Search results for: secure workflow
546 Decoding the Structure of Multi-Agent System Communication: A Comparative Analysis of Protocols and Paradigms
Authors: Gulshad Azatova, Aleksandr Kapitonov, Natig Aminov
Abstract:
Multiagent systems have gained significant attention in various fields, such as robotics, autonomous vehicles, and distributed computing, where multiple agents cooperate and communicate to achieve complex tasks. Efficient communication among agents is a crucial aspect of these systems, as it directly impacts their overall performance and scalability. This scholarly work provides an exploration of essential communication elements and conducts a comparative assessment of diverse protocols utilized in multiagent systems. The emphasis lies in scrutinizing the strengths, weaknesses, and applicability of these protocols across various scenarios. The research also sheds light on emerging trends within communication protocols for multiagent systems, including the incorporation of machine learning methods and the adoption of blockchain-based solutions to ensure secure communication. These trends provide valuable insights into the evolving landscape of multiagent systems and their communication protocols.Keywords: communication, multi-agent systems, protocols, consensus
Procedia PDF Downloads 74545 Impact of the Energy Transition on Security of Supply - A Case Study of Vietnam Power System in 2030
Authors: Phuong Nguyen, Trung Tran
Abstract:
Along with the global ongoing energy transition, Vietnam has indicated a strong commitment in the last COP events on the zero-carbon emission target. However, it is a real challenge for the nation to replace fossil-fired power plants by a significant amount of renewable energy sources (RES) while maintaining security of supply. The unpredictability and variability of RES would cause technical issues for supply-demand balancing, network congestions, system balancing, among others. It is crucial to take these into account while planning the future grid infrastructure. This study will address both generation and transmission adequacy and reveal a comprehensive analysis about the impact of ongoing energy transition on the development of Vietnam power system in 2030. This will provide insight for creating an secure, stable, and affordable pathway for the country in upcoming years.Keywords: generation adequacy, transmission adequacy, security of supply, energy transition
Procedia PDF Downloads 86544 The Role of Relationship Duration in the Expressions of Love
Authors: Thea Silayro, Isabella Tan, Carlo Manuel, Denisse Abellon
Abstract:
Romantic love is highly universal and exists in most cultures. The current study explored its definition for people in different relationship durations and explored how this definition influences their expression of love and their conflict resolutions. Gender‟s influence on the definitions was explored, as well. Nine couples from different relationship durations (2-3 years, 7-10 years and more than 25 years) were interviewed. Transcripts of the interviews underwent thematic analysis. The results of the study suggest that 2-3 years in the relationship is the courting stage, 7-10 years in the relationship is the settling down stage and more than 25 years, the most stable stage. Men and women have similar ways of expressing love and resolving conflicts, but differ in such a way that men highlight actions and women highlight emotions when talking about love; changes in definitions arise internally in men and externally in females. Generally, romantic love is expressed through service. Communication is essential among all couples, and they become more secure with time.Keywords: relationship duration, love, expressions of love, relationships
Procedia PDF Downloads 335543 A ‘Just and Loving Gaze’ on Sexuality and Attachment: Why I Think (Not) All Homosexual Relationships are Borne Out of an Abandonment and Attachment Crisis
Authors: Victor Counted
Abstract:
John Bowlby's Attachment theory is often a framework used by many researchers to understand human relationship experiences with close 'others'. In this short brief on sexuality, I tried to discuss homosexual relationships from three attachment positions, or if you like, conditions, in relation to the compensation and correspondence hypothesis used to understand an individual's attachment orientation with an attachment figure who is seen as a secure base, safe haven, and some kind of target for proximity seeking. Drawing from the springs of virtue and hope in light of Murdock’s ‘just and love gaze’ model, I allowed myself to see the homosexual cases cited in positive terms, as I related to the situations and experiences of our homosexual ‘others’ from the guiding herald of Moltmann's theology of hope. This approach allowed me to conclusively convince readers to engage sexuality from a tolerating tendency of hope in our thinking and thoughts towards the actions and conditions of our dynamic world which is always plunging toward the future.Keywords: attachment, wellbeing, sexuality, homosexuality, abandonment, tolerance of hope, wise fool
