Search results for: secure key exchange
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2212

Search results for: secure key exchange

1912 Mother-Child Attachment and Anxiety Symptoms in Middle Childhood: Differences in Levels of Attachment Security

Authors: Simran Sharda

Abstract:

There is increasing evidence that leads psychologists today to believe that the attachment formed between a mother and child plays a much more profound role in later-life outcomes than previously expected. Particularly, the fact that a link may exist between maternal attachment and the development in addition to the severity of social anxiety in middle childhood seems to be gaining ground. This research will examine and address a myriad of major issues related to the impact of mother-child attachment: behaviors of children with different levels of secure attachment, various aspects of anxiety in relation to attachment security as well as other styles of mother-child attachments, especially avoidant attachment and over-attachment. This analysis serves to compile previous literature on the subject and touch light upon a logical extension of the research. Moreover, researchers have identified links between attachment and the externalization of problem behaviors: these behaviors may later manifest as social anxiety as well as increased severity and likelihood of PTSD diagnosis (an anxiety disorder). Furthermore, secure attachment has been linked to increased health benefits, cognitive skills, emotive socialization, and developmental psychopathology.

Keywords: child development, anxiety, cognition, developmental psychopathology, mother-child relationships, maternal, cognitive development

Procedia PDF Downloads 145
1911 Improving Cryptographically Generated Address Algorithm in IPv6 Secure Neighbor Discovery Protocol through Trust Management

Authors: M. Moslehpour, S. Khorsandi

Abstract:

As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.

Keywords: CGA, ICMPv6, IPv6, malicious node, modifier, NDP, overall load, SEND, trust management

Procedia PDF Downloads 176
1910 Energy Management of Hybrid Energy Source Composed of a Fuel Cell and Supercapacitor for an Electric Vehicle

Authors: Mejri Achref

Abstract:

This paper proposes an energy management strategy for an electrical hybrid vehicle which is composed of a Proton Exchange Membrane (PEM) fuel cell and a supercapacitor storage device. In this paper, the mathematical model for the proposed power train, comprising the PEM Fuel Cell, supercapacitor, boost converter, inverter, and vehicular structure, was modeled in MATLAB/Simulink. The proposed algorithm is evaluated for the Highway Fuel Economy Test (HWFET) driving cycle. The obtained results demonstrate the effectiveness of the proposed energy management strategy in reduction of hydrogen consumption.

Keywords: proton exchange membrane fuel cell, hybrid vehicle, hydrogen consumption, energy management strategy

Procedia PDF Downloads 166
1909 The Acceptance of E-Assessment Considering Security Perspective: Work in Progress

Authors: Kavitha Thamadharan, Nurazean Maarop

Abstract:

The implementation of e-assessment as tool to support the process of teaching and learning in university has become a popular technological means in universities. E-Assessment provides many advantages to the users especially the flexibility in teaching and learning. The e-assessment system has the capability to improve its quality of delivering education. However, there still exists a drawback in terms of security which limits the user acceptance of the online learning system. Even though there are studies providing solutions for identified security threats in e-learning usage, there is no particular model which addresses the factors that influences the acceptance of e-assessment system by lecturers from security perspective. The aim of this study is to explore security aspects of e-assessment in regard to the acceptance of the technology. As a result a conceptual model of secure acceptance of e-assessment is proposed. Both human and security factors are considered in formulation of this conceptual model. In order to increase understanding of critical issues related to the subject of this study, interpretive approach involving convergent mixed method research method is proposed to be used to execute the research. This study will be useful in providing more insightful understanding regarding the factors that influence the user acceptance of e-assessment system from security perspective.

Keywords: secure technology acceptance, e-assessment security, e-assessment, education technology

Procedia PDF Downloads 448
1908 Investigating the Relationship Between Corporate Governance and Financial Performance Considering the Moderating Role of Opinion and Internal Control Weakness

Authors: Fatemeh Norouzi

Abstract:

Today, financial performance has become one of the important issues in accounting and auditing that companies and their managers have paid attention to this issue and for this reason to the variables that are influential in this field. One of the things that can affect financial performance is corporate governance, which is examined in this research, although some things such as issues related to auditing can also moderate this relationship; Therefore, this research has been conducted with the aim of investigating the relationship between corporate governance and financial performance with regard to the moderating role of feedback and internal control weakness. The research is practical in terms of purpose, and in terms of method, it has been done in a post-event descriptive manner, in which the data has been analyzed using stock market data. Data collection has been done by using stock exchange data which has been extracted from the website of the Iraqi Stock Exchange, the statistical population of this research is all the companies admitted to the Iraqi Stock Exchange. . The statistical sample in this research is considered from 2014 to 2021, which includes 34 companies. Four different models have been considered for the research hypotheses, which are eight hypotheses, in this research, the analysis has been done using EXCEL and STATA15 software. In this article, collinearity test, integration test ,determination of fixed effects and correlation matrix results, have been used. The research results showed that the first four hypotheses were rejected and the second four hypotheses were confirmed.

