, Sikandar Ali Tahir

Abstract:

Protecting patient information's confidentiality is paramount considering the widespread use of Internet of Things (IoT) gadgets in medical settings. This study's subjects are decentralized identifiers (DIDs) and verifiable credentials (VCs) in conjunction with an OAuth-based authorization framework, as they are the key to protecting IoT healthcare devices. DIDs enable autonomous authentication and trust formation between IoT devices and other entities. To authorize users and enforce access controls based on verified claims, VCs offer a secure and adaptable solution. Through the proposed method, medical facilities can improve the privacy and security of their IoT devices while streamlining access control administration. A Smart pill dispenser in a hospital setting is used to illustrate the advantages of this method. The findings demonstrate the value of DIDs, VCs, and OAuth-based delegation in protecting the IoT devices. Improved processes for authorizing and controlling access to IoT devices are possible thanks to the research findings, which also help ensure patient confidentiality in the healthcare sector.

Keywords: Iot, DID, authorization, verifiable credentials

Procedia PDF Downloads 62
2571 Cyclic NGR Peptide Anchored Block Co-Polymeric Nanoparticles as Dual Targeting Drug Delivery System for Solid Tumor Therapy

Authors: Madhu Gupta, G. P. Agrawa, Suresh P. Vyas

Abstract:

Certain tumor cells overexpress a membrane-spanning molecule aminopeptidase N (CD13) isoform, which is the receptor for peptides containing the NGR motif. NGR-modified Docetaxel (DTX)-loaded PEG-b-PLGA polymeric nanoparticles (cNGR-DNB-NPs) were developed and evaluated for their in vitro potential in HT-1080 cell line. The cNGR-DNB-NPs containing particles were about 148 nm in diameter with spherical shape and high encapsulation efficiency. Cellular uptake was confirmed both qualitatively and quantitatively by Confocal Laser Scanning Microscopy (CLSM) and flow cytometry. Both quantitatively and qualitatively results confirmed the NGR conjugated nanoparticles revealed the higher uptake of nanoparticles by CD13-overexpressed tumor cells. Free NGR inhibited the cellular uptake of cNGR-DNB-NPs, revealing the mechanism of receptor mediated endocytosis. In vitro cytotoxicity studies demonstrated that cNGR-DNB-NPs, formulation was more cytotoxic than unconjugated one, which were consistent well with the observation of cellular uptake. Hence, the selective delivery of cNGR-DNB-NPs formulation in CD13-overexpressing tumors represents a potential approach for the design of nanocarrier-based dual targeted delivery systems for targeting the tumor cells and vasculature.

Keywords: solid Tumor, docetaxel, targeting, NGR ligand

Procedia PDF Downloads 468
2570 Analysis of Genetic Variations in Camel Breeds (Camelus dromedarius)

Authors: Yasser M. Saad, Amr A. El Hanafy, Saleh A. Alkarim, Hussein A. Almehdar, Elrashdy M. Redwan

Abstract:

Camels are substantial providers of transport, milk, sport, meat, shelter, security and capital in many countries, particularly in Saudi Arabia. Inter simple sequence repeat technique was used to detect the genetic variations among some camel breeds (Majaheim, Safra, Wadah, and Hamara). Actual number of alleles, effective number of alleles, gene diversity, Shannon’s information index and polymorphic bands were calculated for each evaluated camel breed. Neighbor-joining tree that re-constructed for evaluated these camel breeds showed that, Hamara breed is distantly related from the other evaluated camels. In addition, the polymorphic sites, haplotypes and nucleotide diversity were identified for some camelidae cox1 gene sequences (obtained from NCBI). The distance value between C. bactrianus and C. dromedarius (0.072) was relatively low. Analysis of genetic diversity is an important way for conserving Camelus dromedarius genetic resources.

