Search results for: privacy preserving
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 774

Search results for: privacy preserving

444 Model of a Context-Aware Middleware for Mobile Workers

Authors: Esraa Moustafa, Gaetan Rey, Stephane Lavirotte, Jean-Yves Tigli

Abstract:

With the development of Internet of Things and Web of Things, computing becomes more pervasive, invisible and present everywhere. In fact, in our environment, we are surrounded by multiple devices that deliver (web) services that meet the needs of the users. However, the mobility of these devices as the users has important repercussions that challenge software design of these applications because the variability of the environment cannot be anticipated at the design time. Thus, it will be interesting to dynamically discover the environment and adapt the application during its execution to the new contextual conditions. We, therefore, propose a model of a context-aware middleware that can address this issue through a monitoring service that is capable of reasoning and observation channels capable of calculating the context during the runtime. The monitoring service evaluates the pre-defined X-Query predicates in the context manager and uses Prolog to deduce the services needed to respond back. An independent Observation Channel for each different predicate is then dynamically generated by the monitoring service depending on the current state of the environment. Each channel sends its result directly to the context manager which consequently calculates the context based on all the predicates’ results while preserving the reactivity of the self-adaptive system.

Keywords: auto-adaptation, context-awareness, middleware, reasoning engine

Procedia PDF Downloads 228
443 Utilizing Federated Learning for Accurate Prediction of COVID-19 from CT Scan Images

Authors: Jinil Patel, Sarthak Patel, Sarthak Thakkar, Deepti Saraswat

Abstract:

Recently, the COVID-19 outbreak has spread across the world, leading the World Health Organization to classify it as a global pandemic. To save the patient’s life, the COVID-19 symptoms have to be identified. But using an AI (Artificial Intelligence) model to identify COVID-19 symptoms within the allotted time was challenging. The RT-PCR test was found to be inadequate in determining the COVID status of a patient. To determine if the patient has COVID-19 or not, a Computed Tomography Scan (CT scan) of patient is a better alternative. It will be challenging to compile and store all the data from various hospitals on the server, though. Federated learning, therefore, aids in resolving this problem. Certain deep learning models help to classify Covid-19. This paper will have detailed work of certain deep learning models like VGG19, ResNet50, MobileNEtv2, and Deep Learning Aggregation (DLA) along with maintaining privacy with encryption.

Keywords: federated learning, COVID-19, CT-scan, homomorphic encryption, ResNet50, VGG-19, MobileNetv2, DLA

Procedia PDF Downloads 48
442 Review Paper on an Algorithm Enhancing Privacy and Security in Online Meeting Platforms Using a Secured Encryption

Authors: Tonderai Muchenje, Mkhatshwa Phethile

Abstract:

Humans living in this current situation know that communication with one another is necessary for themselves. There are many ways to communicate with each other; during unexpected natural disasters and outbreak of epidemics and pandemics, the need for online meeting platforms are considered most important. Apparently, the development in the telecommunication sector also played an important role. Therefore, the epidemic of the Covid-19 Pandemic and the new normal situation resulted in the overwhelming production of online meeting platforms to prevent the situation. This software is commonly used in business communications in the beginning. Rapidly the COVID-19 pandemic changed the situation. At present-day, these virtual meeting applications are not only used to have informal meetings with friends and relatives but also to be used to have formal meetings in the business and education (universities) sector. In this article, an attempt has been made to list out the useful secured ways for using online meeting platforms.

Keywords: virtual background, zoom, secure online algorithm, RingCentral, Pexip Pexip, TeamViewer, microsoft teams

Procedia PDF Downloads 89
441 Critical Review of Web Content Mining Extraction Mechanisms

Authors: Rabia Bashir, Sajjad Akbar

Abstract:

There is an inevitable demand of web mining due to rapid increase of huge information on the Internet, but the striking variety of web structures has made required content retrieval a difficult task. To counter this issue, Web Content Mining (WCM) emerges as a potential candidate which extracts and integrates suitable resources of data to users. In past few years, research has been done on several extraction techniques for WCM i.e. agent-based, template-based, assumption-based, statistic-based, wrapper-based and machine learning. However, it is still unclear that either these approaches are efficiently tackling the significant challenges of WCM or not. To answer this question, this paper identifies these challenges such as language independency, structure flexibility, performance, automation, dynamicity, redundancy handling, intelligence, relevant content retrieval, and privacy. Further, mapping of these challenges is done with existing extraction mechanisms which helps to adopt the most suitable WCM approach, given some conditions and characteristics at hand.

