Search results for: mobile money services
2441 Review of Cyber Security in Oil and Gas Industry with Cloud Computing Perspective: Taxonomy, Issues and Future Direction
Authors: Irfan Mohiuddin, Ahmad Al Mogren
Abstract:
In recent years, cloud computing has earned substantial attention in the Oil and Gas Industry and provides services in all the phases of the industry lifecycle. Oil and gas supply infrastructure, in particular, is more vulnerable to accidental, natural and intentional threats because of its widespread distribution. Numerous surveys have been conducted on cloud security and privacy. However, to the best of our knowledge, hardly any survey is carried out that reviews cyber security in all phases with a cloud computing perspective. Moreover, a distinctive classification is performed for all the cloud-based cyber security measures based on the cloud component in use. The classification approach will enable researchers to identify the required technique used to enhance the security in specific cloud components. Also, the limitation of each component will allow the researchers to design optimal algorithms. Lastly, future directions are given to point out the imminent challenges that can pave the way for researchers to further enhance the resilience to cyber security threats in the oil and gas industry.Keywords: cyber security, cloud computing, safety and security, oil and gas industry, security threats, oil and gas pipelines
Procedia PDF Downloads 1462440 Violence-Health Nexus: Examining the Impact of Ethnic Violence on Mental Health Disorders, A Global Perspective
Authors: Saqib Amina, Waqas Mehmoodb, Iftikhar Yasinc
Abstract:
This study analyzes the robust association between ethnic violence and mental health from a global perspective (201-countries across the world) by using the panel data for the period 1970 to 2020. Mental health has been determined through various dimensions such as mental disorders, anxiety disorder, depressive disorder, schizophrenia, and bipolar disorder. The empirical findings show that ethnic violence has a significant positive association with all types of mental health indicators, including mental disorders, anxiety disorder, depressive disorder, schizophrenia, and bipolar disorder. The study also reveals that institutional quality may reduce the effect of mental health disorders in a better way than promoting democracy. This study suggests the non-stigmatizing social form of community-based support services instead of a stigmatizing the concept of mental illnesses that promotes hospitalization and drug treatment.Keywords: ethnic violence, unemployment, mental health, violence
Procedia PDF Downloads 1752439 Forests, the Sanctuaries to Specialist and Rare Wild Native Bees at the Foothills of Western Himalayas
Authors: Preeti Virkar, V. P. Uniyal, Vinod Kumar Bhatt
Abstract:
With 50% decline in managed honey bee hives in the continents of Europe and America, farmers and landscape managers are turning to native wild bees for their essential ecosystem services of pollination. Wild bees population are too under danger due to the rapid land use changes from anthropogenic activities. With an escalating population reaching 9.0 billion by 2050, human-induced land use changes are predicted to further deteriorate the habitats of numerous species by the turn of this century. The status of bees are uncertain, especially in the tropical regions of the world, which also questions the crisis of global pollinator decline and their essential services to wild and managed flora. Our investigation collectively compares wild native bee diversity and their status in forests and agroecosystems in Doon Valley landscape, situated at the foothills of Himalayan ranges, Uttarakhand, India. We seek to ask whether (1) natural habitat are refuge to richer and rarer bees communities than the agroecosystems, (2) Are agroecosystems closer to natural habitats similar to them than agroecosystems farther away; hence support richer bee communities and hence, (3) Do polyculture farms support richer bee communities than monoculture. The data was collected using observation and pantrap sampling form February to May, 2012 to 2014. We recorded 43 species of bees in Doon Valley. They belonged to 5 families; Megachilidae, Apidae, Andrenidae, Halictidae and Collitidae. A multinomial model approach was used to classify the bees into 2 habitats, in which forests demonstrated to support greater number of specialist (26%, n= 11) species than agroecosystems (7%, n= 3). The valley had many species categorized as the rare (58%, n= 25) and very few generalists (9%, n=4). A linear regression model run on our data demonstrated higher bee diversity in agro-ecosystems in close proximity to forests (H’ for < 200 m = 1.60) compared to those further away (H’ for > 600 m = 0.56) (R2=0.782, SE=0.148, p value=0.004). Organic agriculture supported significantly greater species richness in comparison to conventional farms (Mann-Whitney U test, n1 = 33, n2 = 35; P = 0.001). Forests ecosystems are refuge to rare specialist groups and support bee communities in nearby agroecosystems. The findings of our investigation demonstrate the importance of natural habitats as a potential refuge for rare native wild bee pollinators. Polyculture in the valley behaves similar to natural habitats and supports diverse bee communities in comparison to conventional monocultures. Our study suggests that the farming communities adopt diverse organic agriculture systems to attract wild pollinators beneficial for better crop production. Forests are sanctuaries for bees to nest, forage, and breed. Therefore, our outcome also suggests landscape managers not only preserve protected areas but also enhance the floral diversity in semi-natural and urban areas.Keywords: native bees, pollinators, polyculture, agroecosystem, natural habitat, diversity, monoculture, specialists, generalists
Procedia PDF Downloads 2192438 The Application of Bayesian Heuristic for Scheduling in Real-Time Private Clouds
Authors: Sahar Sohrabi
Abstract:
The emergence of Cloud data centers has revolutionized the IT industry. Private Clouds in specific provide Cloud services for certain group of customers/businesses. In a real-time private Cloud each task that is given to the system has a deadline that desirably should not be violated. Scheduling tasks in a real-time private CLoud determine the way available resources in the system are shared among incoming tasks. The aim of the scheduling policy is to optimize the system outcome which for a real-time private Cloud can include: energy consumption, deadline violation, execution time and the number of host switches. Different scheduling policies can be used for scheduling. Each lead to a sub-optimal outcome in a certain settings of the system. A Bayesian Scheduling strategy is proposed for scheduling to further improve the system outcome. The Bayesian strategy showed to outperform all selected policies. It also has the flexibility in dealing with complex pattern of incoming task and has the ability to adapt.Keywords: cloud computing, scheduling, real-time private cloud, bayesian