Keywords: camel, genetics, ISSR, neighbor-joining

Procedia PDF Downloads 457
2569 Virtual Container Yard: Assessing the Perceived Impact of Legal Implications to Container Carriers

Authors: L. Edirisinghe, P. Mukherjee, H. Edirisinghe

Abstract:

Virtual Container Yard (VCY) is a modern concept that helps to reduce the empty container repositioning cost of carriers. The concept of VCY is based on container interchange between shipping lines. Although this mechanism has been theoretically accepted by the shipping community as a feasible solution, it has not yet achieved the necessary momentum among container shipping lines (CSL). This paper investigates whether there is any legal influence on this industry myopia about the VCY. It is believed that this is the first publication that focuses on the legal aspects of container exchange between carriers. Not much literature on this subject is available. This study establishes with statistical evidence that there is a phobia prevailing in the shipping industry that exchanging containers with other carriers may lead to various legal implications. The complexity of exchange is two faceted. CSLs assume that offering a container to another carrier (obviously, a competitor in terms of commercial context) or using a container offered by another carrier may lead to undue legal implications. This research reveals that this fear is reflected through four types of perceived components, namely: shipping associate; warehouse associate; network associate; and trading associate. These components carry eighteen subcomponents that comprehensively cover the entire process of a container shipment. The statistical explanation has been supported through regression analysis; INCO terms were used to illustrate the shipping process.

Keywords: virtual container yard, legal, maritime law, inventory

Procedia PDF Downloads 151
2568 An Empirical Study of Determinants Influencing Telemedicine Services Acceptance by Healthcare Professionals: Case of Selected Hospitals in Ghana

Authors: Jonathan Kissi, Baozhen Dai, Wisdom W. K. Pomegbe, Abdul-Basit Kassim

Abstract:

Protecting patient’s digital information is a growing concern for healthcare institutions as people nowadays perpetually live their lives through telemedicine services. These telemedicine services have been confronted with several determinants that hinder their successful implementations, especially in developing countries. Identifying such determinants that influence the acceptance of telemedicine services is also a problem for healthcare professionals. Despite the tremendous increase in telemedicine services, its adoption, and use has been quite slow in some healthcare settings. Generally, it is accepted in today’s globalizing world that the success of telemedicine services relies on users’ satisfaction. Satisfying health professionals and patients are one of the crucial objectives of telemedicine success. This study seeks to investigate the determinants that influence health professionals’ intention to utilize telemedicine services in clinical activities in a sub-Saharan African country in West Africa (Ghana). A hybridized model comprising of health adoption models, including technology acceptance theory, diffusion of innovation theory, and protection of motivation theory, were used to investigate these quandaries. The study was carried out in four government health institutions that apply and regulate telemedicine services in their clinical activities. A structured questionnaire was developed and used for data collection. Purposive and convenience sampling methods were used in the selection of healthcare professionals from different medical fields for the study. The collected data were analyzed based on structural equation modeling (SEM) approach. All selected constructs showed a significant relationship with health professional’s behavioral intention in the direction expected from prior literature including perceived usefulness, perceived ease of use, management strategies, financial sustainability, communication channels, patients security threat, patients privacy risk, self efficacy, actual service use, user satisfaction, and telemedicine services systems securities threat. Surprisingly, user characteristics and response efficacy of health professionals were not significant in the hybridized model. The findings and insights from this research show that health professionals are pragmatic when making choices for technology applications and also their willingness to use telemedicine services. They are, however, anxious about its threats and coping appraisals. The identified significant constructs in the study may help to increase efficiency, quality of services, quality patient care delivery, and satisfactory user satisfaction among healthcare professionals. The implantation and effective utilization of telemedicine services in the selected hospitals will aid as a strategy to eradicate hardships in healthcare services delivery. The service will help attain universal health access coverage to all populace. This study contributes to empirical knowledge by identifying the vital factors influencing health professionals’ behavioral intentions to adopt telemedicine services. The study will also help stakeholders of healthcare to formulate better policies towards telemedicine service usage.

