Search results for: children in need of special protection
3435 Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme
Authors: Nidal F. Shilbayeh, Reem A. Al-Saidi, Ahmed H. Alsswey
Abstract:
In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.Keywords: e-voting preparation stage, blind signature protocol, Nonce based authentication scheme, Kerberos Authentication Protocol, pseudo voter identity scheme PVID
Procedia PDF Downloads 2993434 Morpho-Dynamic Modelling of the Western 14 Km of the Togolese Coast
Authors: Sawsan Eissa, Omnia Kabbany
Abstract:
The coastline of Togo has been historically suffering from erosion for decades, which requires a solution to help control and reduce the erosion to allow for the development of the coastal area. A morpho-dynamic model using X-beach software was developed for the Western 14 Km of the Togolese coast. The model was coupled with the hydrodynamic module of DELFT 3D, flow, and the Wave module, SWAN. The data used as input included a recent bathymetric survey, a recent shoreline topographic survey, aerial photographs, ERA 5 water level and wave data, and recent test results of seabed samples. A number of scenarios were modeled: do nothing scenario, groynes, detached breakwaters system with different crest levels and alignments. The findings showed that groynes is not expected to be effective for protection against erosion, and that the best option is a system of detached breakwater, partially emerged-partially submerged couples with periodical maintenance.Keywords: hydrodynamics, morphology, Togo, Delft3D, SWAN, XBeach, coastal erosion, detached breakwaters
Procedia PDF Downloads 683433 Cybersecurity Protection Structures: The Case of Lesotho
Authors: N. N. Mosola, K. F. Moeketsi, R. Sehobai, N. Pule
Abstract:
The Internet brings increasing use of Information and Communications Technology (ICT) services and facilities. Consequently, new computing paradigms emerge to provide services over the Internet. Although there are several benefits stemming from these services, they pose several risks inherited from the Internet. For example, cybercrime, identity theft, malware etc. To thwart these risks, this paper proposes a holistic approach. This approach involves multidisciplinary interactions. The paper proposes a top-down and bottom-up approach to deal with cyber security concerns in developing countries. These concerns range from regulatory and legislative areas, cyber awareness, research and development, technical dimensions etc. The main focus areas are highlighted and a cybersecurity model solution is proposed. The paper concludes by combining all relevant solutions into a proposed cybersecurity model to assist developing countries in enhancing a cyber-safe environment to instill and promote a culture of cybersecurity.Keywords: cybercrime, cybersecurity, computer emergency response team, computer security incident response team
Procedia PDF Downloads 1563432 Laryngeal Tuberculosis in a 7-Year-Old Child: A Case Report and Literature Review
Authors: Mohd Jaish Siddiqui
Abstract:
Laryngeal TB is extremely rare in the pediatric population, accounting for 1% of all cases. Here, we present a case of laryngeal TB with miliary tuberculosis and tuberculous encephalitis, presented with sore throat, hoarseness, severe cough and, acute obstruction the larynx, sputum for AFB was negative, T-SPOT was positive and X-pert was positive, bronchoscopy revealed multiple nodules and edema around the larynx, epiglottis, bilateral arytenopharyngeal folds and vocal cord. Enhanced MRI revealed multiple small nodules in bilateral cerebral hemispheres and right thalamus, however CSF was negative. We reviewed the LTB cases that were published up to 2021. A total of twenty fine cases were identified in English literature. The most common manifestation was hoarseness of voice with 80% followed by stridor 40% of cases. Pulmonary involvement was found in 36% of cases, whereas, 45% of cases had no underlying TB. We did not find any case who developed tuberculous encephalitis in the literature.Keywords: laryngeal tb, treatment, tuberculous encephalitis, children
Procedia PDF Downloads 463431 Biofeedback-Driven Sound and Image Generation
Authors: Claudio Burguez, María Castelló, Mikaela Pisani, Marcos Umpiérrez
Abstract:
BIOFEEDBACK exhibition offers a unique experience for each visitor, combining art, neuroscience, and technology in an interactive way. Using a headband that captures the bioelectric activity of the brain, the visitors are able to generate sound and images in a sequence loop, making them an integral part of the artwork. Through this interactive exhibit, visitors gain a deeper appreciation of the beauty and complexity of the brain. As a special takeaway, visitors will receive an NFT as a present, allowing them to continue their engagement with the exhibition beyond the physical space. We used the EEG Biofeedback technique following a closed-loop neuroscience approach, transforming EEG data captured by a Muse S headband in real-time into audiovisual stimulation. PureData is used for sound generation and Generative Adversarial Networks (GANs) for image generation. Thirty participants have experienced the exhibition. For some individuals, it was easier to focus than others. Participants who said they could focus during the exhibit stated that at one point, they felt that they could control the sound, while images were more abstract, and they did not feel that they were able to control them.Keywords: art, audiovisual, biofeedback, EEG, NFT, neuroscience, technology
