Search results for: safety and security
2631 DNA Isolation and Identification of Virulence Factors of Escherichia coli and Salmonella Species Isolated from Fresh Vegetables in Phnom Penh
Authors: Heng Sreyly, Phoeurk Chanrith
Abstract:
Fresh-eaten vegetables have become more popular in the Cambodian diet. However, according to WHO, these vegetables should be one of the main sources of infection if contaminated with pathogenic microorganisms. The outbreaks of foodborne diseases related to fresh fruits and vegetables have been increasingly reported and raised concerns regarding the safety of these products. Therefore, it is very important to conduct the determination of virulence factors Escherichia coli and Salmonella spp. in fresh vegetables. This study aims to identify virulence strains of Escherichia coli and Salmonella species from fresh vegetables, including cucumber (Cucumis sativus), saw-herb (Eryngium foetidum), and lettuce (Lactuca sativa) from different market and supermarket in Phnom Penh. The PCR method was used to detect the virulence strains of each sample. The results indicate that there are ninety five samples containing extracted DNA among one hundred and three samples. Moreover, the virulence strain of E. coli and salmonella have been found in leafy vegetables (lettuce and saw-herb) much more than in fruit vegetables (cucumber). This research is mainly used to raise public awareness of washing fresh vegetables with clean water more carefully to reduce adverse health impacts.Keywords: DNA, virulence factor, Escherichia coli, Salmonella
Procedia PDF Downloads 412630 Intrusion Detection Using Dual Artificial Techniques
Authors: Rana I. Abdulghani, Amera I. Melhum
Abstract:
With the abnormal growth of the usage of computers over networks and under the consideration or agreement of most of the computer security experts who said that the goal of building a secure system is never achieved effectively, all these points led to the design of the intrusion detection systems(IDS). This research adopts a comparison between two techniques for network intrusion detection, The first one used the (Particles Swarm Optimization) that fall within the field (Swarm Intelligence). In this Act, the algorithm Enhanced for the purpose of obtaining the minimum error rate by amending the cluster centers when better fitness function is found through the training stages. Results show that this modification gives more efficient exploration of the original algorithm. The second algorithm used a (Back propagation NN) algorithm. Finally a comparison between the results of two methods used were based on (NSL_KDD) data sets for the construction and evaluation of intrusion detection systems. This research is only interested in clustering the two categories (Normal and Abnormal) for the given connection records. Practices experiments result in intrude detection rate (99.183818%) for EPSO and intrude detection rate (69.446416%) for BP neural network.Keywords: IDS, SI, BP, NSL_KDD, PSO
Procedia PDF Downloads 3872629 Using A Blockchain-Based, End-to-End Encrypted Communication System Between Mobile Terminals to Improve Organizational Privacy
Authors: Andrei Bogdan Stanescu, Robert Stana
Abstract:
Creating private and secure communication channels between employees has become a critical aspect in order to ensure organizational integrity and avoid leaks of sensitive information. With the widespread use of modern methods of disrupting communication between users, real use-cases of advanced encryption mechanisms have emerged to avoid cyber-attackers that are willing to intercept private conversations between critical employees in an organization. This paper aims to present a custom implementation of a messaging application named “Whisper” that uses end-to-end encryption (E2EE) mechanisms and blockchain-related components to protect sensitive conversations and mitigate the risks of information breaches inside organizations. The results of this research paper aim to expand the areas of applicability of E2EE algorithms and integrations with private blockchains in chat applications as a viable method of enhancing intra-organizational communication privacy.Keywords: end-to-end encryption, mobile communication, cryptography, communication security, data privacy
Procedia PDF Downloads 952628 Application of Lean Manufacturing Tools in Hot Asphalt Production
Authors: S. Bayona, J. Nunez, D. Paez, C. Diaz
Abstract:
The application of Lean manufacturing tools continues to be an effective solution for increasing productivity, reducing costs and eliminating waste in the manufacture of goods and services. This article analyzes the production process of a hot asphalt manufacturing company from an administrative and technical perspective. Three main phases were analyzed, the first phase was related to the determination of the risk priority number of the main operations in asphalt mix production process by an FMEA (Failure Mode Effects Analysis), in the second phase the Value Stream Mapping (VSM) of the production line was performed and in the third phase a SWOT (Strengths, Weaknesses Opportunities, Threats) matrix was constructed. Among the most valued failure modes were the lack training of workers in occupational safety and health issues, the lack of signaling and classification of granulated material, and the overweight of vehicles loaded. The analysis of the results in the three phases agree on the importance of training operational workers, improve communication with external actors in order to minimize delays in material orders and strengthen control suppliers.Keywords: asphalt, lean manufacturing, productivity, process
Procedia PDF Downloads 1212627 Restraint and Seclusion: Individual and Environmental Characteristics of the Educators Super Users
Authors: Caroline A. Mathieu, Steve Geoffrion, Alexandre Dumais, Denis Lafortune
Abstract:
In Quebec, troubled youths stay in a rehabilitation Center (RC), and educators in RC’S are particularly at risk of exposure to workplace violence. In order to manage youth violence and protect youth safety or their own, educators can resort to restraint and seclusion (R&S) strategies. To our best knowledge, in the literature, no study was found on the topic of R&S super users either in psychiatry or in a rehabilitation center. The objective of this study is to explore the differences between R&S super users and normal users among educators in terms of individual and environmental characteristics, over an eight weeks period. The 278 participants were volunteers recruited from 36 units that foster around 8 to 12 youths per unit, in a suburb of Montreal; Quebec, Canada. The results indicate that among the variables that were studied, only fear of violence and past exposure to violence at work characterized the R&S super users. These results suggest that exposure to violence in the workplace might increase the anticipation and fear of violence from a youth; this is concordant with the results indicating that these variables are the ones separating normal users from super users.Keywords: seclusion and restraint, violence, youth, educators
Procedia PDF Downloads 2022626 Citizens’ Satisfaction with Green and Blue Spaces and Urban Furniture in Sari Iran
Authors: Neda Rezvanisanijouybari
Abstract:
Cities are living and dynamic organisms that can play an essential role in meeting people's psychological and mental needs. The green and blue spaces, including parks, play an important role in meeting those needs, and therefore they should be prioritised in urban planning and designing. Sari city had several city designs and planning projects to expand the green spaces. These included adding more parks and open spaces with new urban furniture in the city and were an important step forward in creating a pleasant urban landscape in the north of Iran. This research used quantitative and qualitative methods to examine whether the citizens of Sari were satisfied with green and blue spaces and new urban furniture in the city or not. From a questionnaire of 120 Sari citizens, it was found that the citizens were generally satisfied with the green and blue spaces and new urban furniture in Sari. It was also found that the favourite park was Mellal park, and the least favourite was Azadegan park. Accessibility, safety, design, facilities, and water source were the most important reason to visit the parks.Keywords: satisfaction, green, blue, urban furniture
Procedia PDF Downloads 1712625 Robust and Dedicated Hybrid Cloud Approach for Secure Authorized Deduplication
Authors: Aishwarya Shekhar, Himanshu Sharma
Abstract:
Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. In this process, duplicate data is expunged, leaving only one copy means single instance of the data to be accumulated. Though, indexing of each and every data is still maintained. Data deduplication is an approach for minimizing the part of storage space an organization required to retain its data. In most of the company, the storage systems carry identical copies of numerous pieces of data. Deduplication terminates these additional copies by saving just one copy of the data and exchanging the other copies with pointers that assist back to the primary copy. To ignore this duplication of the data and to preserve the confidentiality in the cloud here we are applying the concept of hybrid nature of cloud. A hybrid cloud is a fusion of minimally one public and private cloud. As a proof of concept, we implement a java code which provides security as well as removes all types of duplicated data from the cloud.Keywords: confidentiality, deduplication, data compression, hybridity of cloud
Procedia PDF Downloads 3862624 Seismic Response Analysis of Frame Structures Based on Super Joint Element Model
Authors: Li Xu, Yang Hong, T. Zhao Wen
Abstract:
Experimental results of many RC beam-column subassemblage indicate that slippage of longitudinal beam rebar within the joint and the shear deformation of joint core have significant influence on seismic behavior of the subassemblage. However, rigid joint assumption has been generally used in the seismic response analysis of RC frames, in which two kinds of inelastic deformation of joint have been ignored. Based on OpenSees platform, ‘Super Joint Element Model’ with more detailed inelastic mechanism is used to simulate the inelastic response of joints. Two finite element models of typical RC plane frame, namely considering or ignoring the inelastic deformation of joint respectively, were established and analyzed under seven strong earthquake waves. The simulated global and local inelastic deformations of the RC plane frame is shown and discussed. The analyses also confirm the security of the earthquake-resistant frame designed according to Chinese codes.Keywords: frame structure, beam-column joint, longitudinal bar slippage, shear deformation, nonlinear analysis
Procedia PDF Downloads 4132623 Application of Drones in Agriculture
Authors: Reza Taherlouei Safa, Mohammad Aboonajmi
Abstract:
Agriculture plays an essential role in providing food for the world's population. It also offers numerous benefits to countries, including non-food products, transportation, and environmental balance. Precision agriculture, which employs advanced tools to monitor variability and manage inputs, can help achieve these benefits. The increasing demand for food security puts pressure on decision-makers to ensure sufficient food production worldwide. To support sustainable agriculture, unmanned aerial vehicles (UAVs) can be utilized to manage farms and increase yields. This paper aims to provide an understanding of UAV usage and its applications in agriculture. The objective is to review the various applications of UAVs in agriculture. Based on a comprehensive review of existing research, it was found that different sensors provide varying analyses for agriculture applications. Therefore, the purpose of the project must be determined before using UAV technology for better data quality and analysis. In conclusion, identifying a suitable sensor and UAV is crucial to gather accurate data and precise analysis when using UAVs in agriculture.Keywords: drone, precision agriculture, farmer income, UAV