Keywords: telemedicine service, perceived usefulness, perceived ease of use, management strategies, security threats

Procedia PDF Downloads 126
2567 Increasing Abundance of Jellyfish in the Shorelines of Bangladesh: Analyzing the Policy Framework for Facing the Challenges

Authors: Md Mizanur Rahman, M. Aslam Alam, Muhammad Abu Yusuf

Abstract:

The abundance of Jellyfish across the coasts of the Bay of Bengal is increasing sharply due to marine pollution, increased sea acidification and climate change. Jellyfish draws our attention to address the local and global stressors. This also indicates that something wrong is happening in this bay behind the scenes. This study aimed to investigate how the policy framework governing the sea can be reformed. To do so, this study evaluated the existing policy, regulatory and institutional framework. Empirical data were collected from the middle coastal zone of Bangladesh. The secondary literature on policy, legal documents, and institutional arrangements were reviewed. The causes of poor coordination among different public sectors and non-compliance of laws were identified. The key findings show that despite the existing of Department of Environment, poor coordination with other departments, and lack of logistics and technical staffs have resulted in severe marine pollution and degradation of coastal and marine living resources. The existing policies had no monitoring and evaluation mechanisms. Non-compliance of the existing laws has been fueling the problems. This study provides an integrated policy and a guideline for updating the legal and institutional mechanism to manage coastal and marine living resources sustainably in Bangladesh to achieve Sustainable Development Goal 14.

Keywords: legal, institutional, framework, jellyfish

Procedia PDF Downloads 109
2566 Enablers of Total Quality Management for Social Enterprises: A Study of UAE Social Organizations

Authors: Farhat Sultana

Abstract:

Originality: TQM principles are considered the tools to enhance organizational performance for most organizations. The paper contributes to the literature on the social enterprise because social organizations are still far behind in implementing TQM as compared to other private, public, and nonprofit organizations. Study design: The study is based on the data and information provided by two case studies and one focus group of social enterprises. Purpose: The purpose of the study is to get a deep understating of TQM implementation and to recognize the enablers of TQM in social enterprises that enhance the organizational performance of social enterprises located in UAE. Findings: As per the findings of the study, key enablers of Total Quality management in the case enterprises are leadership support, strategic approach for quality, continuous improvement, process improvement, employee empowerment and customer focus practices, though some inhibitors for TQM implementation such as managerial structure for quality assurance and performance appraisal mechanism are also pointed out by the study. Research limitations: The study findings are only based on two case studies and one focus group, which is not enough to generalize the findings to all social organizations. Practical Implications: Identified TQM enablers can help management to implement TQM successfully in social enterprises. Social implications: The study provides enabling path for Social enterprises to implement TQM to seek quality output to build a better society.

Keywords: TQM, social enterprise, enablers of TQM, UAE

Procedia PDF Downloads 92
2565 The Mediterranean Migration Crisis: The North East Hotspot Policy

Authors: Loizos A. Hadjivasiliou, May Chehab

Abstract:

Confronted with the human tragedy unfolding in the Mediterranean during the 2011-2016 period, the European Union introduced for the first time the “hotspot approach”, the establishment of facilities for initial reception, identification registration, and fingerprinting of asylum seekers and migrants arriving in the EU by sea, at the frontline Member States. However, the lack of a comprehensive collective policy on migration management and border security left the Mediterranean Member States, mainly Italy, Greece, and Cyprus, struggling to overcome these challenges. The current study sheds light on the implementation of the hotspot approach as the frontispiece of the European response to the migration challenges, which, limited to the operational and financial support of the hosting member states, leads to heterogeneous burden-sharing. Within this framework, it highlights the fact that the implementation of the hotspots as a panacea carries the risk of transforming the Mediterranean member states into giant hotspots with unpredictable consequences for the future of the Schengen area.

Keywords: asylum, burden sharing, hotspots, migration management policy, Schengen area

Procedia PDF Downloads 165
2564 Service Life Modelling of Concrete Deterioration Due to Biogenic Sulphuric Acid (BSA) Attack-State-of-an-Art-Review

Authors: Ankur Bansal, Shashank Bishnoi

Abstract:

Degradation of Sewage pipes, sewage pumping station and Sewage treatment plants(STP) is of major concern due to difficulty in their maintenance and the high cost of replacement. Most of these systems undergo degradation due to Biogenic sulphuric acid (BSA) attack. Since most of Waste water treatment system are underground, detection of this deterioration remains hidden. This paper presents a literature review, outlining the mechanism of this attack focusing on critical parameters of BSA attack, along with available models and software to predict the deterioration due to this attack. This paper critically examines the various steps and equation in various Models of BSA degradation, detail on assumptions and working of different softwares are also highlighted in this paper. The paper also focuses on the service life design technique available through various codes and method to integrate the servile life design with BSA degradation on concrete. In the end, various methods enhancing the resistance of concrete against Biogenic sulphuric acid attack are highlighted. It may be concluded that the effective modelling for degradation phenomena may bring positive economical and environmental impacts. With current computing capabilities integrated degradation models combining the various durability aspects can bring positive change for sustainable society.

