Search results for: port safety and security
2698 Integration of Wireless Sensor Networks and Radio Frequency Identification (RFID): An Assesment
Authors: Arslan Murtaza
Abstract:
RFID (Radio Frequency Identification) and WSN (Wireless sensor network) are two significant wireless technologies that have extensive diversity of applications and provide limitless forthcoming potentials. RFID is used to identify existence and location of objects whereas WSN is used to intellect and monitor the environment. Incorporating RFID with WSN not only provides identity and location of an object but also provides information regarding the condition of the object carrying the sensors enabled RFID tag. It can be widely used in stock management, asset tracking, asset counting, security, military, environmental monitoring and forecasting, healthcare, intelligent home, intelligent transport vehicles, warehouse management, and precision agriculture. This assessment presents a brief introduction of RFID, WSN, and integration of WSN and RFID, and then applications related to both RFID and WSN. This assessment also deliberates status of the projects on RFID technology carried out in different computing group projects to be taken on WSN and RFID technology.Keywords: wireless sensor network, RFID, embedded sensor, Wi-Fi, Bluetooth, integration, time saving, cost efficient
Procedia PDF Downloads 3342697 Easily Memorable Strong Password Generation and Retrieval
Authors: Shatadru Das, Natarajan Vijayarangan
Abstract:
In this paper, a system and method for generating and recovering an authorization code has been designed and analyzed. The system creates an authorization code by accepting a base-sentence from a user. Based on the characters present in this base-sentence, the system computes a base-sentence matrix. The system also generates a plurality of patterns. The user can either select the pattern from the multiple patterns suggested by the system or can create his/her own pattern. The system then performs multiplications between the base-sentence matrix and the selected pattern matrix at different stages in the path forward, for obtaining a strong authorization code. In case the user forgets the base sentence, the system has a provision to manage and retrieve 'forgotten authorization code'. This is done by fragmenting the base sentence into different matrices and storing the fragmented matrices into a repository after computing matrix multiplication with a security question-answer approach and with a secret key provided by the user.Keywords: easy authentication, key retrieval, memorable passwords, strong password generation
Procedia PDF Downloads 4002696 Modeling the Risk Perception of Pedestrians Using a Nested Logit Structure
Authors: Babak Mirbaha, Mahmoud Saffarzadeh, Atieh Asgari Toorzani
Abstract:
Pedestrians are the most vulnerable road users since they do not have a protective shell. One of the most common collisions for them is pedestrian-vehicle at intersections. In order to develop appropriate countermeasures to improve safety for them, researches have to be conducted to identify the factors that affect the risk of getting involved in such collisions. More specifically, this study investigates factors such as the influence of walking alone or having a baby while crossing the street, the observable age of pedestrian, the speed of pedestrians and the speed of approaching vehicles on risk perception of pedestrians. A nested logit model was used for modeling the behavioral structure of pedestrians. The results show that the presence of more lanes at intersections and not being alone especially having a baby while crossing, decrease the probability of taking a risk among pedestrians. Also, it seems that teenagers show more risky behaviors in crossing the street in comparison to other age groups. Also, the speed of approaching vehicles was considered significant. The probability of risk taking among pedestrians decreases by increasing the speed of approaching vehicle in both the first and the second lanes of crossings.Keywords: pedestrians, intersection, nested logit, risk
Procedia PDF Downloads 1862695 The Effectiveness and Accuracy of the Schulte Holt IOL Toric Calculator Processor in Comparison to Manually Input Data into the Barrett Toric IOL Calculator
Authors: Gabrielle Holt
Abstract:
This paper is looking to prove the efficacy of the Schulte Holt IOL Toric Calculator Processor (Schulte Holt ITCP). It has been completed using manually inputted data into the Barrett Toric Calculator and comparing the number of minutes taken to complete the Toric calculations, the number of errors identified during completion, and distractions during completion. It will then compare that data to the number of minutes taken for the Schulte Holt ITCP to complete also, using the Barrett method, as well as the number of errors identified in the Schulte Holt ITCP. The data clearly demonstrate a momentous advantage to the Schulte Holt ITCP and notably reduces time spent doing Toric Calculations, as well as reducing the number of errors. With the ever-growing number of cataract surgeries taking place around the world and the waitlists increasing -the Schulte Holt IOL Toric Calculator Processor may well demonstrate a way forward to increase the availability of ophthalmologists and ophthalmic staff while maintaining patient safety.Keywords: Toric, toric lenses, ophthalmology, cataract surgery, toric calculations, Barrett
Procedia PDF Downloads 942694 Integration of Smart Grid Technologies with Smart Phones for Energy Monitoring and Management
Authors: Arjmand Khaliq, Pemra Sohaib
Abstract:
There is increasing trend of use of smart devices in the present age. The growth of computing techniques and advancement in hardware has also brought the use of sensors and smart devices to a high degree during the course of time. So use of smart devices for control, management communication and optimization has become very popular. This paper gives proposed methodology which involves sensing and switching unite for load, two way communications between utility company and smart phones of consumers using cellular techniques and price signaling resulting active participation of user in energy management .The goal of this proposed control methodology is active participation of user in energy management with accommodation of renewable energy resource. This will provide load adjustment according to consumer’s choice, increased security and reliability for consumer, switching of load according to consumer need and monitoring and management of energy.Keywords: cellular networks, energy management, renewable energy source, smart grid technology
Procedia PDF Downloads 4132693 Alternative Coating Compositions by Thermal Arc Spraying to Improve the Contact Heat Treatment in Press Hardening
Authors: Philipp Burger, Jonas Sommer, Haneen Daoud, Franz Hilmer, Uwe Glatzel
Abstract:
Press-hardened structural components made of coated high-strength steel are an essential part of the automotive industry when it comes to weight reduction, safety, and durability. Alternative heat treatment processes, such as contact heating, have been developed to improve the efficiency of this process. However, contact heating of the steel sheets often results in cracking within the Al-Si-coated layer. Therefore, this paper will address the development of alternative coating compositions based on Al-Si-X, suitable for contact heating. For this purpose, robot-assisted thermal arc spray was applied to coat the high-strength steel sheets. This ensured high reproducibility as well as effectiveness. The influence of the coating parameters and the variation of the nozzle geometry on the microstructure of the developed coatings will be discussed. Finally, the surface and mechanical properties after contact heating and press hardening will be presented.Keywords: press hardening, hot stamping, thermal spraying, arc spraying, coating compositions
Procedia PDF Downloads 942692 Promoting Biofuels in India: Assessing Land Use Shifts Using Econometric Acreage Response Models
Authors: Y. Bhatt, N. Ghosh, N. Tiwari
Abstract:
Acreage response function are modeled taking account of expected harvest prices, weather related variables and other non-price variables allowing for partial adjustment possibility. At the outset, based on the literature on price expectation formation, we explored suitable formulations for estimating the farmer’s expected prices. Assuming that farmers form expectations rationally, the prices of food and biofuel crops are modeled using time-series methods for possible ARCH/GARCH effects to account for volatility. The prices projected on the basis of the models are then inserted to proxy for the expected prices in the acreage response functions. Food crop acreages in different growing states are found sensitive to their prices relative to those of one or more of the biofuel crops considered. The required percentage improvement in food crop yields is worked to offset the acreage loss.Keywords: acreage response function, biofuel, food security, sustainable development
Procedia PDF Downloads 3012691 Localization of Near Field Radio Controlled Unintended Emitting Sources
Authors: Nurbanu Guzey, S. Jagannathan
Abstract:
Locating radio controlled (RC) devices using their unintended emissions has a great interest considering security concerns. Weak nature of these emissions requires near field localization approach since it is hard to detect these signals in far field region of array. Instead of only angle estimation, near field localization also requires range estimation of the source which makes this method more complicated than far field models. Challenges of locating such devices in a near field region and real time environment are analyzed in this paper. An ESPRIT like near field localization scheme is utilized for both angle and range estimation. 1-D search with symmetric subarrays is provided. Two 7 element uniform linear antenna arrays (ULA) are employed for locating RC source. Experiment results of location estimation for one unintended emitting walkie-talkie for different positions are given.Keywords: localization, angle of arrival (AoA), range estimation, array signal processing, ESPRIT, Uniform Linear Array (ULA)
Procedia PDF Downloads 5262690 The Role of Healthcare Informatics in Combating the COVID-19 Pandemic
Authors: Philip Eappen, Narasimha Rao Vajjhala
Abstract:
This chapter examines how healthcare organizations harnessed innovative healthcare informatics to navigate the challenges posed by the COVID-19 pan-demic, addressing critical needs and improving care delivery. The pandemic's un-precedented demands necessitated the adoption of new and advanced tools to manage healthcare operations more effectively. Informatics solutions played a crucial role in facilitating the smooth functioning of healthcare systems during this crisis and are anticipated to remain central to future healthcare management. Technologies such as telemedicine helped healthcare professionals minimize ex-posure to COVID-19 patients, thereby reducing infection risks within healthcare facilities. This chapter explores a range of informatics applications utilized worldwide, including telemedicine, AI-driven solutions, big data analytics, drones, robots, and digital platforms for drug delivery, all of which enabled re-mote patient care and enhanced healthcare accessibility and safety during the pan-demic.Keywords: healthcare informatics, COVID-19 Pandemic, telemedicine, AI-driven healthcare, big data analytics, remote patient care, digital health platforms