Procedia PDF Downloads 852622 Earthquakes and Buildings: Lesson Learnt from Past Earthquakes in Turkey
Authors: Yavuz Yardım
Abstract:
The most important criteria for structural engineering is the structure’s ability to carry intended loads safely. The key element of this ability is mathematical modeling of really loadings situation into a simple loads input to use in structure analysis and design. Amongst many different types of loads, the most challenging load is earthquake load. It is possible magnitude is unclear and timing is unknown. Therefore the concept of intended loads and safety have been built on experience of previous earthquake impact on the structures. Understanding and developing these concepts is achieved by investigating performance of the structures after real earthquakes. Damage after an earthquake provide results of thousands of full-scale structure test under a real seismic load. Thus, Earthquakes reveille all the weakness, mistakes and deficiencies of analysis, design rules and practice. This study deals with lesson learnt from earthquake recoded last two decades in Turkey. Results of investigation after several earthquakes exposes many deficiencies in structural detailing, inappropriate design, wrong architecture layout, and mainly mistake in construction practice.Keywords: earthquake, seismic assessment, RC buildings, building performance
Procedia PDF Downloads 2672621 Secret Sharing in Visual Cryptography Using NVSS and Data Hiding Techniques
Authors: Misha Alexander, S. B. Waykar
Abstract:
Visual Cryptography is a special unbreakable encryption technique that transforms the secret image into random noisy pixels. These shares are transmitted over the network and because of its noisy texture it attracts the hackers. To address this issue a Natural Visual Secret Sharing Scheme (NVSS) was introduced that uses natural shares either in digital or printed form to generate the noisy secret share. This scheme greatly reduces the transmission risk but causes distortion in the retrieved secret image through variation in settings and properties of digital devices used to capture the natural image during encryption / decryption phase. This paper proposes a new NVSS scheme that extracts the secret key from randomly selected unaltered multiple natural images. To further improve the security of the shares data hiding techniques such as Steganography and Alpha channel watermarking are proposed.Keywords: decryption, encryption, natural visual secret sharing, natural images, noisy share, pixel swapping
Procedia PDF Downloads 4082620 The Role of Urban Design in Creating Cohesive and People’s Public Spaces
Authors: Hazem Abuorf
Abstract:
From the perspective of viewing urban design as the architecture of public spaces, the latter has many advantages; for example, in achieving attractive and vibrant public spaces, ensuring safety and amenity, supporting a strong sense of place and local character. Besides all advantages, such spaces nevertheless trigger numerous dilemmas, how to design urban spaces preserving the quality of life in the long term while equally achieving cohesion between new urban developments and the already existing urban structure without causing a split in history through the cause of functional and aesthetic degradation. Analysis of this article seeks to propose a methodology deemed essential for assessing and stimulating design criteria of the public spaces when rehabilitating urban sites. The method’s utility is shown by analyzing rehabilitation projects in Gaza Strip, whose design of the public spaces has mainly focused on the physical aspect ignoring the place’s local identity, users’ needs, and history. The proposed methodology serves as a guide for municipal authorities and technical teams to deal with interventions that would rework the role of urban design towards making sense of place.Keywords: urban design, public realm, rehabilitation projects, quality of life
Procedia PDF Downloads 1662619 Innovation and Performance of Very Small Agri-Food Enterprises in Cameroon
Authors: Ahmed Moustapha Mfokeu
Abstract:
Agri-food VSEs in Cameroon are facing a succession of crises, lack of security, particularly in the Far North, South West, and North West regions, the consequences of the Covid 19 crisis, and the war in Ukraine . These multiple crises have benefited the reception of the prices of the raw materials. Moreover, the exacerbation of competitive pressures is driven by the technological acceleration of productive systems in emerging countries which increase the demands imposed on the markets. The Cameroonian VSE must therefore be able to meet the new challenges of international competition, especially through innovation. The objective of this research is to contribute to the knowledge of the effects of innovation on the performance of very small agribusinesses in Cameroon. On the methodological level, the data were provided from a sample of 153 companies in the cities of Douala and Yaoundé. This research uses structural equation models with latent variables. The main results show that there is a positive and significant link between innovation and the performance of very small agri-food companies, so if it is important for entrepreneurs to encourage and practice innovation, it is also necessary to make them understand and make them like this aspect in their strategic function.Keywords: innovation, performance, very small enterprise, agrifood
Procedia PDF Downloads 1182618 Deep Learning Based Road Crack Detection on an Embedded Platform
Authors: Nurhak Altın, Ayhan Kucukmanisa, Oguzhan Urhan
Abstract:
It is important that highways are in good condition for traffic safety. Road crashes (road cracks, erosion of lane markings, etc.) can cause accidents by affecting driving. Image processing based methods for detecting road cracks are available in the literature. In this paper, a deep learning based road crack detection approach is proposed. YOLO (You Look Only Once) is adopted as core component of the road crack detection approach presented. The YOLO network structure, which is developed for object detection, is trained with road crack images as a new class that is not previously used in YOLO. The performance of the proposed method is compared using different training methods: using randomly generated weights and training their own pre-trained weights (transfer learning). A similar training approach is applied to the simplified version of the YOLO network model (tiny yolo) and the results of the performance are examined. The developed system is able to process 8 fps on NVIDIA Jetson TX1 development kit.Keywords: deep learning, embedded platform, real-time processing, road crack detection
Procedia PDF Downloads 3422617 ESRA: An End-to-End System for Re-identification and Anonymization of Swiss Court Decisions
Authors: Joel Niklaus, Matthias Sturmer
Abstract:
The publication of judicial proceedings is a cornerstone of many democracies. It enables the court system to be made accountable by ensuring that justice is made in accordance with the laws. Equally important is privacy, as a fundamental human right (Article 12 in the Declaration of Human Rights). Therefore, it is important that the parties (especially minors, victims, or witnesses) involved in these court decisions be anonymized securely. Today, the anonymization of court decisions in Switzerland is performed either manually or semi-automatically using primitive software. While much research has been conducted on anonymization for tabular data, the literature on anonymization for unstructured text documents is thin and virtually non-existent for court decisions. In 2019, it has been shown that manual anonymization is not secure enough. In 21 of 25 attempted Swiss federal court decisions related to pharmaceutical companies, pharmaceuticals, and legal parties involved could be manually re-identified. This was achieved by linking the decisions with external databases using regular expressions. An automated re-identification system serves as an automated test for the safety of existing anonymizations and thus promotes the right to privacy. Manual anonymization is very expensive (recurring annual costs of over CHF 20M in Switzerland alone, according to an estimation). Consequently, many Swiss courts only publish a fraction of their decisions. An automated anonymization system reduces these costs substantially, further leading to more capacity for publishing court decisions much more comprehensively. For the re-identification system, topic modeling with latent dirichlet allocation is used to cluster an amount of over 500K Swiss court decisions into meaningful related categories. A comprehensive knowledge base with publicly available data (such as social media, newspapers, government documents, geographical information systems, business registers, online address books, obituary portal, web archive, etc.) is constructed to serve as an information hub for re-identifications. For the actual re-identification, a general-purpose language model is fine-tuned on the respective part of the knowledge base for each category of court decisions separately. The input to the model is the court decision to be re-identified, and the output is a probability distribution over named entities constituting possible re-identifications. For the anonymization system, named entity recognition (NER) is used to recognize the tokens that need to be anonymized. Since the focus lies on Swiss court decisions in German, a corpus for Swiss legal texts will be built for training the NER model. The recognized named entities are replaced by the category determined by the NER model and an identifier to preserve context. This work is part of an ongoing research project conducted by an interdisciplinary research consortium. Both a legal analysis and the implementation of the proposed system design ESRA will be performed within the next three years. This study introduces the system design of ESRA, an end-to-end system for re-identification and anonymization of Swiss court decisions. Firstly, the re-identification system tests the safety of existing anonymizations and thus promotes privacy. Secondly, the anonymization system substantially reduces the costs of manual anonymization of court decisions and thus introduces a more comprehensive publication practice.Keywords: artificial intelligence, courts, legal tech, named entity recognition, natural language processing, ·privacy, topic modeling
Procedia PDF Downloads 1512616 Earthquake Retrofitting Methods of Steel and Concrete Structures and Investigating Strategies to Deal With Destructive Earthquakes
Authors: Ehsan Sadie
Abstract:
Today, after devastating earthquakes and many deaths due to the destruction of residential buildings, the scientific community has attracted the attention of the existing structures to strengthen and standardize construction. Due to the fact that the existing buildings are sometimes constructed without sufficient knowledge of the correct design, and even the buildings built according to the old standards today need to be reinforced due to changes in some provisions of the regulations. The location of some countries in the seismic zone has always caused a lot of human and economic damage throughout history, and attention to the strengthening of buildings, important facilities, and vital arteries is the result of this situation. Engineers' efforts to design earthquake-resistant buildings began when decades had passed since the development of design criteria and ensuring the safety of buildings against loads. New methods, mass reduction, reducing the weight of the building, use of moving structures to deal with earthquakes, as well as the use of new technologies in this field, including the use of dampers, composites in the reinforcement of structures are discussed, and appropriate solutions have been provided in each of the fields.Keywords: brace, concrete structure, damper, earthquake, FRP reinforcement, lightweight material, retrofitting, seismic isolator, shear wall, steel structure
