Search results for: smart devices security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5949

Search results for: smart devices security

2769 Predicting Destination Station Based on Public Transit Passenger Profiling

Authors: Xuyang Song, Jun Yin

Abstract:

The smart card has been an extremely universal tool in public transit. It collects a large amount of data on buses, urban railway transit, and ferries and provides possibilities for passenger profiling. This paper combines offline analysis of passenger profiling and real-time prediction to propose a method that can accurately predict the destination station in real-time when passengers tag on. Firstly, this article constructs a static database of user travel characteristics after identifying passenger travel patterns based on the Density-Based Spatial Clustering of Applications with Noise (DBSCAN). The dual travel passenger habits are identified: OD travel habits and D station travel habits. Then a rapid real-time prediction algorithm based on Transit Passenger Profiling is proposed, which can predict the destination of in-board passengers. This article combines offline learning with online prediction, providing a technical foundation for real-time passenger flow prediction, monitoring and simulation, and short-term passenger behavior and demand prediction. This technology facilitates the efficient and real-time acquisition of passengers' travel destinations and demand. The last, an actual case was simulated and demonstrated feasibility and efficiency.

Keywords: travel behavior, destination prediction, public transit, passenger profiling

Procedia PDF Downloads 10
2768 Centrifuge Testing to Determine the Effect of Temperature on the Adhesion Strength of Ice

Authors: Zaid A. Janjua, Barbara Turnbull, Kwing-So Choi

Abstract:

The adhesion of glaze ice on power infrastructure, ships and aerofoils cause monetary and structural damage. Here we investigate the influence of temperature as an important parameter affecting adhesion strength of ice. Two terms are defined to investigate this: 'freezing temperature', the temperature at which glaze ice forms; and 'ambient temperature', the temperature of the surrounding during the test. Using three metal surfaces, the adhesion strength of ice has been calculated as a value of shear stress at the point of detachment on a spinning centrifuge. Findings show that the ambient temperature has a greater influence than the freezing temperature on the adhesion strength of ice. This is because there exists an amorphous liquid-like layer at the ice-surface interface, whose bond with the surface increases in strength at lower ambient temperatures when the substrate conducts heat much faster than the ice and acts as a heat sink. The results will help us to measure the actual adhesion strength of ice to metal surfaces based on data from weather monitoring devices. Future tests envisaged focus on thermally non-conducting substrates and their influence on adhesion strength.

Keywords: ice adhesion, centrifuge, glaze ice, freezing temperature, ambient temperature

Procedia PDF Downloads 333
2767 Colorful Ethnoreligious Map of Iraq and the Current Situation of Minorities in the Country

Authors: Meszár Tárik

Abstract:

The aim of the study is to introduce the minority groups living in Iraq and to shed light on their current situation. The Middle East is a rather heterogeneous region in ethnic terms. It includes many ethnic, national, religious, linguistic, or ethnoreligious groups. The relationship between the majority and minority is the main cause of various conflicts in the region. It seems that most of the post-Ottoman states have not yet developed a unified national identity capable of integrating their multi-ethnic societies. The issue of minorities living in the Middle East is highly politicized and controversial, as the various Arab states consider the treatment of minorities as their internal affair, do not recognize discrimination or even deny the existence of any kind of minorities on their territory. This attitude of the Middle Eastern states may also be due to the fact that the minority issue can be abused and can serve as a reference point for the intervention policies of Western countries at any time. Methodologically, the challenges of these groups are perceived through the manifestos of prominent individuals and organizations belonging to minorities. The basic aim is to present the minorities’ own history in dealing with the issue. It also introduces the different ethnic and religious minorities in Iraq and analyzes their situation during the operation of the terrorist organization „Islamic State” and in the aftermath. It is clear that the situation of these communities deteriorated significantly with the advance of ISIS, but it is also clear that even after the expulsion of the militant group, we cannot necessarily report an improvement in this area, especially in terms of the ability of minorities to assert their interests and physical security. The emergence of armed militias involved in the expulsion of ISIS sometimes has extremely negative effects on them. Until the interests of non-Muslims are adequately represented at the local level and in the legislature, most experts and advocates believe that little will change in their situation. When conflicts flare, many Iraqi citizens usually leave Iraq, but because of the poor public security situation (threats from terrorist organizations, interventions by other countries), emigration causes serious problems not only outside the country’s borders but also within the country. Another ominous implication for minorities is that their communities are very slow if ever, to return to their homes after fleeing their own settlements. An important finding of the study is that this phenomenon is changing the face of traditional Iraqi settlements and threatens to plunge groups that have lived there for thousands of years into the abyss of history. Therefore, we not only present the current situation of minorities living in Iraq but also discuss their future possibilities.