Keywords: content mining challenges, web content mining, web content extraction approaches, web information retrieval

Procedia PDF Downloads 522
440 Efficient Internal Generator Based on Random Selection of an Elliptic Curve

Authors: Mustapha Benssalah, Mustapha Djeddou, Karim Drouiche

Abstract:

The random number generation (RNG) presents a significant importance for the security and the privacy of numerous applications, such as RFID technology and smart cards. Since, the quality of the generated bit sequences is paramount that a weak internal generator for example, can directly cause the entire application to be insecure, and thus it makes no sense to employ strong algorithms for the application. In this paper, we propose a new pseudo random number generator (PRNG), suitable for cryptosystems ECC-based, constructed by randomly selecting points from several elliptic curves randomly selected. The main contribution of this work is the increasing of the generator internal states by extending the set of its output realizations to several curves auto-selected. The quality and the statistical characteristics of the proposed PRNG are validated using the Chi-square goodness of fit test and the empirical Special Publication 800-22 statistical test suite issued by NIST.

Keywords: PRNG, security, cryptosystem, ECC

Procedia PDF Downloads 423
439 AI-Based Autonomous Plant Health Monitoring and Control System with Visual Health-Scoring Models

Authors: Uvais Qidwai, Amor Moursi, Mohamed Tahar, Malek Hamad, Hamad Alansi

Abstract:

This paper focuses on the development and implementation of an advanced plant health monitoring system with an AI backbone and IoT sensory network. Our approach involves addressing the critical environmental factors essential for preserving a plant’s well-being, including air temperature, soil moisture, soil temperature, soil conductivity, pH, water levels, and humidity, as well as the presence of essential nutrients like nitrogen, phosphorus, and potassium. Central to our methodology is the utilization of computer vision technology, particularly a night vision camera. The captured data is then compared against a reference database containing different health statuses. This comparative analysis is implemented using an AI deep learning model, which enables us to generate accurate assessments of plant health status. By combining the AI-based decision-making approach, our system aims to provide precise and timely insights into the overall health and well-being of plants, offering a valuable tool for effective plant care and management.

Keywords: deep learning image model, IoT sensing, cloud-based analysis, remote monitoring app, computer vision, fuzzy control

Procedia PDF Downloads 19
438 Preservation of Coconut Toddy Sediments as a Leavening Agent for Bakery Products

Authors: B. R. Madushan, S. B. Navaratne, I. Wickramasinge

Abstract:

Toddy sediment (TS) was cultured in a PDA medium to determine initial yeast load, and also it was undergone sun, shade, solar, dehumidified cold air (DCA) and hot air oven (at 400, 500 and 60oC) drying with a view to preserve viability of yeast. Thereafter, this study was conducted according to two factor factorial design in order to determine best preservation method. Therein the dried TS from the best drying method was taken and divided into two portions. One portion was mixed with 3: 7 ratio of TS: rice flour and the mixture was divided in to two again. While one portion was kept under in house condition the other was in a refrigerator. Same procedure was followed to the rest portion of TS too but it was at the same ratio of corn flour. All treatments were vacuum packed in triple laminate pouches and the best preservation method was determined in terms of leavening index (LI). The TS obtained from the best preservation method was used to make foods (bread and hopper) and organoleptic properties of it were evaluated against same of ordinary foods using sensory panel with a five point hedonic scale. Results revealed that yeast load or fresh TS was 58×106 CFU/g. The best drying method in preserving viability of yeast was DCA because LI of this treatment (96%) is higher than that of other three treatments. Organoleptic properties of foods prepared from best preservation method are as same as ordinary foods according to Duo trio test.

Keywords: biological leavening agent, coconut toddy, fermentation, yeast

Procedia PDF Downloads 315
437 Secure Intelligent Information Management by Using a Framework of Virtual Phones-On Cloud Computation

Authors: Mohammad Hadi Khorashadi Zadeh

Abstract:

Many new applications and internet services have been emerged since the innovation of mobile networks and devices. However, these applications have problems of security, management, and performance in business environments. Cloud systems provide information transfer, management facilities, and security for virtual environments. Therefore, an innovative internet service and a business model are proposed in the present study for creating a secure and consolidated environment for managing the mobile information of organizations based on cloud virtual phones (CVP) infrastructures. Using this method, users can run Android and web applications in the cloud which enhance performance by connecting to other CVP users and increases privacy. It is possible to combine the CVP with distributed protocols and central control which mimics the behavior of human societies. This mix helps in dealing with sensitive data in mobile devices and facilitates data management with less application overhead.

Keywords: BYOD, mobile cloud computing, mobile security, information management

Procedia PDF Downloads 291
436 Energy in the Nexus of Defense and Border Security: Securing Energy Deposits in the Natuna Islands of Indonesia

Authors: Debby Rizqie Amelia Gustin, Purnomo Yusgiantoro

Abstract:

Hydrocarbon energy is still pivotal to today’s economy, but its existence is continually declining. Thus, preserving future energy supply has become the national interest of many countries, which they cater in various way, from importing to expansion and occupation. Underwater of Natuna islands in Indonesia deposits great amount of natural gas reserved, numbered to 46 TCF (trillion cubic feet), which is highly potential to meet Indonesia future energy demand. On the other hand, there could be a possibility that others also seek this natural resources. Natuna is located in the borderline of Indonesia, directly adjacent to the South China Sea, an area which is prolonged to conflict. It is a challenge for Indonesia government to preserve their energy deposit in Natuna islands and to response accordingly if the tension in South China Sea rises. This paper examines that nowadays defense and border security is not only a matter of guarding a country from foreign invasion, but also securing its resources accumulated on the borderline. Countries with great amount of energy deposits on their borderline need to build up their defense capacity continually, to ensure their territory along with their energy deposits is free from any interferences.