Procedia PDF Downloads 772615 Designing an Aerodynamic Braking in Order to Increase Power and Speed of Braking System of Vehicles
Authors: Hamidreza Ahmadi, Majid Abbasalizadeh, Ghasem Yazdani, Masoud Ahmadi
Abstract:
In this paper a special kind of aerodynamic system as a spoiler has been designed and tried to show effects of this devise on braking system of vehicle. Moreover, position of this spoiler has been considered in order to find optimum point from safety and highest rate of braking view for spoiler. Fluent software is our main tool to calculate rate of extra force that is produced by spoiler and this article has been tried to use various figures that are showed effects of spoiler at different speeds, angles and also heights. Other major points in this paper are static pressure of vehicle at different speed and statues. Undoubtedly, shape of spoiler would be very important, so in this investigation spoiler has been designed and proposed after a lot of simulation for different shape of spoiler. In the end, there is very important part as validation since these simulations must be validated by experimental way to prove our claims. In this case, a special kind of BMW has been simulated and results have been compared by experimental results that have been presented by BMW Company. Difference between simulation results and experimental results are very little and it could be a suitable validation for this project.Keywords: drag force, down force, vehicle, spoiler
Procedia PDF Downloads 3412614 Generation of Waste Streams in Small Model Reactors
Authors: Sara Mostofian
Abstract:
The nuclear industry is a technology that can fulfill future energy needs but requires special attention to ensure safety and reliability while minimizing any environmental impact. To meet these expectations, the nuclear industry is exploring different reactor technologies for power production. Several designs are under development and the technical viability of these new designs is the subject of many ongoing studies. One of these studies considers the radioactive emissions and radioactive waste generated during the life of a nuclear power production plant to allow a successful license process. For all the modern technologies, a good understanding of the radioactivity generated in the process systems of the plant is essential. Some of that understanding may be gleaned from the performance of some prototype reactors of similar design that operated decades ago. This paper presents how, with that understanding, a model can be developed to estimate the emissions as well as the radioactive waste during the normal operation of a nuclear power plant. The model would predict the radioactive material concentrations in different waste streams. Using this information, the radioactive emission and waste generated during the life of these new technologies can be estimated during the early stages of the design of the plant.Keywords: SMRs, activity transport, model, radioactive waste
Procedia PDF Downloads 1132613 Calpoly Autonomous Transportation Experience: Software for Driverless Vehicle Operating on Campus
Authors: F. Tang, S. Boskovich, A. Raheja, Z. Aliyazicioglu, S. Bhandari, N. Tsuchiya
Abstract:
Calpoly Autonomous Transportation Experience (CATE) is a driverless vehicle that we are developing to provide safe, accessible, and efficient transportation of passengers throughout the Cal Poly Pomona campus for events such as orientation tours. Unlike the other self-driving vehicles that are usually developed to operate with other vehicles and reside only on the road networks, CATE will operate exclusively on walk-paths of the campus (potentially narrow passages) with pedestrians traveling from multiple locations. Safety becomes paramount as CATE operates within the same environment as pedestrians. As driverless vehicles assume greater roles in today’s transportation, this project will contribute to autonomous driving with pedestrian traffic in a highly dynamic environment. The CATE project requires significant interdisciplinary work. Researchers from mechanical engineering, electrical engineering and computer science are working together to attack the problem from different perspectives (hardware, software and system). In this abstract, we describe the software aspects of the project, with a focus on the requirements and the major components. CATE shall provide a GUI interface for the average user to interact with the car and access its available functionalities, such as selecting a destination from any origin on campus. We have developed an interface that provides an aerial view of the campus map, the current car location, routes, and the goal location. Users can interact with CATE through audio or manual inputs. CATE shall plan routes from the origin to the selected destination for the vehicle to travel. We will use an existing aerial map for the campus and convert it to a spatial graph configuration where the vertices represent the landmarks and edges represent paths that the car should follow with some designated behaviors (such as stay on the right side of the lane or follow an edge). Graph search algorithms such as A* will be implemented as the default path planning algorithm. D* Lite will be explored to efficiently recompute the path when there are any changes to the map. CATE shall avoid any static obstacles and walking pedestrians within some safe distance. Unlike traveling along traditional roadways, CATE’s route directly coexists with pedestrians. To ensure the safety of the pedestrians, we will use sensor fusion techniques that combine data from both lidar and stereo vision for obstacle avoidance while also allowing CATE to operate along its intended route. We will also build prediction models for pedestrian traffic patterns. CATE shall improve its location and work under a GPS-denied situation. CATE relies on its GPS to give its current location, which has a precision of a few meters. We have implemented an Unscented Kalman Filter (UKF) that allows the fusion of data from multiple sensors (such as GPS, IMU, odometry) in order to increase the confidence of localization. We also noticed that GPS signals can easily get degraded or blocked on campus due to high-rise buildings or trees. UKF can also help here to generate a better state estimate. In summary, CATE will provide on-campus transportation experience that coexists with dynamic pedestrian traffic. In future work, we will extend it to multi-vehicle scenarios.Keywords: driverless vehicle, path planning, sensor fusion, state estimate