Procedia PDF Downloads 723430 Nanotechnology as a Futuristic Approach to Architecture with Special Reference to Chandigarh
Authors: Chaudhary Archana, Dhingra Poshika
Abstract:
The architecture of the world is at a crossroads with the advent of new technology. The issues of energy efficiency and global warming are getting important with the coming times. New technologies are making their mark. For the architecture profession, nanotechnology will greatly impact construction materials and their properties. Nanotechnology, the understanding and control of matter at a scale of one to one hundred billions of a meter, is bringing incredible changes to the materials and processes of buildings. Materials will behave in many different ways as we are able to more precisely control their properties at the nanoscale. It is precisely called the next industrial revolution. We live in an age where scientific progress continues to transform human lifestyle. This is evermore true when it comes to the progress being made in the field of nanotechnology. This science stands to change and advance the practice of design in a multitude of ways – where architectural progress is being made at the molecular level. The nanotechnology has already been adopted in various buildings across the world. What an impact it shall have on the futuristic architecture in Chandigarh, India shall be discussed in the paper. But before we hurtle off toward a nano-utopia, we need to step back and ask ourselves whether this is a direction in which we really want to go.Keywords: building materials, energy efficiency, nanotechnology, sustainability
Procedia PDF Downloads 4593429 Corrosion Protection of Structural Steel by Surfactant Containing Reagents
Authors: D. Erdenechimeg, T. Bujinlkham, N. Erdenepurev
Abstract:
The anti-corrosion performance of fatty acid coated mild steel samples is studied. Samples of structural steel coated with collector reagents deposited from surfactant in ethanol solution and overcoated with an epoxy barrier paint. A quantitative corrosion rate was determined by linear polarization resistance method using biopotentiostat/galvanostat 400. Coating morphology was determined by scanning electronic microscopy. A test for hydrophobic surface of steel by surfactant was done. From the samples, the main component or high content iron was determined by chemical method and other metal contents were determined by Inductively Coupled Plasma-Optical Emission Spectrometry (ICP-OES) method. Prior to measuring the corrosion rate, mechanical and chemical treatments were performed to prepare the test specimens. Overcoating the metal samples with epoxy barrier paint after exposing them with surfactant the corrosion rate can be inhibited by 34-35 µm/year.Keywords: corrosion, linear polarization resistance, coating, surfactant
Procedia PDF Downloads 993428 Investigating Problems and Social Support for Mothers of Poor Households
Authors: Niken Hartati
Abstract:
This study provides a description of the problem and sources of social support that given to 90 mothers from poor households. Data were collected using structured interviews with the three main questions: 1) what kind of problem in mothers daily life, 2) to whom mothers ask for help to overcome it and 3) the form of the assistances that provided. Furthermore, the data were analyzed using content analysis techniques were then coded and categorized. The results of the study illustrate the problems experienced by mothers of poor households in the form of: subsistence (37%), child care (27%), management of money and time (20%), housework (5%), bad place of living (5%), the main breadwinner (3%), and extra costs (3%). While the sources of social support that obtained by mothers were; neighbors (10%), extended family (8%), children (8%), husband (7%), parents (7%), and siblings (5%). Unfortunately, more mothers who admitted not getting any social support when having problems (55%). The form of social support that given to mother from poor household were: instrumental support (91%), emotional support (5%) and informational support (2%). Implications for further intervention also discussed in this study.Keywords: household problems, social support, mothers, poor households
Procedia PDF Downloads 3653427 Rainwater Management: A Case Study of Residential Reconstruction of Cultural Heritage Buildings in Russia
Authors: V. Vsevolozhskaia
Abstract:
Since 1990, energy-efficient development concepts have constituted both a turning point in civil engineering and a challenge for an environmentally friendly future. Energy and water currently play an essential role in the sustainable economic growth of the world in general and Russia in particular: the efficiency of the water supply system is the second most important parameter for energy consumption according to the British assessment method, while the water-energy nexus has been identified as a focus for accelerating sustainable growth and developing effective, innovative solutions. The activities considered in this study were aimed at organizing and executing the renovation of the property in residential buildings located in St. Petersburg, specifically buildings with local or federal historical heritage status under the control of the St. Petersburg Committee for the State Inspection and Protection of Historic and Cultural Monuments (KGIOP) and UNESCO. Even after reconstruction, these buildings still fall into energy efficiency class D. Russian Government Resolution No. 87 on the structure and required content of project documentation contains a section entitled ‘Measures to ensure compliance with energy efficiency and equipment requirements for buildings, structures, and constructions with energy metering devices’. Mention is made of the need to install collectors and meters, which only calculate energy, neglecting the main purpose: to make buildings more energy-efficient, potentially even energy efficiency class A. The least-explored aspects of energy-efficient technology in the Russian Federation remain the water balance and the possibility of implementing rain and meltwater collection systems. These modern technologies are used exclusively for new buildings due to a lack of government directive to create project documentation during the planning of major renovations and reconstruction that would include the collection and reuse of rainwater. Energy-efficient technology for rain and meltwater collection is currently applied only to new buildings, even though research has proved that using rainwater is safe and offers a huge step forward in terms of eco-efficiency analysis and water innovation. Where conservation is mandatory, making changes to protected sites is prohibited. In most cases, the protected site is the cultural heritage building itself, including the main walls and roof. However, the installation of a second water supply system and collection of rainwater would not affect the protected building itself. Water efficiency in St. Petersburg is currently considered only from the point of view of the installation that regulates the flow of the pipeline shutoff valves. The development of technical guidelines for the use of grey- and/or rainwater to meet the needs of residential buildings during reconstruction or renovation is not yet complete. The ideas for water treatment, collection and distribution systems presented in this study should be taken into consideration during the reconstruction or renovation of residential cultural heritage buildings under the protection of KGIOP and UNESCO. The methodology applied also has the potential to be extended to other cultural heritage sites in northern countries and lands with an average annual rainfall of over 600 mm to cover average toilet-flush needs.Keywords: cultural heritage, energy efficiency, renovation, rainwater collection, reconstruction, water management, water supply
Procedia PDF Downloads 923426 A Case Study in Using Gamification in the Mobile Computing Course
Authors: Rula Al Azawi, Abobaker Shafi
Abstract:
The purpose of this paper is to use gamification technology in the mobile computing course to increase students motivation and engagement. The game applied to be designed by students focusing also to design educational game for children with age six years. This game will teach the students how to learn in a fun way. Our case study is implemented at Gulf College which is affiliated with Staffordshire University-UK. Our game design was applied to teach students Android Studio software by designing an educational game. Our goal with gamification is to improve student attendance, increase student engagement, problem solving and user stratification. Finally, we describe the findings and results of our case study. The data analysis and evaluation are based on students feedback, staff feedback and the final marking grades for the students.Keywords: gamification, educational game, android studio software, students motivation and engagement
Procedia PDF Downloads 4553425 Method for Evaluating the Monetary Value of a Customized Version of the Digital Twin for the Additive Manufacturing
Authors: Fabio Oettl, Sebastian Hoerbrand, Tobias Wittmeir, Johannes Schilp
Abstract:
By combining the additive manufacturing (AM)- process with digital concepts, like the digital twin (DT) or the downsized and basing concept of the digital part file (DPF), the competitiveness of additive manufacturing is enhanced and new use cases like decentral production are enabled. But in literature, one can´t find any quantitative approach for valuing the usage of a DT or DPF in AM. Out of this fact, such an approach will be developed within this paper in order to further promote or dissuade the usage of these concepts. The focus is set on the production as an early lifecycle phase, which means that the AM-production process gets analyzed regarding the potential advantages of using DPF in AM. These advantages are transferred to a monetary value with this approach. By calculating the costs of the DPF, an overall monetary value is a result. Thereon a tool, based on a simulation environment is constructed, where the algorithms are transformed into a program. The results of applying this tool show that an overall value of 20,81 € for the DPF can be realized for one special use case. For the future application of the DPF there is the recommendation to integrate especially sustainable information because out of this, a higher value of the DPF can be expected.Keywords: additive manufacturing, digital concept costs, digital part file, digital twin, monetary value estimation