Keywords: border security, defense, energy, national interest, threat

Procedia PDF Downloads 452
435 Mapping the Future: Participatory Master Planning for Pioneer Village Tourism in Cibubuan, Sumedang

Authors: Sarojini Imran, Riza Firmansyah, Aula Ramadhan, Chudamul Furqon, Achfriyatama Oktariflandi

Abstract:

This article delves into the participatory approach in formulating a master plan for the development of pioneer village tourism in Cibubuan, Sumedang. We explore the process of participatory mapping that involves the active participation of the local community in planning and envisioning the future of village tourism. This research considers the positive impact that arises when the community takes an active role in designing a master plan that benefits the local economy while preserving culture and the environment. The results of this research reveal that the participatory approach can create a more accurate and community-responsive mapping that aligns with the aspirations of the people in Cibubuan Village. It also provides a deep insight into how community-developed mapping can guide the development of sustainable tourism. By offering a deeper understanding of the participatory role in village tourism development planning, this article provides essential insights for stakeholders and researchers in this field. We hope this article will inspire more communities to adopt a participatory approach in planning the future of their village tourism.

Keywords: participatory masterplan, pioneer village tourism, sustainable tourism, community engagement, Cibubuan Village

Procedia PDF Downloads 46
434 Cloud Monitoring and Performance Optimization Ensuring High Availability and Security

Authors: Inayat Ur Rehman, Georgia Sakellari

Abstract:

Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.

Keywords: cloud computing, cloud monitoring, performance optimization, high availability

Procedia PDF Downloads 34
433 Review of Cyber Security in Oil and Gas Industry with Cloud Computing Perspective: Taxonomy, Issues and Future Direction

Authors: Irfan Mohiuddin, Ahmad Al Mogren

Abstract:

In recent years, cloud computing has earned substantial attention in the Oil and Gas Industry and provides services in all the phases of the industry lifecycle. Oil and gas supply infrastructure, in particular, is more vulnerable to accidental, natural and intentional threats because of its widespread distribution. Numerous surveys have been conducted on cloud security and privacy. However, to the best of our knowledge, hardly any survey is carried out that reviews cyber security in all phases with a cloud computing perspective. Moreover, a distinctive classification is performed for all the cloud-based cyber security measures based on the cloud component in use. The classification approach will enable researchers to identify the required technique used to enhance the security in specific cloud components. Also, the limitation of each component will allow the researchers to design optimal algorithms. Lastly, future directions are given to point out the imminent challenges that can pave the way for researchers to further enhance the resilience to cyber security threats in the oil and gas industry.

Keywords: cyber security, cloud computing, safety and security, oil and gas industry, security threats, oil and gas pipelines

Procedia PDF Downloads 120
432 Ubuntu: A Holistic Social Framework for Preserving Ecosystem Amidst the Climate Change Challenges

Authors: Gabriel Sunday Ayayia

Abstract:

The paper argues that Ubuntu, as a philosophy that emphasizes the interconnectedness of all living things and importance of community and mutual support, can be used as a social framework to address the problems of climate change and promote environmental sustainability. The research demonstrate that Ubuntu is an ideological concept that encourages collective action on climate change, with the emphasis on individual and collective commitment to taking concrete action to address the problems of climate change. The paper shows that Ubuntu can be employed as a social tool that would enhance the cultivation of shared identity and promote the sense of shared response responsibility to develop the resilience to cope with climate change. Using qualitative and quantitative methodologies, the study establishes the imperativeness of mutual support and cooperation through the lens of Ubuntu as a human-centered scalable response to the debacle of climate change. It recommends that we can build a society that values the environment and promotes sustainable practices by encouraging community involvement in sustainable initiatives by integrating Ubuntu-based principles to our decision-making processes, collaboration, leadership, human agency and governance.

Keywords: ubuntu, climate change, humanity, collective actions, community-based

Procedia PDF Downloads 160
431 Understanding of Heritage Values within University Education Systems in the Kingdom of Saudi Arabia

Authors: Mahmoud Tarek Mohamed Hammad

Abstract:

Despite the importance of the role and efforts made by the universities of the Kingdom of Saudi Arabia in reviving and preserving heritage architecture as an important cultural heritage in the Kingdom, The idea revolves around restoration and conservation processes and neglects the architectural heritage values, whose content can be used in sustainable contemporary architectural works. Educational values based on heritage architecture and how to integrate with the contemporary requirements were investigated in this research. For this purpose, by understanding the heritage architectural values as well as educational, academic process, the researcher presented an educational model of questionnaire forms for architecture students and the staff at the Architecture Department at Al-Baha University as a case study that serves the aims of the research. The results of the research show that heritage values especially those interview results are considered as a positive indicator of the importance of these values. The students and the staff need both to gain an understanding of heritage values as well as an understanding of theories of incorporating those values into the design process of contemporary local architecture. The research concludes that a correct understanding of the heritage values, its performance, and its reintegration with modern architecture technology should be focused on architectural education.