Procedia PDF Downloads 1492612 Understanding the Experience of Siblings in Multisystemic Therapy
Authors: Lily Beaumont-Griffin, Philip Reynolds, Helen Pote, Pinder Kaur
Abstract:
Siblings are a key part of the family unit, which Multisystemic Therapy (MST) intervenes, with the aim of reducing antisocial behavior and keeping families together. However, despite operating in multiple countries, including the United States of America, Europe, parts of South America, and the Western Hemisphere, there are only few previous studies on siblings within MST. According to best of authors knowledge neither of these seeks to understand the siblings' experience of the intervention nor their perception of the outcomes. This study utilized semi-structured interviews to understand the experience of seven siblings of children and adolescents who were closed to MST within the last year (2023-2024). Using reflexive thematic analysis, three themes were identified: sibling inclusion by the therapist, sharing responsibility for change, and fostering a safe and supportive environment at home. These themes express that siblings need to have a basic understanding of an intervention to be able to perceive benefits, siblings need help understanding responsibility across the whole family, and that safety is both physical and emotional. Clinical implications, including encouragement of therapists to integrate the siblings in the intervention more, and future research directions around integrating these findings into the development of iterations of MST standard are discussed.Keywords: siblings, multisystemic therapy, family therapy, experience
Procedia PDF Downloads 572611 Organization’s Ethics, Job Performance Satisfaction and Effects on Employees’ Engagement and Commitment
Authors: Anunya Thanasrisuebwong
Abstract:
This research paper aimed to find out how was the ethical climate in an organization and job performance satisfaction of employees affected employees’ engagement and commitment by using the case study of PTT Exploration and Production Public Company Limited, Thailand. The population of this research was 4,383 Thai employees of PTTEP, Thailand. From a total of 420 questionnaires sent out, 345 respondents replied. The statistics utilized was mean score and Multiple Regression Analysis. The findings revealed that the respondents had opinion towards ethical climate of their organization, job performance satisfaction and organization engagement and commitment at a high level. The test of hypothesis disclosed the determinant attributes of job performance satisfaction that affected the respondents’ overall level of organization engagement and commitment. The set of these determinant attributes consisted of employees’ responsibilities for duties, organization’s policies and practice, relationship with organization’s commanders, work security and stability, job description, career path and relationship with colleagues. These variables were able to predict the employees’ organization engagement and commitment at 50.6 percent.Keywords: ethical climate in organization, job performance satisfaction, organization engagement, commitment
Procedia PDF Downloads 2932610 Measuring Government’s Performance (Services) Oman Service Maturity Model (OSMM)
Authors: Angie Al Habib, Khalid Al Siyabi
Abstract:
To measure or asses any government’s efficiency we need to measure the performance of this government in regards to the quality of the service it provides. Using a technological platform in service provision became a trend and a public demand. It is also a public need to make sure these services are aligned to values and to the whole government’s strategy, vision and goals as well. Providing services using technology tools and channels can enhance the internal business process and also help establish many essential values to government services like transparency and excellence, since in order to establish e-services many standards and policies must be put in place to enable the handing over of decision making to a mature system oriented mechanism. There was no doubt that the Sultanate of Oman wanted to enhance its services and move it towards automation and establishes a smart government as well as links its services to life events. Measuring government efficiency is very essential in achieving social security and economic growth, since it can provide a clear dashboard of all projects and improvements. Based on this data we can improve the strategies and align the country goals to them.Keywords: government, maturity, Oman, performance, service
Procedia PDF Downloads 3732609 Decentralized Data Marketplace Framework Using Blockchain-Based Smart Contract
Authors: Meshari Aljohani, Stephan Olariu, Ravi Mukkamala
Abstract:
Data is essential for enhancing the quality of life. Its value creates chances for users to profit from data sales and purchases. Users in data marketplaces, however, must share and trade data in a secure and trusted environment while maintaining their privacy. The first main contribution of this paper is to identify enabling technologies and challenges facing the development of decentralized data marketplaces. The second main contribution is to propose a decentralized data marketplace framework based on blockchain technology. The proposed framework enables sellers and buyers to transact with more confidence. Using a security deposit, the system implements a unique approach for enforcing honesty in data exchange among anonymous individuals. Before the transaction is considered complete, the system has a time frame. As a result, users can submit disputes to the arbitrators which will review them and respond with their decision. Use cases are presented to demonstrate how these technologies help data marketplaces handle issues and challenges.Keywords: blockchain, data, data marketplace, smart contract, reputation system
