Search results for: cloud storage security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5102

Search results for: cloud storage security

1712 A Mixed Approach to Assess Information System Risk, Operational Risk, and Congolese Microfinance Institutions Performance

Authors: Alfred Kamate Siviri, Angelus Mafikiri Tsongo, Jean Robert Kala Kamdjoug

Abstract:

Digitalization and information systems well organized have been selected as relevant measures to mitigate operational risks within organizations. Unfortunately, information system comes with new threats that can cause severe damage and quick organization lockout. This study aims to measure perceived information system risks and their effects on operational risks within the microfinance institution in D.R. Congo. Also, the factors influencing the operational risk are identified, and the link between operational risk with other risks and performance is to be assessed. The study proposes a research model drawn on the combination of Resources-Based-View, dynamic capabilities, the agency theory, the Information System Security Model, and social theories of risk. Therefore, we suggest adopting a mixed methods research with the sole aim of increasing the literature that already exists on perceived operational risk assessment and its link with other risk and performance, a focus on IT risk.

Keywords: Democratic Republic Congo, information system risk, microfinance performance, operational risk

Procedia PDF Downloads 212
1711 An Industrial Scada System Remote Control Using Mobile Phones

Authors: Ahmidah Elgali

Abstract:

SCADA is the abbreviation for "Administrative Control And Data Acquisition." SCADA frameworks are generally utilized in industry for administrative control and information securing of modern cycles. Regular SCADA frameworks use PC, journal, slim client, and PDA as a client. In this paper, a Java-empowered cell phone has been utilized as a client in an example SCADA application to show and regulate the place of an example model crane. The paper presents a genuine execution of the online controlling of the model crane through a cell phone. The remote correspondence between the cell phone and the SCADA server is performed through a base station by means of general parcel radio assistance GPRS and remote application convention WAP. This application can be used in industrial sites in areas that are likely to be exposed to a security emergency (like terrorist attacks) which causes the sudden exit of the operators; however, no time to perform the shutdown procedures for the plant. Hence this application allows shutting down units and equipment remotely by mobile and so avoids damage and losses.

Keywords: control, industrial, mobile, network, remote, SCADA

Procedia PDF Downloads 66
1710 Counterfeit Drugs Prevention in Pharmaceutical Industry with RFID: A Framework Based On Literature Review

Authors: Zeeshan Hamid, Asher Ramish

Abstract:

The purpose of this paper is to focus on security and safety issues facing by pharmaceutical industry globally when counterfeit drugs are in question. Hence, there is an intense need to secure and authenticate pharmaceutical products in the emerging counterfeit product market. This paper will elaborate the application of radio frequency identification (RFID) in pharmaceutical industry and to identify its key benefits for patient’s care. The benefits are: help to co-ordinate the stream of supplies, accuracy in chains of supplies, maintaining trustworthy information, to manage the operations in appropriate and timely manners and finally deliver the genuine drug to patient. It is discussed that how RFID supported supply chain information sharing (SCIS) helps to combat against counterfeit drugs. And a solution how to tag pharmaceutical products; since, some products prevent RFID implementation in this industry. In this paper, a proposed model for pharma industry distribution suggested to combat against the counterfeit drugs when they are in supply chain.

Keywords: supply chain, RFID, pharmaceutical industry, counterfeit drugs, patients care

Procedia PDF Downloads 307
1709 Knowledge Engineering Based Smart Healthcare Solution

Authors: Rhaed Khiati, Muhammad Hanif

Abstract:

In the past decade, smart healthcare systems have been on an ascendant drift, especially with the evolution of hospitals and their increasing reliance on bioinformatics and software specializing in healthcare. Doctors have become reliant on technology more than ever, something that in the past would have been looked down upon, as technology has become imperative in reducing overall costs and improving the quality of patient care. With patient-doctor interactions becoming more necessary and more complicated than ever, systems must be developed while taking into account costs, patient comfort, and patient data, among other things. In this work, we proposed a smart hospital bed, which mixes the complexity and big data usage of traditional healthcare systems with the comfort found in soft beds while taking certain concerns like data confidentiality, security, and maintaining SLA agreements, etc. into account. This research work potentially provides users, namely patients and doctors, with a seamless interaction with to their respective nurses, as well as faster access to up-to-date personal data, including prescriptions and severity of the condition in contrast to the previous research in the area where there is lack of consideration of such provisions.

Keywords: big data, smart healthcare, distributed systems, bioinformatics

Procedia PDF Downloads 189
1708 A Second Look at Gesture-Based Passwords: Usability and Vulnerability to Shoulder-Surfing Attacks

Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier

Abstract:

For security purposes, it is important to detect passwords entered by unauthorized users. With traditional alphanumeric passwords, if the content of a password is acquired and correctly entered by an intruder, it is impossible to differentiate the password entered by the intruder from those entered by the authorized user because the password entries contain precisely the same character set. However, no two entries for the gesture-based passwords, even those entered by the person who created the password, will be identical. There are always variations between entries, such as the shape and length of each stroke, the location of each stroke, and the speed of drawing. It is possible that passwords entered by the unauthorized user contain higher levels of variations when compared with those entered by the authorized user (the creator). The difference in the levels of variations may provide cues to detect unauthorized entries. To test this hypothesis, we designed an empirical study, collected and analyzed the data with the help of machine-learning algorithms. The results of the study are significant.