Procedia PDF Downloads 2013424 Limiting Fracture Stress of Composite Ceramics with Symmetric Triangle Eutectic
Authors: Jian Zheng, Jinfeng Yu, Xinhua Ni
Abstract:
The limiting fracture stress predicting model of composite ceramics with symmetric triangle eutectic was established based on its special microscopic structure. The symmetric triangle eutectic is consisted of matrix, the strong constraint inter-phase and reinforced fiber inclusions which are 120 degrees uniform symmetrical distribution. Considering the conditions of the rupture of the cohesive bond between matrix and fibers in eutectic and the stress concentration effect at the fiber end, the intrinsic fracture stress of eutectic was obtained. Based on the biggest micro-damage strain in eutectic, defining the load function, the macro-damage fracture stress of symmetric triangle eutectic was determined by boundary conditions. Introducing the conception of critical zone, the theoretical limiting fracture stress forecasting model of composite ceramics was got, and the stress was related to the fiber size and fiber volume fraction in eutectic. The calculated results agreed with the experimental results in the literature.Keywords: symmetric triangle eutectic, composite ceramics, limiting stress, intrinsic fracture stress
Procedia PDF Downloads 2583423 Home Environment and Self-Efficacy Beliefs among Native American, African American and Latino Adolescents
Authors: Robert H. Bradley
Abstract:
Many minority adolescents in the United States live in adverse circumstances that pose long-term threats to their well-being. A strong sense of personal control and self-efficacy can help youth mitigate some of those risks and may help protect youth from influences connected with deviant peer groups. Accordingly, it is important to identify conditions that help foster feelings of efficacy in areas that seem critical for the accomplishment of developmental tasks during adolescence. The purpose of this study is to examine two aspects of the home environment (modeling and encouragement of maturity, family companionship and investment) and their relation to three components of self efficacy (self efficacy in enlisting social resources, self efficacy for engaging in independent learning, and self-efficacy for self-regulatory behavior) in three groups of minority adolescents (Native American, African American, Latino). The sample for this study included 54 Native American, 131 African American, and 159 Latino families, each with a child between 16 and 20 years old. The families were recruited from four states: Arizona, Arkansas, California, and Oklahoma. Each family was administered the Late Adolescence version of the Home Observation for Measurement of the Environment (HOME) Inventory and each adolescent completed a 30-item measure of perceived self-efficacy. Three areas of self-efficacy beliefs were examined for this study: enlisting social resources, independent learning, and self-regulation. Each of the three areas of self-efficacy was regressed on the two aspects of the home environment plus overall household risk. For Native Americans, modeling and encouragement were significant for self-efficacy pertaining to enlisting social resources and independent learning. For African Americans, companionship and investment was significant in all three models. For Latinos, modeling and encouragement was significant for self-efficacy pertaining to enlisting social resources and companionship and investment were significant for the other two areas of self-efficacy. The findings show that even as minority adolescents are becoming more individuated from their parents, the quality of experiences at home continues to be associated with their feelings of self-efficacy in areas important for adaptive functioning in adult life. Specifically, individuals can develop a sense that they are efficacious in performing key tasks relevant to work, social relationships, and management of their own behavior if they are guided in how to deal with key challenges and they have been exposed and supported by others who are competent in dealing with such challenges. The findings presented in this study would seem useful given that there is so little current research on home environmental factors connected to self-efficacy beliefs among adolescents in the three groups examined. It would seem worthwhile that personnel from health, human service and juvenile justice agencies give attention to supporting parents in communicating with adolescents, offering expectations to adolescents in mutually supportive ways, and in engaging with adolescents in productive activities. In comparison to programs for parents of young children, there are few specifically designed for parents of children in middle childhood and adolescence.Keywords: family companionship, home environment, household income, modeling, self-efficacy
Procedia PDF Downloads 2383422 Interactive Shadow Play Animation System
Authors: Bo Wan, Xiu Wen, Lingling An, Xiaoling Ding
Abstract:
The paper describes a Chinese shadow play animation system based on Kinect. Users, without any professional training, can personally manipulate the shadow characters to finish a shadow play performance by their body actions and get a shadow play video through giving the record command to our system if they want. In our system, Kinect is responsible for capturing human movement and voice commands data. Gesture recognition module is used to control the change of the shadow play scenes. After packaging the data from Kinect and the recognition result from gesture recognition module, VRPN transmits them to the server-side. At last, the server-side uses the information to control the motion of shadow characters and video recording. This system not only achieves human-computer interaction, but also realizes the interaction between people. It brings an entertaining experience to users and easy to operate for all ages. Even more important is that the application background of Chinese shadow play embodies the protection of the art of shadow play animation.Keywords: hadow play animation, Kinect, gesture recognition, VRPN, HCI
Procedia PDF Downloads 4013421 Farmers’ Awareness and Behavior of Chemical Pesticide Uses in Suan Luang Sub-District Municipality, Ampawa, Samut Songkram, Thailand
Authors: Paiboon Jeamponk, Tikamporn Thipsaeng
Abstract:
This paper is aimed to investigate farmers’ level of awareness and behavior of chemical pesticide uses, by using a case study of Suan Luang Sub- District Municipality, Ampawa, Samut Songkram Province. Questionnaire was employed in this study with the farmers from 46 households to explore their level of awareness in chemical pesticide uses, while interview and observation were adopted in exploring their behavior of chemical pesticide uses. The findings reflected the farmers’ high level of awareness in chemical pesticide uses in the hazardous effects of the chemical to human and environmental health, while their behavior of chemical pesticide uses explained their awareness paid to the right way of using pesticides, for instance reading the direction on the label, keeping children and animals away from the area of pesticide mixing, covering body with clothes and wearing hat and mask, no smoking, eating or drinking during pesticide spray or standing in windward direction.Keywords: awareness, behavior, pesticide, farmers
Procedia PDF Downloads 4293420 Multilingual Students Acting as Language Brokers in Italy: Their Points of View and Feelings towards This Activity
Authors: Federica Ceccoli
Abstract:
Italy is undergoing one of its largest migratory waves, and Italian schools are reporting the highest numbers of multilingual students coming from immigrant families and speaking minority languages. For these pupils, who have not perfectly acquired their mother tongue yet, learning a second language may represent a burden on their linguistic development and may have some repercussions on their school performances and relational skills. These are some of the reasons why they have turned out to be those who have the worst grades and the highest school drop-out rates. However, despite these negative outcomes, it has been demonstrated that multilingual immigrant students frequently act as translators or language brokers for their peers or family members who do not speak Italian fluently. This activity has been defined as Child Language Brokering (hereinafter CLB) and it has become a common practice especially in minority communities as immigrants’ children often learn the host language much more quickly than their parents, thus contributing to their family life by acting as language and cultural mediators. This presentation aims to analyse the data collected by a research carried out during the school year 2014-2015 in the province of Ravenna, in the Northern Italian region of Emilia-Romagna, among 126 immigrant students attending junior high schools. The purpose of the study was to analyse by means of a structured questionnaire whether multilingualism matched with language brokering experiences or not and to examine the perspectives of those students who reported having acted as translators using their linguistic knowledge to help people understand each other. The questionnaire consisted of 34 items roughly divided into 2 sections. The first section required multilingual students to provide personal details like their date and place of birth, as well as details about their families (number of siblings, parents’ jobs). In the second section, they were asked about the languages spoken in their families as well as their language brokering experience. The in-depth questionnaire sought to investigate a wide variety of brokering issues such as frequency and purpose of the activity, where, when and which documents young language brokers translate and how they feel about this practice. The results have demonstrated that CLB is a very common practice among immigrants’ children living in Ravenna and almost all students reported positive feelings when asked about their brokering experience with their families and also at school. In line with previous studies, responses to the questionnaire item regarding the people they brokered for revealed that the category ranking first is parents. Similarly, language-brokering activities tend to occur most often at home and the documents they translate the most (either orally or in writing) are notes from teachers. Such positive feelings towards this activity together with the evidence that it occurs very often in schools have laid the foundation for further projects on how this common practice may be valued and used to strengthen the linguistic skills of these multilingual immigrant students and thus their school performances.Keywords: immigration, language brokering, multilingualism, students' points of view