Keywords: size of the board of directors, duality of the CEO, financial performance, internal control weakness

Procedia PDF Downloads 76
1907 Survey of Access Controls in Cloud Computing

Authors: Monirah Alkathiry, Hanan Aljarwan

Abstract:

Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.

Keywords: access controls, cloud computing, confidentiality, identity and access management

Procedia PDF Downloads 122
1906 The Effect of Macroeconomic Policies on Cambodia's Economy: ARDL and VECM Model

Authors: Siphat Lim

Abstract:

This study used Autoregressive Distributed Lag (ARDL) approach to cointegration. In the long-run the general price level and exchange rate have a positively significant effect on domestic output. The estimated result further revealed that fiscal stimulus help stimulate domestic output in the long-run, but not in the short-run, while monetary expansion help to stimulate output in both short-run and long-run. The result is complied with the theory which is the macroeconomic policies, fiscal and monetary policy; help to stimulate domestic output in the long-run. The estimated result of the Vector Error Correction Model (VECM) has indicated more clearly that the consumer price index has a positive effect on output with highly statistically significant. Increasing in the general price level would increase the competitiveness among producers than increase in the output. However, the exchange rate also has a positive effect and highly significant on the gross domestic product. The exchange rate depreciation might increase export since the purchasing power of foreigners has increased. More importantly, fiscal stimulus would help stimulate the domestic output in the long-run since the coefficient of government expenditure is positive. In addition, monetary expansion would also help stimulate the output and the result is highly significant. Thus, fiscal stimulus and monetary expansionary would help stimulate the domestic output in the long-run in Cambodia.

Keywords: fiscal policy, monetary policy, ARDL, VECM

Procedia PDF Downloads 416
1905 The Impact of Macroeconomic Factors on Tehran Stock Exchange Index during Economic and Oil Sanctions between January 2006 and December 2012

Authors: Hamed Movahedizadeh, Annuar Md Nassir, Mehdi Karimimalayer, Navid Samimi Sedeh, Ehsan Bagherpour

Abstract:

The aim of this paper is to evaluate Tehran’s Stock Exchange (TSE) performance regarding with impact of four macroeconomic factors including world crude Oil Price (OP), World Gold Price (GP), Consumer Price Index (CPI) and total Supplied Oil by Iran (SO) from January 2006 to December 2012 that Iran faced with economic and oil sanctions. Iran's exports of crude oil and lease condensate reduced to roughly 1.5 million barrels per day (bbl/d) in 2012, compared to 2.5 million bbl/d in 2011 due to hard sanctions. Monthly data are collected and subjected to a battery of tests through ordinary least square by EViews7. This study found that gold price and oil price are positively correlated with stock returns while total oil supplied and consumer price index have negative relationship with stock index, however, consumer price index tends to become insignificant in stock index. While gold price and consumer price index have short run relationship with TSE index at 10% of significance level this amount for oil price is significant at 5% and there is no significant short run relationship between supplied oil and Tehran stock returns. Moreover, this study found that all macroeconomic factors have long-run relationship with Tehran Stock Exchange Index.

Keywords: consumer price index, gold price, macroeconomic, oil price, sanction, stock market, supplied oil

Procedia PDF Downloads 475
1904 Study on Properties of Carbon-based Layer for Proton Exchange Membrane Fuel Cell Application

Authors: Pei-Jung Wu, Ching-Ying Huang, Chih-Chia Lin, Chun-Han Li, Chien-Yuan Wang

Abstract:

The fuel cell market has considerable development potential, but the cost is still less competitive. Replacing the traditional graphite plate with a stainless steel plate as a bipolar plate can greatly reduce the weight and volume of the stack, and has more cost advantages. However, the passivation layer on the surface of stainless steel makes the contact resistance reach the ohmic level and reduces the performance of the fuel cell. Therefore, it is necessary to reduce the interfacial contact resistance through the surface treatment. In this research, the thickness, uniformity, interfacial contact resistance (ICR), and adhesion of the carbon-based layer was analyzed. On the other hand, the effect of coating properties on the performance of the fuel cell was verified through I-V tests. The results show that after coating the contact resistance is greatly reduced by three stages to the microohm level, and as the film thickness is reduced, the contact resistance is reduced from 229~118 mΩ-cm² to 135~73 mΩ-cm² at a general assembly pressure of 1 to 2 MPa., and the current density at 0.6 V increased from 485.7 mA/cm² to 575.7 mA/cm². This study verifies the importance of the uniformity and ICR of the coating on proton exchange membrane fuel cell (PEMFC), and the surface coating technology is the key to affecting the characteristics of the coating.