Keywords: authentication, gesture-based passwords, shoulder-surfing attacks, usability

Procedia PDF Downloads 132
1707 In Vitro Morphogenic Response of the Alginate Encapsulated Nodal Segment and Antioxidative Enzymes Analysis during Acclimatization of Cassia Angustifolia Vahl

Authors: Iram Siddique

Abstract:

Synthetic seed technology is an alternative to traditional micropropagation for production and delivery of cloned plantlets. Synthetic seeds were produced by encapsulating nodal segments of C. angustifolia in calcium alginate gel. 3% (w/v) sodium alginate and 100 mM CaCl2. 2H2O were found most suitable for encapsulation of nodal segments. Synthetic seeds cultured on half strength Murashige and Skoog (MS) medium supplemented with thidiazuron (5.0 µM) + indole -3- acetic acid (1.0 µM) produced maximum number of shoots (10.9 ± 0.78) after 8 weeks of culture exhibiting (78%) in vitro conversion response. Encapsulated nodal segments demonstrated successful regeneration after different period (1-6 weeks) of cold storage at 4 °C. The synthetic seeds stored at 4 °C for a period of 4 weeks resulted in maximum conversion frequency (93%) after 8 weeks when placed back to regeneration medium. The isolated shoots when cultured on half strength MS medium supplemented with 1.0 µM indole -3- butyric acid (IBA), produced healthy roots and plantlets with well developed shoot and roots were successfully hardened off in plastic pots containing sterile soilrite inside the growth chamber and gradually transferred to greenhouse where they grew well with 85% survival rate. Changes in the content of photosynthetic pigments, net photosynthetic rate (PN), superoxide dismutase (SOD) and catalase (CAT) activity in C. angustifolia indicated the adaptation of micropropagated plants to ex vitro conditions.

Keywords: biochemical studies, nodal segments, rooting, synthetic seeds, thidiazuron

Procedia PDF Downloads 356
1706 Friendship Love Orientation as Predictor of Attachment Style: A Gender Perspective

Authors: Maria Sana Amin, Anum Atiq, Haya Fatimah

Abstract:

Secure attachment in childhood creates a healthy love attitude in the adulthood. Child secure attachment develops a positive relation attitude in their adulthood, similarly, anxiety-avoidant attachment develops negative attitude toward relations. The aim of this paper is twofold: 1) We investigate the relationship between Friendship Attitude and Attachment Styles; and 2) explore the impact of gender on Love Attitudes and Attachment styles. Data was collected by convincing sampling among the students of University of Management and Technology age group 18- 25. The sample consists 60 young adults (Male=36, Female =54). The Love Attitudes Scales subscale Storage was used to measure attitudes towards friendship love and The Experiences in Close Relationships-Revised questionnaire was used to measure Adult Attachment Style. The result of Independent T-Test analysis shows that there was no significant difference in anxiety for female and male conditions; t (58) =-.768, p=.446 and avoidance for female and male conditions; t (58) =1.63, p=.108. Moreover, also there was no significant difference in friendship love for female (M=27.37, SD=6.371) and male (M=26.08, SD=5.709) conditions; t (58) =-.820, p=.416. Pearson correlation analysis shows significantly negative correlation between love attitude-friendship and attachment style- avoidance, (r=-.433, p=.008) among male and love attitude-friendship and attachment style- avoidance (r=-.438, p=.032) among female. There are no gender differences in attachment styles i.e. anxiety, avoidance and their relationship with friendship love attitude. People have avoidant attachment find it hard to fall in love and develop intimacy, and they tend to search for independence.

Keywords: avoidance attachment style, anxiety attachment style, friendship love attitude, gender difference/similarity

Procedia PDF Downloads 303
1705 Impact of Climate Change on Crop Production: Climate Resilient Agriculture Is the Need of the Hour

Authors: Deepak Loura

Abstract:

Climate change is considered one of the major environmental problems of the 21st century and a lasting change in the statistical distribution of weather patterns over periods ranging from decades to millions of years. Agriculture and climate change are internally correlated with each other in various aspects, as the threat of varying global climate has greatly driven the attention of scientists, as these variations are imparting a negative impact on global crop production and compromising food security worldwide. The fast pace of development and industrialization and indiscriminate destruction of the natural environment, more so in the last century, have altered the concentration of atmospheric gases that lead to global warming. Carbon dioxide (CO₂), methane (CH₄), and nitrous oxide (NO) are important biogenic greenhouse gases (GHGs) from the agricultural sector contributing to global warming and their concentration is increasing alarmingly. Agricultural productivity can be affected by climate change in 2 ways: first, directly, by affecting plant growth development and yield due to changes in rainfall/precipitation and temperature and/or CO₂ levels, and second, indirectly, there may be considerable impact on agricultural land use due to snow melt, availability of irrigation, frequency and intensity of inter- and intra-seasonal droughts and floods, soil organic matter transformations, soil erosion, distribution and frequency of infestation by insect pests, diseases or weeds, the decline in arable areas (due to submergence of coastal lands), and availability of energy. An increase in atmospheric CO₂ promotes the growth and productivity of C3 plants. On the other hand, an increase in temperature, can reduce crop duration, increase crop respiration rates, affect the equilibrium between crops and pests, hasten nutrient mineralization in soils, decrease fertilizer- use efficiencies, and increase evapotranspiration among others. All these could considerably affect crop yield in long run. Climate resilient agriculture consisting of adaptation, mitigation, and other agriculture practices can potentially enhance the capacity of the system to withstand climate-related disturbances by resisting damage and recovering quickly. Climate resilient agriculture turns the climate change threats that have to be tackled into new business opportunities for the sector in different regions and therefore provides a triple win: mitigation, adaptation, and economic growth. Improving the soil organic carbon stock of soil is integral to any strategy towards adapting to and mitigating the abrupt climate change, advancing food security, and improving the environment. Soil carbon sequestration is one of the major mitigation strategies to achieve climate-resilient agriculture. Climate-smart agriculture is the only way to lower the negative impact of climate variations on crop adaptation before it might affect global crop production drastically. To cope with these extreme changes, future development needs to make adjustments in technology, management practices, and legislation. Adaptation and mitigation are twin approaches to bringing resilience to climate change in agriculture.

Keywords: climate change, global warming, crop production, climate resilient agriculture

Procedia PDF Downloads 68
1704 Key Performance Indicators of Cold Supply Chain Practices in Agriculture Sector: Empirical Study on the Egyptian Export Companies

Authors: Ahmed Barakat, Nourhan Ahmed Saad, Mahmoud Hammad

Abstract:

Tracking and monitoring agricultural products, cold chain activities, and transportation in real-time can effectively ensure both the quality and safety of agricultural products, as well as reduce overall logistics costs. Effective supply chain practices are one of the main requirements for enhancing agricultural business in Egypt. Cold chain is among the best practices for the storage and transportation of perishable goods and has potential within the agricultural sector in Egypt. This practice has the scope of reducing the wastage of food and increasing the profitability with a reduction in costs. Even though it has several implementation challenges for the farmers, traders, and people involved in the entire supply chain, it has highlighted better benefits for all and for the export of goods for the economic progression for Egypt. The aim of this paper is to explore cold supply chain practices for the agriculture sector in Egypt, to enhance the export performance of fresh goods. In this context, this study attempts to explore those aspects of the performance of cold supply chain practices that can enhance the functioning of the agriculture sector in Egypt from the perspective of export companies (traders) and farmers. Based on the empirical results obtained by data collection from the farmers and traders, the study argues that there is a significant association between cold supply chain practices and enhancement of the agriculture value chain. The paper thus highlights the contribution of the study with final conclusions and limitations with scope for future research.

Keywords: agriculture sector, cold chain management, export companies, non-traded goods, supply chain management

Procedia PDF Downloads 147
1703 SVID: Structured Vulnerability Intelligence for Building Deliberated Vulnerable Environment

Authors: Wenqing Fan, Yixuan Cheng, Wei Huang

Abstract:

The diversity and complexity of modern IT systems make it almost impossible for internal teams to find vulnerabilities in all software before the software is officially released. The emergence of threat intelligence and vulnerability reporting policy has greatly reduced the burden on software vendors and organizations to find vulnerabilities. However, to prove the existence of the reported vulnerability, it is necessary but difficult for security incident response team to build a deliberated vulnerable environment from the vulnerability report with limited and incomplete information. This paper presents a structured, standardized, machine-oriented vulnerability intelligence format, that can be used to automate the orchestration of Deliberated Vulnerable Environment (DVE). This paper highlights the important role of software configuration and proof of vulnerable specifications in vulnerability intelligence, and proposes a triad model, which is called DIR (Dependency Configuration, Installation Configuration, Runtime Configuration), to define software configuration. Finally, this paper has also implemented a prototype system to demonstrate that the orchestration of DVE can be automated with the intelligence.

Keywords: DIR triad model, DVE, vulnerability intelligence, vulnerability recurrence

Procedia PDF Downloads 110
1702 Evaluation and Analysis of Light Emitting Diode Distribution in an Indoor Visible Light Communication

Authors: Olawale J. Olaluyi, Ayodele S. Oluwole, O. Akinsanmi, Johnson O. Adeogo

Abstract:

Communication using visible light VLC is considered a cutting-edge technology used for data transmission and illumination since it uses less energy than radio frequency (RF) technology and has a large bandwidth, extended lifespan, and high security. The room's irregular distribution of small base stations, or LED array distribution, is the cause of the obscured area, minimum signal-to-noise ratio (SNR), and received power. In order to maximize the received power distribution and SNR at the center of the room for an indoor VLC system, the researchers offer an innovative model for the placement of eight LED array distributions in this work. We have investigated the arrangement of the LED array distribution with regard to receiving power to fill the open space in the center of the room. The suggested LED array distribution saved 36.2% of the transmitted power, according to the simulation findings. Aside from that, the entire room was equally covered. This leads to an increase in both received power and SNR.