Procedia PDF Downloads 412542 Electric Field Analysis of XLPE, Cross-Linked Polyethylene Covered Aerial Line and Insulator Lashing
Authors: Jyh-Cherng Gu, Ming-Ta Yang, Dai-Ling Tsai
Abstract:
Both sparse lashing and dense lashing are applied to secure overhead XLPE (cross-linked polyethylene) covered power lines on ceramic insulators or HDPE polymer insulators. The distribution of electric field in and among the lashing wires, the XLPE power lines and insulators in normal clean condition and when conducting materials such as salt, metal particles, dust, smoke or acidic smog are present is studied in this paper. The ANSYS Maxwell commercial software is used in this study for electric field analysis. Although the simulation analysis is performed assuming ideal conditions due to the constraints of the simulation software, the result may not be the same as in real situation but still be of sufficient practical values.Keywords: electric field intensity, insulator, XLPE covered aerial line, empty
Procedia PDF Downloads 263541 Reservoir Potential, Net Pay Zone and 3D Modeling of Cretaceous Clastic Reservoir in Eastern Sulieman Belt Pakistan
Authors: Hadayat Ullah, Pervez Khalid, Saad Ahmed Mashwani, Zaheer Abbasi, Mubashir Mehmood, Muhammad Jahangir, Ehsan ul Haq
Abstract:
The aim of the study is to explore subsurface structures through data that is acquired from the seismic survey to delineate the characteristics of the reservoir through petrophysical analysis. Ghazij Shale of Eocene age is regional seal rock in this field. In this research work, 3D property models of subsurface were prepared by applying Petrel software to identify various lithologies and reservoir fluids distribution throughout the field. The 3D static modeling shows a better distribution of the discrete and continuous properties in the field. This model helped to understand the reservoir properties and enhance production by selecting the best location for future drilling. A complete workflow is proposed for formation evaluation, electrofacies modeling, and structural interpretation of the subsurface geology. Based on the wireline logs, it is interpreted that the thickness of the Pab Sandstone varies from 250 m to 350 m in the entire study area. The sandstone is massive with high porosity and intercalated layers of shales. Faulted anticlinal structures are present in the study area, which are favorable for the accumulation of hydrocarbon. 3D structural models and various seismic attribute models were prepared to analyze the reservoir character of this clastic reservoir. Based on wireline logs and seismic data, clean sand, shaly sand, and shale are marked as dominant facies in the study area. However, clean sand facies are more favorable to act as a potential net pay zone.Keywords: cretaceous, pab sandstone, petrophysics, electrofacies, hydrocarbon
Procedia PDF Downloads 143540 Security in Resource Constraints Network Light Weight Encryption for Z-MAC
Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy
Abstract:
Wireless sensor network was formed by a combination of nodes, systematically it transmitting the data to their base stations, this transmission data can be easily compromised if the limited processing power and the data consistency from these nodes are kept in mind; there is always a discussion to address the secure data transfer or transmission in actual time. This will present a mechanism to securely transmit the data over a chain of sensor nodes without compromising the throughput of the network by utilizing available battery resources available in the sensor node. Our methodology takes many different advantages of Z-MAC protocol for its efficiency, and it provides a unique key by sharing the mechanism using neighbor node MAC address. We present a light weighted data integrity layer which is embedded in the Z-MAC protocol to prove that our protocol performs well than Z-MAC when we introduce the different attack scenarios.Keywords: hybrid MAC protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node dataprocessing, Z-MAC
Procedia PDF Downloads 143539 Digital Watermarking Based on Visual Cryptography and Histogram
Authors: R. Rama Kishore, Sunesh
Abstract:
Nowadays, robust and secure watermarking algorithm and its optimization have been need of the hour. A watermarking algorithm is presented to achieve the copy right protection of the owner based on visual cryptography, histogram shape property and entropy. In this, both host image and watermark are preprocessed. Host image is preprocessed by using Butterworth filter, and watermark is with visual cryptography. Applying visual cryptography on water mark generates two shares. One share is used for embedding the watermark, and the other one is used for solving any dispute with the aid of trusted authority. Usage of histogram shape makes the process more robust against geometric and signal processing attacks. The combination of visual cryptography, Butterworth filter, histogram, and entropy can make the algorithm more robust, imperceptible, and copy right protection of the owner.Keywords: digital watermarking, visual cryptography, histogram, butter worth filter
Procedia PDF Downloads 357538 Quantum Dots with Microwave Propagation in Future Quantum Internet Protocol for Mobile Telephony
Authors: A. B. R. Hazarika
Abstract:
In the present paper, Quantum dots of ZnS are used to study the faster microwave propagation in space and on earth which will be difficult to bypass as quantum key encryption-decryption is difficult to decode. The present study deals with Quantum internet protocol which is much faster, safer and secure in microwave propagation than the present Internet Protocol v6, which forms the aspect of our study. Assimilation of hardware, Quantum dots with Quantum protocol theory beautifies the aspect of the study. So far to author’s best knowledge, the study on mobile telephony with Quantum dots long-term evolution (QDLTE) has not been studied earlier, which forms the aspect of the study found that the Bitrate comes out to be 102.4 Gbps.Keywords: encryption, decryption, internet protocol, microwave, mobile telephony, quantum key encryption, quantum dots
Procedia PDF Downloads 173537 A Preliminary Study of Economic Dimension of Underground Rock Caverns for Water Storage at Singapore
Authors: Junlong Shang, Zhengxian Chua, Hoongping Peh, Zhiye Zhao
Abstract:
Due to scarce land resources in Singapore, it is imperative to increase water storage capacities to meet the increasing demand of water to secure a sustainable development, which can be achieved in the underground by rock caverns. In this paper, a preliminary study on the effects of cavern span, height and radius on the cavern stability is presented to provide a guidance on the cavern construction in the context of Singapore. It is found that the radius of caverns should be around half of the span width (i.e., B/R=2) to reduce vertical displacement at the crown of cavern. The smaller the rock cover, the smaller displacement. The minimum rock thickness should be at least the same as the cavern span to eliminate excessive yielded element. Finally, rock support system is introduced to maintain the profile of caverns.Keywords: cavern dimension, numerical modelling, sustainable development, underground rock cavern
Procedia PDF Downloads 320536 Computational Chemical-Composition of Carbohydrates in the Context of Healthcare Informatics
Authors: S. Chandrasekaran, S. Nandita, M. Shivathmika, Srikrishnan Shivakumar
Abstract:
The objective of the research work is to analyze the computational chemical-composition of carbohydrates in the context of healthcare informatics. The computation involves the representation of complex chemical molecular structure of carbohydrate using graph theory and in a deployable Chemical Markup Language (CML). The parallel molecular structure of the chemical molecules with or without other adulterants for the sake of business profit can be analyzed in terms of robustness and derivatization measures. The rural healthcare program should create awareness in malnutrition to reduce ill-effect of decomposition and help the consumers to know the level of such energy storage mixtures in a quantitative way. The earlier works were based on the empirical and wet data which can vary from time to time but cannot be made to reuse the results of mining. The work is carried out on the quantitative computational chemistry on carbohydrates to provide a safe and secure right to food act and its regulations.Keywords: carbohydrates, chemical-composition, chemical markup, robustness, food safety
Procedia PDF Downloads 374535 Comparison Between Fuzzy and P&O Control for MPPT for Photovoltaic System Using Boost Converter
Authors: M. Doumi, A. Miloudi, A. G. Aissaoui, K. Tahir, C. Belfedal, S. Tahir
Abstract:
The studies on the photovoltaic system are extensively increasing because of a large, secure, essentially exhaustible and broadly available resource as a future energy supply. However, the output power induced in the photovoltaic modules is influenced by an intensity of solar cell radiation, temperature of the solar cells and so on. Therefore, to maximize the efficiency of the photovoltaic system, it is necessary to track the maximum power point of the PV array, for this Maximum Power Point Tracking (MPPT) technique is used. Some MPPT techniques are available in that perturbation and observation (P&O) and Fuzzy logic controller (FLC). The fuzzy control method has been compared with perturb and observe (P&O) method as one of the most widely conventional method used in this area. Both techniques have been analyzed and simulated. MPPT using fuzzy logic shows superior performance and more reliable control with respect to the P&O technique for this application.Keywords: photovoltaic system, MPPT, perturb and observe, fuzzy logic