Procedia PDF Downloads 3612437 Towards Creative Movie Title Generation Using Deep Neural Models
Authors: Simon Espigolé, Igor Shalyminov, Helen Hastie
Abstract:
Deep machine learning techniques including deep neural networks (DNN) have been used to model language and dialogue for conversational agents to perform tasks, such as giving technical support and also for general chit-chat. They have been shown to be capable of generating long, diverse and coherent sentences in end-to-end dialogue systems and natural language generation. However, these systems tend to imitate the training data and will only generate the concepts and language within the scope of what they have been trained on. This work explores how deep neural networks can be used in a task that would normally require human creativity, whereby the human would read the movie description and/or watch the movie and come up with a compelling, interesting movie title. This task differs from simple summarization in that the movie title may not necessarily be derivable from the content or semantics of the movie description. Here, we train a type of DNN called a sequence-to-sequence model (seq2seq) that takes as input a short textual movie description and some information on e.g. genre of the movie. It then learns to output a movie title. The idea is that the DNN will learn certain techniques and approaches that the human movie titler may deploy that may not be immediately obvious to the human-eye. To give an example of a generated movie title, for the movie synopsis: ‘A hitman concludes his legacy with one more job, only to discover he may be the one getting hit.’; the original, true title is ‘The Driver’ and the one generated by the model is ‘The Masquerade’. A human evaluation was conducted where the DNN output was compared to the true human-generated title, as well as a number of baselines, on three 5-point Likert scales: ‘creativity’, ‘naturalness’ and ‘suitability’. Subjects were also asked which of the two systems they preferred. The scores of the DNN model were comparable to the scores of the human-generated movie title, with means m=3.11, m=3.12, respectively. There is room for improvement in these models as they were rated significantly less ‘natural’ and ‘suitable’ when compared to the human title. In addition, the human-generated title was preferred overall 58% of the time when pitted against the DNN model. These results, however, are encouraging given the comparison with a highly-considered, well-crafted human-generated movie title. Movie titles go through a rigorous process of assessment by experts and focus groups, who have watched the movie. This process is in place due to the large amount of money at stake and the importance of creating an effective title that captures the audiences’ attention. Our work shows progress towards automating this process, which in turn may lead to a better understanding of creativity itself.Keywords: creativity, deep machine learning, natural language generation, movies
Procedia PDF Downloads 3282436 Denoising Convolutional Neural Network Assisted Electrocardiogram Signal Watermarking for Secure Transmission in E-Healthcare Applications
Authors: Jyoti Rani, Ashima Anand, Shivendra Shivani
Abstract:
In recent years, physiological signals obtained in telemedicine have been stored independently from patient information. In addition, people have increasingly turned to mobile devices for information on health-related topics. Major authentication and security issues may arise from this storing, degrading the reliability of diagnostics. This study introduces an approach to reversible watermarking, which ensures security by utilizing the electrocardiogram (ECG) signal as a carrier for embedding patient information. In the proposed work, Pan-Tompkins++ is employed to convert the 1D ECG signal into a 2D signal. The frequency subbands of a signal are extracted using RDWT(Redundant discrete wavelet transform), and then one of the subbands is subjected to MSVD (Multiresolution singular valued decomposition for masking. Finally, the encrypted watermark is embedded within the signal. The experimental results show that the watermarked signal obtained is indistinguishable from the original signals, ensuring the preservation of all diagnostic information. In addition, the DnCNN (Denoising convolutional neural network) concept is used to denoise the retrieved watermark for improved accuracy. The proposed ECG signal-based watermarking method is supported by experimental results and evaluations of its effectiveness. The results of the robustness tests demonstrate that the watermark is susceptible to the most prevalent watermarking attacks.Keywords: ECG, VMD, watermarking, PanTompkins++, RDWT, DnCNN, MSVD, chaotic encryption, attacks
Procedia PDF Downloads 1072435 Use of Proton Pump Inhibitors Medications during the First Years of Life and Late Complications
Authors: Kamelia Hamza
Abstract:
Background: Proton pump inhibitors (PPIs) are the most prescribed drug classes for pediatric gastroesophageal reflux disease (GERD).Many patients are treated with these drugs for atypical manifestations attributed to gastroesophageal reflux (GER), even in the absence of proved causal relationship. There is an impression of increase use of PPI's treatment for reflux in "clalit health services," the largest health organization in Israel. In the recent years, the medicine is given without restriction, it's not limited to pediatric gastroenterologists only, but pediatricians and family doctors. The objective of this study is to evaluate the hypothesis that exposure to PPIs during the first year of life is associated with an increased risk of developing late adverse diseases: pneumonia, asthma, AGE, IBD, celiac disease, allergic disorders, obesity, attention deficit hyperactivity disorders (ADHD), autism spectrum disorders (ASD). Methods: The study is a retrospective case-control cohort study based on a computerized database of Clalit Health Services (CHS). It includes 9844 children born between 2002-2018 and reported to complain of at least one of the symptoms (reflux/ spitting up, irritability, feeding difficulties, colics). The study population included the study group (n=4922) of children exposed to PPIs at any time prior to the first year of life and a control group (n=4922) child not exposed to PPIs who were matched to each case of the study group on age, race, socioeconomic status, and year of birth. The prevalence of late complications/diseases in the study group was compared with the prevalence of late complications/diseases diagnosis between 2002-2020 in the control group. Odds ratios and 95% confidence intervals were calculated by using logistic regression models. Results: We found that compared to the control group, children exposed to PPIs in the first year of life had an increased risk of developing several late complications/ disorders: pneumonia, asthma, various allergies (urticaria, allergic rhinitis, or allergic conjunctivitis) OR, inhalant allergies, and food allergies. In addition, they showed an increased risk of being diagnosed with ADHD or ASD, but children exposed to PPIs in the first year of life had decrease the risk of obesity by 17% (OR 0.825, 95%CI 0.697-0.976). Conclusions: We found significant associations between the use of PPIs during the first year of life and subsequent development of late complications/diseases such as respiratory diseases, allergy diseases, ADHD, and ASD. More studies are needed to prove causality and determine the mechanism behind the effect of PPIs and the development of late complications.Keywords: acid suppressing medications, proton pump inhibitors, histamine 2 blocker, late complications, gastroesophageal reflux, gastroesophageal reflux disease, acute gastroenteritis, community acquired pneumonia, asthma, allergic diseases, obesity, inflammatory bowel diseases, ulcerative colitis, crohn disease, attention deficit hyperactivity disorders, autism spectrum disorders
Procedia PDF Downloads 962434 Analysis of the Fair Distribution of Urban Facilities in Kabul City by Population Modeling
Authors: Ansari Mohammad Reza, Hiroko Ono
Abstract:
In this study, we investigated how much of the urban facilities are fairly distributing in the city of Kabul based on the factor of population. To find the answer to this question we simulated a fair model for the distribution of investigated facilities in the city which is proposed based on the consideration of two factors; the number of users for each facility and the average distance of reach of each facility. Then the model was evaluated to make sure about its efficiency. And finally, the two—the existing pattern and the simulation model—were compared to find the degree of bias in the existing pattern of distribution of facilities in the city. The result of the study clearly clarified that the facilities are not fairly distributed in Kabul city based on the factor of population. Our analysis also revealed that the education services and the parks are the most and the worst fair distributed facilities in this regard.Keywords: Afghanistan, ArcGIS Software, Kabul City, fair distribution, urban facilities
Procedia PDF Downloads 1832433 Predictors, Barriers, and Facilitators to Refugee Women’s Employment and Economic Inclusion: A Mixed Methods Systematic Review
Authors: Areej Al-Hamad, Yasin Yasin, Kateryna Metersky
Abstract:
This mixed-method systematic review and meta-analysis provide an encompassing understanding of the barriers, facilitators, and predictors of refugee women's employment and economic inclusion. The study sheds light on the complex interplay of sociocultural, personal, political, and environmental factors influencing these outcomes, underlining the urgent need for a multifaceted, tailored approach to devising strategies, policies, and interventions aimed at boosting refugee women's economic empowerment. Our findings suggest that sociocultural factors, including gender norms, societal attitudes, language proficiency, and social networks, profoundly shape refugee women's access to and participation in the labor market. Personal factors such as age, educational attainment, health status, skills, and previous work experience also play significant roles. Political factors like immigration policies, regulations, and rights to work, alongside environmental factors like labor market conditions, availability of employment opportunities, and access to resources and support services, further contribute to the complex dynamics influencing refugee women's economic inclusion. The significant variability observed in the impacts of these factors across different contexts underscores the necessity of adopting population and region-specific strategies. A one-size-fits-all approach may prove to be ineffective due to the diversity and unique circumstances of refugee women across different geographical, cultural, and political contexts. The study's findings have profound implications for policy-making, practice, education, and research. The insights garnered a call for coordinated efforts across these domains to bolster refugee women's economic participation. In policy-making, the findings necessitate a reassessment of current immigration and labor market policies to ensure they adequately support refugee women's employment and economic integration. In practice, they highlight the need for comprehensive, tailored employment services and interventions that address the specific barriers and leverage the facilitators identified. In education, they underline the importance of language and skills training programs that cater to the unique needs and circumstances of refugee women. Lastly, in research, they emphasize the need for ongoing investigations into the multifaceted factors influencing refugee women's employment experiences, allowing for continuous refinement of our understanding and interventions. Through this comprehensive exploration, the study contributes to ongoing efforts aimed at creating more inclusive, equitable societies. By continually refining our understanding of the complex factors influencing refugee women's employment experiences, we can pave the way toward enhanced economic empowerment for this vulnerable population.Keywords: refugee women, employment barriers, systematic review, employment facilitators
Procedia PDF Downloads 842432 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing
Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali
Abstract:
Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish
Procedia PDF Downloads 3612431 Managing the Cloud Procurement Process: Findings from a Case Study
Authors: Andreas Jede, Frank Teuteberg
Abstract:
Cloud computing (CC) has already gained overall appreciation in research and practice. Whereas the willingness to integrate cloud services in various IT environments is still unbroken, the previous CC procurement processes run mostly in an unorganized and non-standardized way. In practice, a sufficiently specific, yet applicable business process for the important acquisition phase is often lacking. And research does not appropriately remedy this deficiency yet. Therefore, this paper introduces a field-tested approach for CC procurement. Based on an extensive literature review and augmented by expert interviews, we designed a model that is validated and further refined through an in-depth real-life case study. For the detailed process description, we apply the event-driven process chain notation (EPC). The gained valuable insights into the case study may help CC research to shift to a more socio-technical area. For practice, next to giving useful organizational instructions we will provide extended checklists and lessons learned.Keywords: cloud procurement process, IT-organization, event-driven process chain, in-depth case study
Procedia PDF Downloads 3972430 Psychoeducation to Prevent Spread of HIV Among Men Who Have Sex with Men in Surabaya City
Authors: Christina Albertina Ludwinia Parung, I Gusti Ayu Maya Vratasti
Abstract:
Sexual transmission of HIV among Men who have Sex with Men (MSM) is believed to be one of the sources of the AIDS epidemic. Nowadays, government, communities, and NGOs are taking action to prevent its spread by assisting and educating groups of MSM in their countries. This assistance involves experts in many fields of study, including psychology. In the field of psychology, psychoeducation is believed to be one of the ways to assist the MSM groups. Just like in other countries, this psychoeducation assistance is also needed in Indonesia, where MSM groups are found in many cities within. Surabaya, as the second largest and densely populated city in Indonesia, is known to have a big number of MSM population. In September to December 2020, the author and a colleague conducted a mentoring effort to the MSM community at the MSM community gathering location called Gang Pattaya, in the city of Surabaya. The existence of this community is disguised by the general public, but is well known by NGOs. Community members do MSM out of their liking, although some do it in exchange for money. However, safety factors, such as using condoms for MSM, are not a priority for this community. They do MSM whether they receive a reward or not, just out of a boost of pleasure. There is no attempt to find out the health of the partner once they are attracted to each other. In general, they do not know whether they are infected with HIV. Most of them feel healthy and since they do not show any symptoms, they think it is not necessary to get tested. In the mentoring process, the researchers conduct psychoeducation, which begins with an approach to certain individuals so that they are comfortable with the researchers’ presence, then increasing awareness of safe sex behavior for HIV prevention for groups in the form of counseling using the Theory of Reasoned Action (TRA) approach. Counseling is carried out in various forms including roleplay, games, and seminars. The number of participants was 11 people, varying from 19-47 years old. Pretest related to knowledge of safe sex was carried out before conducting the intervention and post-test after the intervention. The normality test used is the Shapiro-Wilk analysis. Different tests on the data obtained were carried out using the non-parametric Wilcoxon Signed Ranks Test. None of the participants had lower post-test knowledge scores than the pre-test. Prestest and post test for safer sex behavior showed 2 participants with safer sex behavior did not change. Both belong to the senior group, while other participants have an improvement in their safer sex behavior. These findings suggest that intervention programs for MSM as an effort to reduce HIV transmission should pay attention to affective and cognitive coping strategies.Keywords: HIV, men who have sex with men, psychoeducation, psychology health, safer sex behavior, theory of reasoned action
Procedia PDF Downloads 1432429 Generational Differences in Leadership and Motivation: A Multilevel Study of Federal Workers
Authors: Sally Selden, Jyoti Aggarwal
Abstract:
The research on generational expectations about leadership is developing, but little scholarship exists on this topic for public sector organizations. Given the size of the federal workforce, this research study fills an important gap in the knowledge base and will inform public organizations how to approach managing and leading a multigenerational workforce. The research objectives of this study are to explore leadership preferences and motivation within generations and to determine whether these qualities differ by type of federal agency (e.g., law enforcement, human services, etc.). This paper will review the research on generational differences, expectations, and leadership with a focus on studies of public organizations. Using hierarchical linear modeling (HLM), this study will examine how leadership and motivation vary by generation in the federal government workforce, controlling for other demographic characteristics. The study will also examine whether generational differences impact satisfaction and performance. The study will utilize the 2019 Federal Employee Viewpoint Survey.Keywords: multigenerational workforce, leadership, generational differences, federal workforce
Procedia PDF Downloads 2302428 Child Labour and Contemporary Slavery: A Nigerian Perspective
Authors: Obiageli Eze
Abstract:
Millions of Nigerian children are subjected daily to all forms of abuse, ranging from trafficking to slavery, and forced labor. These under age children are taken from different parts of the Country to be used as sex slaves and laborers in the big cities, killed for rituals, organ transplantation, or used for money laundering, begging on the streets or are put to work in the fields. These children are made to do inhuman jobs under degrading conditions and face all kinds of abuse at the hands of their owners with no hope of escape. While lots of people blame poverty or culture as a basis for human trafficking in Nigeria, the National Agency for the Prohibition and Trafficking in Persons and other Related Matters (NAPTIP) says other causes of the outrageous rate of human trafficking in the country are ignorance, desperation, and the promotion and commercialization of sex by the European Union (EU) as dozens of young Nigerian children and women are forced to work as prostitutes in European countries including the Netherlands, France, Italy, and Spain. In the cause of searching for greener pastures, they are coerced into work they have not chosen and