Keywords: Middle East, Iraq, Islamic State, minorities

Procedia PDF Downloads 83
2766 Anterior Chamber Depth Measured with Orbscan and Pentacam Compared with Smith Method in 102 Phakic Eyes

Authors: Mohammad Ghandehari Motlagh

Abstract:

Purpose: Comparing anterior chamber depth (ACD) measured with Orbscan II and Pentacam HR compared with the Smith method results. Methods: Smith method (1979) is a reliable method of measuring ACD only with help of slit lamp. In this study 102 phakic eyes as PRK candidates were imaged with both OrbScan and Pentacam and finally ACD was measured thru Smith method with slit lamp. ACD measured with Smith method was presumed as the gold standard and was compared with ACD of the 2 imaging devices. Contraindication cases for PRK and pseudophakic eyes have been excluded from the study. Results: Mean age of the patients was 35.2 ±14.8 yrs/old including 56 M(54.9%)and 46 F(45.09%).Acceptable correlation of ACD measured thru Smith method with Orbscan and Pentacam are R=0.958 and R=0.942 respectively and so Orbscan results can be used in procedures relying on ACD. Conclusion: ACDs measured with OrbScan is more precise than Pentacam and so can be more useful in some surgery procedures relying ACD results such as phakic IOLs and in cycloplegia contraindications.

Keywords: orbscan, pentacam, anterior chamber depth, slit lamp

Procedia PDF Downloads 364
2765 Cuckoo Search Optimization for Black Scholes Option Pricing

Authors: Manas Shah

Abstract:

Black Scholes option pricing model is one of the most important concepts in modern world of computational finance. However, its practical use can be challenging as one of the input parameters must be estimated; implied volatility of the underlying security. The more precisely these values are estimated, the more accurate their corresponding estimates of theoretical option prices would be. Here, we present a novel model based on Cuckoo Search Optimization (CS) which finds more precise estimates of implied volatility than Particle Swarm Optimization (PSO) and Genetic Algorithm (GA).

Keywords: black scholes model, cuckoo search optimization, particle swarm optimization, genetic algorithm

Procedia PDF Downloads 450
2764 Evaluation of Fetal brain using Magnetic Resonance Imaging

Authors: Mahdi Farajzadeh Ajirlou

Abstract:

Ordinary fetal brain development can be considered by in vivo attractive reverberation imaging (MRI) from the 18th gestational week (GW) to term and depends fundamentally on T2-weighted and diffusion-weighted (DW) arrangements. The foremost commonly suspected brain pathologies alluded to fetal MRI for assist assessment are ventriculomegaly, lost corpus callosum, and anomalies of the posterior fossa. Brain division could be a crucial to begin with step in neuroimage examination. Within the case of fetal MRI it is especially challenging and critical due to the subjective introduction of the hatchling, organs that encompass the fetal head, and irregular fetal movement. A few promising strategies have been proposed but are constrained in their execution in challenging cases and in realtime division. Fetal MRI is routinely performed on a 1.5-Tesla scanner without maternal or fetal sedation. The mother lies recumbent amid the course of the examination, the length of which is ordinarily 45 to 60 minutes. The accessibility and continuous approval of standardizing fetal brain development directions will give critical devices for early discovery of impeded fetal brain development upon which to oversee high-risk pregnancies.

Keywords: brain, fetal, MRI, imaging

Procedia PDF Downloads 73
2763 Using Vulnerability to Reduce False Positive Rate in Intrusion Detection Systems

Authors: Nadjah Chergui, Narhimene Boustia

Abstract:

Intrusion Detection Systems are an essential tool for network security infrastructure. However, IDSs have a serious problem which is the generating of massive number of alerts, most of them are false positive ones which can hide true alerts and make the analyst confused to analyze the right alerts for report the true attacks. The purpose behind this paper is to present a formalism model to perform correlation engine by the reduction of false positive alerts basing on vulnerability contextual information. For that, we propose a formalism model based on non-monotonic JClassicδє description logic augmented with a default (δ) and an exception (є) operator that allows a dynamic inference according to contextual information.

Keywords: context, default, exception, vulnerability

Procedia PDF Downloads 256
2762 Antimicrobial Nanocompositions Made of Amino Acid Based Biodegradable Polymers

Authors: Nino Kupatadze, Mzevinar Bedinashvili, Tamar Memanishvili, Manana Gurielidze, David Tugushi, Ramaz Katsarava

Abstract:

Bacteria easily colonize the surfaces of tissues, surgical devices (implants, orthopedics, catheters, etc.), and instruments causing surgical device related infections. Therefore, the battle against bacteria and the prevention of surgical devices from biofilm formation is one of the main challenges of biomedicine today. Our strategy to the solution of this problem consists in using antimicrobial polymeric coatings as effective “shields” to protect surfaces from bacteria’s colonization and biofilm formation. As one of the most promising approaches look be the use of antimicrobial bioerodible polymeric nanocomposites containing silver nanoparticles (AgNPs). We assume that the combination of an erodible polymer with a strong bactericide should put obstacles to bacteria to occupy the surface and to form biofilm. It has to be noted that this kind of nanocomposites are also promising as wound dressing materials to treat infected superficial wounds. Various synthetic and natural polymers were used for creating biocomposites containing AgNPs as both particles' stabilizers and matrices forming elastic films at surfaces. One of the most effective systems to fabricate AgNPs is an ethanol solution of polyvinylpyrrolidone(PVP) with dissolved AgNO3–ethanol serves as a AgNO3 reductant and PVP as AgNPs stabilizer (through the interaction of nanoparticles with nitrogen atom of the amide group). Though PVP is biocompatible and film-forming polymer, it is not a good candidate to design either "biofilm shield" or wound dressing material because of a high solubility in water – though the solubility of PVP provides the desirable release of AgNPs from the matrix, but the coating is easily washable away from the surfaces. More promising as matrices look water insoluble but bioerodible polymers that can provide the release of AgNPs and form long-lasting coatings at the surfaces. For creating bioerodible water-insoluble antimicrobial coatings containing AgNPs, we selected amino acid based biodegradable polymers(AABBPs)–poly(ester amide)s, poly(ester urea)s, their copolymers containing amide and related groups capable to stabilize AgNPs. Among a huge variety of AABBPs reported we selected the polymers soluble in ethanol. For preparing AgNPs containing nanocompositions AABBPs and AgNO3 were dissolved in ethanol and subjected to photochemical reduction using daylight-irradiation. The formation of AgNPs was observed visually by coloring the solutions in brownish-red. The obtained AgNPs were characterized by UV-spectroscopy, transmission electron microscopy(TEM), and dynamic light scattering(DLS). According to the UV and TEM data, the photochemical reduction resulted presumably in spherical AgNPs with rather high contribution of the particles below 10 nm that are known as responsible for the antimicrobial activity. DLS study showed that average size of nanoparticles formed after photo-reduction in ethanol solution ranged within 50 nm. The in vitro antimicrobial activity study of the new nanocomposite material is in progress now.

Keywords: nanocomposites, silver nanoparticles, polymer, biodegradable

Procedia PDF Downloads 393
2761 Comparative Study on Different Type of Shear Connectors in Composite Slabs

Authors: S. Subrmanian, A. Siva, R. Raghul

Abstract:

In modern construction industry, usage of cold form composite slab has its scope widely due to its light weight, high structural properties and economic factor. To enhance the structural integrity, mechanical interlocking or frictional interlocking was introduced. The role of mechanical interlocking or frictional interlocking is to increase the longitudinal shear between the profiled sheet and concrete. This paper deals with the experimental evaluation of three types of mechanical interlocking devices namely normal stud shear connector, J-Type shear connector, U-Type shear connector. An attempt was made to evolve the shear connector which can be suitable for the composite slab as an interlocking device. Totally six number of composite slabs have been experimented with three types of shear connectors and comparison study is made. The outcome was compared with numerical model was created by ABAQUS software and analyzed for comparative purpose. The result was U-Type shear connector provided better performance and resistance.

Keywords: composite slabs, shear connector, end slip, longitudinal shear

Procedia PDF Downloads 318
2760 An E-Retailing System Architecture Based on Cloud Computing

Authors: Chanchai Supaartagorn

Abstract:

E-retailing is the sale of goods online that takes place over the Internet. The Internet has shrunk the entire World. The world e-retailing is growing at an exponential rate in the Americas, Europe, and Asia. However, e-retailing costs require expensive investment, such as hardware, software, and security systems. Cloud computing technology is internet-based computing for the management and delivery of applications and services. Cloud-based e-retailing application models allow enterprises to lower their costs with their effective implementation of e-retailing activities. In this paper, we describe the concept of cloud computing and present the architecture of cloud computing, combining the features of e-retailing. In addition, we propose a strategy for implementing cloud computing with e-retailing. Finally, we explain the benefits from the architecture.