Keywords: concrete degradation, modelling, service life, sulphuric acid attack

Procedia PDF Downloads 297
2563 Modeling of Ductile Fracture Using Stress-Modified Critical Strain Criterion for Typical Pressure Vessel Steel

Authors: Carlos Cuenca, Diego Sarzosa

Abstract:

Ductile fracture occurs by the mechanism of void nucleation, void growth and coalescence. Potential sites for initiation are second phase particles or non-metallic inclusions. Modelling of ductile damage at the microscopic level is very difficult and complex task for engineers. Therefore, conservative predictions of ductile failure using simple models are necessary during the design and optimization of critical structures like pressure vessels and pipelines. Nowadays, it is well known that the initiation phase is strongly influenced by the stress triaxiality and plastic deformation at the microscopic level. Thus, a simple model used to study the ductile failure under multiaxial stress condition is the Stress Modified Critical Strain (SMCS) approach. Ductile rupture has been study for a structural steel under different stress triaxiality conditions using the SMCS method. Experimental tests are carried out to characterize the relation between stress triaxiality and equivalent plastic strain by notched round bars. After calibration of the plasticity and damage properties, predictions are made for low constraint bending specimens with and without side grooves. Stress/strain fields evolution are compared between the different geometries. Advantages and disadvantages of the SMCS methodology are discussed.

Keywords: damage, SMSC, SEB, steel, failure

Procedia PDF Downloads 287
2562 The Duty of Application and Connection Providers Regarding the Supply of Internet Protocol by Court Order in Brazil to Determine Authorship of Acts Practiced on the Internet

Authors: João Pedro Albino, Ana Cláudia Pires Ferreira de Lima

Abstract:

Humanity has undergone a transformation from the physical to the virtual world, generating an enormous amount of data on the world wide web, known as big data. Many facts that occur in the physical world or in the digital world are proven through records made on the internet, such as digital photographs, posts on social media, contract acceptances by digital platforms, email, banking, and messaging applications, among others. These data recorded on the internet have been used as evidence in judicial proceedings. The identification of internet users is essential for the security of legal relationships. This research was carried out on scientific articles and materials from courses and lectures, with an analysis of Brazilian legislation and some judicial decisions on the request of static data from logs and Internet Protocols (IPs) from application and connection providers. In this article, we will address the determination of authorship of data processing on the internet by obtaining the IP address and the appropriate judicial procedure for this purpose under Brazilian law.

Keywords: IP address, digital forensics, big data, data analytics, information and communication technology

Procedia PDF Downloads 108
2561 Study of the Formation Mechanism of Dipalmitoylphosphatidylcholine Liposomes and Calcium Ion Complexes

Authors: T. Mdzinarashvili, M. Khvedelidze, E. Shekiladze, S. Chinchaladze, M. Mdzinarashvili

Abstract:

The study of the possible interaction between calcium ions and lipids is of great importance for the studies of complexes of calcium drug-carrying nanoparticles. We prepared calcium-containing complex liposomes from Dipalmitoylphosphatidylcholine (DPPC) lipids and studied their thermodynamic properties. In calorimetric studies, we determined that the phase transition temperature of these complexes is close to 420 C. It was shown that both hydrophobic and hydrophilic connections take part in the formation of calcium nanoparticles. We were interested in hydrophilic bonds represented by hydrogen bonds. We have shown that these hydrogen bonds are formed between the phospholipid heads, and the main contributor is the oxygen atoms in the phosphoric acid residues. In addition, based on the amount of heat absorbed during the breaking of hydrogen bonds formed between calcium-containing nanoparticle complexes, it can be concluded that the hydrogen atoms in the head of DPPC lipids form hydrogen bonds between P=O and P-O groups of phosphate. The energy of heat absorption measured by the calorimeter is of the order obtained by breaking the hydrogen bonds we have specified. Thus, we conclude that our approach to the model of liposome formation from lipids is correct. As for calcium atoms - due to the fact that it is present in the form of positive ions in the liposome, they will connect only with negatively charged phosphorus ions.