Procedia PDF Downloads 604534 Underneath Vehicle Inspection Using Fuzzy Logic, Subsumption, and Open Cv-Library
Authors: Hazim Abdulsada
Abstract:
The inspection of underneath vehicle system has been given significant attention by governments after the threat of terrorism become more prevalent. New technologies such as mobile robots and computer vision are led to have more secure environment. This paper proposed that a mobile robot like Aria robot can be used to search and inspect the bombs under parking a lot vehicle. This robot is using fuzzy logic and subsumption algorithms to control the robot that movies underneath the vehicle. An OpenCV library and laser Hokuyo are added to Aria robot to complete the experiment for under vehicle inspection. This experiment was conducted at the indoor environment to demonstrate the efficiency of our methods to search objects and control the robot movements under vehicle. We got excellent results not only by controlling the robot movement but also inspecting object by the robot camera at same time. This success allowed us to know the requirement to construct a new cost effective robot with more functionality.Keywords: fuzzy logic, mobile robots, Opencv, subsumption, under vehicle inspection
Procedia PDF Downloads 472533 Basic Characteristics and Prospects of Synchronized Stir Welding
Authors: Shoji Matsumoto
Abstract:
Friction Stir Welding (FSW) has been widely used in the automotive, aerospace, and high-tech industries due to its superior mechanical properties after welding. However, when it becomes a matter to perform a high-quality joint using FSW, it is necessary to secure an advanced tilt angle (usually 1 to 5 degrees) using a dedicated FSW machine and to use a joint structure and a restraining jig that can withstand the tool pressure applied during the jointing process using a highly rigid processing machine. One issue that has become a challenge in this process is ‘productivity and versatility’. To solve this problem, we have conducted research and development of multi-functioning machines and robotics with FSW tools, which combine cutting/milling and FSW functions as one in recent years. However, the narrow process window makes it prone to welding defects and lacks repeatability, which makes a limitation for FSW its use in the fields where precisions required. Another reason why FSW machines are not widely used in the world is because of the matter of very high cost of ownership.Keywords: synchronized, stir, welding, friction, traveling speed, synchronized stir welding, friction stir welding
Procedia PDF Downloads 53532 Review Paper on an Algorithm Enhancing Privacy and Security in Online Meeting Platforms Using a Secured Encryption
Authors: Tonderai Muchenje, Mkhatshwa Phethile
Abstract:
Humans living in this current situation know that communication with one another is necessary for themselves. There are many ways to communicate with each other; during unexpected natural disasters and outbreak of epidemics and pandemics, the need for online meeting platforms are considered most important. Apparently, the development in the telecommunication sector also played an important role. Therefore, the epidemic of the Covid-19 Pandemic and the new normal situation resulted in the overwhelming production of online meeting platforms to prevent the situation. This software is commonly used in business communications in the beginning. Rapidly the COVID-19 pandemic changed the situation. At present-day, these virtual meeting applications are not only used to have informal meetings with friends and relatives but also to be used to have formal meetings in the business and education (universities) sector. In this article, an attempt has been made to list out the useful secured ways for using online meeting platforms.Keywords: virtual background, zoom, secure online algorithm, RingCentral, Pexip Pexip, TeamViewer, microsoft teams
Procedia PDF Downloads 115531 Real-Time Image Encryption Using a 3D Discrete Dual Chaotic Cipher
Authors: M. F. Haroun, T. A. Gulliver
Abstract:
In this paper, an encryption algorithm is proposed for real-time image encryption. The scheme employs a dual chaotic generator based on a three dimensional (3D) discrete Lorenz attractor. Encryption is achieved using non-autonomous modulation where the data is injected into the dynamics of the master chaotic generator. The second generator is used to permute the dynamics of the master generator using the same approach. Since the data stream can be regarded as a random source, the resulting permutations of the generator dynamics greatly increase the security of the transmitted signal. In addition, a technique is proposed to mitigate the error propagation due to the finite precision arithmetic of digital hardware. In particular, truncation and rounding errors are eliminated by employing an integer representation of the data which can easily be implemented. The simple hardware architecture of the algorithm makes it suitable for secure real-time applications.Keywords: chaotic systems, image encryption, non-autonomous modulation, FPGA
Procedia PDF Downloads 506530 A Secure System for Handling Information from Heterogeous Sources
Authors: Shoohira Aftab, Hammad Afzal
Abstract:
Information integration is a well known procedure to provide consolidated view on sets of heterogeneous information sources. It not only provides better statistical analysis of information but also facilitates users to query without any knowledge on the underlying heterogeneous information sources The problem of providing a consolidated view of information can be handled using Semantic data (information stored in such a way that is understandable by machines and integrate-able without manual human intervention). However, integrating information using semantic web technology without any access management enforced, will results in increase of privacy and confidentiality concerns. In this research we have designed and developed a framework that would allow information from heterogeneous formats to be consolidated, thus resolving the issue of interoperability. We have also devised an access control system for defining explicit privacy constraints. We designed and applied our framework on both semantic and non-semantic data from heterogeneous resources. Our approach is validated using scenario based testing.Keywords: information integration, semantic data, interoperability, security, access control system
Procedia PDF Downloads 357529 The Study of Security Techniques on Information System for Decision Making
Authors: Tejinder Singh
Abstract:
Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data
Procedia PDF Downloads 307528 Eco-Infrastructures: A Multidimensional System Approach for Urban Ecology
Authors: T. A. Mona M. Salem, Ali F. Bakr
Abstract:
Given the potential devastation associated with future climate change related disasters, it is vital to change the way we build and manage our cities, through new strategies to reconfigure them and their infrastructures in ways that help secure their reproduction. This leads to a kaleidoscopic view of the city that recognizes the interrelationships of energy, water, transportation, and solid waste. These interrelationships apply across sectors and with respect to the built form of the city. The paper aims at a long-term climate resilience of cities and their critical infrastructures, and sets out an argument for including an eco-infrastructure-based approach in strategies to address climate change. As these ecosystems have a critical role to play in building resilience and reducing vulnerabilities in cities, communities and economies at risk, the enhanced protection and management of ecosystems, biological resources and habitats can mitigate impacts and contribute to solutions as nations and cities strive to adapt to climate change.Keywords: ecology, ecosystem, infrastructure, climate change, urban
Procedia PDF Downloads 306527 Usability and Biometric Authentication of Electronic Voting System
Authors: Nighat Ayub, Masood Ahmad
Abstract:
In this paper, a new voting system is developed and its usability is evaluated. The main feature of this system is the biometric verification of the voter and then a few easy steps to cast a vote. As compared to existing systems available, e.g dual vote, the new system requires no training in advance. The security is achieved via multiple key concept (another part of this project). More than 100 student voters were participated in the election from University of Malakanad, Chakdara, PK. To achieve the reliability, the voters cast their votes in two ways, i.e. paper based and electronic based voting using our new system. The results of paper based and electronic voting system are compared and it is concluded that the voters cast their votes for the intended candidates on the electronic voting system. The voters were requested to fill a questionnaire and the results of the questionnaire are carefully analyzed. The results show that the new system proposed in this paper is more secure and usable than other systems.Keywords: e-voting, security, usability, authentication