Keywords: architecture, cloud computing, e-retailing, internet-based

Procedia PDF Downloads 390
2759 A Single Phase ZVT-ZCT Power Factor Correction Boost Converter

Authors: Yakup Sahin, Naim Suleyman Ting, Ismail Aksoy

Abstract:

In this paper, a single phase soft switched Zero Voltage Transition and Zero Current Transition (ZVT-ZCT) Power Factor Correction (PFC) boost converter is proposed. In the proposed PFC converter, the main switch turns on with ZVT and turns off with ZCT without any additional voltage or current stresses. Auxiliary switch turns on and off with zero current switching (ZCS). Also, the main diode turns on with zero voltage switching (ZVS) and turns off with ZCS. The proposed converter has features like low cost, simple control and structure. The output current and voltage are controlled by the proposed PFC converter in wide line and load range. The theoretical analysis of converter is clarified and the operating steps are given in detail. The simulation results of converter are obtained for 500 W and 100 kHz. It is observed that the semiconductor devices operate with soft switching (SS) perfectly. So, the switching power losses are minimum. Also, the proposed converter has 0.99 power factor with sinusoidal current shape.

Keywords: power factor correction, zero-voltage transition, zero-current transition, soft switching

Procedia PDF Downloads 794
2758 Pythagorean-Platonic Lattice Method for Finding all Co-Prime Right Angle Triangles

Authors: Anthony Overmars, Sitalakshmi Venkatraman

Abstract:

This paper presents a method for determining all of the co-prime right angle triangles in the Euclidean field by looking at the intersection of the Pythagorean and Platonic right angle triangles and the corresponding lattice that this produces. The co-prime properties of each lattice point representing a unique right angle triangle are then considered. This paper proposes a conjunction between these two ancient disparaging theorists. This work has wide applications in information security where cryptography involves improved ways of finding tuples of prime numbers for secure communication systems. In particular, this paper has direct impact in enhancing the encryption and decryption algorithms in cryptography.

Keywords: Pythagorean triples, platonic triples, right angle triangles, co-prime numbers, cryptography

Procedia PDF Downloads 230
2757 DNA PLA: A Nano-Biotechnological Programmable Device

Authors: Hafiz Md. HasanBabu, Khandaker Mohammad Mohi Uddin, Md. IstiakJaman Ami, Rahat Hossain Faisal

Abstract:

Computing in biomolecular programming performs through the different types of reactions. Proteins and nucleic acids are used to store the information generated by biomolecular programming. DNA (Deoxyribose Nucleic Acid) can be used to build a molecular computing system and operating system for its predictable molecular behavior property. The DNA device has clear advantages over conventional devices when applied to problems that can be divided into separate, non-sequential tasks. The reason is that DNA strands can hold so much data in memory and conduct multiple operations at once, thus solving decomposable problems much faster. Programmable Logic Array, abbreviated as PLA is a programmable device having programmable AND operations and OR operations. In this paper, a DNA PLA is designed by different molecular operations using DNA molecules with the proposed algorithms. The molecular PLA could take advantage of DNA's physical properties to store information and perform calculations. These include extremely dense information storage, enormous parallelism, and extraordinary energy efficiency.

Keywords: biological systems, DNA computing, parallel computing, programmable logic array, PLA, DNA

Procedia PDF Downloads 120
2756 Phone Number Spoofing Attack in VoLTE

Authors: Joo-Hyung Oh, Sekwon Kim, Myoungsun Noh, Chaetae Im

Abstract:

The number of service users of 4G VoLTE (voice over LTE) using LTE data networks is rapidly growing. VoLTE based on All-IP network enables clearer and higher-quality voice calls than 3G. It does, however, pose new challenges; a voice call through IP networks makes it vulnerable to security threats such as wiretapping and forged or falsified information. Moreover, in particular, stealing other users’ phone numbers and forging or falsifying call request messages from outgoing voice calls within VoLTE result in considerable losses that include user billing and voice phishing to acquaintances. This paper focuses on the threats of caller phone number spoofing in the VoLTE and countermeasure technology as safety measures for mobile communication networks.

Keywords: LTE, 4G, VoLTE, phone number spoofing

Procedia PDF Downloads 516
2755 The Prototype of the Solar Energy Utilization for the Finding Sustainable Conditions in the Future: The Solar Community with 4000 Dwellers 960 Families, equal to 480 Solar Dwelling Houses and 32 Mansion Buildings (480 Dwellers)

Authors: Kunihisa Kakumoto

Abstract:

This technical paper is for the prototype of solar energy utilization for finding sustainable conditions. This model has been simulated under the climate conditions in Japan. At the beginning of the study, the solar model house was built up on site. And the concerned data was collected in this model house for several years. On the basis of these collected data, the concept on the solar community was built up. For the finding sustainable conditions, the amount of the solar energy generation and its reduction of carbon dioxide and the reduction of carbon dioxide by the green planting and the amount of carbon dioxide according to the normal daily life in the solar community and the amount of the necessary water for the daily life in the solar community and the amount of the water supply by the rainfall on-site were calculated. These all values were taken into consideration. The relations between each calculated result are shown in the expression of inequality. This solar community and its consideration for finding sustainable conditions can be one prototype to do the feasibility study for our life in the future

Keywords: carbon dioxide, green planting, smart city, solar community, sustainable condition, water activity