subjected to perpetual life in bondage. The Universal Declaration of Human Rights 1948 prohibits slave trade and slavery. Despite the fact that Nigeria is a Sovereign member of the United Nations and signatory to this International instrument, Child trafficking and slavery is still on the increase. This may be caused by the fact that the punishment for this crime in Nigeria is a maximum term of 10 years imprisonment with some of the worst offenders getting off with as little as 2 years imprisonment or an option of fine. It goes without saying that this punishment is not sufficient to act as a deterrent to these modern slave traders. Another major factor oiling the wheel of trafficking in the country is voodoo. The victims are taken to shrines of voodoo priests for oath taking. There, underage girls and boys are made to swear that they would never reveal the identities of their traffickers to anyone if arrested whether in the course of the journey or in the destination countries and that they would pay off debt. Nigeria needs tougher Laws in order to be able to combat human trafficking and slave trade. Also there has to be aggressive sensitization and awareness programs designed to educate and enlighten the public as to the dangers faced by these victims and the need to report any suspicious activity to the authorities. This paper attempts to give an insight into the plight of under-age Nigerian children trafficked and sold as slaves and offer a more effective stand in the fight against it.Keywords: child labor, slavery, slave trade, trafficking
Procedia PDF Downloads 5072427 Translation Training in the AI Era
Authors: Min Gao
Abstract:
In the past year, the advent of large language models (LLMs) has brought about a revolution in the language service industry, making it possible to efficiently produce more satisfactory and higher-quality translations. This is groundbreaking news for commercial companies involved in language services since much of a translator's work can now be completed by machines. However, it may be bad news for universities that provide translation training programs. They need to confront the challenges posed by AI in education by reconsidering issues such as the reform of traditional teaching methods, the translation ethics of students, and the new demands of the job market for their graduates. This article is an exploratory study of these issues based on the author's experiences in translation teaching. The research combines methods in the form of questionnaires and interviews. The findings include: (1) students may lose their motivation to learn in the AI era, but this can be compensated for by encouragement from the lecturer; (2) Translation ethics are not a serious problem in schools, considering the strict policies and regulations in place; (3) The role of translators has evolved in the new era, necessitating a reform of the traditional teaching methods.Keywords: job market of translation, large language model, translation ethics, translation training
Procedia PDF Downloads 722426 Cyber-Med: Practical Detection Methodology of Cyber-Attacks Aimed at Medical Devices Eco-Systems
Authors: Nir Nissim, Erez Shalom, Tomer Lancewiki, Yuval Elovici, Yuval Shahar
Abstract:
Background: A Medical Device (MD) is an instrument, machine, implant, or similar device that includes a component intended for the purpose of the diagnosis, cure, treatment, or prevention of disease in humans or animals. Medical devices play increasingly important roles in health services eco-systems, including: (1) Patient Diagnostics and Monitoring; Medical Treatment and Surgery; and Patient Life Support Devices and Stabilizers. MDs are part of the medical device eco-system and are connected to the network, sending vital information to the internal medical information systems of medical centers that manage this data. Wireless components (e.g. Wi-Fi) are often embedded within medical devices, enabling doctors and technicians to control and configure them remotely. All these functionalities, roles, and uses of MDs make them attractive targets of cyber-attacks launched for many malicious goals; this trend is likely to significantly increase over the next several years, with increased awareness regarding MD vulnerabilities, the enhancement of potential attackers’ skills, and expanded use of medical devices. Significance: We propose to develop and implement Cyber-Med, a unique collaborative project of Ben-Gurion University of the Negev and the Clalit Health Services Health Maintenance Organization. Cyber-Med focuses on the development of a comprehensive detection framework that relies on a critical attack repository that we aim to create. Cyber-Med will allow researchers and companies to better understand the vulnerabilities and attacks associated with medical devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The Cyber-Med detection framework will consist of two independent, but complementary detection approaches: one for known attacks, and the other for unknown attacks. These modules incorporate novel ideas and algorithms inspired by our team's domains of expertise, including cyber security, biomedical informatics, and advanced machine learning, and temporal data mining techniques. The establishment and maintenance of Cyber-Med’s up-to-date attack repository will strengthen the capabilities of Cyber-Med’s detection framework. Major Findings: Based on our initial survey, we have already found more than 15 types of vulnerabilities and possible attacks aimed at MDs and their eco-system. Many of these attacks target individual patients who use devices such pacemakers and insulin pumps. In addition, such attacks are also aimed at MDs that are widely used by medical centers such as MRIs, CTs, and dialysis engines; the information systems that store patient information; protocols such as DICOM; standards such as HL7; and medical information systems such as PACS. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched against MDs. Very little research has been conducted in order to protect these devices from cyber-attacks, since most of the development and engineering efforts are aimed at the devices’ core medical functionality, the contribution to patients’ healthcare, and the business aspects associated with the medical device.Keywords: medical device, cyber security, attack, detection, machine learning
Procedia PDF Downloads 3602425 Energy Savings with the Use of LED Lights at the Wastewater Treatment Plant
Authors: Kishen Prathivadi
Abstract:
The Sewer Authority Mid-Coastside (SAM) is a Joint Powers Authority formed in 1976 and provides secondary wastewater treatment to an average flow of 2.0 million gallons per day. SAM owns and operates a Wastewater Treatment Plant (WWTP) and a sanitary sewage collection system that collects sewage from its three member agencies: the City of Half Moon Bay, the Granada Community Services District and Montara Water and Sanitary District. The Sewer Authority Mid-Coastside (SAM) partnered with Pacific Gas & Electric, and its contractor GEL America, to review and replace all inefficient lighting fixtures and bulbs at the SAM treatment plant and administrative office. The project focused on replacing old and inefficient lighting fixtures and bulbs, reducing annual operating and maintenance costs, and reducing SAM’s carbon footprint. The project resulted in a 55% overall energy reduction, higher light quality and acuity, and a total operational savings of $495,000 over ten years.Keywords: energy savings, LED, lighting, electrical
Procedia PDF Downloads 1432424 The Role of Social Media in Activating Youth Participation in the Community
Authors: Raya Hamed Hilal Al Maamari
Abstract:
The Gulf societies have been undergoing radical changes due to the technology transfer. It altered the humanities attitudes, especially, youth habits as they have become an addicted to using social media. This study aimed to find out the ratio of social media in guiding youth to participate with government’s institutions in decision-making and developing their societies. The study considered a descriptive study, social survey method was used on a sample of 100 young from different gulf countries, using an electronic questionnaire, as well as, some interviews with famous leaders of youth groups. Finally, the researcher suggested some effective ways activate youth efforts using social media in an effective manner to plan for the development policy in the community. The findings illustrated that social media plays a vital role in encouraging youth to participate enthusiastically in providing services. Noticeably, social media contains large numbers of youth. Therefore, the influences will be widely and feasible. Moreover, the study indicated the fact that most of the youth teamwork started in social media. Then, it has been growing in the real society.Keywords: community, participation, social media, youth
Procedia PDF Downloads 3772423 The SEMONT Monitoring and Risk Assessment of Environmental EMF Pollution
Authors: Dragan Kljajic, Nikola Djuric, Karolina Kasas-Lazetic, Danka Antic
Abstract:
Wireless communications have been expanded very fast in recent decades. This technology relies on an extensive network of base stations and antennas, using radio frequency signals to transmit information. Devices that use wireless communication, while offering various services, basically act as sources of non-ionizing electromagnetic fields (EMF). Such devices are permanently present in the human vicinity and almost constantly radiate, causing EMF pollution of the environment. This fact has initiated development of modern systems for observation of the EMF pollution, as well as for risk assessment. This paper presents the Serbian electromagnetic field monitoring network – SEMONT, designed for automated, remote and continuous broadband monitoring of EMF in the environment. Measurement results of the SEMONT monitoring at one of the test locations, within the main campus of the University of Novi Sad, are presented and discussed, along with corresponding exposure assessment of the general population, regarding the Serbian legislation.Keywords: EMF monitoring, exposure assessment, sensor nodes, wireless network
Procedia PDF Downloads 2662422 Urban Security through Urban Transformation: Case of Saraycik District
Authors: Emir Sunguroglu, Merve Sunguroglu, Yesim Aliefendioglu, Harun Tanrivermis
Abstract:
Basic human needs range from physiological needs such as food, water and shelter to safety needs such as security, protection from natural disasters and even urban terrorism which are extant and not fulfilled even in urban areas where people live civilly in large communities. These basic needs when arose in urban life lead to a different kind of crime set defined as urban crimes. Urban crimes mostly result from differences between socioeconomic conditions in society. Income inequality increases tendency towards urban crimes. Especially in slum areas and suburbs, urban crimes not only threaten public security but they also affect deliverance of public services. It is highlighted that, construction of urban security against problems caused by urban crimes is not only achieved by involvement of urban security in security of the community but also comprises juridical development and staying above a level of legal standards concurrently. The idea of urban transformation emerged as interventions to demolishment and rebuilding of built environment to solve the unhealthy urban environment, inadequate infrastructure and socioeconomic problems came up during the industrialization process. Considering the probability of urbanization process driving citizens to commit crimes, The United Nations Commission on Human Security’s focus on this theme is conferred to be a proper approach. In this study, the analysis and change in security before, through and after urban transformation, which is one of the tools related to urbanization process, is strived to be discussed through the case of Sincan County Saraycik District. The study also aims to suggest improvements to current legislation on public safety, urban resilience, and urban transformation. In spite of Saraycik District residing in a developing County in Ankara, Turkey, from urbanization perspective as well as socioeconomic and demographic indicators the District exhibits a negative view throughout the County and the country. When related to the county, rates of intentional harm reports, burglary reports, the offense of libel and threat reports and narcotic crime reports are higher. The District is defined as ‘crime hotspot’. Interviews with residents of Saraycik claim that the greatest issue of the neighborhood is Public Order and Security (82.44 %). The District becomes prominent with negative aspects, especially with the presence of unlicensed constructions, occurrence of important social issues such as crime and insecurity and complicated lives of inhabitants from poverty and low standard conditions of living. Additionally, the social structure and demographic properties and crime and insecurity of the field have been addressed in this study. Consequently, it is claimed that urban crime rates were related to level of education, employment and household income, poverty trap, physical condition of housing and structuration, accessibility of public services, security, migration, safety in terms of disasters and emphasized that urban transformation is one of the most important tools in order to provide urban security.Keywords: urban security, urban crimes, urban transformation, Saraycik district