Keywords: heritage architecture, academic work, heritage values, sustainable contemporary local architectural

Procedia PDF Downloads 141
430 A Post-Occupancy Evaluation of the Impact of Indoor Environmental Quality on Health and Well-Being in Office Buildings

Authors: Suyeon Bae, Abimbola Asojo, Denise Guerin, Caren Martin

Abstract:

Post-occupancy evaluations (POEs) have been recognized for documenting occupant well-being and responses to indoor environmental quality (IEQ) factors such as thermal, lighting, and acoustic conditions. Sustainable Post-Occupancy evaluation survey (SPOES) developed by an interdisciplinary team at a Midwest University provides an evidence-based quantitative analysis of occupants’ satisfaction in office, classroom, and residential spaces to help direct attention to successful areas and areas that need improvement in buildings. SPOES is a self-administered and Internet-based questionnaire completed by building occupants. In this study, employees in three different office buildings rated their satisfaction on a Likert-type scale about 12 IEQ criteria including thermal condition, indoor air quality, acoustic quality, daylighting, electric lighting, privacy, view conditions, furnishings, appearance, cleaning and maintenance, vibration and movement, and technology. Employees rated their level of satisfaction on a Likert-type scale from 1 (very dissatisfied) to 7 (very satisfied). They also rate the influence of their physical environment on their perception of their work performance and the impact of their primary workspaces on their health on a scale from 1 (hinders) to 7 (enhances). Building A is a three-story building that includes private and group offices, classrooms, and conference rooms and amounted to 55,000 square-feet for primary workplace (N=75). Building B, a six-story building, consisted of private offices, shared enclosed office, workstations, and open desk areas for employees and amounted to 14,193 square-feet (N=75). Building C is a three-story 56,000 square-feet building that included classrooms, therapy rooms, an outdoor playground, gym, restrooms, and training rooms for clinicians (N=76). The results indicated that 10 IEQs for Building A except acoustic quality and privacy showed statistically significant correlations on the impact of the primary workspace on health. In Building B, 11 IEQs except technology showed statistically significant correlations on the impact of the primary workspace on health. Building C had statistically significant correlations between all 12 IEQ and the employees’ perception of the impact of their primary workspace on their health in two-tailed correlations (P ≤ 0.05). Out of 33 statistically significant correlations, 25 correlations (76%) showed at least moderate relationship (r ≥ 0.35). For the three buildings, daylighting, furnishings, and indoor air quality IEQs ranked highest on the impact on health. IEQs about vibration and movement, view condition, and electric lighting ranked second, followed by IEQs about cleaning and maintenance and appearance. These results imply that 12 IEQs developed in SPOES are highly related to employees’ perception of how their primary workplaces impact their health. The IEQs in this study offer an opportunity for improving occupants’ well-being and the built environment.

Keywords: post-occupancy evaluation, built environment, sustainability, well-being, indoor air quality

Procedia PDF Downloads 263
429 A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow

Authors: Ming Lun Wang, Yan Wang, Ning Ruo Sun

Abstract:

With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable key-policy attribute-based encryption without key escrow (WOKE-AKP-ABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks.

Keywords: cloud storage security, sharing storage, attributes, Hash algorithm

Procedia PDF Downloads 359
428 FLEX: A Backdoor Detection and Elimination Method in Federated Scenario

Authors: Shuqi Zhang

Abstract:

Federated learning allows users to participate in collaborative model training without sending data to third-party servers, reducing the risk of user data privacy leakage, and is widely used in smart finance and smart healthcare. However, the distributed architecture design of federation learning itself and the existence of secure aggregation protocols make it inherently vulnerable to backdoor attacks. To solve this problem, the federated learning backdoor defense framework FLEX based on group aggregation, cluster analysis, and neuron pruning is proposed, and inter-compatibility with secure aggregation protocols is achieved. The good performance of FLEX is verified by building a horizontal federated learning framework on the CIFAR-10 dataset for experiments, which achieves 98% success rate of backdoor detection and reduces the success rate of backdoor tasks to 0% ~ 10%.

Keywords: federated learning, secure aggregation, backdoor attack, cluster analysis, neuron pruning

Procedia PDF Downloads 72
427 Rejuvenating Cultural Energy: Forging Pathways to Alternative Ecological and Development Paradigms

Authors: Aldrin R. Logdat

Abstract:

The insights and wisdom of the Alangan Mangyans offer valuable guidance for developing alternative ecological and development frameworks. Their reverence for the sacredness of the land, rooted in their traditional cosmology, guides their harmonious relationship with nature. Through their practice of swidden farming, ecosystem preservation takes precedence as they carefully manage agricultural activities and allow for forest regeneration. This approach aligns with natural processes, reflecting their profound understanding of the natural world. Similar to early advocates like Aldo Leopold, the emphasis is on shifting our perception of land from a commodity to a community. The indigenous wisdom of the Alangan Mangyans provides practical and sustainable approaches to preserving the interdependence of the biotic community and ecosystems. By integrating their cultural heritage, we can transcend the prevailing anthropocentric mindset and foster a meaningful and sustainable connection with nature. The revitalization of cultural energy and the embrace of alternative frameworks require learning from indigenous peoples like the Alangan Mangyans, where reverence for the land and the recognition of the interconnectedness between humanity and nature are prioritized. This paves the way for a future where harmony with nature and the well-being of the Earth community prevail.