Procedia PDF Downloads 279
2754 Directional Dependence of the Stress-Strain Behavior of Reinforced Sand

Authors: Alaa H. J. Al-Rkaby, A. Chegenizadeh, H. R. Nikraz

Abstract:

The technique of reinforcing soil is an efficient, reliable and cost-effective alternative way for improving the performance of soil in civil engineering applications. Despite the anisotropic states of stresses induced within soil elements by many geotechnical structures such as footings, highways and offshore, most of the previous studies have been carried out under isotropic conditions. The anisotropic stress state in term of the inclined principal stress and the inequality of the intermediate and minor principal stresses cannot be investigated using conventional devices. Therefore, the advanced hollow cylinder apparatus, used in this work, provides a great opportunity to simulate such anisotropic stress states. To date, very little consideration has been given to how the direction of principal stress α and intermediate principal stress ratio b can affect the performance of the reinforced sand. This study presented that the anisotropic conditions of α and b resulted in significant variations in the deviator stress and volumetric strain of sand reinforced with geosynthetics. Anisotropic effect has been decreased by adding clay content.

Keywords: anisotropy, reinforced sand, direction of principal stress, intermediate principal stress ratio

Procedia PDF Downloads 190
2753 Economic Characteristics of Bitcoin: "An Analytical Study"

Authors: Abdelhalem Shahen

Abstract:

The world is now experiencing a digital revolution and greatly accelerated technological developments, in addition to the transition from the economy in its traditional form to the digital economy, which has resulted in the emergence of new tools that are appropriate to those developments, and from this, this paper attempts to explore the economic characteristics of the bitcoin currency that circulated recently. Due to the many advantages that distinguish it from money in its traditional forms, which have a range of economic effects. The study found that Bitcoin is among the technological innovations, which contain a set of characteristics that are worth studying, those that make it the focus of attention, such as the digital currency, the peer-to-peer property, Lower and Faster Transaction Costs, transparency, decentralized control, privacy, and Double-Spending, as well as security and Cryptographic, and finally mining.

Keywords: Digital Economics, Digital Currencies, Bitcoin, Features of Bitcoin

Procedia PDF Downloads 132
2752 Rollet vs Rocket: A New in-Space Propulsion Concept

Authors: Arthur Baraov

Abstract:

Nearly all rocket and spacecraft propulsion concepts in existence today can be linked one way or the other to one of the two ancient warfare devices: the gun and the sling. Chemical, thermoelectric, ion, nuclear thermal and electromagnetic rocket engines – all fall into the first group which, for obvious reasons, can be categorized as “hot” space propulsion concepts. Space elevator, orbital tower, rolling satellite, orbital skyhook, tether propulsion and gravitational assist – are examples of the second category which lends itself for the title “cold” space propulsion concepts. The “hot” space propulsion concepts skyrocketed – literally and figuratively – from the naïve ideas of Jules Verne to the manned missions to the Moon. On the other hand, with the notable exception of gravitational assist, hardly any of the “cold” space propulsion concepts made any progress in terms of practical application. Why is that? This article aims to show that the right answer to this question has the potential comparable by its implications and practical consequences to that of transition from Jules Verne’s stillborn and impractical conceptions of space flight to cogent and highly fertile ideas of Konstantin Tsiolkovsky and Yuri Kondratyuk.

Keywords: propulsion, rocket, rollet, spacecraft

Procedia PDF Downloads 529
2751 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

Information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or website, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate the phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecured web-surfing. This study allows to analyze information retrieved from OSINT tools i.e., the Harvester, and Maltego, that can be used to send phishing attacks to individuals.

Keywords: OSINT, phishing, spear phishing, email spoofing, the harvester, maltego

Procedia PDF Downloads 70
2750 The Clash of the Clans in the British Divorce

Authors: Samuel Gary Beckton

Abstract:

Ever since the Scottish Independence Referendum in 2014, there has been a threat of a second referendum. However, if there was another referendum and the majority favoured independence, it is highly likely to be by a small majority. In this paper, it will look into the hypothetical situation of what could have happened if Scotland had voted in favour of independence in 2014. If this occurred, there would be many Unionists within Scotland, including devoted supporters of the Better Together campaign. There was a possibility of some Scottish Unionists not willing to accept the result of the Referendum unchallenged and use their right of self-determination through the UN Charter for their region to remain within the United Kingdom. The Shetland and Orkney Islands contemplated of opting out of an independent Scotland in 2013. This caught the attention of some politicians and the media, via confirming the possibility of some form of partition in Scotland and could have gained extra attention if partition quickly became a matter of ‘need’ instead of ‘want’. Whilst some Unionists may have used petitions and formed pressure groups to voice their claims, others may have used more hard-line tactics to achieve their political objectives, including possible protest marches and acts of civil unrest. This could have possibly spread sectarian violence between Scottish Unionists and Nationalists. Glasgow has a serious issue of this kind of sectarianism, which has escalated in recent years. This is due to the number communities that have been established from Irish Immigrants, which maintain links with Northern Irish loyalists and republicans. Some Scottish Unionists not only have sympathy towards Northern Irish loyalists but actively participate with the paramilitary groups and gave support. Scottish loyalists could use these contacts to create their own paramilitary group(s), with aid from remaining UK (RUK) benefactors. Therefore, this could have resulted in the RUK facing a serious security dilemma, with political and ethical consequences to consider. The RUK would have the moral obligation to protect Scottish Unionists from persecution and recognise their right of self-determination, whilst ensuring the security and well-being of British citizens within and outside of Scotland. This work takes into consideration the lessons learned from the ‘Troubles’ in Northern Ireland. As an era of ‘Troubles’ could occur in Scotland, extending into England and Northern Ireland. This is due to proximity, the high number of political, communal and family links in Scotland to the RUK, and the delicate peace process within Northern Ireland which shares a similar issue. This paper will use British and Scottish Government documents prior to the Scottish referendum to argue why partition might happen and use cartography of maps of a potential partition plan for Scotland. Reports from the UK National Statistics, National Rail, and Ministry of Defence shall also be utilised, and use of journal articles that were covering the referendum.

Keywords: identity, nationalism, Scotland, unionism

Procedia PDF Downloads 160
2749 An Explorative Research on the Electric and Electronic Officers Employment: Turkish Flagged Ship's Perspective

Authors: Mehmet Yahsi, Ozkan Ugurlu, Ercan Yuksekyildiz

Abstract:

Assistant department among the electric and electronic officers on ships, has an important place for the maintenance of electric and electronic devices. From this perspective, ships must be employed with a sufficient number of assistant department. In this study, in order to research on the Turkish-flagged ships electric and electronic officers employment; Our national manning regulation compared with international regulations. The data used in this study were collected via visiting of the ships. 3000 gross tonnage and above engaged in international voyages 181 Turkish-flagged ship’s crew lists were compared with Minimum Safety Manning Certificates. According to the findings; employment rate, %54 electric and electronic officers. According to the results of the study; Turkish-flagged ships, although it is not obliged to electric and electronic officers, were employed on ships.

Keywords: manning, electric officer, electronic officer, minimum safety manning certificate

Procedia PDF Downloads 428
2748 An Aspiring Solution to the Man in the Middle Bootstrap Vulnerability

Authors: Mouad Zouina, Benaceur Outtaj

Abstract:

The proposed work falls within the context of improving data security for m-commerce systems. In this context we have placed under the light some flaws encountered in HTTPS the most used m-commerce protocol, particularly the man in the middle attack, shortly MITM. The man in the middle attack is an active listening attack. The idea of this attack is to target the handshake phase of the HTTPS protocol which is the transition from a non-secure connection to a secure connection in our case HTTP to HTTPS. This paper proposes a solution to fix those flaws based on the upgrade of HSTS standard handshake sequence using the DNSSEC standard.

Keywords: m-commerce, HTTPS, HSTS, DNSSEC, MITM bootstrap vulnerability

Procedia PDF Downloads 384
2747 Mobile Microscope for the Detection of Pathogenic Cells Using Image Processing

Authors: P. S. Surya Meghana, K. Lingeshwaran, C. Kannan, V. Raghavendran, C. Priya

Abstract:

One of the most basic and powerful tools in all of science and medicine is the light microscope, the fundamental device for laboratory as well as research purposes. With the improving technology, the need for portable, economic and user-friendly instruments is in high demand. The conventional microscope fails to live up to the emerging trend. Also, adequate access to healthcare is not widely available, especially in developing countries. The most basic step towards the curing of a malady is the diagnosis of the disease itself. The main aim of this paper is to diagnose Malaria with the most common device, cell phones, which prove to be the immediate solution for most of the modern day needs with the development of wireless infrastructure allowing to compute and communicate on the move. This opened up the opportunity to develop novel imaging, sensing, and diagnostics platforms using mobile phones as an underlying platform to address the global demand for accurate, sensitive, cost-effective, and field-portable measurement devices for use in remote and resource-limited settings around the world.