Procedia PDF Downloads 1612608 A Mixed Approach to Assess Information System Risk, Operational Risk, and Congolese Microfinance Institutions Performance
Authors: Alfred Kamate Siviri, Angelus Mafikiri Tsongo, Jean Robert Kala Kamdjoug
Abstract:
Digitalization and information systems well organized have been selected as relevant measures to mitigate operational risks within organizations. Unfortunately, information system comes with new threats that can cause severe damage and quick organization lockout. This study aims to measure perceived information system risks and their effects on operational risks within the microfinance institution in D.R. Congo. Also, the factors influencing the operational risk are identified, and the link between operational risk with other risks and performance is to be assessed. The study proposes a research model drawn on the combination of Resources-Based-View, dynamic capabilities, the agency theory, the Information System Security Model, and social theories of risk. Therefore, we suggest adopting a mixed methods research with the sole aim of increasing the literature that already exists on perceived operational risk assessment and its link with other risk and performance, a focus on IT risk.Keywords: Democratic Republic Congo, information system risk, microfinance performance, operational risk
Procedia PDF Downloads 2322607 Radio-Frequency Identification (RFID) Based Smart Helmet for Coal Miners
Authors: Waheeda Jabbar, Ali Gul, Rida Noor, Sania Kurd, Saba Gulzar
Abstract:
Hundreds of miners die from mining accidents each year due to poisonous gases found underground mining areas. This paper proposed an idea to protect the precious lives of mining workers. A supervising system is designed which is based on ZigBee wireless technique along with the smart protective helmets to detect real-time surveillance and it gives early warnings on presence of different poisonous gases in order to save mineworkers from any danger caused by these poisonous gases. A wireless sensor network is established using ZigBee wireless technique by integrating sensors on the helmet, apart from this helmet have embedded heartbeat sensor to detect the pulse rate and be aware of the physical or mental strength of a mineworker to increase the potential safety. Radio frequency identification (RFID) technology is used to find the location of workers. A ZigBee based base station is set-upped to control the communication. The idea is implemented and results are verified through experiment.Keywords: Arduino, gas sensor (MQ7), RFID, wireless ZigBee
Procedia PDF Downloads 4572606 Investigation of Different Electrolyte Salts Effect on ZnO/MWCNT Anode Capacity in LIBs
Authors: Şeyma Dombaycıoğlu, Hilal Köse, Ali Osman Aydın, Hatem Akbulut
Abstract:
Rechargeable lithium ion batteries (LIBs) have been considered as one of the most attractive energy storage choices for laptop computers, electric vehicles and cellular phones owing to their high energy and power density. Compared with conventional carbonaceous materials, transition metal oxides (TMOs) have attracted great interests and stand out among versatile novel anode materials due to their high theoretical specific capacity, wide availability and good safety performance. ZnO, as an anode material for LIBs, has a high theoretical capacity of 978 mAh g-1, much higher than that of the conventional graphite anode (∼370 mAhg-1). However, several major problems such as poor cycleability, resulting from the severe volume expansion and contraction during the alloying-dealloying cycles with Li+ ions and the associated charge transfer process, the pulverization and the agglomeration of individual particles, which drastically reduces the total entrance/exit sites available for Li+ ions still hinder the practical use of ZnO powders as an anode material for LIBs. Therefore, a great deal of effort has been devoted to overcome these problems, and many methods have been developed. In most of these methods, it is claimed that carbon nanotubes (CNTs) will radically improve the performance of batteries, because their unique structure may especially enhance the kinetic properties of the electrodes and result in an extremely high specific charge compared with the theoretical limits of graphitic carbon. Due to outstanding properties of CNTs, MWCNT buckypaper substrate is considered a buffer material to prevent mechanical disintegration of anode material during the battery applications. As the bridge connecting the positive and negative electrodes, the electrolyte plays a critical role affecting the overall electrochemical performance of the cell including rate, capacity, durability and safety. Commercial electrolytes for Li-ion batteries normally consist of certain lithium salts and mixed organic linear and cyclic carbonate solvents. Most commonly, LiPF6 is attributed to its remarkable features including high solubility, good ionic conductivity, high dissociation constant and satisfactory electrochemical stability for commercial fabrication. Besides LiPF6, LiBF4 is well known as a conducting salt for LIBs. LiBF4 shows a better temperature stability in organic carbonate based solutions and less moisture sensitivity compared to LiPF6. In this work, free standing zinc oxide (ZnO) and multiwalled carbon nanotube (MWCNT) nanocomposite materials were prepared by a sol gel technique giving a high capacity anode material for lithium ion batteries. Electrolyte solutions (including 1 m Li+ ion) were prepared with different Li salts in glove box. For this purpose, LiPF6 and LiBF4 salts and also mixed of these salts were solved in EC:DMC solvents (1:1, w/w). CR2016 cells were assembled by using these prepared electrolyte solutions, the ZnO/MWCNT buckypaper nanocomposites as working electrodes, metallic lithium as cathode and polypropylene (PP) as separator. For investigating the effect of different Li salts on the electrochemical performance of ZnO/MWCNT nanocomposite anode material electrochemical tests were performed at room temperature.Keywords: anode, electrolyte, Li-ion battery, ZnO/MWCNT