Keywords: contact resistance, proton exchange membrane fuel cell, PEMFC, SS bipolar plate, spray coating process

Procedia PDF Downloads 197
1903 Secure Texting Used in a Post-Acute Pediatric Skilled Nursing Inpatient Setting: A Multidisciplinary Care Team Driven Communication System with Alarm and Alert Notification Management

Authors: Bency Ann Massinello, Nancy Day, Janet Fellini

Abstract:

Background: The use of an appropriate mode of communication among the multidisciplinary care team members regarding coordination of care is an extremely complicated yet important patient safety initiative. Effective communication among the team members(nursing staff, medical staff, respiratory therapists, rehabilitation therapists, patient-family services team…) become essential to develop a culture of trust and collaboration to deliver the highest quality care to patients are their families. The inpatient post-acute pediatrics, where children and their caregivers come for continuity of care, is no exceptions to the increasing use of text messages as a means to communication among clinicians. One such platform is the Vocera Communications (Vocera Smart Mobile App called Vocera Edge) allows the teams to use the application and share sensitive patient information through an encrypted platform using IOS company provided shared and assigned mobile devices. Objective: This paper discusses the quality initiative of implementing the transition from Vocera Smartbage to Vocera Edge Mobile App, technology advantage, use case expansion, and lessons learned about a secure alternative modality that allows sending and receiving secure text messages in a pediatric post-acute setting using an IOS device. This implementation process included all direct care staff, ancillary teams, and administrative teams on the clinical units. Methods: Our institution launched this transition from voice prompted hands-free Vocera Smartbage to Vocera Edge mobile based app for secure care team texting using a big bang approach during the first PDSA cycle. The pre and post implementation data was gathered using a qualitative survey of about 500 multidisciplinary team members to determine the ease of use of the application and its efficiency in care coordination. The technology was further expanded in its use by implementing clinical alerts and alarms notification using middleware integration with patient monitoring (Masimo) and life safety (Nurse call) systems. Additional use of the smart mobile iPhone use include pushing out apps like Lexicomp and Up to Date to have it readily available for users for evident-based practice in medication and disease management. Results: Successful implementation of the communication system in a shared and assigned model with all of the multidisciplinary teams in our pediatric post-acute setting. In just a 3-monthperiod post implementation, we noticed a 14% increase from 7,993 messages in 6 days in December 2020 to 9,116messages in March 2021. This confirmed that all clinical and non-clinical teams were using this mode of communication for coordinating the care for their patients. System generated data analytics used in addition to the pre and post implementation staff survey for process evaluation. Conclusion: A secure texting option using a mobile device is a safe and efficient mode for care team communication and collaboration using technology in real time. This allows for the settings like post-acute pediatric care areas to be in line with the widespread use of mobile apps and technology in our mainstream healthcare.

Keywords: nursing informatics, mobile secure texting, multidisciplinary communication, pediatrics post acute care

Procedia PDF Downloads 186
1902 Development of Partial Sulphonated Poly(Vinylidene Fluoride - Hexafluoro Propylene)–Montmorillonite Nano-Composites as Proton Exchange Membranes

Authors: K. Selvakumar, J. Kalaiselvimary, B. Jansirani, M. Ramesh Prabhu

Abstract:

Proton conducting sulphonated poly (vinylidene fluoride- hexafluoro propylene) PVdF-HFP membranes were modified with nano – sized montmorillonite (MMT) through homogeneous dispersive mixing and solution casting technique for fuel cell applications. The prepared composite membranes were characterized using Fourier Transform Infrared Spectroscopy and 1HNMR technique. The suitability of the composite membranes for fuel cell application was evaluated in terms of water uptake, swelling behavior, and proton conductivity. These composites showed good conductivities and durability and expected to be used in the development of proton exchange membrane for fuel cells.

Keywords: composite, proton conduction, sulphonation, water uptake

Procedia PDF Downloads 235
1901 Recent Development of Materials for Proton Exchange Membrane Fuel Cell (PEMFC)

Authors: Mohammed Jourdani, Hamid Mounir, Abdellatif El Marjani

Abstract:

Proton exchange membrane fuel cells (PEMFCs) have been developed as a promising power source for transportation and stationary applications, and power devices for computers and mobile telephones. This paper discusses and summarizes the latest developments of materials and remaining challenges of PEMFC. The different contributions to the material of all components and the efficiencies are analyzed. Many technical advances are introduced to increase the PEMFC fuel cell efficiency and life time for transportation, stationary and portable utilization. By the last years the total cost of this system is decreasing. However, the remaining challenges that need to be overcome mean that it will be several years before full commercialization can take place.