Procedia PDF Downloads 392526 Establishing a Computational Screening Framework to Identify Environmental Exposures Using Untargeted Gas-Chromatography High-Resolution Mass Spectrometry
Authors: Juni C. Kim, Anna R. Robuck, Douglas I. Walker
Abstract:
The human exposome, which includes chemical exposures over the lifetime and their effects, is now recognized as an important measure for understanding human health; however, the complexity of the data makes the identification of environmental chemicals challenging. The goal of our project was to establish a computational workflow for the improved identification of environmental pollutants containing chlorine or bromine. Using the “pattern. search” function available in the R package NonTarget, we wrote a multifunctional script that searches mass spectral clusters from untargeted gas-chromatography high-resolution mass spectrometry (GC-HRMS) for the presence of spectra consistent with chlorine and bromine-containing organic compounds. The “pattern. search” function was incorporated into a different function that allows the evaluation of clusters containing multiple analyte fragments, has multi-core support, and provides a simplified output identifying listing compounds containing chlorine and/or bromine. The new function was able to process 46,000 spectral clusters in under 8 seconds and identified over 150 potential halogenated spectra. We next applied our function to a deidentified dataset from patients diagnosed with primary biliary cholangitis (PBC), primary sclerosing cholangitis (PSC), and healthy controls. Twenty-two spectra corresponded to potential halogenated compounds in the PSC and PBC dataset, including six significantly different in PBC patients, while four differed in PSC patients. We have developed an improved algorithm for detecting halogenated compounds in GC-HRMS data, providing a strategy for prioritizing exposures in the study of human disease.Keywords: exposome, metabolome, computational metabolomics, high-resolution mass spectrometry, exposure, pollutants
Procedia PDF Downloads 138525 TAXAPRO, A Streamlined Pipeline to Analyze Shotgun Metagenomes
Authors: Sofia Sehli, Zainab El Ouafi, Casey Eddington, Soumaya Jbara, Kasambula Arthur Shem, Islam El Jaddaoui, Ayorinde Afolayan, Olaitan I. Awe, Allissa Dillman, Hassan Ghazal
Abstract:
The ability to promptly sequence whole genomes at a relatively low cost has revolutionized the way we study the microbiome. Microbiologists are no longer limited to studying what can be grown in a laboratory and instead are given the opportunity to rapidly identify the makeup of microbial communities in a wide variety of environments. Analyzing whole genome sequencing (WGS) data is a complex process that involves multiple moving parts and might be rather unintuitive for scientists that don’t typically work with this type of data. Thus, to help lower the barrier for less-computationally inclined individuals, TAXAPRO was developed at the first Omics Codeathon held virtually by the African Society for Bioinformatics and Computational Biology (ASBCB) in June 2021. TAXAPRO is an advanced metagenomics pipeline that accurately assembles organelle genomes from whole-genome sequencing data. TAXAPRO seamlessly combines WGS analysis tools to create a pipeline that automatically processes raw WGS data and presents organism abundance information in both a tabular and graphical format. TAXAPRO was evaluated using COVID-19 patient gut microbiome data. Analysis performed by TAXAPRO demonstrated a high abundance of Clostridia and Bacteroidia genera and a low abundance of Proteobacteria genera relative to others in the gut microbiome of patients hospitalized with COVID-19, consistent with the original findings derived using a different analysis methodology. This provides crucial evidence that the TAXAPRO workflow dispenses reliable organism abundance information overnight without the hassle of performing the analysis manually.Keywords: metagenomics, shotgun metagenomic sequence analysis, COVID-19, pipeline, bioinformatics
Procedia PDF Downloads 220524 Generation of Symmetric Key Using Randomness of Hash Function
Authors: Sai Charan Kamana, Harsha Vardhan Nakkina, B.R. Chandavarkar
Abstract:
In a highly secure and robust key generation process, a key role is played by randomness and random numbers when current real-world cryptosystems are observed. Most of the present-day cryptographic protocols depend upon the Random Number Generators (RNG), Pseudo-Random Number Generator (PRNG). These protocols often use noisy channels such as Disk seek time, CPU temperature, Mouse pointer movement, Fan noise to obtain true random values. Despite being cost-effective, these noisy channels may need additional hardware devices to continuously communicate with them. On the other hand, Hash functions are Pseudo-Random (because of their requirements). So, they are a good replacement for these noisy channels and have low hardware requirements. This paper discusses, some of the key generation methodologies, and their drawbacks. This paper explains how hash functions can be used in key generation, how to combine Key Derivation Functions with hash functions.Keywords: key derivation, hash based key derivation, password based key derivation, symmetric key derivation