Procedia PDF Downloads 2352605 Global Position of Gender Equality in India: A Comparative Study
Authors: Mangesh Govindrao Acharya
Abstract:
It’s a matter of regret that rule began by causing social divisions in slave India. Even after independence, gender inequality persisted in Indian society; however, as social consciousness, awareness of governance, and political participation increased, this disparity gradually decreased. Technological advancement played an important role in awakening women. Today, a large number of women are able to address their problems in relevant places. The sense of honour for women in the family has also increased. Education, health, and food are indispensable for a strong society. Society's attitude towards the education of women and girls has become positive. Today, women have set their records in many important places. Women still face many challenges. Health awareness among rural women is a big challenge. Equality between men and women is the biggest social reform campaign implemented in our country. It has been going on endlessly for years, but the expected success does not seem to have been achieved. On the contrary, the issue of equality between men and women keeps coming before society in a new form. An attempt has been made in the present research essay to give an account of India's performance in this regard at the global level.Keywords: gender sensitization, gender equality, women's dignity, women's safety
Procedia PDF Downloads 1432604 An Industrial Scada System Remote Control Using Mobile Phones
Authors: Ahmidah Elgali
Abstract:
SCADA is the abbreviation for "Administrative Control And Data Acquisition." SCADA frameworks are generally utilized in industry for administrative control and information securing of modern cycles. Regular SCADA frameworks use PC, journal, slim client, and PDA as a client. In this paper, a Java-empowered cell phone has been utilized as a client in an example SCADA application to show and regulate the place of an example model crane. The paper presents a genuine execution of the online controlling of the model crane through a cell phone. The remote correspondence between the cell phone and the SCADA server is performed through a base station by means of general parcel radio assistance GPRS and remote application convention WAP. This application can be used in industrial sites in areas that are likely to be exposed to a security emergency (like terrorist attacks) which causes the sudden exit of the operators; however, no time to perform the shutdown procedures for the plant. Hence this application allows shutting down units and equipment remotely by mobile and so avoids damage and losses.Keywords: control, industrial, mobile, network, remote, SCADA
Procedia PDF Downloads 822603 Knowledge Engineering Based Smart Healthcare Solution
Authors: Rhaed Khiati, Muhammad Hanif
Abstract:
In the past decade, smart healthcare systems have been on an ascendant drift, especially with the evolution of hospitals and their increasing reliance on bioinformatics and software specializing in healthcare. Doctors have become reliant on technology more than ever, something that in the past would have been looked down upon, as technology has become imperative in reducing overall costs and improving the quality of patient care. With patient-doctor interactions becoming more necessary and more complicated than ever, systems must be developed while taking into account costs, patient comfort, and patient data, among other things. In this work, we proposed a smart hospital bed, which mixes the complexity and big data usage of traditional healthcare systems with the comfort found in soft beds while taking certain concerns like data confidentiality, security, and maintaining SLA agreements, etc. into account. This research work potentially provides users, namely patients and doctors, with a seamless interaction with to their respective nurses, as well as faster access to up-to-date personal data, including prescriptions and severity of the condition in contrast to the previous research in the area where there is lack of consideration of such provisions.Keywords: big data, smart healthcare, distributed systems, bioinformatics
Procedia PDF Downloads 2022602 A Second Look at Gesture-Based Passwords: Usability and Vulnerability to Shoulder-Surfing Attacks
Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier
Abstract:
For security purposes, it is important to detect passwords entered by unauthorized users. With traditional alphanumeric passwords, if the content of a password is acquired and correctly entered by an intruder, it is impossible to differentiate the password entered by the intruder from those entered by the authorized user because the password entries contain precisely the same character set. However, no two entries for the gesture-based passwords, even those entered by the person who created the password, will be identical. There are always variations between entries, such as the shape and length of each stroke, the location of each stroke, and the speed of drawing. It is possible that passwords entered by the unauthorized user contain higher levels of variations when compared with those entered by the authorized user (the creator). The difference in the levels of variations may provide cues to detect unauthorized entries. To test this hypothesis, we designed an empirical study, collected and analyzed the data with the help of machine-learning algorithms. The results of the study are significant.Keywords: authentication, gesture-based passwords, shoulder-surfing attacks, usability
Procedia PDF Downloads 143