Keywords: PEMFC fuel cell, materials, recent development, efficiency, life time, commercialization possibility

Procedia PDF Downloads 294
1900 The Fiscal-Monetary Policy and Economic Growth in Algeria: VECM Approach

Authors: K. Bokreta, D. Benanaya

Abstract:

The objective of this study is to examine the relative effectiveness of monetary and fiscal policy in Algeria using the econometric modelling techniques of cointegration and vector error correction modelling to analyse and draw policy inferences. The chosen variables of fiscal policy are government expenditure and net taxes on products, while the effect of monetary policy is presented by the inflation rate and the official exchange rate. From the results, we find that in the long-run, the impact of government expenditures is positive, while the effect of taxes is negative on growth. Additionally, we find that the inflation rate is found to have little effect on GDP per capita but the impact of the exchange rate is insignificant. We conclude that fiscal policy is more powerful then monetary policy in promoting economic growth in Algeria.

Keywords: economic growth, monetary policy, fiscal policy, VECM

Procedia PDF Downloads 299
1899 An Efficient Discrete Chaos in Generalized Logistic Maps with Applications in Image Encryption

Authors: Ashish Ashish

Abstract:

In the last few decades, the discrete chaos of difference equations has gained a massive attention of academicians and scholars due to its tremendous applications in each and every branch of science, such as cryptography, traffic control models, secure communications, weather forecasting, and engineering. In this article, a generalized logistic discrete map is established and discrete chaos is reported through period doubling bifurcation, period three orbit and Lyapunov exponent. It is interesting to see that the generalized logistic map exhibits superior chaos due to the presence of an extra degree of freedom of an ordered parameter. The period doubling bifurcation and Lyapunov exponent are demonstrated for some particular values of parameter and the discrete chaos is determined in the sense of Devaney's definition of chaos theoretically as well as numerically. Moreover, the study discusses an extended chaos based image encryption and decryption scheme in cryptography using this novel system. Surprisingly, a larger key space for coding and more sensitive dependence on initial conditions are examined for encryption and decryption of text messages, images and videos which secure the system strongly from external cyber attacks, coding attacks, statistic attacks and differential attacks.

Keywords: chaos, period-doubling, logistic map, Lyapunov exponent, image encryption

Procedia PDF Downloads 136
1898 Measuring Greenhouse Gas Exchange from Paddy Field Using Eddy Covariance Method in Mekong Delta, Vietnam

Authors: Vu H. N. Khue, Marian Pavelka, Georg Jocher, Jiří Dušek, Le T. Son, Bui T. An, Ho Q. Bang, Pham Q. Huong

Abstract:

Agriculture is an important economic sector of Vietnam, the most popular of which is wet rice cultivation. These activities are also known as the main contributor to the national greenhouse gas. In order to understand more about greenhouse gas exchange in these activities and to investigate the factors influencing carbon cycling and sequestration in these types of ecosystems, since 2019, the first eddy covariance station has been installed in a paddy field in Long An province, Mekong Delta. The station was equipped with state-of-the-art equipment for CO₂ and CH₄ gas exchange and micrometeorology measurements. In this study, data from the station was processed following the ICOS recommendations (Integrated Carbon Observation System) standards for CO₂, while CH₄ was manually processed and gap-filled using a random forest model from methane-gapfill-ml, a machine learning package, as there is no standard method for CH₄ flux gap-filling yet. Finally, the carbon equivalent (Ce) balance based on CO₂ and CH₄ fluxes was estimated. The results show that in 2020, even though a new water management practice - alternate wetting and drying - was applied to reduce methane emissions, the paddy field released 928 g Cₑ.m⁻².yr⁻¹, and in 2021, it was reduced to 707 g Cₑ.m⁻².yr⁻¹. On a provincial level, rice cultivation activities in Long An, with a total area of 498,293 ha, released 4.6 million tons of Cₑ in 2020 and 3.5 million tons of Cₑ in 2021.

Keywords: eddy covariance, greenhouse gas, methane, rice cultivation, Mekong Delta

Procedia PDF Downloads 123
1897 Cryptocurrencies: Business Students’ Awareness and Universities’ Adoption Readiness and Compatibility of Use Considering the Mediation of Attitudes

Authors: Eric S. Parilla, Marc Edward Abadilla

Abstract:

The study aims to determine the effect of awareness of business students towards cryptocurrencies and the readiness of universities and colleges to accept cryptocurrencies as a medium of exchange, considering the mediation of business students’ attitudes. The research used partial least squares structural equation modeling (PLS-SEM) and deployed a questionnaire attuned to the awareness and attitudes of business students towards cryptocurrencies and readiness and compatibility of use in universities and colleges in Ilocos Norte. The output of the investigation revealed that awareness of business students is not correlated to the readiness of universities and colleges, which means that even though students understand cryptocurrencies, it is not an assurance that universities and colleges are ready to accept them as the medium of exchange. The study proposes that training and seminars for business students and professionals should be conducted to expand understanding and acceptance of cryptocurrencies.