Keywords: DPPC, liposomes, calcium, complex nanoparticles

Procedia PDF Downloads 98
2560 Morphology of the Acetabular Cartilage Surface in Elderly Cadavers Analyzing the Contact between the Acetabulum and Femoral Head

Authors: Keisuke Akiyama, Takashi Sakai, Junichiro Koyanagi, Hideki Yoshikawa, Kazuomi Sugamoto

Abstract:

The geometry of acetabular cartilage surface plays an important role in hip joint biomechanics. The aim of this study was to analyze the morphology of acetabular articular cartilage surface in elderly subjects using a 3D-digitizer. Twenty hemipelves from 12 subjects (mean ages 85 years) were scanned with 3D-digitizer. Each acetabular surface model was divided into four regions: anterosuperior (AS), anteroinferior (AI), posterosuperior (PS), and posteroinferior (PI). In the global acetabulum and each region, the acetabular sphere radius and the standard deviation (SD) of the distance from the acetabular sphere center to the acetabular cartilage surface were calculated. In the global acetabulum, the distance between the acetabular surface model and the maximum sphere which did not penetrate over the acetabular surface model was calculated as the inferred femoral head, and then the distribution was mapped at intervals of 0.5 mm. The SD in AS was significantly larger than that in AI (p = 0.006) and PI (p = 0.001). The SD in PS was significantly larger than that in PI (p = 0.005). The closest region (0-0.5 mm) tended to be distributed at anterior or posterosuperior acetabular edge. The contact between the femoral head and acetabulum might start at the periphery of the lunate surface, especially in the anterior or posterosuperior region. From viewpoint of acetabular morphology, the acetabular articular cartilage in the anterior or posterosuperior edge could be more vulnerable due to direct contact mechanism.

Keywords: acetabulum, cartilage, morphology, 3D-digitizer

Procedia PDF Downloads 333
2559 Public Private Partnership for Infrastructure Projects: Mapping the Key Risks

Authors: Julinda Keçi

Abstract:

In many countries, governments have been promoting the involvement of private sector entities to enter into long-term agreements for the development and delivery of large infrastructure projects, with a focus on overcoming the limitations upon public fund of the traditional approach. The involvement of private sector through public-private partnerships (PPP) brings in new capital investments, value for money and additional risks to handle. Worldwide research studies have shown that an objective, systematic, reliable and user-oriented risk assessment process and an optimal allocation mechanism among different stakeholders is crucial to the successful completion. In this framework this paper, which is the first stage of a research study, aims to identify the main risks for the delivery of PPP projects. A review of cross-countries research projects and case studies was performed to map the key risks affecting PPP infrastructure delivery. The matrix of mapping offers a summary of the frequency of factors, clustered in eleven categories: Construction, Design, Economic, Legal, Market, Natural, Operation, Political, Project finance, Project selection and Relationship. Results will highlight the most critical risk factors, and will hopefully assist the project managers in directing the managerial attention in the further stages of risk allocation.

Keywords: construction, infrastructure, public private partnerships, risks

Procedia PDF Downloads 426
2558 The Impact of the Interest Rates on Investments in the Context of Financial Crisis

Authors: Joanna Stawska

Abstract:

The main objective of this article is to examine the impact of interest rates on investments in Poland in the context of financial crisis. The paper also investigates the dependence of bank loans to enterprises on interbank market rates. The article studies the impact of interbank market rate on the level of investments in Poland. Besides, this article focuses on the research of the correlation between the level of corporate loans and the amount of investments in Poland in order to determine the indirect impact of central bank interest rates through the transmission mechanism of monetary policy on the real economy. To achieve the objective we have used econometric and statistical research methods like: econometric model and Pearson correlation coefficient. This analysis suggests that the central bank reference rate inversely proportionally affects the level of investments in Poland and this dependence is moderate. This is also important issue because it is related to preparing of Poland to accession to euro area. The research is important from both theoretical and empirical points of view. The formulated conclusions and recommendations determine the practical significance of the paper which may be used in the decision making process of monetary and economic authorities of the country.