Keywords: visible light communication (VLC), light emitted diodes (LED), optical power distribution, signal-to-noise ratio (SNR).

Procedia PDF Downloads 73
1701 Evaluation of Raw Diatomaceous Earth and Plant Powders in the Control of Callosobruchus subinnotatus (Pic.) on Stored Bambara Groundnut (Vigna subterranea (L.) (Verdc.) Seeds

Authors: Ibrahim Nasiru Dole, Audu Abdullahi, Dike Michiel Chidozie, Lawal Mansur

Abstract:

Bambara groundnut is an important grain legume and the seeds in storage suffer infestation by Callosobruchus subinnotatus. Laboratory study was conducted to evaluate the efficacy of raw diatomaceous earth (RDE) and plant powders (Jatropha curcas (L.), Eucalyptus camaldulensis (Dehnh.) and Melia azedarach (L.) against C. subinnotatus infesting stored bambara groundnut seeds. Rearing of the insects and the experiments were conducted in Agricultural Biology Laboratory of the Usmanu Danfodiyo University, Sokoto - Nigeria under ambient conditions (29-33oC and a relative humidity of 44-56%). Four treatments at three levels: RDE at 0.5, 1.0 and 1.5 g while plant powders at 0.5, 1.0 and 2.0 g, standard/check (2.0 g of Actellic dust), and a control. These were separately admixed with 100 g of sterilized seeds in glass jars. Each jar was later infested with thirty, 1-2-days old C. subinnotatus of mixed sexes. Adult mortality was assessed 24, 48, 72 and 96 hours, F1 and F2 progenies, seed damage, weight loss and viability were also assessed after 90 days. Eighty-nine (89%) percent adult mortality was recorded in the highest dose of RDE after 96 hours of exposure. These treatments significantly (P < 0.05) suppressed F1 and F2 progenies emergence in relation to the control. The control suffered significantly (P < 0.05) higher seed damage (51.0 %) and weight loss (40.8%) thereby recording lower seed germination. Therefore, RDE and plant powders could be used against C. subinnotatus on stored bambara groundnut seeds.

Keywords: bambara, callosobruchus subinnotatus, plant powders, raw diatomaceous earth,

Procedia PDF Downloads 414
1700 Development of Real Time System for Human Detection and Localization from Unmanned Aerial Vehicle Using Optical and Thermal Sensor and Visualization on Geographic Information Systems Platform

Authors: Nemi Bhattarai

Abstract:

In recent years, there has been a rapid increase in the use of Unmanned Aerial Vehicle (UAVs) in search and rescue (SAR) operations, disaster management, and many more areas where information about the location of human beings are important. This research will primarily focus on the use of optical and thermal camera via UAV platform in real-time detection, localization, and visualization of human beings on GIS. This research will be beneficial in disaster management search of lost humans in wilderness or difficult terrain, detecting abnormal human behaviors in border or security tight areas, studying distribution of people at night, counting people density in crowd, manage people flow during evacuation, planning provisions in areas with high human density and many more.

Keywords: UAV, human detection, real-time, localization, visualization, haar-like, GIS, thermal sensor

Procedia PDF Downloads 451
1699 Joint Replenishment and Heterogeneous Vehicle Routing Problem with Cyclical Schedule

Authors: Ming-Jong Yao, Chin-Sum Shui, Chih-Han Wang

Abstract:

This paper is developed based on a real-world decision scenario that an industrial gas company that applies the Vendor Managed Inventory model and supplies liquid oxygen with a self-operated heterogeneous vehicle fleet to hospitals in nearby cities. We name it as a Joint Replenishment and Heterogeneous Vehicle Routing Problem with Cyclical Schedule and formulate it as a non-linear mixed-integer linear programming problem which simultaneously determines the length of the planning cycle (PC), the length of the replenishment cycle and the dates of replenishment for each customer and the vehicle routes of each day within PC, such that the average daily operation cost within PC, including inventory holding cost, setup cost, transportation cost, and overtime labor cost, is minimized. A solution method based on genetic algorithm, embedded with an encoding and decoding mechanism and local search operators, is then proposed, and the hash function is adopted to avoid repetitive fitness evaluation for identical solutions. Numerical experiments demonstrate that the proposed solution method can effectively solve the problem under different lengths of PC and number of customers. The method is also shown to be effective in determining whether the company should expand the storage capacity of a customer whose demand increases. Sensitivity analysis of the vehicle fleet composition shows that deploying a mixed fleet can reduce the daily operating cost.