Procedia PDF Downloads 72689 Revisiting the Donning and Doffing Procedure: Ensuring a Coordinated Practice
Authors: Deanna Ruano-Meas, Laura Shenkman
Abstract:
Variances are seen in the way healthcare personnel (HCP) don and doff PPE risking contamination to self and others. By standardizing practice, variances in technique decrease, and so does the risk of contamination. To implement this change, the Model for Improvement will be used. A system change will be developed that will outline the role of the organizational leader’s support of HCP in the proper donning and doffing of PPE. Interventions will include environmental surveys to assess the safety and work situation ensuring a permissible environment, plan audits to confirm consistency, and the assessment of PPE wear for standardization. The change will also include an educational plan that will involve instruction of the current guidelines recommended by the Centers for Disease Control and Prevention (CDC) to all pertinent HCP, and the incorporation of PPE education in yearly educational training. The goal is a standardized practice and a reduced risk of contamination through education and organizational support. Personal protective equipment has had recent attention with the coming of the SARS-CoV-2. The realization that proper technique is important to decreasing contamination of pathogens has led to the revising of current processes.Keywords: donning and doffing, HAI, infection control, PPE
Procedia PDF Downloads 2052688 Facial Biometric Privacy Using Visual Cryptography: A Fundamental Approach to Enhance the Security of Facial Biometric Data
Authors: Devika Tanna
Abstract:
'Biometrics' means 'life measurement' but the term is usually associated with the use of unique physiological characteristics to identify an individual. It is important to secure the privacy of digital face image that is stored in central database. To impart privacy to such biometric face images, first, the digital face image is split into two host face images such that, each of it gives no idea of existence of the original face image and, then each cover image is stored in two different databases geographically apart. When both the cover images are simultaneously available then only we can access that original image. This can be achieved by using the XM2VTS and IMM face database, an adaptive algorithm for spatial greyscale. The algorithm helps to select the appropriate host images which are most likely to be compatible with the secret image stored in the central database based on its geometry and appearance. The encryption is done using GEVCS which results in a reconstructed image identical to the original private image.Keywords: adaptive algorithm, database, host images, privacy, visual cryptography
Procedia PDF Downloads 1302687 Enhancing Financial Security: Real-Time Anomaly Detection in Financial Transactions Using Machine Learning
Authors: Ali Kazemi
Abstract:
The digital evolution of financial services, while offering unprecedented convenience and accessibility, has also escalated the vulnerabilities to fraudulent activities. In this study, we introduce a distinct approach to real-time anomaly detection in financial transactions, aiming to fortify the defenses of banking and financial institutions against such threats. Utilizing unsupervised machine learning algorithms, specifically autoencoders and isolation forests, our research focuses on identifying irregular patterns indicative of fraud within transactional data, thus enabling immediate action to prevent financial loss. The data we used in this study included the monetary value of each transaction. This is a crucial feature as fraudulent transactions may have distributions of different amounts than legitimate ones, such as timestamps indicating when transactions occurred. Analyzing transactions' temporal patterns can reveal anomalies (e.g., unusual activity in the middle of the night). Also, the sector or category of the merchant where the transaction occurred, such as retail, groceries, online services, etc. Specific categories may be more prone to fraud. Moreover, the type of payment used (e.g., credit, debit, online payment systems). Different payment methods have varying risk levels associated with fraud. This dataset, anonymized to ensure privacy, reflects a wide array of transactions typical of a global banking institution, ranging from small-scale retail purchases to large wire transfers, embodying the diverse nature of potentially fraudulent activities. By engineering features that capture the essence of transactions, including normalized amounts and encoded categorical variables, we tailor our data to enhance model sensitivity to anomalies. The autoencoder model leverages its reconstruction error mechanism to flag transactions that deviate significantly from the learned normal pattern, while the isolation forest identifies anomalies based on their susceptibility to isolation from the dataset's majority. Our experimental results, validated through techniques such as k-fold cross-validation, are evaluated using precision, recall, and the F1 score alongside the area under the receiver operating characteristic (ROC) curve. Our models achieved an F1 score of 0.85 and a ROC AUC of 0.93, indicating high accuracy in detecting fraudulent transactions without excessive false positives. This study contributes to the academic discourse on financial fraud detection and provides a practical framework for banking institutions seeking to implement real-time anomaly detection systems. By demonstrating the effectiveness of unsupervised learning techniques in a real-world context, our research offers a pathway to significantly reduce the incidence of financial fraud, thereby enhancing the security and trustworthiness of digital financial services.Keywords: anomaly detection, financial fraud, machine learning, autoencoders, isolation forest, transactional data analysis