Keywords: cellular, hand-held, health care, image processing, malarial parasites, microscope

Procedia PDF Downloads 261
2746 The Use of Continuous Improvement Methods to Empower the Osh MS With Leading Key Performance Indicators

Authors: Maha Rashid Al-Azib, Almuzn Qasem Alqathradi, Amal Munir Alshahrani, Bilqis Mohammed Assiri, Ali Almuflih

Abstract:

The Occupational Safety and Health Management System in one of the largest Saudi companies has been experiencing in the last 10 years extensive direct and indirect expenses due to lack of proactive leading indicators and safety leadership effective procedures. And since there are no studies that are associated with this department of safety in the company, this research has been conducted. In this study we used a mixed method approach containing a literature review and experts input, then a qualitative questionnaire provided by Institute for Work and Health related to determining the company’s occupational safety and health management system level out from three levels (Compliance - Improvement - Continuous Learning) and the output regarding the company’s level was in Continuous Learning. After that Deming cycle was employed to create a set of proactive leading indicators and analyzed using the SMART method to make sure of its effectiveness and suitability to the company. The objective of this research is to provide a set of proactive indicators to contribute in making an efficient occupational safety and health management system that has less accidents which results in less expenses. Therefore, we provided the company with a prototype of an APP, designed and empowered with our final results to contribute in supporting decisions making processes.

Keywords: proactive leading indicators, OSH MS, safety leadership, accidents reduction

Procedia PDF Downloads 73
2745 Responsibility to Protect: The Continuing Post-Colonial Western Hegemony

Authors: Helyeh Doutaghi

Abstract:

In 2005, the doctrine of Responsibility to Protect (R2P) was created by the UN Member States agreeing to not only to have the primary responsibility to protect their civilians from genocide, war crimes, crimes against humanity and ethnic cleansing, but also to be responsible towards those civilians whose State was found manifestly failing in that regard. This paper will assess the doctrine of R2P and will argue that R2P too, just like humanitarian intervention, suffers from a lack of legal basis and political will to implement it. Or better said, it is being selectively used by the hegemon’s power to achieve its political will. In doing so, the origin and development shall be explained. Furthermore, it will be submitted that R2P has failed to achieve its purpose due to the unresolved Security Council’s deadlock. Lastly, the concept of legal morality entailed in R2P and its use in real life cases since 2005 will be examined.

Keywords: responsibility to protect, humanitarian intervention, United Nations, legitimacy, legality

Procedia PDF Downloads 335
2744 'iTheory': Mobile Way to Music Fundamentals

Authors: Marina Karaseva

Abstract:

The beginning of our century became a new digital epoch in the educational situation. Last decade the newest stage of this process had been initialized by the touch-screen mobile devices with program applications for them. The touch possibilities for learning fundamentals of music are of especially importance for music majors. The phenomenon of touching, firstly, makes it realistic to play on the screen as on music instrument, secondly, helps students to learn music theory while listening in its sound elements by music ear. Nowadays we can detect several levels of such mobile applications: from the basic ones devoting to the elementary music training such as intervals and chords recognition, to the more advanced applications which deal with music perception of non-major and minor modes, ethnic timbres, and complicated rhythms. The main purpose of the proposed paper is to disclose the main tendencies in this process and to demonstrate the most innovative features of music theory applications on the base of iOS and Android systems as the most common used. Methodological recommendations how to use these digital material musicologically will be done for the professional music education of different levels. These recommendations are based on more than ten year ‘iTheory’ teaching experience of the author. In this paper, we try to logically classify all types of ‘iTheory’mobile applications into several groups, according to their methodological goals. General concepts given below will be demonstrated in concrete examples. The most numerous group of programs is formed with simulators for studying notes with audio-visual links. There are link-pair types as follows: sound — musical notation which may be used as flashcards for studying words and letters, sound — key, sound — string (basically, guitar’s). The second large group of programs is programs-tests containing a game component. As a rule, their basis is made with exercises on ear identification and reconstruction by voice: sounds and intervals on their sounding — harmonical and melodical, music modes, rhythmic patterns, chords, selected instrumental timbres. Some programs are aimed at an establishment of acoustical communications between concepts of the musical theory and their musical embodiments. There are also programs focused on progress of operative musical memory (with repeating of sounding phrases and their transposing in a new pitch), as well as on perfect pitch training In addition a number of programs improvisation skills have been developed. An absolute pitch-system of solmisation is a common base for mobile programs. However, it is possible to find also the programs focused on the relative pitch system of solfegе. In App Store and Google Play Market online store there are also many free programs-simulators of musical instruments — piano, guitars, celesta, violin, organ. These programs may be effective for individual and group exercises in ear training or composition classes. Great variety and good sound quality of these programs give now a unique opportunity to musicians to master their music abilities in a shorter time. That is why such teaching material may be a way to effective study of music theory.