Keywords: Alangan Mangyans, ecological frameworks, sacredness of the land, cultural energy

Procedia PDF Downloads 67
426 An Enhanced Distributed Weighted Clustering Algorithm for Intra and Inter Cluster Routing in MANET

Authors: K. Gomathi

Abstract:

Mobile Ad hoc Networks (MANET) is defined as collection of routable wireless mobile nodes with no centralized administration and communicate each other using radio signals. Especially MANETs deployed in hostile environments where hackers will try to disturb the secure data transfer and drain the valuable network resources. Since MANET is battery operated network, preserving the network resource is essential one. For resource constrained computation, efficient routing and to increase the network stability, the network is divided into smaller groups called clusters. The clustering architecture consists of Cluster Head(CH), ordinary node and gateway. The CH is responsible for inter and intra cluster routing. CH election is a prominent research area and many more algorithms are developed using many different metrics. The CH with longer life sustains network lifetime, for this purpose Secondary Cluster Head(SCH) also elected and it is more economical. To nominate efficient CH, a Enhanced Distributed Weighted Clustering Algorithm (EDWCA) has been proposed. This approach considers metrics like battery power, degree difference and speed of the node for CH election. The proficiency of proposed one is evaluated and compared with existing algorithm using Network Simulator(NS-2).

Keywords: MANET, EDWCA, clustering, cluster head

Procedia PDF Downloads 367
425 Japan’s Challenges in Managing Resources and Implementing Strategies toward Sustainability

Authors: Dana Aljadaa, Hasim Altan

Abstract:

Japan’s strategy is based on improving the current resources and productivity by identifying the environmental challenges to progress further in many areas. For example, it will help in understanding the competitive challenges in the industry, emerging innovation, and other progresses. The present study seeks to examine the characteristics of sustainable practices using materials that will last longer and following environmental policies. There has been a major emphasis since 1990s and onwards about recycling and preserving the environment. Furthermore, the present paper analyses and argues how national interest in policy increases resource productivity. It is a universal law, but these actions may be different based on the unique situation of the country. In addition, the present study explains some of the strategies developed by the Environmental Agency of Japan in the last few years. There are a few resources reviewed involving ‘Strategy for an Environmental Nation in the 21st Century’ from 2001, ‘Clean Asia Initiative’ from 2008, and ‘New Growth Strategy’ from 2010. The present paper also highlights the emphasis on increasing efficiency, as it is an important part of sustainability. We finally conclude by providing reasoning on the impact and positivity of reducing production and consumption on the environment, resulting in a productive and progressive Japan for the near and long term future.

Keywords: eco-system, resource productivity, sound material-cycle, sustainable development

Procedia PDF Downloads 179
424 Data Poisoning Attacks on Federated Learning and Preventive Measures

Authors: Beulah Rani Inbanathan

Abstract:

In the present era, it is vivid from the numerous outcomes that data privacy is being compromised in various ways. Machine learning is one technology that uses the centralized server, and then data is given as input which is being analyzed by the algorithms present on this mentioned server, and hence outputs are predicted. However, each time the data must be sent by the user as the algorithm will analyze the input data in order to predict the output, which is prone to threats. The solution to overcome this issue is federated learning, where the models alone get updated while the data resides on the local machine and does not get exchanged with the other local models. Nevertheless, even on these local models, there are chances of data poisoning, and it is crystal clear from various experiments done by many people. This paper delves into many ways where data poisoning occurs and the many methods through which it is prevalent that data poisoning still exists. It includes the poisoning attacks on IoT devices, Edge devices, Autoregressive model, and also, on Industrial IoT systems and also, few points on how these could be evadible in order to protect our data which is personal, or sensitive, or harmful when exposed.

Keywords: data poisoning, federated learning, Internet of Things, edge computing

Procedia PDF Downloads 65
423 Perception of Consumer Behavior on Mobile Banking Offered by the National and Multinational Banks in UAE with Special Reference to Emirates NBD and Citibank

Authors: Aarohi Surya

Abstract:

The number of mobile banking users continues to climb across the world due to its increasing popularity, and UAE is no exception. This type of banking is part of the core strategy of most of the financial institutions that allows its customers to conduct a range of financial transactions through mobile apps to cash in the high demand from the bankers. This study aims at evaluating service quality of online banking in Dubai, one of the swiftly growing cities of Middle East. The paper mainly compares online banking services of Multinational bank and National Bank with special reference to Citibank and Emirates NBD. A structured questionnaire survey is conducted among various target groups. The research has been focused on mainly 4 significant areas of online banking, i.e. Privacy, Responsiveness, Reliability, and Efficiency of customer data. Information was analyzed statistically on SPSS to investigate the service quality of e-banking.