Procedia PDF Downloads 572686 Epidemiology of Healthcare-Associated Infections among Hematology/Oncology Patients: Results of a Prospective Incidence Survey in a Tunisian University Hospital
Authors: Ezzi Olfa, Bouafia Nabiha, Ammar Asma, Ben Cheikh Asma, Mahjoub Mohamed, Bannour Wadiaa, Achour Bechir, Khelif Abderrahim, Njah Mansour
Abstract:
Background: In hematology/oncology, health care improvement has allowed increasingly aggressive management in diagnostic and therapeutic procedures. Nevertheless, these intensified procedures have been associated with higher risk of healthcare associated infections (HAIs). We undertook this study to estimate the burden of HAIs in the cancer patients in an onco -hematology unit in a Tunisian university hospital. Materials/Methods: A prospective, observational study, based on active surveillance for a period of 06 months from Mars through September 2016, was undertaken in the department of onco-hematology in a university hospital in Tunisia. Patients, who stayed in the unit for ≥ 48 h, were followed until hospital discharge. The Centers for Disease Control and Prevention criteria (CDC) for site-specific infections were used as standard definitions for HAIs. Results: One hundred fifty patients were included in the study. The gender distribution was 33.3% for girls and 66.6% boys. They have a mean age of 23.12 years (SD = 18.36 years). The main patient’s diagnosis is: Acute Lymphoblastic Leukemia (ALL): 48.7 %( n=73). The mean length of stay was 21 days +/- 18 days. Almost 8% of patients had an implantable port (n= 12), 34.9 % (n=52) had a lumber puncture and 42.7 % (n= 64) had a medullary puncture. Chemotherapy was instituted in 88% of patients (n=132). Eighty (53.3%) patients had neutropenia at admission. The incidence rate of HAIs was 32.66 % per patient; the incidence density was 15.73 per 1000 patient-days in the unit. Mortality rate was 9.3% (n= 14), and 50% of cases of death were caused by HAIs. The most frequent episodes of infection were: infection of skin and superficial mucosa (5.3%), pulmonary aspergillosis (4.6%), Healthcare associated pneumonia (HAP) (4%), Central venous catheter associated infection (4%), digestive infection (5%), and primary bloodstream infection (2.6%). Finally, fever of unknown origin (FUO) incidence rate was 14%. In case of skin and superficial infection (n= 8), 4 episodes were documented, and organisms implicated were Escherichia.coli, Geotricum capitatum and Proteus mirabilis. For pulmonary aspergillosis, 6 cases were diagnosed clinically and radiologically, and one was proved by positive aspergillus antigen in bronchial aspiration. Only one patient died due this infection. In HAP (6 cases), four episodes were diagnosed clinically and radiologically. No bacterial etiology was established in these cases. Two patients died due to HAP. For primary bloodstream infection (4 cases), implicated germs were Enterobacter cloacae, Geotricum capitatum, klebsiella pneumoniae, and Streptococcus pneumoniae. Conclusion: This type of prospective study is an indispensable tool for internal quality control. It is necessary to evaluate preventive measures and design control guides and strategies aimed to reduce the HAI’s rate and the morbidity and mortality associated with infection in a hematology/oncology unit.Keywords: cohort prospective studies, healthcare associated infections, hematology oncology department, incidence
Procedia PDF Downloads 3902685 Tolerance of Colonoscopy: Questioning Its Utility in the Elderly
Authors: Faizan Rathore, Naveed Sultan, Humphrey O. Connor
Abstract:
This study was carried out from Jan '12-Dec'12 to assess current practice in Kerry General Hospital against the age-related indicators for colonoscopies. A total of 1474 colonoscopies were performed,1177(79.9%) were diagnostic and 297 (20.1%) were therapeutic, patients were divided into 4 age groups under 75, 75-80, 81-85, 86+. The trend analysis revealed an increase in diagnostic colonoscopies and decrease in therapeutic colonoscopies with age. 664(45.04%) of colonoscopies were reported normal which made up the majority of the total diagnoses, 1330 (90.2%) of colonoscopies occurred without any complications. Main complications were patient discomfort being the highest, present in 112(7.6%) of patients, and lowest being urticaria around the IV site present in 1 (0.1%) of the cases. Patient discomfort was higher in younger patients as evidenced by 98 cases aged <75 , followed by 11 cases aged 75-80, 2 cases aged 81-85 and 1 case aged >86. Highest percentage of poor tolerance was found in 14 (1.1%) of total patients <75, 1 (0.8%) of total patients aged 75-80, 1(1.7%) of total patients in age group 81-85 and none (0%) in age group >86. We have established the safety of colonoscopy, low rate of complications and a better tolerance in the elderly from this study, however, its utility, especially in the presence of other comorbidities in elderly is questionable.Keywords: colonoscopy, elderly patients, utility, tolerance
Procedia PDF Downloads 4322684 The Effects of Urbanization on Peri-Urban Livelihood in Ghana: A Case of Kumasi Peri-Urban Communities
Authors: Charles Kwaku Oppong
Abstract:
The research linked urban expansion resulting from urbanization with changing morphology processes happening in peri-urban communities. Two villages of Kumasi City peri-urban were used as a case study. Appropriate analytical framework and methodology (literature review and empirical evidence) were employed to ensure that all pertinent issues of peri-urban interface are brought to light. It was discovered from the study that since peri-urban livelihood is linked with assets base; it has been found that stock of asset, as well as transformation processes, were major factors in the shaping of livelihoods strategies. For that reason, success or failure of household livelihoods was seen to relate to the kind of livelihood strategy employed. With efforts to mitigate for livelihoods failure due to peri-urban development, households' recourse to remittances, land disposal, and other means as an alternative livelihood approach. The study calls for local government policy interventions in regulating peri-urban transformation process and providing safety nets for the vulnerable.Keywords: urban expansion, peri-urban interface, livelihoods, asset
Procedia PDF Downloads 2662683 A Model for Adaptive Online Quiz: QCitra
Authors: Rosilah Hassan, Karam Dhafer Mayoof, Norngainy Mohd Tawil, Shamshubaridah Ramlee
Abstract:
Application of adaptive online quiz system and a design are performed in this paper. The purpose of adaptive quiz system is to establish different questions automatically for each student and measure their competence on a definite area of discipline. This model determines students competencies in cases like distant-learning which experience challenges frequently. Questions are specialized to allow clear deductions about student gains; they are able to identify student competencies more effectively. Also, negative effects of questions requiring higher knowledge than competency over student’s morale and self-confidence are dismissed. The advantage of the system in the quiz management requires less total time for measuring and is more flexible. Self sufficiency of the system in terms of repeating, planning and assessment of the measurement process allows itself to be used in the individual education sets. Adaptive quiz technique prevents students from distraction and motivation loss, which is led by the questions with quite lower hardness level than student’s competency.Keywords: e-learning, adaptive system, security, quiz database
Procedia PDF Downloads 4502682 The Politicization of Foreign Aid and Its Effect on Afghanistan, 2001-2016
Authors: Narender Banwala
Abstract:
The study critically evaluates that the politics of foreign aid and its effect on Afghanistan. The study argues that dynamics of foreign aid to Afghanistan are not driven solely by the Afghan political, social, and economic realities but much more by the ephemeral political goals of international donor countries. The objective of this paper is to find out the political reality of foreign aid given to Afghanistan in a post 9/11 era. The study analyses the gap between the donor countries' interests and the Afghan government's priorities in aid coordination and management. The aid given to Afghanistan has been accompanied by the political interests of the major powers and therefore violated the core principles of humanitarianism, i.e., humanity, impartiality, neutrality, and independence. This research attempts to explain the areas which are of high priority, extremely vulnerable, and have been a neglected part since 2001. The study focuses on how as a result of politicization, foreign aid could not yield the expected results even after prolong presence of international donors in Afghanistan. Methodologically, the study includes both qualitative and quantitative data, which are collected by interviews with government officials and other government documents.Keywords: Afganistan, aid, politics, security
Procedia PDF Downloads 1262681 Optimization of Our Eyes Cooperation as the Counter-Terrorism Strategy in Association of South East Asian Nations
Authors: Chastiti Mediafira Wulolo
Abstract:
Our Eyes is a cooperation pact in the field of intelligence information exchanges initiated by the Indonesian Ministry of Defense, which has been signed by Indonesia, Philippines, Malaysia, Brunei Darussalam, Thailand, and Singapore. This cooperation mostly engages the military acts as a central role, but this pact still requires the involvement of various parties such as police and other linear institution. This paper will use a qualitative content analysis method by doing some deep analyzing the pattern of cooperation itself. As the implementation of translantic counter-terrorism cooperation, this research will address how the role of Our Eyes can be optimized as a form of government’s response towards the contemporary threat in the Dynamics of Strategic Environmental Security in the Asia Pacific Region. Optimizing the role of this cooperation will also acquire from the previous counter-terrorism cooperation in ASEAN region, so it expects that Our Eyes collaboration can be the most effective cooperation in overcoming terrorism issues in ASEAN, eventually in Asia Pacific.Keywords: our eyes, Defense Ministry of Indonesia, ASEAN, counter-terrorism
Procedia PDF Downloads 1852680 Modeling of Digital and Settlement Consolidation of Soil under Oedomete
Authors: Yu-Lin Shen, Ming-Kuen Chang
Abstract:
In addition to a considerable amount of machinery and equipment, intricacies of the transmission pipeline exist in Petrochemical plants. Long term corrosion may lead to pipeline thinning and rupture, causing serious safety concerns. With the advances in non-destructive testing technology, more rapid and long-range ultrasonic detection techniques are often used for pipeline inspection, EMAT without coupling to detect, it is a non-contact ultrasonic, suitable for detecting elevated temperature or roughened e surface of line. In this study, we prepared artificial defects in pipeline for Electromagnetic Acoustic Transducer Testing (EMAT) to survey the relationship between the defect location, sizing and the EMAT signal. It was found that the signal amplitude of EMAT exhibited greater signal attenuation with larger defect depth and length.. In addition, with bigger flat hole diameter, greater amplitude attenuation was obtained. In summary, signal amplitude attenuation of EMAT was affected by the defect depth, defect length and the hole diameter and size.Keywords: EMAT, artificial defect, NDT, ultrasonic testing
Procedia PDF Downloads 3332679 Investigating the Factors Affecting on One Time Passwords Technology Acceptance: A Case Study in Banking Environment
Authors: Sajad Shokohuyar, Mahsa Zomorrodi Anbaji, Saghar Pouyan Shad
Abstract:
According to fast technology growth, modern banking tries to decrease going to banks’ branches and increase customers’ consent. One of the problems which banks face is securing customer’s password. The banks’ solution is one time password creation system. In this research by adapting from acceptance of technology model theory, assesses factors that are effective on banking in Iran especially in using one time password machine by one of the private banks of Iran customers. The statistical population is all of this bank’s customers who use electronic banking service and one time password technology and the questionnaires were distributed among members of statistical population in 5 selected groups of north, south, center, east and west of Tehran. Findings show that confidential preservation, education, ease of utilization and advertising and informing has positive relations and distinct hardware and age has negative relations.Keywords: security, electronic banking, one time password, information technology
Procedia PDF Downloads 4532678 Human Motion Capture: New Innovations in the Field of Computer Vision
Authors: Najm Alotaibi
Abstract:
Human motion capture has become one of the major area of interest in the field of computer vision. Some of the major application areas that have been rapidly evolving include the advanced human interfaces, virtual reality and security/surveillance systems. This study provides a brief overview of the techniques and applications used for the markerless human motion capture, which deals with analyzing the human motion in the form of mathematical formulations. The major contribution of this research is that it classifies the computer vision based techniques of human motion capture based on the taxonomy, and then breaks its down into four systematically different categories of tracking, initialization, pose estimation and recognition. The detailed descriptions and the relationships descriptions are given for the techniques of tracking and pose estimation. The subcategories of each process are further described. Various hypotheses have been used by the researchers in this domain are surveyed and the evolution of these techniques have been explained. It has been concluded in the survey that most researchers have focused on using the mathematical body models for the markerless motion capture.Keywords: human motion capture, computer vision, vision-based, tracking
Procedia PDF Downloads 3202677 Simplifying the Migration of Architectures in Embedded Applications Introducing a Pattern Language to Support the Workforce
Authors: Farha Lakhani, Michael J. Pont
Abstract:
There are two main architectures used to develop software for modern embedded systems: these can be labelled as “event-triggered” (ET) and “time-triggered” (TT). The research presented in this paper is concerned with the issues involved in migration between these two architectures. Although TT architectures are widely used in safety-critical applications they are less familiar to developers of mainstream embedded systems. The research presented in this paper began from the premise that–for a broad class of systems that have been implemented using an ET architecture–migration to a TT architecture would improve reliability. It may be tempting to assume that conversion between ET and TT designs will simply involve converting all event-handling software routines into periodic activities. However, the required changes to the software architecture are, in many cases rather more profound. The main contribution of the work presented in this paper is to identify ways in which the significant effort involved in migrating between existing ET architectures and “equivalent” (and effective) TT architectures could be reduced. The research described in this paper has taken an innovative step in this regard by introducing the use of ‘Design patterns’ for this purpose for the first time.Keywords: embedded applications, software architectures, reliability, pattern
Procedia PDF Downloads 3292676 Preliminary Investigations on the Development and Production of Topical Skin Ointments
Authors: C. C. Igwe, C. E. Ogbuadike
Abstract:
Bryophyllum pinnatum is a tropical plant used by the indigenous people of South-East Nigeria as a medicinal plant for the treatment of skin ulcer and is being explored for the production of topical herbal skin ointments. This preliminary study involves the extraction and characterization of bioactive compounds from this plant for anti-skin ulcer, antimicrobial, and antioxidant activity, as well as formulating topical herbal medications for skin ulcer. Thus extraction, percentage yield, moisture content analysis, solvent-solvent fractionation and GC-MS has been carried out on processed leaves sample of B. pinnatum. GC-MS analysis revealed the presence of seven compounds, namely: 1-Octene, 3, 7-dimethyl, 1-Tridecene, E-14-Hexadecenal, 3-Eicosene (E)-, 11-Tricosene, 1-Tridecyn-4-ol and Butanamide. Standardized herbal products have been produced from B. pinnatum extracts. The products are being evaluated for safety and efficacy tests to ascertain their toxicity (if any), anti-ulcer, antibiotic and antioxidant properties. Further work is on-going to characterize the bioactive principles present in the plant extracts.Keywords: anti-microbial, bioactive compounds, bryophyllum pinnatum, skin ulcer