Keywords: cryptocurrencies, awareness, readiness, attitudes

Procedia PDF Downloads 202
1896 Long Distance Aspirating Smoke Detection for Large Radioactive Areas

Authors: Michael Dole, Pierre Ninin, Denis Raffourt

Abstract:

Most of the CERN’s facilities hosting particle accelerators are large, underground and radioactive areas. All fire detection systems installed in such areas, shall be carefully studied to cope with the particularities of this stringent environment. The detection equipment usually chosen by CERN to secure these underground facilities are based on air sampling technology. The electronic equipment is located in non-radioactive areas whereas air sampling networks are deployed in radioactive areas where fire detection is required. The air sampling technology provides very good detection performances and prevent the "radiation-to-electronic" effects. In addition, it reduces the exposure to radiations of maintenance workers and is permanently available during accelerator operation. In order to protect the Super Proton Synchrotron and its 7 km tunnels, a specific long distance aspirating smoke detector has been developed to detect smoke at up to 700 meters between electronic equipment and the last air sampling hole. This paper describes the architecture, performances and return of experience of the long distance fire detection system developed and installed to secure the CERN Super Proton Synchrotron tunnels.

Keywords: air sampling, fire detection, long distance, radioactive areas

Procedia PDF Downloads 143
1895 Data Security and Privacy Challenges in Cloud Computing

Authors: Amir Rashid

Abstract:

Cloud Computing frameworks empower organizations to cut expenses by outsourcing computation resources on-request. As of now, customers of Cloud service providers have no methods for confirming the privacy and ownership of their information and data. To address this issue we propose the platform of a trusted cloud computing program (TCCP). TCCP empowers Infrastructure as a Service (IaaS) suppliers, for example, Amazon EC2 to give a shout box execution condition that ensures secret execution of visitor virtual machines. Also, it permits clients to bear witness to the IaaS supplier and decide if the administration is secure before they dispatch their virtual machines. This paper proposes a Trusted Cloud Computing Platform (TCCP) for guaranteeing the privacy and trustworthiness of computed data that are outsourced to IaaS service providers. The TCCP gives the deliberation of a shut box execution condition for a client's VM, ensuring that no cloud supplier's authorized manager can examine or mess up with its data. Furthermore, before launching the VM, the TCCP permits a client to dependably and remotely acknowledge that the provider at backend is running a confided in TCCP. This capacity extends the verification of whole administration, and hence permits a client to confirm the data operation in secure mode.

Keywords: cloud security, IaaS, cloud data privacy and integrity, hybrid cloud

Procedia PDF Downloads 289
1894 Importance of Knowledge in the Interdisciplinary Production Processes of Innovative Medical Tools

Authors: Katarzyna Mleczko

Abstract:

Processes of production of innovative medical tools have interdisciplinary character. They consist of direct and indirect close cooperation of specialists of different scientific branches. The Knowledge they have seems to be important for undertaken design, construction and manufacturing processes. The Knowledge exchange between participants of these processes is therefore crucial for the final result, which are innovative medical products. The paper draws attention to the necessity of feedback from the end user to the designer / manufacturer of medical tools which will allow for more accurate understanding of user needs. The study describes prerequisites of production processes of innovative medical (surgical) tools including participants and category of knowledge resources occurring in these processes. They are the result of research in selected Polish organizations involved in the production of medical instruments and are the basis for further work on the development of knowledge sharing model in interdisciplinary teams geographically dispersed.

Keywords: interdisciplinary production processes, knowledge exchange, knowledge sharing, medical tools

Procedia PDF Downloads 431
1893 The Role of Short-Term Study Abroad Experience on Intercultural Communication Competence

Authors: Zeynep Aksoy

Abstract:

Since global mobility of capital, information and people increase more and more, intercultural communication and management become a growing study field of investigating various aspects of the interaction between people from different cultural backgrounds. Human mobility, caused by several intentions from tourism to forced migration, often put people in facing communication barriers, issues or sometimes conflicts. This reality naturally enforces education institutions to develop international policies and programs for students in order to improve their intercultural experiences along with the educative objectives. Study-abroad programs, particularly the student exchanges in higher education provide an environment for participants to encounter with cultural differences. Therefore, international exchange programs (i.e. Erasmus Student Mobility, Global Exchange Program) are accepted to bring opportunities for intergroup contact, which may lead students to obtain new perspectives about the host culture, either in positive or negative ways, and new intercultural communication skills. This study aims to explore the role of short-term study abroad experience on intercultural communication competence with a qualitative approach. It attempts to reveal a comparative analysis, which is derived from two field studies conducted in Izmir (Turkey) and in Amsterdam (the Netherlands) in 2015 and 2016. They were both organized in two phases as pre-and-posttest to gain an insight into the changes (if any) in students’ attitudes and knowledge regarding the host culture, and their further motivations towards cross-cultural interactions. With this aim, focus group sessions and in-depth interviews have been taken place with participants at the beginning of their stay and at the end of the semester. The sample covers students mainly from Erasmus program (20 students in Izmir and 14 students in Amsterdam), and few from Global Exchange Program (5 students in Amsterdam). Data obtained from both studies were thematically analyzed and essential themes were identified within the framework of intercultural communication competence.

Keywords: Erasmus student mobility, intercultural communication competence, student exchange, short-term study abroad

Procedia PDF Downloads 248
1892 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks

Authors: Naveed Ghani, Samreen Javed

Abstract:

In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.

Keywords: network worms, malware infection propagating malicious code, virus, security, VPN

Procedia PDF Downloads 346
1891 Study of the Adsorptives Properties of Zeolites X Exchanged by the Cations Cu2 + and/or Zn2+

Authors: H. Hammoudi, S. Bendenia, I. Batonneau-Gener, A. Khelifa

Abstract:

Applying growing zeolites is due to their intrinsic physicochemical properties: a porous structure, regular, generating a large free volume, a high specific surface area, acidic properties of interest to the origin of their activity, selectivity energy and dimensional, leading to a screening phenomenon, hence the name of molecular sieves is generally attributed to them. Most of the special properties of zeolites have been valued as direct applications such as ion exchange, adsorption, separation and catalysis. Due to their crystalline structure stable, their large pore volume and their high content of cation X zeolites are widely used in the process of adsorption and separation. The acidic properties of zeolites X and interesting selectivity conferred on them their porous structure is also have potential catalysts. The study presented in this manuscript is devoted to the chemical modification of an X zeolite by cation exchange. Ion exchange of zeolite NaX by Zn 2 + cations and / or Cu 2 + is gradually conducted by following the evolution of some of its characteristics: crystallinity by XRD, micropore volume by nitrogen adsorption. Once characterized, the different samples will be used for the adsorption of propane and propylene. Particular attention is paid thereafter, on the modeling of adsorption isotherms. In this vein, various equations of adsorption isotherms and localized mobile, some taking into account the adsorbate-adsorbate interactions, are used to describe the experimental isotherms. We also used the Toth equation, a mathematical model with three parameters whose adjustment requires nonlinear regression. The last part is dedicated to the study of acid properties of Cu (x) X, Zn (x) X and CuZn (x) X, with the adsorption-desorption of pyridine followed by IR. The effect of substitution at different rates of Na + by Cu2 + cations and / or Zn 2 +, on the crystallinity and on the textural properties was treated. Some results on the morphology of the crystallites and the thermal effects during a temperature rise, obtained by scanning electron microscopy and DTA-TGA thermal analyzer, respectively, are also reported. The acidity of our different samples was also studied. Thus, the nature and strength of each type of acidity are estimated. The evaluation of these various features will provide a comparison between Cu (x) X, Zn (x) X and CuZn (x) X. One study on adsorption of C3H8 and C3H6 in NaX, Cu (x) X , Zn (x) x and CuZn (x) x has been undertaken.

Keywords: adsorption, acidity, ion exchange, zeolite

Procedia PDF Downloads 185
1890 Control of Hybrid System Using Fuzzy Logic

Authors: Faiza Mahi, Fatima Debbat, Mohamed Fayçal Khelfi

Abstract:

This paper proposes a control approach using Fuzzy Lo system. More precisely, the study focuses on the improvement of users service in terms of analysis and control of a transportation system their waiting times in the exchange platforms of passengers. Many studies have been developed in the literature for such problematic, and many control tools are proposed. In this paper we focus on the use of fuzzy logic technique to control the system during its evolution in order to minimize the arrival gap of connected transportation means at the exchange points of passengers. An example of illustration is worked out and the obtained results are reported. an important area of research is the modeling and simulation ordering system. We describe an approach to analysis using Fuzzy Logic. The hybrid simulator developed in toolbox Matlab consists calculation of waiting time transportation mode.