Procedia PDF Downloads 161523 Trait of Sales Professionals
Authors: Yuichi Morita, Yoshiteru Nakamori
Abstract:
In car dealer business of Japan, a sale professional is a key factor of company’s success. We hypothesize that, if a corporation knows what is the sales professionals’ trait of its corporation’s business field, it will be easier for a corporation to secure and nurture sales persons effectively. The lean human resources management will ensure business success and good performance of corporations, especially small and medium ones. The goal of the paper is to determine the traits of sales professionals for small-and medium-size car dealers, using chi-square test and the variable rough set model. As a result, the results illustrate that experience of job change, learning ability and product knowledge are important, and an academic background, building a career with internal transfer, experience of the leader and self-development are not important to be a sale professional. Also, we illustrate sales professionals’ traits are persistence, humility, improvisation and passion at business.Keywords: traits of sales professionals, variable precision rough sets theory, sales professional, sales professionals
Procedia PDF Downloads 382522 Human Security Providers in Fragile State under Asymmetric War Conditions
Authors: Luna Shamieh
Abstract:
Various players are part of the game in an asymmetric war, all making efforts to provide human security to their own adherents. Although a fragile state is not able to provide sufficient and comprehensive services, it still provides special services and security to the elite; the insurgents as well provide services and security to their associates. The humanitarian organisations, on the other hand, provide some fundamental elements of human security, but only in the regions, they are able to access when possible (if possible). The counterinsurgents (security forces of the state and intervention forces) operate within a narrow band defined by the vision of the responsibility to protect and the perspective of the resolution of the conflict through combat; hence, the possibility to provide human security is shaken at this end. This article examines how each player provides human security from the perspective of freedom from want in order to secure basic and strategic needs, freedom from fear through providing protection against all kinds of violence, and the freedom to live in dignity. It identifies a vicious cycle caused by the intervention of the different players causing a centrifugal force that may lead to disintegration of the nation under war.Keywords: asymmetric war, counterinsurgency, fragile state, human security, insurgency
Procedia PDF Downloads 334521 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption
Authors: Waziri Victor Onomza, John K. Alhassan, Idris Ismaila, Noel Dogonyaro Moses
Abstract:
This paper describes the problem of building secure computational services for encrypted information in the Cloud Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy, confidentiality, availability of the users. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute theoretical presentations in high-level computational processes that are based on number theory and algebra that can easily be integrated and leveraged in the Cloud computing with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based cryptographic security algorithm.Keywords: big data analytics, security, privacy, bootstrapping, homomorphic, homomorphic encryption scheme
Procedia PDF Downloads 379520 Cognitive Science Based Scheduling in Grid Environment
Authors: N. D. Iswarya, M. A. Maluk Mohamed, N. Vijaya
Abstract:
Grid is infrastructure that allows the deployment of distributed data in large size from multiple locations to reach a common goal. Scheduling data intensive applications becomes challenging as the size of data sets are very huge in size. Only two solutions exist in order to tackle this challenging issue. First, computation which requires huge data sets to be processed can be transferred to the data site. Second, the required data sets can be transferred to the computation site. In the former scenario, the computation cannot be transferred since the servers are storage/data servers with little or no computational capability. Hence, the second scenario can be considered for further exploration. During scheduling, transferring huge data