Procedia PDF Downloads 3072421 Impinging Acoustics Induced Combustion: An Alternative Technique to Prevent Thermoacoustic Instabilities
Authors: Sayantan Saha, Sambit Supriya Dash, Vinayak Malhotra
Abstract:
Efficient propulsive systems development is an area of major interest and concern in aerospace industry. Combustion forms the most reliable and basic form of propulsion for ground and space applications. The generation of large amount of energy from a small volume relates mostly to the flaming combustion. This study deals with instabilities associated with flaming combustion. Combustion is always accompanied by acoustics be it external or internal. Chemical propulsion oriented rockets and space systems are well known to encounter acoustic instabilities. Acoustic brings in changes in inter-energy conversion and alter the reaction rates. The modified heat fluxes, owing to wall temperature, reaction rates, and non-linear heat transfer are observed. The thermoacoustic instabilities significantly result in reduced combustion efficiency leading to uncontrolled liquid rocket engine performance, serious hazards to systems, assisted testing facilities, enormous loss of resources and every year a substantial amount of money is spent to prevent them. Present work attempts to fundamentally understand the mechanisms governing the thermoacoustic combustion in liquid rocket engine using a simplified experimental setup comprising a butane cylinder and an impinging acoustic source. Rocket engine produces sound pressure level in excess of 153 Db. The RL-10 engine generates noise of 180 Db at its base. Systematic studies are carried out for varying fuel flow rates, acoustic levels and observations are made on the flames. The work is expected to yield a good physical insight into the development of acoustic devices that when coupled with the present propulsive devices could effectively enhance combustion efficiency leading to better and safer missions. The results would be utilized to develop impinging acoustic devices that impinge sound on the combustion chambers leading to stable combustion thus, improving specific fuel consumption, specific impulse, reducing emissions, enhanced performance and fire safety. The results can be effectively applied to terrestrial and space application.Keywords: combustion instability, fire safety, improved performance, liquid rocket engines, thermoacoustics
Procedia PDF Downloads 1472420 Identity-Based Encryption: A Comparison of Leading Classical and Post-Quantum Implementations in an Enterprise Setting
Authors: Emily Stamm, Neil Smyth, Elizabeth O'Sullivan
Abstract:
In Identity-Based Encryption (IBE), an identity, such as a username, email address, or domain name, acts as the public key. IBE consolidates the PKI by eliminating the repetitive process of requesting public keys for each message encryption. Two of the most popular schemes are Sakai-Kasahara (SAKKE), which is based on elliptic curve pairings, and the Ducas, Lyubashevsky, and Prest lattice scheme (DLP- Lattice), which is based on quantum-secure lattice cryptography. In or- der to embed the schemes in a standard enterprise setting, both schemes are implemented as shared system libraries and integrated into a REST service that functions at the enterprise level. The performance of both schemes as libraries and services is compared, and the practicalities of implementation and application are discussed. Our performance results indicate that although SAKKE has the smaller key and ciphertext sizes, DLP-Lattice is significantly faster overall and we recommend it for most enterprise use cases.Keywords: identity-based encryption, post-quantum cryptography, lattice-based cryptography, IBE
Procedia PDF Downloads 1452419 Critical Design - Concepts, Methods and Practices for Innovative Societal Relationships
Authors: Martina Maria Keitsch
Abstract:
Critical Design (CD) confronts traditional design practice. Instead of reproducing and reinforcing contemporary perceptions of products and services, CD seeks to challenge them with the goal to stimulate debates and visions on societal innovation. CD methods comprise, among other narratives and design of critical objects. The oral presentation is based on a study that discusses concepts, methods, and applications of CD links CD to traditional design, and identifies CD benefits and challenges for design research and practice. The objective of the study is to introduce CD as an alternative for design researchers and practitioners supplementing commercially oriented design approaches. The study utilizes a literature review on CD concepts and methods based on current publications and online documents and illustrates CD practice with help of selected case studies. Findings of the study indicate that CD contribute, among others, to create new societal roles for designers, foster innovative relationships between designers and users, and encourage creativity through imaginative aesthetics.Keywords: critical design, postmodern design theories, narratives, rhizome
Procedia PDF Downloads 1752418 Welfare State and Income Distribution to School-Age Children
Authors: Kanyarat Bussaban, Siriporn Poolsuwan
Abstract:
This study is conducted with the objective to prove how the distorted distribution of welfare affects the quality of school-age children lives differently in the case of an urban community in Bangkok. 334 samples are households from Suan Oi and Ratchapatubtim communities. The study of sample communities found the difference between two community areas that are close. The people of Suan Oi community are economically better off people than the people of the Ratchapatubtim community. They share the benefits of using most services except the welfare of a child’s education. The resulting analysis of the variability in quality of life of the school age children indicate that heads of the households are women looking for quality of life benefits when the compulsory school age is less. A study of the two communities suggests that the inequality in income distribution currently affects the quality of life of school-age children.Keywords: inequality, income distribution, quality of school-age children lives, welfare state
Procedia PDF Downloads 3762417 Retaining Users in a Commercially-Supported Social Network
Authors: Sasiphan Nitayaprapha
Abstract:
A commercially-supported social network has become an emerging channel for an organization to communicate with and provide services to customers. The success of the commercially-supported social network depends on the ability of the organization to keep the customers in participating in the network. Drawing from the theories of information adoption, information systems continuance, and web usability, the author develops a model to explore how a commercially-supported social network can encourage customers to continue participating and using the information in the network. The theoretical model will be proved through an online survey of customers using the commercially-supported social networking sites of several high technology companies operating in the same sector. The result will be compared with previous studies to learn about the explanatory power of the research model, and to identify the main factors determining users’ intention to continue using a commercially-supported social network. Theoretical and practical implications, and limitations are discussed.Keywords: social network, information adoption, information systems continuance, web usability, user satisfaction
Procedia PDF Downloads 3182416 Sensor Data Analysis for a Large Mining Major
Authors: Sudipto Shanker Dasgupta
Abstract:
One of the largest mining companies wanted to look at health analytics for their driverless trucks. These trucks were the key to their supply chain logistics. The automated trucks had multi-level sub-assemblies which would send out sensor information. The use case that was worked on was to capture the sensor signal from the truck subcomponents and analyze the health of the trucks from repair and replacement purview. Open source software was used to stream the data into a clustered Hadoop setup in Amazon Web Services cloud and Apache Spark SQL was used to analyze the data. All of this was achieved through a 10 node amazon 32 core, 64 GB RAM setup real-time analytics was achieved on ‘300 million records’. To check the scalability of the system, the cluster was increased to 100 node setup. This talk will highlight how Open Source software was used to achieve the above use case and the insights on the high data throughput on a cloud set up.Keywords: streaming analytics, data science, big data, Hadoop, high throughput, sensor data
Procedia PDF Downloads 4082415 Tracking of Linarin from the Ethyl Acetate Fraction of Melinjo (Gnetum gnemon L.) Seeds Using Preparative High Performance Liquid Chromatography
Authors: Asep Sukohar, Ramadhan Triyandi, Muhammad Iqbal, Sahidin, Suharyani
Abstract:
Introduction: Resveratrol is a class of bioactive chemicals found in melinjo, which has a wide range of biological actions. The purpose of this study is to determine the linarin content of the melinjo fraksi by using preparative-high-performance liquid chromatography (prep-HPLC). Method: Extraction used the soxhletation method with 96% ethanol solvent. Fractionation used ethyl acetate and ethanol in a ratio of 1:1. Tracing of linarin compound used prep-HPLC with a mobile phase ratio of distilled water: methanol (55: 45, v/v). The presence of linarin was detected using a wavelength of 215 nm. Fourier Transform Infrared (FTIR) was used to identify the functional groups of compound. Result: The retention time required to elute the ethyl acetate fraction was 2.601 minutes. Compound separation identification using Fourier Transform Infrared Spectroscopy - Quest Attenuated Total Reflectance (FTIR - QATR) has a similarity value range with standards from 0 to 1000. The elution results of the ethyl acetate fraction have similar values with the standard compounds linarin (668), resveratrol (578), and catechin (455). Conclusion: Tracing for active compound in the ethyl acetate fraction of Gnetum Gnemon L. using prep-HPLC showed a strong suspicion of the presence of linarin compound.Keywords: Gnetum gnemon L., linarin, prep-HPLC, fraction ethyl acetate
Procedia PDF Downloads 1242414 Chaos Cryptography in Cloud Architectures with Lower Latency
Authors: Mohammad A. Alia
Abstract:
With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.Keywords: chaos, cloud computing, security, cryptography
Procedia PDF Downloads 3482413 Application of Metroxylon Sagu Waste in Textile Process
Authors: Nazlina Shaari
Abstract:
Sustainability is economic, social and environmental systems that make up the community in providing a healthy, productive, meaningful life for all community residents, present and future. The environmental profile of goods and services that satisfy our individual and societal needs were shaped by design activities. The integration of environmental aspect of product design, especially in textiles present much confusion surrounds the incorporation of environmental objectives into the design process. This paper explores the effective use of waste materials that can contribute to the development of more environmentally responsible practice in textile sector. It introduces key elements of the ecological approach and innovative ideas from waste to wealth. The paper focuses on the potential methods of utilizing sago residue as a natural colour enhancer in natural dyeing process. It will discover the potential of waste materials to be fully utilized to attempt to make the production of that textile more environmentally friendly.Keywords: sustainability, textiles, waste materials, environmentally friendly
Procedia PDF Downloads 3252412 Alcohol and Tobacco Influencing Prevalence of Hypertension among 15-54 Old Indian Men: An Application of Discriminant Analysis Using National Family Health Survey, 2015-16
Authors: Chander Shekhar, Jeetendra Yadav, Shaziya Allarakha
Abstract:
Hypertension has been described as an 'iceberg disease' as those who suffered are ignored and hence usually seek healthcare services at a very late stage. It is estimated that more than 2 million Indians are suffering from hypertensive heart disease that contributed to above 0.13 million deaths in 2016. The paper study aims to know the prevalence of Hypertension in India and its variation by socioeconomic backgrounds and to find out risk factors discriminating hypertension with special emphasis on consumption of tobacco and alcohol among men aged 15-54 years in India. The paper uses NFHS (2015-16) data. The paper used binary logistic regression and discriminant analysis to find significant predictors and discriminants of interest. The prevalence of hypertension was 16.5% in the study population. The results suggest that consumption of alcohol and tobacco are significant discriminant characteristics in carrying hypertension irrespective of what socioeconomic background characteristic he possesses.Keywords: hypertention, alcohol, tobacco, discriminant
Procedia PDF Downloads 150