Keywords: Fuzzy logic, Hybrid system, Waiting Time, Transportation system, Control

Procedia PDF Downloads 541
1889 Estimation and Forecasting with a Quantile AR Model for Financial Returns

Authors: Yuzhi Cai

Abstract:

This talk presents a Bayesian approach to quantile autoregressive (QAR) time series model estimation and forecasting. We establish that the joint posterior distribution of the model parameters and future values is well defined. The associated MCMC algorithm for parameter estimation and forecasting converges to the posterior distribution quickly. We also present a combining forecasts technique to produce more accurate out-of-sample forecasts by using a weighted sequence of fitted QAR models. A moving window method to check the quality of the estimated conditional quantiles is developed. We verify our methodology using simulation studies and then apply it to currency exchange rate data. An application of the method to the USD to GBP daily currency exchange rates will also be discussed. The results obtained show that an unequally weighted combining method performs better than other forecasting methodology.

Keywords: combining forecasts, MCMC, quantile modelling, quantile forecasting, predictive density functions

Procedia PDF Downloads 338
1888 Study of Biofuel Produced by Babassu Oil Fatty Acids Esterification

Authors: F. A. F. da Ponte, J. Q. Malveira, I. A. Maciel, M. C. G. Albuquerque

Abstract:

In this work aviation, biofuel production was studied by fatty acids (C6 to C16) esterification. The process variables in heterogeneous catalysis were evaluated using an experimental design. Temperature and reaction time were the studied parameters, and the methyl esters content was the response of the experimental design. An ion exchange resin was used as a heterogeneous catalyst. The process optimization was carried out using response surface methodology (RSM) and polynomial model of second order. Results show that the most influential variables on the linear coefficient of each effect studied were temperature and reaction time. The best result of methyl esters conversion in the experimental design was under the conditions: 10% wt of catalyst; 100 °C and 4 hours of reaction. The best-achieved conversion was 96.5% wt of biofuel.

Keywords: esterification, ion-exchange resins, response surface methodology, biofuel

Procedia PDF Downloads 483
1887 Markowitz and Implementation of a Multi-Objective Evolutionary Technique Applied to the Colombia Stock Exchange (2009-2015)

Authors: Feijoo E. Colomine Duran, Carlos E. Peñaloza Corredor

Abstract:

There modeling component selection financial investment (Portfolio) a variety of problems that can be addressed with optimization techniques under evolutionary schemes. For his feature, the problem of selection of investment components of a dichotomous relationship between two elements that are opposed: The Portfolio Performance and Risk presented by choosing it. This relationship was modeled by Markowitz through a media problem (Performance) - variance (risk), ie must Maximize Performance and Minimize Risk. This research included the study and implementation of multi-objective evolutionary techniques to solve these problems, taking as experimental framework financial market equities Colombia Stock Exchange between 2009-2015. Comparisons three multiobjective evolutionary algorithms, namely the Nondominated Sorting Genetic Algorithm II (NSGA-II), the Strength Pareto Evolutionary Algorithm 2 (SPEA2) and Indicator-Based Selection in Multiobjective Search (IBEA) were performed using two measures well known performance: The Hypervolume indicator and R_2 indicator, also it became a nonparametric statistical analysis and the Wilcoxon rank-sum test. The comparative analysis also includes an evaluation of the financial efficiency of the investment portfolio chosen by the implementation of various algorithms through the Sharpe ratio. It is shown that the portfolio provided by the implementation of the algorithms mentioned above is very well located between the different stock indices provided by the Colombia Stock Exchange.

Keywords: finance, optimization, portfolio, Markowitz, evolutionary algorithms

Procedia PDF Downloads 285
1886 A Step Towards Circular Economy: Assessing the Efficacy of Ion Exchange Resins in the Recycling of Automotive Engine Coolants

Authors: George Madalin Danila, Mihaiella Cretu, Cristian Puscasu

Abstract:

The recycling of used antifreeze/coolant is a widely discussed and intricate issue. Complying with government regulations for the proper disposal of hazardous waste poses a significant challenge for today's automotive and industrial industries. In recent years, global focus has shifted toward Earth's fragile ecology, emphasizing the need to restore and preserve the natural environment. The business and industrial sectors have undergone substantial changes to adapt and offer products tailored to these evolving markets. The global antifreeze market size was evaluated at US 5.4 billion in 2020 to reach USD 5,9 billion by 2025 due to the increased number of vehicles worldwide, but also to the growth of HVAC systems. This study presents the evaluation of an ion exchange resin-based installation designed for the recycling of engine coolants, specifically ethylene glycol (EG) and propylene glycol (PG). The recycling process aims to restore the coolant to meet the stringent ASTM standards for both new and recycled coolants. A combination of physical-chemical methods, gas chromatography-mass spectrometry (GC-MS), and inductively coupled plasma mass spectrometry (ICP-MS) was employed to analyze and validate the purity and performance of the recycled product. The experimental setup included performance tests, namely corrosion to glassware and the tendency to foaming of coolant, to assess the efficacy of the recycled coolants in comparison to new coolant standards. The results demonstrate that the recycled EG coolants exhibit comparable quality to new coolants, with all critical parameters falling within the acceptable ASTM limits. This indicates that the ion exchange resin method is a viable and efficient solution for the recycling of engine coolants, offering an environmentally friendly alternative to the disposal of used coolants while ensuring compliance with industry standards.