sets from one site to another site requires more network bandwidth. In order to mitigate this issue, this work focuses on incorporating cognitive science in scheduling. Cognitive Science is the study of human brain and its related activities. Current researches are mainly focused on to incorporate cognitive science in various computational modeling techniques. In this work, the problem solving approach of human brain is studied and incorporated during the data intensive scheduling in grid environments. Here, a cognitive engine is designed and deployed in various grid sites. The intelligent agents present in CE will help in analyzing the request and creating the knowledge base. Depending upon the link capacity, decision will be taken whether to transfer data sets or to partition the data sets. Prediction of next request is made by the agents to serve the requesting site with data sets in advance. This will reduce the data availability time and data transfer time. Replica catalog and Meta data catalog created by the agents assist in decision making process.Keywords: data grid, grid workflow scheduling, cognitive artificial intelligence
Procedia PDF Downloads 394519 A Smart Visitors’ Notification System with Automatic Secure Door Lock Using Mobile Communication Technology
Authors: Rabail Shafique Satti, Sidra Ejaz, Madiha Arshad, Marwa Khalid, Sadia Majeed
Abstract:
The paper presents the development of an automated security system to automate the entry of visitors, providing more flexibility of managing their record and securing homes or workplaces. Face recognition is part of this system to authenticate the visitors. A cost effective and SMS based door security module has been developed and integrated with the GSM network and made part of this system to allow communication between system and owner. This system functions in real time as when the visitor’s arrived it will detect and recognizes his face and on the result of face recognition process it will open the door for authorized visitors or notifies and allows the owner’s to take further action in case of unauthorized visitor. The proposed system is developed and it is successfully ensuring security, managing records and operating gate without physical interaction of owner.Keywords: SMS, e-mail, GSM modem, authenticate, face recognition, authorized
Procedia PDF Downloads 789518 A Study on the Reliability Evaluation of a Timer Card for Air Dryer of the Railway Vehicle
Authors: Chul Su Kim, Jun Ku Lee, Won Jun Lee
Abstract:
The EMU (electric multiple unit) vehicle timer card is a PCB (printed circuit board) for controlling the air-dryer to remove the moisture of the generated air from the air compressor of the braking device. This card is exposed to the lower part of the railway vehicle, so it is greatly affected by the external environment such as temperature and humidity. The main cause of the failure of this timer card is deterioration of soldering area of the PCB surface due to temperature and humidity. Therefore, in the viewpoint of preventive maintenance, it is important to evaluate the reliability of the timer card and predict the replacement cycle to secure the safety of the air braking device is one of the main devices for driving. In this study, the existing and the improved products were evaluated on the reliability through ALT (accelerated life test). In addition, the acceleration factor by the 'Coffin-Manson' equation was obtained, and the remaining lifetime was compared and examined.Keywords: reliability evaluation, timer card, Printed Circuit Board, Accelerated Life Test
Procedia PDF Downloads 279517 Exploring Probabilistic Models for Transient Stability Analysis of Renewable-Dominant Power Grid
Authors: Phuong Nguyen
Abstract:
Along with the ongoing energy transition, the electrical power system is getting more vulnerable with the increasing penetration of renewable energy sources (RES). By replacing a large amount of fossil fuel-based power plants with RES, the rotating mass of the power grid is decreasing drastically, which has been reported by a number of system operators. This leads to a huge challenge for operators to secure the operation of their grids in all-time horizon ranges, from sub-seconds to minutes and even hours. There is a need to revise the grid capabilities in dealing with transient (angle) stability and voltage dynamics. While the traditional approaches relied on deterministic scenarios (worst-case scenarios), there is also a need to cover a whole range of probabilities regarding a wide range of uncertainties coming from massive RES units. To contribute to handle these issues, this paper aims to focus on developing a new analytical approach for transient stability.Keywords: transient stability, uncertainties, renewable energy sources, analytical approach
Procedia PDF Downloads 72