Keywords: cyclic inventory routing problem, joint replenishment, heterogeneous vehicle, genetic algorithm

Procedia PDF Downloads 74
1698 Thermodynamic and Spectroscopic Investigation of Binary 2,2-Dimethyl-1-Propanol+ CO₂ Gas Hydrates

Authors: Seokyoon Moon, Yun-Ho Ahn, Heejoong Kim, Sujin Hong, Yunseok Lee, Youngjune Park

Abstract:

Gas hydrate is a non-stoichiometric crystalline compound consisting of host water-framework and low molecular weight guest molecules. Small gaseous molecules such as CH₄, CO₂, and N₂ can be captured in the host water framework lattices of the gas hydrate with specific temperature and pressure conditions. The three well-known crystal structures of structure I (sI), structure II (sII), and structure H (sH) are determined by the size and shape of guest molecules. In this study, we measured the phase equilibria of binary (2,2-dimethyl-1-propanol + CO₂, CH₄, N₂) hydrates to explore their fundamental thermodynamic characteristics. We identified the structure of the binary gas hydrate by employing synchrotron high-resolution powder diffraction (HRPD), and the guest distributions in the lattice of gas hydrate were investigated via dispersive Raman and ¹³C solid-state nuclear magnetic resonance (NMR) spectroscopies. The end-to-end distance of 2,2-dimethyl-1-propanol was calculated to be 7.76 Å, which seems difficult to be enclathrated in large cages of sI or sII. However, due to the flexibility of the host water framework, binary hydrates of sI or sII types can be formed with the help of small gas molecule. Also, the synchrotron HRPD patterns revealed that the binary hydrate structure highly depends on the type of help gases; a cubic Fd3m sII hydrate was formed with CH₄ or N₂, and a cubic Pm3n sI hydrate was formed with CO₂. Interestingly, dispersive Raman and ¹³C NMR spectra showed that the unique tuning phenomenon occurred in binary (2,2-dimethyl-1-propanol + CO₂) hydrate. By optimizing the composition of NPA, we can achieve both thermodynamic stability and high CO₂ storage capacity for the practical application to CO₂ capture.

Keywords: clathrate, gas hydrate, neopentyl alcohol, CO₂, tuning phenomenon

Procedia PDF Downloads 228
1697 The Combination of Porcine Plasma Protein and Maltodextrin as Wall Materials on Microencapsulated Turmeric Oil Powder Quality

Authors: Namfon Samsalee, Rungsinee Sothornvit

Abstract:

Turmeric is a natural plant herb and generally extracted as essential oil and widely used in food, cosmetic, pharmaceutical products including insect repellent. However, turmeric oil is a volatile essential oil which is easy to be lost during storage or exposure to light. Therefore, biopolymers such as protein and polysaccharide can be used as wall materials to encapsulate the essential oil which will solve this drawback. Approximately 60% plasma from porcine blood contains 6-7% of protein content mainly albumin and globulin which can be a good source of animal protein at the low-cost biopolymer from by-product. Microencapsulation is a useful technique to entrap volatile compounds in the biopolymer matrix and protect them to degrade. The objective of this research was to investigate the different ratios of two biopolymers (PPP and maltodextrin; MD) as wall materials at 100:0, 75:25, 50:50, 25:75 and 0:100 at a fixed ratio of wall material: core material (turmeric oil) at 3:1 (oil in water) on the qualities of microencapsulated powder using freeze drying. It was found that the combination of PPP and MD showed higher solubility of microencapsules compared to the use of PPP alone (P < 0.05). Moreover, the different ratios of wall materials also affected on color (L*, a* and b*) of microencapsulated powder. Morphology of microencapsulated powder using a scanning electron microscope showed holes on the surface reflecting on free oil content and encapsulation efficiency of microencapsules. At least 50% of MD was needed to increase encapsulation efficiency of microencapsulates rather than using only PPP as the wall material (P < 0.05). Microencapsulated turmeric oil powder can be useful as food additives to improve food texture, as a biopolymer material for edible film and coating to maintain quality of food products.

Keywords: microencapsulation, turmeric oil, porcine plasma protein, maltodextrin

Procedia PDF Downloads 178
1696 Tracing Back the Bot Master

Authors: Sneha Leslie

Abstract:

The current situation in the cyber world is that crimes performed by Botnets are increasing and the masterminds (botmaster) are not detectable easily. The botmaster in the botnet compromises the legitimate host machines in the network and make them bots or zombies to initiate the cyber-attacks. This paper will focus on the live detection of the botmaster in the network by using the strong framework 'metasploit', when distributed denial of service (DDOS) attack is performed by the botnet. The affected victim machine will be continuously monitoring its incoming packets. Once the victim machine gets to know about the excessive count of packets from any IP, that particular IP is noted and details of the noted systems are gathered. Using the vulnerabilities present in the zombie machines (already compromised by botmaster), the victim machine will compromise them. By gaining access to the compromised systems, applications are run remotely. By analyzing the incoming packets of the zombies, the victim comes to know the address of the botmaster. This is an effective and a simple system where no specific features of communication protocol are considered.