Keywords: central bank, financial crisis, interest rate, investments

Procedia PDF Downloads 419
2557 Analyzing the Effect of Design of Pipe in Shell and Tube Type Heat Exchanger by Measuring Its Heat Transfer Rate by Computation Fluid Dynamics and Thermal Approach

Authors: Dhawal Ladani

Abstract:

Shell and tube type heat exchangers are predominantly used in heat exchange between two fluids and other applications. This paper projects the optimal design of the pipe used in the heat exchanger in such a way to minimize the vibration occurring in the pipe. Paper also consists of the comparison of the different design of the pipe to get the maximize the heat transfer rate by converting laminar flow into the turbulent flow. By the updated design the vibration in the pipe due to the flow is also decreased. Computational Fluid Dynamics and Thermal Heat Transfer analysis are done to justifying the result. Currently, the straight pipe is used in the shell and tube type of heat exchanger where as per the paper the pipe consists of the curvature along with the pipe. Hence, the heat transfer area is also increased and result in the increasing in heat transfer rate. Curvature type design is useful to create turbulence and minimizing the vibration, also. The result will give the output comparison of the effect of laminar flow and the turbulent flow in the heat exchange mechanism, as well as, inverse effect of the boundary layer in heat exchanger is also justified.

Keywords: heat exchanger, heat transfer rate, laminar and turbulent effect, shell and tube

Procedia PDF Downloads 291
2556 Robust Medical Image Watermarking Using Frequency Domain and Least Significant Bits Algorithms

Authors: Volkan Kaya, Ersin Elbasi

Abstract:

Watermarking and stenography are getting importance recently because of copyright protection and authentication. In watermarking we embed stamp, logo, noise or image to multimedia elements such as image, video, audio, animation and text. There are several works have been done in watermarking for different purposes. In this research work, we used watermarking techniques to embed patient information into the medical magnetic resonance (MR) images. There are two methods have been used; frequency domain (Digital Wavelet Transform-DWT, Digital Cosine Transform-DCT, and Digital Fourier Transform-DFT) and spatial domain (Least Significant Bits-LSB) domain. Experimental results show that embedding in frequency domains resist against one type of attacks, and embedding in spatial domain is resist against another group of attacks. Peak Signal Noise Ratio (PSNR) and Similarity Ratio (SR) values are two measurement values for testing. These two values give very promising result for information hiding in medical MR images.

Keywords: watermarking, medical image, frequency domain, least significant bits, security

Procedia PDF Downloads 276
2555 Flame Retardancy of Organophosphorus Compound on Cellulose - an Eco Friendly Concern

Authors: M. A. Hannan, N. Matthias Neisius

Abstract:

Organophosphorus compound diethyloxymethyl-9-oxa-10-phosphaphenanthrene-10-oxide (DOPAC) was applied on cotton cellulose to impart eco-friendly flame retardant property to it. Here acetal linkage was introduced rather than conventionally used ester linkage to rescue from the undurability problem of flame retardant compound. Some acidic catalysts, sodium dihydrogen phosphate (NaH2PO4), ammonium dihydrogen phosphate (NH4H2PO4) and phosphoric acid (H3PO4) were successfully used to form acetal linkage between the base material and flame retardant compound. Inspiring limiting oxygen index (LOI) value of 22.4 was found after exclusive washing treatment. A good outcome of total heat of combustion (THC) 6.05 KJ/g was found possible during pyrolysis combustion flow calorimetry (PCFC) test of the treated sample. Low temperature dehydration with sufficient amount of char residue (14.89%) was experienced in case of treated sample. In addition, the temperature of peak heat release rate (TPHRR) 343.061°C supported the expected low temperature pyrolysis in condensed phase mechanism. With the consequence of pyrolysis effects, thermogravimetric analysis (TGA) also reported inspiring weight retention% of the treated samples.