Keywords: customer satisfaction, service quality, responsiveness, online banking

Procedia PDF Downloads 245
422 Reinvestment of the Urban Context in Historic Cities: The Case Study of El Sheikh Kandil Street, Rosetta, Egypt

Authors: Riham A. Ragheb, Ingy M. Naguib

Abstract:

Conservation and urban investment are a prerequisite to improve the quality of life. Since the historic street is a part of the economic system, it should be able to play an important role in the city development by upgrading all services, public open spaces and reuse of historical buildings and sites. Furthermore, historical conservation enriches the political, economic, social, cultural and functional aspects of the site. Rosetta has been selected as an area of study because it has a unique character due to its possession of a variety of monuments and historical buildings. The aim of this research is to analyze the existing situation of an historic street named El Sheikh Kandil, to be able to identify the potentials and problems. The paper gives a proposal for the redesign and reinvestment of the street and the reuse for the historical buildings to serve the community, users and visitors. Then, it concludes with recommendations to improve quality of life through the rehabilitation of the historical buildings and strengthening of the cultural and historical identity of the street. Rosetta city can benefit from these development proposals by preserving and revitalizing its unique character which leads to tourism development and benefits from the new investments.

Keywords: adaptive reuse, heritage street, historic investment, restoration, urban design

Procedia PDF Downloads 151
421 The Hawza Al-’Ilmiyya and Its Role in Preserving the Shia Identity through Jurisprudence

Authors: Raied Khayou

Abstract:

The Hawza Al-'Ilmiyya is a network of religious seminaries in the Shia branch of Islam. This research mainly focuses on the oldest school located in Najaf, Iraq, because its core curriculum and main characteristics have been unchanged since the fourth century of Islam. Relying on a thorough literature review of Arabic and English publications, and interviews with current and previous students of the seminary, the current research outlines the factors proving how this seminary was crucial in keeping the Shia religious identity intact despite sometimes gruesome attempts of interference and persecution. There are several factors that helped the seminary to preserve its central importance. First, rooted in their theology, Shia Muslims believe that the Hawza Al-’Ilmiyya and its graduates carry a sacred authority. Secondly, the financial independence of the Seminary helped to keep it intact from any governmental or political meddling. Third, its unique teaching method, its matchless openness for new students, and its flexible curriculum made it attractive for many students who were interested in learning more about Shia theology and jurisprudence. The Hawza Al-‘Ilmiyya has the exclusive right to train clerics who hold the religious authority of Shia Islamic jurisprudence, and the seminary’s success in staying independent throughout history kept Shia Islamic theology independent, as well.

Keywords: Hawza Al'Ilmiyya, religious seminary, Shia Muslim education, Islamic jurisprudence

Procedia PDF Downloads 81
420 Guidelines for the Management and Sustainability Development of Forest Tourism Kamchanoad Baan Dung, Udon Thani

Authors: Pennapa Palapin

Abstract:

This study aimed to examine the management and development of forest tourism Kamchanoad. Ban Dung, Udon Thani sustainability. Data were collected by means of qualitative research including in-depth interviews, semi-structured, and then the data were summarized and discussed in accordance with the objectives. And make a presentation in the form of lectures. The target population for the study consisted of 16 people, including representatives from government agencies, community leaders and the community. The results showed that Guidelines for the Management and Development of Forest Tourism Kamchanoad include management of buildings and infrastructure such as roads, water, electricity, toilets. Other developments are the establishment of a service center that provides information and resources to facilitate tourists.; nature trails and informative signage to educate visitors on the path to the jungle Kamchanoad; forest activities for tourists who are interested only in occasional educational activities such as vegetation, etc.; disseminating information on various aspects of tourism through various channels in both Thailand and English, as well as a website to encourage community involvement in the planning and management of tourism together with the care and preservation of natural resources and preserving the local cultural tourist area of Kamchanoad.

Keywords: guidelines for the management and development, forest tourism, Kamchanoad, sustainability

Procedia PDF Downloads 508
419 Preserving a Nation Oversea: Galician Folklore Music and Identity in the Americas. Analysis of Galician Migrant Music in the Latin American Context

Authors: Santiago Guerra Fernández

Abstract:

Abstract—This study is focused on exploring the conditions for the development of Galician music in the communities of Latin America after the massive arrival of Galician immigrants in the late nineteenth and early twentieth centuries, fleeing from hunger and misery in Spain. Migration would be accentuated after 1936 with the arrival of refugees from the Spanish Civil War due to their Republican political militancy fleeing fascism. The aim of this paper is to investigate the part that miscegenation with other local musical traditions has played within Galician expat music, helping to understand the complexity of contemporary Galician identity. Through archival work, the focus is set on examining the different traditional dances (such as the ‘muiñeira’), folk instruments (bagpipes, ‘pandeireta’), and poetic forms (‘cantiga’, ‘copla’) that were exported to Argentina and Cuba. Although research about migrant Galician music has been conducted in Spanish scholarship, there is a gap in the English literature on the topic that this paper intends to fill in. The results show how these musical traditions have played an essential role in shaping the social life and customs of Galician emigrants. By virtue of its malleability and blending properties, music serves here as an indicator of social cohesion.