Keywords: bonet, DDoS attack, network security, detection system, metasploit framework

Procedia PDF Downloads 246
1695 Value-Added Products from Recycling of Solid Waste in Steel Plants

Authors: B. Karthik Vasan, Rachil Maliwal, Somnath Basu

Abstract:

Generation of solid waste is a major problem confronting the iron and steel industry around the world. Disposal of untreated wastes is no longer a viable solution in view of the environmental regulations becoming more and more stringent, as well as an increase in community awareness about the long-term hazards of indiscriminate waste disposal. The current work explores the possibility of converting some of the ‘problematic’ solid wastes generated during steel manufacturing operations, viz. dust from primary steelmaking, iron ore handling, and flux calcination processes, into value-added products instead of environmentally hazardous disposal practices. It was possible to develop a synthetic calcium ferrite, which helped to enhance the dissolution of calcined basic fluxes (e.g. CaO) and reduce the overall energy consumption during steel making. This, in turn, increased process efficiency and reduced greenhouse gas emissions. The preliminary results from laboratory-scale experiments clearly demonstrate the potential of utilizing these ‘waste materials’ that are generated in-house in iron and steel manufacturing plants. The energy required for synthesis of the ferrite may be reduced further by partially utilizing the waste heat from the exhaust gases. In the longer run, it would result in significant financial benefits due to reduced dependence on purchased fluxes. The synthesized ferrite is non-hygroscopic and this provides an additional benefit during its storage and transportation, relative to calcined lime (CaO) that is widely used as a basic flux across the steel making industry.

Keywords: calcium ferrite, flux, slag formation, solid waste

Procedia PDF Downloads 208
1694 Using Environmental Life Cycle Assessment to Design Sustainable Packaging

Authors: Timothy Francis Grant

Abstract:

There are conflicting purposes at play with the design of sustainable packaging which include material reduction, recycling compatibility, use of secondary content and performance of the package in protecting and delivering the product. Life Cycle Assessment (LCA) is able to evaluate these different strategies against environmental metrics such as climate change, land and water use and marine litter pollution. However, LCA has traditionally been too time consuming and expensive to be used effectively in packaging design process. To make LCA practical for packaging technologist and designers a simplified tool is needed to make LCA possible for non-environmental specialists. The Packaging Quick Evaluation Tool (PIQET) is a web-based solution for undertaking LCA of new and existing packaging designs considering the global supply chain and impacts from cradle to grave. PIQET is based on a pre-calculated LCA database covering the materials and processes involved in the packaging lifecycle from cradle to grave. This includes both virgin materials and recycled content, conversion of materials into packaging, and the transportation of packaging to the product filling. In addition, PIQET assesses the impacts once the package is filled looking at storage, transport and product loss through the supply chain. When applied to consumer packaging light weight packages which are note recyclable have lower impacts than more recyclable packages which have a higher mass. Its also apparent that for many products the impacts of product failure and product loss are more important environmentally compared to packaging material efficiency.

Keywords: Climate change, Life Cycle Assessment, Marine litter, Packaging sustainability

Procedia PDF Downloads 123
1693 Compaction of Municipal Solid Waste

Authors: Jovana Jankovic Pantic, Dragoslav Rakic, Tina Djuric, Irena Basaric Ikodinovic, Snezana Bogdanovic

Abstract:

Regardless of the numerous activities undertaken to reduce municipal solid waste, its annual volumes continue to grow. In Serbia, the most common and the only one form of waste disposal is at municipal landfills with daily compaction and soil covering. Municipal waste compacting is one of the basic components of the disposal process. Well compacted waste takes up less volume and allows much safer storage. In order to better predict the behavior of municipal waste at landfills, it is necessary to define compaction parameters: the maximum dry unit weight and optimal moisture content. In current geotechnical practice, the most common method of determination compaction parameters is by the standard method (Proctor compaction test) used in soil mechanics, with an eventual reduction of compaction energy. Although this methodology is accepted in newer geotechnical scientific discipline "waste mechanics", different treatments of municipal waste at the landfill itself (including pretreatment), indicate the need to change this classical approach. The main reason for that is the simulation of the operation of compactors (hedgehogs) at the landfill. Therefore, during the research, various innovative solutions are introduced, such as changing the classic flat Proctor hammer, by adding spikes, whose function is, in addition to compaction, destruction and shredding of municipal waste. The paper presents the behavior of municipal waste for four synthetic waste samples with different waste compositions (Plandište landfill). The samples were tested in standard Proctor apparatus at the same compaction energy, but with two different hammers: standard flat hammer and hammer with spikes.

Keywords: compaction, hammer with spikes, landfill, municipal solid waste, proctor compaction test

Procedia PDF Downloads 210
1692 Interpolation Issue in PVNPG-14M Application for Technical Control of Artillery Fire

Authors: Martin Blaha, Ladislav Potužák, Daniel Holesz

Abstract:

This paper focused on application support for technical control of artillery units – PVNPG-14M, especially on interpolation issue. Artillery units of the Army of the Czech Republic, reflecting the current global security neighborhood, can be used outside the Czech Republic. The paper presents principles, evolution and calculation in the process of complete preparation. The paper presents expertise using of application of current artillery communication and information system and suggests the perspective future system. The paper also presents problems in process of complete preparing of fire especially problems in permanently information (firing table) and calculated values. The paper presents problems of current artillery communication and information system and suggests requirements of the future system.

Keywords: Fire for Effect, Application, Fire Control, Interpolation method, Software development.