Keywords: engine coolant, glycols, recycling, ion exchange resin, circular economy

Procedia PDF Downloads 27
1885 Leveraging NFT Secure and Decentralized Lending: A Defi Solution

Authors: Chandan M. S., Darshan G. A., Vyshnavi, Abhishek T.

Abstract:

In the evolving world of technology and digital assets, non-fungible tokens (NFTs) have emerged as the latest advancement. These digital assets represent ownership of intangible items and hold significant value. Unlike cryptocurrencies, like Ethereum or Bitcoin, NFTs cannot be exchanged due to their nature. Each NFT has an indivisible value. NFTs not only pave the way for financial services but also open up fresh opportunities for creators, buyers and artists. To revolutionize financing in the DeFi space, this proposed approach utilizes NFTs generated from digital arts. By eliminating intermediaries, this innovative method ensures trust and security in transactions. The idea entails automating borrower-lender interactions through contracts while securely storing data using blockchain technology. Borrowers can obtain funding by leveraging assets such as estate, artwork and collectibles that are often illiquid. The key component of this system is contracts that independently execute lending agreements and collateral transfers within predefined parameters. By leveraging the Ethereum blockchain, this project aims to provide consumers with access to a platform offering a wide range of financial services. The demonstration illustrates how NFT lending and borrowing is managed through contracts, providing a secure and trustworthy transaction environment.

Keywords: blockchain, defi, NFT, ethereum, marketplace

Procedia PDF Downloads 34
1884 Replica-Exchange Metadynamics Simulations of G-Quadruplex DNA Structures Under Substitution of K+ by Na+ Ions

Authors: Juan Antonio Mondragon Sanchez, Ruben Santamaria

Abstract:

The DNA G-quadruplex is a four-stranded DNA structure conformed by stacked planes of four base paired guanines (G-quartet). The guanine rich DNA sequences are present in many sites of genomic DNA and can potentially lead to the formation of G-quadruplexes, especially at the 3'-terminus of the human telomeric DNA with many TTAGGG repeats. The formation and stabilization of a G-quadruplex by small ligands at the telomeric region can inhibit the telomerase activity. In turn, the ligands can be used to regulate oncogene expression making the G-quadruplex an attractive target for anticancer therapy. Clearly, the G-quadruplex structured in the telomeric DNA is of fundamental importance for rational drug design. In this context, we investigate two G-quadruplex structures, the first follows from the sequence TTAGGG(TTAGGG)3TT (HUT1), and the second from AAAGGG(TTAGGG)3AA (HUT2), both in a K+ solution. We determine the free energy surfaces of the HUT1 and HUT2 structures and investigate their conformations using replica-exchange metadynamics simulations. The carbonyl-carbonyl distances belonging to different guanines residues are selected as the main collective variables to determine the free energy surfaces. The surfaces exhibit two main local minima, compatible with experiments on the conformational transformations of HUT1 and HUT2 under substitution of the K+ ions by the Na+ ions. The conformational transitions are not observed in short MD simulations without the use of the metadynamics approach. The results of this work should be of help to understand the formation and stability of human telomeric G-quadruplex in environments including the presence of K+ and Na+ ions.

Keywords: g-quadruplex, metadynamics, molecular dynamics, replica-exchange

Procedia PDF Downloads 334
1883 Political Determinants of Sovereign Spread: The Great East-West Divide

Authors: Maruska Vizek, Josip Glaurdic, Marina Tkalec, Goran Vuksic

Abstract:

We empirically explore whether and how taxation affects bilateral real exchange rates in the euro area – relative unit labor costs and relative consumer price indices. We find that employers’ social security contributions and the value added tax changes have the expected effects put forward in the fiscal devaluation literature and simulations. Increases in employers’ contributions appreciate the relative unit labor costs in the short- and the long-run, while value added tax hike appreciates the relative consumer prices. Somewhat surprisingly, for personal income tax increases, we find a short-run depreciating impact on the relative unit labor costs, while increases in employees’ contributions depreciate both measures of real exchange rates in the short-run.

Keywords: sovereign bonds, European Union, developing countries, political determinants

Procedia PDF Downloads 301