Procedia PDF Downloads 772675 Assessing of Social Comfort of the Russian Population with Big Data
Authors: Marina Shakleina, Konstantin Shaklein, Stanislav Yakiro
Abstract:
The digitalization of modern human life over the last decade has facilitated the acquisition, storage, and processing of data, which are used to detect changes in consumer preferences and to improve the internal efficiency of the production process. This emerging trend has attracted academic interest in the use of big data in research. The study focuses on modeling the social comfort of the Russian population for the period 2010-2021 using big data. Big data provides enormous opportunities for understanding human interactions at the scale of society with plenty of space and time dynamics. One of the most popular big data sources is Google Trends. The methodology for assessing social comfort using big data involves several steps: 1. 574 words were selected based on the Harvard IV-4 Dictionary adjusted to fit the reality of everyday Russian life. The set of keywords was further cleansed by excluding queries consisting of verbs and words with several lexical meanings. 2. Search queries were processed to ensure comparability of results: the transformation of data to a 10-point scale, elimination of popularity peaks, detrending, and deseasoning. The proposed methodology for keyword search and Google Trends processing was implemented in the form of a script in the Python programming language. 3. Block and summary integral indicators of social comfort were constructed using the first modified principal component resulting in weighting coefficients values of block components. According to the study, social comfort is described by 12 blocks: ‘health’, ‘education’, ‘social support’, ‘financial situation’, ‘employment’, ‘housing’, ‘ethical norms’, ‘security’, ‘political stability’, ‘leisure’, ‘environment’, ‘infrastructure’. According to the model, the summary integral indicator increased by 54% and was 4.631 points; the average annual rate was 3.6%, which is higher than the rate of economic growth by 2.7 p.p. The value of the indicator describing social comfort in Russia is determined by 26% by ‘social support’, 24% by ‘education’, 12% by ‘infrastructure’, 10% by ‘leisure’, and the remaining 28% by others. Among 25% of the most popular searches, 85% are of negative nature and are mainly related to the blocks ‘security’, ‘political stability’, ‘health’, for example, ‘crime rate’, ‘vulnerability’. Among the 25% most unpopular queries, 99% of the queries were positive and mostly related to the blocks ‘ethical norms’, ‘education’, ‘employment’, for example, ‘social package’, ‘recycling’. In conclusion, the introduction of the latent category ‘social comfort’ into the scientific vocabulary deepens the theory of the quality of life of the population in terms of the study of the involvement of an individual in the society and expanding the subjective aspect of the measurements of various indicators. Integral assessment of social comfort demonstrates the overall picture of the development of the phenomenon over time and space and quantitatively evaluates ongoing socio-economic policy. The application of big data in the assessment of latent categories gives stable results, which opens up possibilities for their practical implementation.Keywords: big data, Google trends, integral indicator, social comfort
Procedia PDF Downloads 2002674 Magnesium Alloys Containing Y, Gd and Ca with Enhanced Ignition Temperature and Mechanical Properties for Aviation Applications
Authors: Jiří Kubásek, Peter Minárik, Klára Hosová, Stanislav Šašek, Jozef Veselý, Jitka Stráská, Drahomír Dvorský, Dalibor Vojtěch, Miloš Janeček
Abstract:
Mg-2Y-2Gd-1Ca and Mg-4Y-4Gd-2Ca alloys were processed by extrusion or equal channel angular pressing (ECAP) to analyse the effect of the microstructure on ignition temperature, mechanical properties and corrosion resistance. The alloys are characterized by good mechanical properties and exceptionally high ignition temperature, which is a critical safety measure. The effect of extrusion and ECAP on the microstructure, mechanical properties and ignition temperature was studied. The obtained results indicated a substantial effect of the processing conditions on the average grain size, the recrystallized fraction and texture formation. Both alloys featured a high strength, depending on the composition and processing condition, and a high ignition temperature of ≈1100 °C (Mg-4Y-4Gd-2Ca) and ≈950 °C (Mg-2Y-2Gd-1Ca), which was attributed to the synergic effect of Y, Gd and Ca oxides, with the dominant effect of Y₂O₃. The achieved combination of enhanced mechanical properties and the ignition temperature makes these alloys a prominent candidate for aircraft applications.Keywords: magnesium alloys, enhanced ignition temperature, mechanical properties, ECAP
Procedia PDF Downloads 1092673 The Role of Access Control Techniques in Creating a Safe Cyberspace for Children
Authors: Sara Muslat Alsahali, Nout Mohammed Alqahtani
Abstract:
Digital technology has changed the world, and with the increasing number of children accessing the Internet, it has now become an integral part of children's lives from their early years. With the rapid development of digital technology, the risks children face on the internet also evolve from cyberbullying to misuse, sexual exploitation, and abuse of their private information over the Internet. Digital technology, with its advantages and disadvantages, is now a fact of our life. Therefore, knowledge of how to reduce its risks and maximize its benefits will help shape the growth and future of a new generation of digital citizens. This paper will discuss access control techniques that help to create secure cyberspace where children can be safe without depriving them of their rights and freedom to use the internet and preventing them from its benefits. Also, it sheds light on its challenges and problems by classifying the methods of parental controlling into two possibilities asynchronous and synchronous techniques and choosing YouTube as a case study of access control techniques.Keywords: access control, cyber security, kids, parental monitoring
Procedia PDF Downloads 1372672 Improving Cyber Resilience in Mobile Field Hospitals: Towards an Assessment Model
Authors: Nasir Baba Ahmed, Nicolas Daclin, Marc Olivaux, Gilles Dusserre
Abstract:
The Mobile field hospital is critical in terms of managing emergencies in crisis. It is a sub-section of the main hospitals and the health sector, tasked with delivering responsive, immediate, and efficient medical services during a crisis. With the aim to prevent further crisis, the assessment of the cyber assets follows different methods, to distinguish its strengths and weaknesses, and in turn achieve cyber resiliency. The work focuses on assessments of cyber resilience in field hospitals with trends growing in both the field hospital and the health sector in general. This creates opportunities for the adverse attackers and the response improvement objectives for attaining cyber resilience, as the assessments allow users and stakeholders to know the level of risks with regards to its cyber assets. Thus, the purpose is to show the possible threat vectors which open up opportunities, with contrast to current trends in the assessment of the mobile field hospitals’ cyber assets.Keywords: assessment framework, cyber resilience, cyber security, mobile field hospital
Procedia PDF Downloads 1582671 An Attack on the Lucas Based El-Gamal Cryptosystem in the Elliptic Curve Group Over Finite Field Using Greater Common Divisor
Authors: Lee Feng Koo, Tze Jin Wong, Pang Hung Yiu, Nik Mohd Asri Nik Long
Abstract:
Greater common divisor (GCD) attack is an attack that relies on the polynomial structure of the cryptosystem. This attack required two plaintexts differ from a fixed number and encrypted under same modulus. This paper reports a security reaction of Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field under GCD attack. Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field was exposed mathematically to the GCD attack using GCD and Dickson polynomial. The result shows that the cryptanalyst is able to get the plaintext without decryption by using GCD attack. Thus, the study concluded that it is highly perilous when two plaintexts have a slight difference from a fixed number in the same Elliptic curve group over finite field.Keywords: decryption, encryption, elliptic curve, greater common divisor
Procedia PDF Downloads 2562670 Iris Detection on RGB Image for Controlling Side Mirror
Authors: Norzalina Othman, Nurul Na’imy Wan, Azliza Mohd Rusli, Wan Noor Syahirah Meor Idris
Abstract:
Iris detection is a process where the position of the eyes is extracted from the face images. It is a current method used for many applications such as for security purpose and drowsiness detection. This paper proposes the use of eyes detection in controlling side mirror of motor vehicles. The eyes detection method aims to make driver easy to adjust the side mirrors automatically. The system will determine the midpoint coordinate of eyes detection on RGB (color) image and the input signal from y-coordinate will send it to controller in order to rotate the angle of side mirror on vehicle. The eye position was cropped and the coordinate of midpoint was successfully detected from the circle of iris detection using Viola Jones detection and circular Hough transform methods on RGB image. The coordinate of midpoint from the experiment are tested using controller to determine the angle of rotation on the side mirrors.Keywords: iris detection, midpoint coordinates, RGB images, side mirror
Procedia PDF Downloads 4232669 Performance Analysis on the Smoke Management System of the Weiwuying Center for the Arts Using Hot Smoke Tests
Authors: K. H. Yang, T. C. Yeh, P. S. Lu, F. C. Yang, T. Y. Wu, W. J. Sung
Abstract:
In this study, a series of full-scale hot smoke tests has been conducted to validate the performances of the smoke management system in the WWY center for arts before grand opening. Totaled 19 scenarios has been established and experimented with fire sizes ranging from 2 MW to 10 MW. The measured ASET data provided by the smoke management system experimentation were compared with the computer-simulated RSET values for egress during the design phase. The experimental result indicated that this system could successfully provide a safety margin of 200% and ensure a safe evacuation in case of fire in the WWY project, including worst-cases and fail-safe scenarios. The methodology developed and results obtained in this project can provide a useful reference for future applications, such as for the large-scale indoor sports dome and arena, stadium, shopping malls, airport terminals, and stations or tunnels for railway and subway systems.Keywords: building hot smoke tests, performance-based smoke management system designs, full-scale experimental validation, tenable condition criteria
Procedia PDF Downloads 445