Procedia PDF Downloads 308
1691 Performance and Emission Characteristics of Diesel Engine Fuelled with Palm Biodiesel Blends

Authors: Jalpit B. Prajapati, Ketankumar G. Patel

Abstract:

Palm oil may be employed in diesel engine as an alternative fuel. Biofuel has so far been backed by government policies in the quest for low carbon fuel in the near future and promises to ensure energy security through partially replacing fossil fuels. This paper presents an experimental investigation of performance and emission characteristics by using palm oil in diesel engine. The properties of palm oil can be compared favorably with the characteristics required for internal combustion engine fuels especially diesel engine. Experiments will be performed for fixed compression ratio i.e. 18 using biodiesel-diesel blends i.e. B0, B10, B20, B30, B40, B50 with load variation from no load to full load and compared with base cases i.e. engine using diesel as a fuel. The parameters studied in performance characteristics are brake power, brake specific fuel consumption and brake thermal efficiency, in emission characteristics are carbon monoxide, unburnt hydrocarbons and nitrogen oxide. After experimental results B20 (20% palm oil and 80% diesel) is best in performance, but NOx formation is little higher in B20.

Keywords: palm biodiesel, performance, emission, diesel-biodiesel blend

Procedia PDF Downloads 355
1690 Improve of Biomass Properties through Torrefaction Process

Authors: Malgorzata Walkowiak, Magdalena Witczak, Wojciech Cichy

Abstract:

Biomass is an important renewable energy source in Poland. As a biofuel, it has many advantages like renewable in noticeable time and relatively high energy potential. But disadvantages of biomass like high moisture content and hygroscopic nature causes that gaining, transport, storage and preparation for combustion become troublesome and uneconomic. Thermal modification of biomass can improve hydrophobic properties, increase its calorific value and natural resistance. This form of thermal processing is known as torrefaction. The aim of the study was to investigate the effect of the pre-heat treatment of wood and plant lignocellulosic raw materials on the properties of solid biofuels. The preliminary studies included pine, beech and willow wood and other lignocellulosic raw materials: mustard, hemp, grass stems, tobacco stalks, sunflower husks, Miscanthus straw, rape straw, cereal straw, Virginia Mallow straw, rapeseed meal. Torrefaction was carried out using variable temperatures and time of the process, depending on the material used. It was specified the weight loss and the ash content and calorific value was determined. It was found that the thermal treatment of the tested lignocellulosic raw materials is able to provide solid biofuel with improved properties. In the woody materials, the increase of the lower heating value was in the range of 0,3 MJ/kg (pine and beech) to 1,1 MJ/kg (willow), in non-woody materials – from 0,5 MJ/kg (tobacco stalks, Miscanthus) to 3,5 MJ/kg (rapeseed meal). The obtained results indicate for further research needs, particularly in terms of conditions of the torrefaction process.

Keywords: biomass, lignocellulosic materials, solid biofuels, torrefaction

Procedia PDF Downloads 228
1689 Digital Watermarking Using Fractional Transform and (k,n) Halftone Visual Cryptography (HVC)

Authors: R. Rama Kishore, Sunesh Malik

Abstract:

Development in the usage of internet for different purposes in recent times creates great threat for the copy right protection of the digital images. Digital watermarking is the best way to rescue from the said problem. This paper presents detailed review of the different watermarking techniques, latest trends in the field and categorized like spatial and transform domain, blind and non-blind methods, visible and non visible techniques etc. It also discusses the different optimization techniques used in the field of watermarking in order to improve the robustness and imperceptibility of the method. Different measures are discussed to evaluate the performance of the watermarking algorithm. At the end, this paper proposes a watermarking algorithm using (k.n) shares of halftone visual cryptography (HVC) instead of (2, 2) share cryptography. (k,n) shares visual cryptography improves the security of the watermark. As halftone is a method of reprographic, it helps in improving the visual quality of watermark image. The proposed method uses fractional transformation to improve the robustness of the copyright protection of the method.

Keywords: digital watermarking, fractional transform, halftone, visual cryptography

Procedia PDF Downloads 346
1688 The Nexus between Climate Change and Criminality: The Nigerian Experience

Authors: Dagaci Aliyu Manbe, Anthony Abah Ebonyi

Abstract:

The increase in global temperatures is worsened by frequent natural events and human activities. Climate change has taken a prominent space in the global discourse on crime and criminality. Compared to when the subject centred around the discussion on the depletion of the ozone layer and global warming, today, the narrative revolves around the implications of changes in weather and climatic conditions in relations to violent crimes or conflict that traverse vast social, economic, and political spaces in different countries. Global warming and climate change refer to an increase in average global temperatures in the Earth’s near-surface air and oceans, which occurs due to human activities such as deforestation and the burning of fossil fuel such as gas flaring. The trend is projected to continue, if unchecked. This paper seeks to explore the nexus between climate change and criminality in Nigeria. It further examines the main ecological changes that predispose conflict dynamics of security threats factored by climate change to peaceful co-existence in Nigeria. It concludes with some recommendations on the way forward.