Keywords: ear training, innovation in music education, music theory, mobile devices

Procedia PDF Downloads 202
2743 Collective Intelligence-Based Early Warning Management for Agriculture

Authors: Jarbas Lopes Cardoso Jr., Frederic Andres, Alexandre Guitton, Asanee Kawtrakul, Silvio E. Barbin

Abstract:

The important objective of the CyberBrain Mass Agriculture Alarm Acquisition and Analysis (CBMa4) project is to minimize the impacts of diseases and disasters on rice cultivation. For example, early detection of insects will reduce the volume of insecticides that is applied to the rice fields through the use of CBMa4 platform. In order to reach this goal, two major factors need to be considered: (1) the social network of smart farmers; and (2) the warning data alarm acquisition and analysis component. This paper outlines the process for collecting the warning and improving the decision-making result to the warning. It involves two sub-processes: the warning collection and the understanding enrichment. Human sensors combine basic suitable data processing techniques in order to extract warning related semantic according to collective intelligence. We identify each warning by a semantic content called 'warncons' with multimedia metaphors and metadata related to these metaphors. It is important to describe the metric to measuring the relation among warncons. With this knowledge, a collective intelligence-based decision-making approach determines the action(s) to be launched regarding one or a set of warncons.

Keywords: agricultural engineering, warning systems, social network services, context awareness

Procedia PDF Downloads 372
2742 Innovations in Teaching

Authors: Dilek Turan Eroğlu

Abstract:

Educators have been searching the more effective and appalling methods of teaching for ages. It has always been an issue among the teachers and scientists to improve the quality of education and to ensure that all students have equal opportunities to learn. However, when it comes to the effective ways of learning,the learners are exposed to the ways which are chosen and approved to be effective by their teachers not by the learners themselves. This is the main problem of this study as the learners are not always happy to be in their classes being treated with their teachers’ favourite styles. This paper is telling the results of a study which has been conducted with the university students in Turkey. The students have been interviewed and asked to respond some questions related to best practices to find out their favourite styles, medium, techniques and strategies. The study has been conducted using qualitative research methods i.e one to one interviews and group discussions. The results show that the learners have significantly different views than the educators when it comes to modern teaching styles. Their definition of the term “modern teaching styles” is different than the general understanding. The university students expect their teachers to be “early adopter”. of ICT tools and or the other electronic devices, but a modern teacher must have many other characteristics for them.

Keywords: effective, innovation, teaching, modern teaching styles

Procedia PDF Downloads 340
2741 Implementation of Elliptic Curve Cryptography Encryption Engine on a FPGA

Authors: Mohamad Khairi Ishak

Abstract:

Conventional public key crypto systems such as RSA (Ron Rivest, Adi Shamir and Leonard Adleman), DSA (Digital Signature Algorithm), and Elgamal are no longer efficient to be implemented in the small, memory constrained devices. Elliptic Curve Cryptography (ECC), which allows smaller key length as compared to conventional public key crypto systems, has thus become a very attractive choice for many applications. This paper describes implementation of an elliptic curve cryptography (ECC) encryption engine on a FPGA. The system has been implemented in 2 different key sizes, which are 131 bits and 163 bits. Area and timing analysis are provided for both key sizes for comparison. The crypto system, which has been implemented on Altera’s EPF10K200SBC600-1, has a hardware size of 5945/9984 and 6913/9984 of logic cells for 131 bits implementation and 163 bits implementation respectively. The crypto system operates up to 43 MHz, and performs point multiplication operation in 11.3 ms for 131 bits implementation and 14.9 ms for 163 bits implementation. In terms of speed, our crypto system is about 8 times faster than the software implementation of the same system.

Keywords: elliptic curve cryptography, FPGA, key sizes, memory

Procedia PDF Downloads 311
2740 Reduction in Population Growth under Various Contraceptive Strategies in Uttar Pradesh, India

Authors: Prashant Verma, K. K. Singh, Anjali Singh, Ujjaval Srivastava

Abstract:

Contraceptive policies have been derived to achieve desired reductions in the growth rate and also, applied to the data of Uttar-Pradesh, India for illustration. Using the Lotka’s integral equation for the stable population, expressions for the proportion of contraceptive users at different ages have been obtained. At the age of 20 years, 42% of contraceptive users is imperative to reduce the present annual growth rate of 0.036 to 0.02, assuming that 40% of the contraceptive users discontinue at the age of 25 years and 30% again continue contraceptive use at age 30 years. Further, presuming that 75% of women start using contraceptives at the age of 23 years, and 50% of the remaining women start using contraceptives at the age of 28 years, while the rest of them start using it at the age of 32 years. If we set a minimum age of marriage as 20 years, a reduction of 0.019 in growth rate will be obtained. This study describes how the level of contraceptive use at different age groups of women reduces the growth rate in the state of Uttar Pradesh. The article also promotes delayed marriage in the region.

Keywords: child bearing, contraceptive devices, contraceptive policies, population growth, stable population

Procedia PDF Downloads 247