Keywords: acetal linkage, char residue, cotton cellulose, flame retardant, loi, low temperature pyrolysis, organophosphorus, THC, THRR

Procedia PDF Downloads 280
2554 Increased Retention of Nanoparticle by Small Molecule Inhibitor in Cancer Cells

Authors: Neha Singh

Abstract:

Background: Nowadays, the nanoparticle is gaining unexceptional attention in targeted drug delivery. But before proceeding to this episode of accomplishment, the journey and closure of these nanoparticles inside the cells should be disentangle. Being foreign for the cells, nanoparticles will easily getcleared off without any effective outcome. As the cancer cells withhold these nanoparticles for a longer period of time, more will be the drug’s effect. Chlorpromazine is a cationic amphiphilic drug which is believed to inhibit clathrin-coated pit formation by a reversible translocation of clathrin and its adapter proteins from the plasma membrane to intracellular vesicles. Chlorpromazine has a role in increasing the retention of nanoparticles in cancer cells. The mechanism of action how this small molecule increases the retention of nanoparticles is still uncovered. Method: Polymeric nanoparticle (PLGA) with Cyanine3.5 dye were synthesized by solvent evaporation method and characterized for size and zeta potential. FTIR was also done. Pulse and chase studies with and without inhibitor were done to check the retention of nanoparticle using fluorescence microscopy. Mean fluorescence intensity was measured by ImageJ software. Results: Increased retention of nanoparticle with inhibitor was observed in both pulse and chase studies. Conclusion: Our results demonstrate that by repurposing these small molecule inhibitor, we can increase the retention of nanoparticle at the targeted site.

Keywords: nanoparticle, endocytosis, clathrin inhibitor, cancer cell

Procedia PDF Downloads 91
2553 A Review of Encryption Algorithms Used in Cloud Computing

Authors: Derick M. Rakgoale, Topside E. Mathonsi, Vusumuzi Malele

Abstract:

Cloud computing offers distributed online and on-demand computational services from anywhere in the world. Cloud computing services have grown immensely over the past years, especially in the past year due to the Coronavirus pandemic. Cloud computing has changed the working environment and introduced work from work phenomenon, which enabled the adoption of technologies to fulfill the new workings, including cloud services offerings. The increased cloud computing adoption has come with new challenges regarding data privacy and its integrity in the cloud environment. Previously advanced encryption algorithms failed to reduce the memory space required for cloud computing performance, thus increasing the computational cost. This paper reviews the existing encryption algorithms used in cloud computing. In the future, artificial neural networks (ANN) algorithm design will be presented as a security solution to ensure data integrity, confidentiality, privacy, and availability of user data in cloud computing. Moreover, MATLAB will be used to evaluate the proposed solution, and simulation results will be presented.

Keywords: cloud computing, data integrity, confidentiality, privacy, availability

Procedia PDF Downloads 112
2552 Sono- and Photocatalytic Degradation of Indigocarmine in Water Using ZnO

Authors: V. Veena, Suguna Yesodharan, E. P. Yesodharan

Abstract:

Two Advanced Oxidation Processes (AOP) i.e., sono- and photo-catalysis mediated by semiconductor oxide catalyst, ZnO has been found effective for the removal of trace amounts of the toxic dye pollutant Indigocarmine (IC) from water. The effect of various reaction parameters such as concentration of the dye, catalyst dosage, temperature, pH, dissolved oxygen etc. as well as the addition of oxidisers and presence of salts in water on the rate of degradation has been evaluated and optimised. The degradation follows variable kinetics depending on the concentration of the substrate, the order of reaction varying from 1 to 0 with increase in concentration. The reaction proceeds through a number of intermediates and many of them have been identified using GCMS technique. The intermediates do not affect the rate of degradation significantly. The influence of anions such as chloride, sulphate, fluoride, carbonate, bicarbonate, phosphate etc. on the degradation of IC is not consistent and does not follow any predictable pattern. Phosphates and fluorides inhibit the degradation while chloride, sulphate, carbonate and bicarbonate enhance. Adsorption studies of the dye in the absence as well as presence of these anions show that there may not be any direct correlation between the adsorption of the dye on the catalyst and the degradation. Oxidants such as hydrogen peroxide and persulphate enhance the degradation though the combined effect and it is less than the cumulative effect of individual components. COD measurements show that the degradation proceeds to complete mineralisation. The results will be presented and probable mechanism for the degradation will be discussed.

Keywords: AOP, COD, indigocarmine, photocatalysis, sonocatalysis

Procedia PDF Downloads 321