Keywords: conflict, climate change, criminality, global warning, peace

Procedia PDF Downloads 162
1687 Monocular 3D Person Tracking AIA Demographic Classification and Projective Image Processing

Authors: McClain Thiel

Abstract:

Object detection and localization has historically required two or more sensors due to the loss of information from 3D to 2D space, however, most surveillance systems currently in use in the real world only have one sensor per location. Generally, this consists of a single low-resolution camera positioned above the area under observation (mall, jewelry store, traffic camera). This is not sufficient for robust 3D tracking for applications such as security or more recent relevance, contract tracing. This paper proposes a lightweight system for 3D person tracking that requires no additional hardware, based on compressed object detection convolutional-nets, facial landmark detection, and projective geometry. This approach involves classifying the target into a demographic category and then making assumptions about the relative locations of facial landmarks from the demographic information, and from there using simple projective geometry and known constants to find the target's location in 3D space. Preliminary testing, although severely lacking, suggests reasonable success in 3D tracking under ideal conditions.

Keywords: monocular distancing, computer vision, facial analysis, 3D localization

Procedia PDF Downloads 133
1686 Factors of Social Network Platform Usage and Privacy Risk: A Unified Theory of Acceptance and Use of Technology2 Model

Authors: Wang Xue, Fan Liwei

Abstract:

The trust and use of social network platforms by users are instrumental factors that contribute to the platform’s sustainable development. Studying the influential factors of the use of social network platforms is beneficial for developing and maintaining a large user base. This study constructed an extended unified theory of acceptance and use of technology (UTAUT2) moderating model with perceived privacy risks to analyze the factors affecting the trust and use of social network platforms. 444 participants completed our 35 surveys, and we verified the survey results by structural equation model. Empirical results reveal the influencing factors that affect the trust and use of social network platforms, and the extended UTAUT2 model with perceived privacy risks increases the applicability of UTAUT2 in social network scenarios. Social networking platforms can increase their use rate by increasing the economics, functionality, entertainment, and privacy security of the platform.

Keywords: perceived privacy risk, social network, trust, use, UTAUT2 model

Procedia PDF Downloads 86
1685 Unauthorized License Verifier and Secure Access to Vehicle

Authors: G. Prakash, L. Mohamed Aasiq, N. Dhivya, M. Jothi Mani, R. Mounika, B. Gomathi

Abstract:

In our day to day life, many people met with an accident due to various reasons like over speed, overload in the vehicle, violation of the traffic rules, etc. Driving license system is difficult task for the government to monitor. To prevent non-licensees from driving who are causing most of the accidents, a new system is proposed. The proposed system consists of a smart card capable of storing the license details of a particular person. Vehicles such as cars, bikes etc., should have a card reader capable of reading the particular license. A person, who wishes to drive the vehicle, should insert the card (license) in the vehicle and then enter the password in the keypad. If the license data stored in the card and database about the entire license holders in the microcontroller matches, he/she can proceed for ignition after the automated opening of the fuel tank valve, otherwise the user is restricted to use the vehicle. Moreover, overload detector in our proposed system verifies and then prompts the user to avoid overload before driving. This increases the security of vehicles and also ensures safe driving by preventing accidents.

Keywords: license, verifier, EEPROM, secure, overload detection

Procedia PDF Downloads 233
1684 Inclusivity in Public Spaces through Architecture: A Case of Transgender Community in India

Authors: Sakshi Dhruve, Ar. Sarang Barbarwar

Abstract:

Public spaces are the locus of activity and interaction in any urban area. Such spaces provide identity to cities, towns or neighborhoods and define the people and culture over there. Inclusiveness is one of the core aspects of public or community spaces. With its humongous population and rapidly expanding urban areas, India needs more inclusivity in public spaces to attain true equitable development. The aim of the paper is to discuss the sensitivity of public spaces in India to the transgender community. The study shows how this community was legally included as ‘Third Gender’ in country’s legislation yet lacks social acceptance and security. It shows the challenges and issues faced by them at public spaces. The community was studied on ethnographic basis to understand their culture, lifestyle, requirements, etc. The findings have indicated towards a social stigma from people and insensitivity in designing of civic spaces. The larger objective of the study is also to provide recommendations on the design aspects and interventions in public places to increase their inclusiveness towards the transgender society.

Keywords: community spaces, ethnographic, stigma, Third Gender community

Procedia PDF Downloads 274
1683 Tourism Qualification and Academics' Opinions about the Influence of Employability Skills on Graduates' Ability to Secure Jobs in the Tourism Industry

Authors: Nicola Wakelin-Theron

Abstract:

This study focuses on higher education institutions in South Africa, with the view to understanding how tourism as a study discipline has evolved over the years, as well as the influence of employability skills on graduates’ ability to secure jobs in the tourism industry. Indeed, the employability landscape is becoming more complex; hence, it is imperative for higher education institutions to equip students with employability skills while going through their academic programmes and during their transition from higher education to the world of work. Employability – which is regarded as an empowerment mechanism and a key to job security – is a set of achievements which increases the probability for graduates to find and maintain employment. A quantitative research method was used to obtain the necessary information. Data were collected through a web-based, online survey questionnaire directed to academics from various public higher education institutions in South Africa that offer tourism as a qualification. The key findings revealed that academics are of the opinion that there are 5 skills that are influential in obtaining a position within the tourism industry.

Keywords: employability, industry skills, tourism industry, tourism qualification

Procedia PDF Downloads 399