Keywords: folk, Galicia, migration, identity

Procedia PDF Downloads 56
418 Hybrid Fixation in Management of Proximal Diaphyseal Forearm Bone Fractures in Children

Authors: Tarek Aly

Abstract:

Introduction: Maintenance of the length, providing rotational stability, and preserving functional range of forearm motion is the mainstay of both bone forearm fractures treatment. Conservative treatment in older children may lead to malunion with poor remodeling capacity. Recent studies emphasized that the rate of complications with IM nailing was obviously increased in old children. Open reduction and internal fixation have been criticized for the amount of soft tissue dissection and periosteal stripping needed for fixation and excessive scar formation. The aim of this study was to evaluate the anatomical and functional outcomes of hybrid fixation in the treatment of closed proximal radius and ulna fractures in adolescents between 12 and 17 years of age. Patients and Methods: 30 cases of diaphyseal both bone forearm fractures treated with hybrid fixation (Nail radius – Plate ulna) and were available for a follow-up period of fewer than 24 months. Results: Clinically, 72% of cases had an excellent function, 22% had a good function, 4% had a fair function, and 2% had a poor function. Radiologically, signs of the union had appeared in the radius 2weeks earlier than in the ulna in 55% of cases. Conclusion: A hybrid fixation technique in adolescent proximal both-bones forearm fractures could be a viable option in managing these injuries.

Keywords: hyprid fixation, both bones, forearm, fractures

Procedia PDF Downloads 77
417 Uterine Leiomyomas and Urological Complications

Authors: Dharshini Selvarajah, Nicula Lui, Karen Kong

Abstract:

Background: Uterine fibroids are a common benign gynaecologic neoplasm in reproductive-aged women. Fibroids may become symptomatic in a vast majority of nulliparous women. Their diagnosis and management is often coordinated between gyneacologists, radiologists and urologists depending on the anatomical location, growth, size and the fibroids sarcomatous evolvement. Some patients may develop obstructive uropathy symptoms, either uni or bilateral secondary urethral obstruction causing hydronephrosis. Uterine artery emoblisation (UAE) has previously shown to effectively resolve symptoms as well as relieve urethral obstruction and resolve the hydronephrosis. UAE has now established itself as an organ preserving and minimally invasive procedure in the management of symptomatic uterine fibroids. It is a safe and effective alternative to hysterectomy for resolving fibroid related pressure symptoms. The case presented examines the clinical manifestations and impact of uterine fibroids on the urinary tract system. The therapeutic options to relieve the urological symptoms as well as preserve fertility are explored and presented. Case: The case is a 29-year-old Nepalese female admitted to hospital with recurrent urosepsis with multiresistant organisms. This was on a background of an enlarged uterus (measuring 17cm x11cm) with multiple subserosal, intramural and exophytic fibroids- causing external ureteric compression. She had bilateral ureteric stents insitu and required bilateral right and left nephrostomies during repeated episodes of urosepsis and bilateral ureteric obstruction. The left nephrostomy was removed a month prior to admission and her most recent CT KUB demonstrated hypofunctioning ureteric stents with bilateral hydronephrosis. Options of hysterectomy versus uterine artery emoblisation (UAE) were extensively explored. The patient was keen to preserve fertility. Risks associated with UAE such as expulsion of the submucosal component of the fibroids and the possibilities of sepsis in the setting of ongoing ureteric colonisation were particularly high. The patient opted to trial UAE even though the risks of recurrent hospital admissions with urosepsis were going to be particularly high. In the event, the uterus fails to shrink adequately enough to relieve the obstructed ureters a hysterectomy would inevitably be required in future. Day 3 post UAE the patient developed fevers, was hypotensive and tachycardic post-receiving prophylactic meropenem and fluconazole pre emoblisation. She was noted to have a CRP of 293 with the most recent urine culture during this time growing Candida albicans. The patient was recommenced on oral fluconazole and IV meropenem, with good effect. Her repeat renal tract ultrasound post-UAE showed ongoing marked left hydronephrosis relatively unchanged from the scan one month prior to the procedure, however the right-sided hydronephrosis had resolved. The patient was discharged on a 2-week course of antibiotics. The patient will have a repeat renal tract ultrasound and MRI of the ureters to re-evaluate the degree of hydronephrosis and progress- this was unavailable at the time of abstract submission and will be presented at the conference. Conclusion: Fibroids are a common benign tumour of the uterus and can frequently impact the lower urinary system resulting in significant uropathy. They often enlarge and compress the urinary bladder, urethra and lower end of the ureters. The effectiveness of UAE as a fertility preserving option is described.

Keywords: Uterine leiomyomas and urological complications, uterine artery embolisation for fibroids, Uterine fibroids and complications, Management of uterine fibroids

Procedia PDF Downloads 196
416 Management of Urological Complications Secondary to Uterine Fibroids

Authors: Dharshini Selvarajah, Karen Kong

Abstract:

Background: Uterine fibroids are a common benign gynaecologic neoplasm in reproductive-aged women. Fibroids may become symptomatic in a vast majority of nulliparous women. Their diagnosis and management are often coordinated between gyneacologists, radiologists and urologists depending on the anatomical location, growth, size and the fibroids' sarcomatous evolvement. Some patients may develop obstructive uropathy symptoms, either uni or bilateral secondary urethral obstruction causing hydronephrosis. Uterine artery embolization (UAE) has previously been shown to effectively resolve symptoms as well as relieve urethral obstruction and resolve hydronephrosis. UAE has now established itself as an organ-preserving and minimally invasive procedure in the management of symptomatic uterine fibroids. It is a safe and effective alternative to hysterectomy for resolving fibroid-related pressure symptoms. The case presented examines the clinical manifestations and impact of uterine fibroids on the urinary tract system. The therapeutic options to relieve the urological symptoms as well as preserve fertility are explored and presented. Case: The case is a 29-year-old Nepalese female admitted to the hospital with recurrent urosepsis with multiresistant organisms. This was on a background of an enlarged uterus (measuring 17cm x11cm) with multiple subserosal, intramural and exophytic fibroids- causing external ureteric compression. She had bilateral ureteric stents in situ and required bilateral right and left nephrostomies during repeated episodes of urosepsis and bilateral ureteric obstruction. The left nephrostomy was removed a month prior to admission, and her most recent CT KUB demonstrated hypofunctioning ureteric stents with bilateral hydronephrosis. Options of hysterectomy versus uterine artery embolization (UAE) were extensively explored. The patient was keen to preserve fertility. Risks associated with UAE, such as the expulsion of the submucosal component of the fibroids and the possibilities of sepsis in the setting of ongoing ureteric colonisation were particularly high. The patient opted to trial UAE even though the risks of recurrent hospital admissions with urosepsis were going to be particularly high. In the event, the uterus fails to shrink adequately enough to relieve the obstructed ureters, a hysterectomy would inevitably be required in the future. Day 3 post-UAE the patient developed fevers, was hypotensive and tachycardic post-receiving prophylactic meropenem and fluconazole pre emoblisation. She was noted to have a CRP of 293 with the most recent urine culture during this time growing Candida albicans. The patient was recommenced on oral fluconazole and IV meropenum, with good effect. Her repeat renal tract ultrasound post-UAE showed ongoing marked left hydronephrosis relatively unchanged from the scan one month prior to the procedure; however, the right-sided hydronephrosis had resolved. The patient was discharged on a 2-week course of antibiotics. The patient will have a repeat renal tract ultrasound and MRI of the ureters to re-evaluate the degree of hydronephrosis and progress- this was unavailable at the time of abstract submission and will be presented at the conference. Conclusion: Fibroids are a common benign tumor of the uterus and can frequently impact the lower urinary system resulting in significant uropathy. They often enlarge and compress the urinary bladder, urethra and lower end of the ureters. The effectiveness of the UAE as a fertility-preserving option is described.

Keywords: uterine artery embolisation for fibroids, urological complications from fibroids, uropathy of fibroids, obstructive fibroid management

Procedia PDF Downloads 187
415 Application of Medium High Hydrostatic Pressure in Preserving Textural Quality and Safety of Pineapple Compote

Authors: Nazim Uddin, Yohiko Nakaura, Kazutaka Yamamoto

Abstract:

Compote (fruit in syrup) of pineapple (Ananas comosus L. Merrill) is expected to have a high market potential as one of convenient ready-to-eat (RTE) foods worldwide. High hydrostatic pressure (HHP) in combination with low temperature (LT) was applied to the processing of pineapple compote as well as medium HHP (MHHP) in combination with medium-high temperature (MHT) since both processes can enhance liquid impregnation and inactivate microbes. MHHP+MHT (55 or 65 °C) process, as well as the HHP+LT process, has successfully inactivated the microbes in the compote to a non-detectable level. Although the compotes processed by MHHP+MHT or HHP+LT have lost the fresh texture as in a similar manner as those processed solely by heat, it was indicated that the texture degradations by heat were suppressed under MHHP. Degassing process reduced the hardness, while calcium (Ca) contributed to be retained hardness in MHT and MHHP+MHT processes. Electrical impedance measurement supported the damage due to degassing and heat. The color, Brix, and appearance were not affected by the processing methods significantly. MHHP+MHT and HHP+LT processes may be applicable to produce high-quality, safe RTE pineapple compotes. Further studies on the optimization of packaging and storage condition will be indispensable for commercialization.

Keywords: compote of pineapple, RTE, medium high hydrostatic pressure, postharvest loss, texture

Procedia PDF Downloads 111