Procedia PDF Downloads 1793419 Effect of Radioprotectors on DNA Repair Enzyme and Survival of Gamma-Irradiated Cell Division Cycle Mutants of Saccharomyces pombe
Authors: Purva Nemavarkar, Badri Narain Pandey, Jitendra Kumar
Abstract:
Introduction: The objective was to understand the effect of various radioprotectors on DNA damage repair enzyme and survival in gamma-irradiated wild and cdc mutants of S. pombe (fission yeast) cultured under permissive and restrictive conditions. DNA repair process, as influenced by radioprotectors, was measured by activity of DNA polymerase in the cells. The use of single cell gel electrophoresis assay (SCGE) or Comet Assay to follow gamma-irradiation induced DNA damage and effect of radioprotectors was employed. In addition, studying the effect of caffeine at different concentrations on S-phase of cell cycle was also delineated. Materials and Methods: S. pombe cells grown at permissive temperature (250C) and/or restrictive temperature (360C) were followed by gamma-radiation. Percentage survival and activity of DNA Polymerase (yPol II) were determined after post-irradiation incubation (5 h) with radioprotectors such as Caffeine, Curcumin, Disulphiram, and Ellagic acid (the dose depending on individual D 37 values). The gamma-irradiated yeast cells (with and without the radioprotectors) were spheroplasted by enzyme glusulase and subjected to electrophoresis. Radio-resistant cells were obtained by arresting cells in S-phase using transient treatment of hydroxyurea (HU) and studying the effect of caffeine at different concentrations on S-phase of cell cycle. Results: The mutants of S. pombe showed insignificant difference in survival when grown under permissive conditions. However, growth of these cells under restrictive temperature leads to arrest in specific phases of cell cycle in different cdc mutants (cdc10: G1 arrest, cdc22: early S arrest, cdc17: late S arrest, cdc25: G2 arrest). All the cdc mutants showed decrease in survival after gamma radiation when grown at permissive and restrictive temperatures. Inclusion of the radioprotectors at respective concentrations during post irradiation incubation showed increase in survival of cells. Activity of DNA polymerase enzyme (yPol II) was increased significantly in cdc mutant cells exposed to gamma-radiation. Following SCGE, a linear relationship was observed between doses of irradiation and the tail moments of comets. The radioprotection of the fission yeast by radioprotectors can be seen by the reduced tail moments of the yeast comets. Caffeine also exhibited its radio-protective ability in radio-resistant S-phase cells obtained after HU treatment. Conclusions: The radioprotectors offered notable radioprotection in cdc mutants when added during irradiation. The present study showed activation of DNA damage repair enzyme (yPol II) and an increase in survival after treatment of radioprotectors in gamma irradiated wild type and cdc mutants of S. pombe cells. Results presented here showed feasibility of applying SCGE in fission yeast to follow DNA damage and radioprotection at high doses, which are not feasible with other eukaryotes. Inclusion of caffeine at 1mM concentration to S phase cells offered protection and did not decrease the cell viability. It can be proved that at minimal concentration, caffeine offered marked radioprotection.Keywords: radiation protection, cell cycle, fission yeast, comet assay, s-phase, DNA repair, radioprotectors, caffeine, curcumin, SCGE
Procedia PDF Downloads 1133418 Behavior of Helical Piles as Foundation of Photovoltaic Panels in Tropical Soils
Authors: Andrea J. Alarcón, Maxime Daulat, Raydel Lorenzo, Renato P. Da Cunha, Pierre Breul
Abstract:
Brazil has increased the use of renewable energy during the last years. Due to its sunshine and large surface area, photovoltaic panels founded in helical piles have been used to produce solar energy. Since Brazilian territory is mainly cover by highly porous structured tropical soils, when the helical piles are installed this structure is broken and its soil properties are modified. Considering the special characteristics of these soils, helical foundations behavior must be extensively studied. The first objective of this work is to determine the most suitable method to estimate the tensile capacity of helical piles in tropical soils. The second objective is to simulate the behavior of these piles in tropical soil. To obtain the rupture to assess load-displacement curves and the ultimate load, also a numerical modelling using Plaxis software was conducted. Lastly, the ultimate load and the load-displacements curves are compared with experimental values to validate the implemented model.Keywords: finite element, helical piles, modelling, tropical soil, uplift capacity
Procedia PDF Downloads 1733417 Identify Users Behavior from Mobile Web Access Logs Using Automated Log Analyzer
Authors: Bharat P. Modi, Jayesh M. Patel
Abstract:
Mobile Internet is acting as a major source of data. As the number of web pages continues to grow the Mobile web provides the data miners with just the right ingredients for extracting information. In order to cater to this growing need, a special term called Mobile Web mining was coined. Mobile Web mining makes use of data mining techniques and deciphers potentially useful information from web data. Web Usage mining deals with understanding the behavior of users by making use of Mobile Web Access Logs that are generated on the server while the user is accessing the website. A Web access log comprises of various entries like the name of the user, his IP address, a number of bytes transferred time-stamp etc. A variety of Log Analyzer tools exists which help in analyzing various things like users navigational pattern, the part of the website the users are mostly interested in etc. The present paper makes use of such log analyzer tool called Mobile Web Log Expert for ascertaining the behavior of users who access an astrology website. It also provides a comparative study between a few log analyzer tools available.Keywords: mobile web access logs, web usage mining, web server, log analyzer
Procedia PDF Downloads 3613416 Meaningfulness of Right to Life in Holy Quran
Authors: Masoud Raei, Mohammadmahdi Sadeghi
Abstract:
The right to life as the most essential right in human rights issues and in the first group has devoted a special place to itself. Attention to this right and its domain and its reflection in civil rights is one of the most important axis of the rights to life issues. Issues discussed concerning this matter in public law with regard to its status in human rights are the determination of government’s duty toward identification; application and guarantee of this right. The constitutions of countries have chosen different approaches towards the identification of this right and also its limits and boundaries, determining the territory of governments for citizens. The reason for such a difference is the question arising in this regard. It is claimed that without the determination of meaningfulness of the right to life, it is not possible to provide a clear response to this question. The goal of this paper is to justify its theoretical framework from the view of meaningfulness of right to life relying on Quranic verses with a conceptual approach towards the right to life so that the relationship between government and citizens with regard to right to life is determined. Through a comparative study, it is possible to attain significant differences between the teachings of the Holy Quran and human rights documents. The method of this paper is a descriptive-analytic approach relying on interpretation books on Holy Quran.Keywords: meaningfulness, objectivism, separatism, right to life
Procedia PDF Downloads 3073415 Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Industry
Authors: Sofia Ahanj Sofia Ahanj, Mahsa Rahmani Mahsa Rahmani, Zahra Sadeghigol, Vida Nobakht Vida Nobakht
Abstract:
Providing security in the electricity industry, as one of the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both technical and managerial dimensions is discussed in the laboratory. There are various standards in the field of general ICT technical-security evaluation. The most important are ISO / IEC 15408, ISO / IEC 27001 and NIST SP 800-53. In the present paper, these standards are first examined. Then, the standards and reports in the industrial field have been reviewed and compared, and finally, based on the results and special considerations of information and communication technology equipment in the electricity industry, the appropriate methodology has been presented.Keywords: security standards, ISO/IEC 15408, ISA/IEC 62443 series, NIST SP 800-53, NISTIR 7628
Procedia PDF Downloads 1683414 Numerical Modeling on the Vehicle Interior Noise Produced by Rain-the-Roof Excitation
Authors: Zilong Peng, Jun Fan
Abstract:
With the improvement of the living standards, the requirement on the acoustic comfort of the vehicle interior environment is becoming higher. The rain-the-roof producing interior noise is a common phenomenon for the vehicle, which usually discourages the conversation, especially for the heavy rain. This paper presents some numerical results about the rain-the-roof noise. The impact of each water drop is modeled as a short pulse, and the excitation locations on the roof are generated randomly. The vehicle body is simplified to a box closed with some certain-thickness shells. According to the main frequency components of the rain excitation, the analyzing frequency range is divided as low, high and middle frequency domains, which makes the vehicle body are modeled using finite element method (FEM), statistical energy analysis (SEA) and hybrid FE-SEA method, respectively. Furthermore, the effect of spatial distribution density and size of the rain on the sound pressure level are also discussed. These results may provide a guide for designing a more silent vehicle in the special weather.Keywords: rain-the-roof noise, vehicle, finite element method, statistical energy analysis
Procedia PDF Downloads 2023413 Cursive Handwriting in an Internet Age
Authors: Karen Armstrong
Abstract:
Recent concerns about the value of teaching cursive handwriting in the classroom are based on the belief that cursive handwriting or penmanship is an outdated and unnecessary skill in today’s online world. The discussion of this issue begins with a description of current initiatives to eliminate handwriting instruction in schools. This is followed by a brief history of cursive writing through the ages. Next considered is a description of its benefits as a preliminary process for younger children as compared with immediate instruction in keyboarding, particularly in the areas of vision, cognition, motor skills and automatic fluency. Also considered, is cursive’s companion, paper itself, and the impact of a paperless, “screen and keyboard” environment. The discussion concludes with a consideration of the unique contributions of cursive and keyboarding as written forms of communication, along with their respective surfaces, paper and screen. Finally, an assessment of the practical utility of each skill is followed by an informal assessment of what is lost and what remains as we move from a predominantly paper and pen world of handwriting to texting and keyboarding in an environment of screens.Keywords: asemic writing, cursive, handwriting, keyboarding, paper
Procedia PDF Downloads 2713412 The Impact of Artificial Intelligence on Human Rights Priciples and Obligations
Authors: Rady Farag Aziz Ibrahim
Abstract:
The gap between Islamic terrorism and human rights has become an important issue in the fight against Islamic terrorism worldwide. This situation is repeated because terrorism and human rights are interconnected in such a way that when the former begins, the latter becomes subject to violence. This unknown relationship was recognized in the Vienna Declaration and Program of Action adopted at the International Conference on Human Rights held in Vienna on 25 June 1993, confirming that terrorist acts, in all their forms and manifestations, aim to destroy the rights of individuals. humanity to destroy. Therefore, Islamic terrorism is a violation of basic human rights. For this purpose, the first part of the article will focus on the relationship between terrorism and human rights and the synergy between these two concepts. The second part then explores the emerging concept of cyber threats and how they exist. Additionally, technology analysis will be conducted against threats based on human rights. This will be achieved through analysis of the concept of 'securitization' of human rights and by striking a balance between counter-terrorism measures and the protection of human rights at all costs. This article concludes with recommendations on how to balance terrorism and human rights today.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development
Procedia PDF Downloads 403411 Improving Communication System through Router Configuration: The Nigerian Navy Experience
Authors: Saidu I. Rambo, Emmanuel O. Ibam, Sunday O. Adewale
Abstract:
The configuration of routers for effective communication in the Nigerian Navy (NN) enables the navy to improve on the current communication systems. The current system is faced with challenges that make the systems partially effective. The major implementation of the system is to configure routers using hierarchical model and obtaining a VSAT option on C-band platform. These routers will act as a link between Naval Headquarters and the Commands under it. The routers main responsibilities are to forward packets from source location to destination using a Link State Routing Protocol (LSRP). Also using the Point to Point Protocol (PPP), creates a strong encrypted password using Challenge Handshake Authentication Protocol (CHAP) which uses one-way hash function of Message Digest 5 (MD5) to provide complete protection against hackers/intruders. Routers can be configured using a Linux operating system or internet work operating system in the Microsoft platform. With this, system packets can be forwarded to various locations more effectively than the present system being used.Keywords: C-band, communication, router, VSAT
Procedia PDF Downloads 3663410 Bitplanes Gray-Level Image Encryption Approach Using Arnold Transform
Authors: Ali Abdrhman M. Ukasha
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: SSPCE method, image compression-salt- peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption
Procedia PDF Downloads 4363409 Structure and Properties of Meltblown Polyetherimide as High Temperature Filter Media
Authors: Gajanan Bhat, Vincent Kandagor, Daniel Prather, Ramesh Bhave
Abstract:
Polyetherimide (PEI), an engineering plastic with very high glass transition temperature and excellent chemical and thermal stability, has been processed into a controlled porosity filter media of varying pore size, performance, and surface characteristics. A special grade of the PEI was processed by melt blowing to produce microfiber nonwovens suitable as filter media. The resulting microfiber webs were characterized to evaluate their structure and properties. The fiber webs were further modified by hot pressing, a post processing technique, which reduces the pore size in order to improve the barrier properties of the resulting membranes. This ongoing research has shown that PEI can be a good candidate for filter media requiring high temperature and chemical resistance with good mechanical properties. Also, by selecting the appropriate processing conditions, it is possible to achieve desired filtration performance from this engineering plastic.Keywords: nonwovens, melt blowing, polyehterimide, filter media, microfibers
Procedia PDF Downloads 3153408 Evaluating the Possibility of Expanding National Health Insurance Funding From Zakat, Sudan
Authors: Fawzia Mohammed Idris
Abstract:
Zakat is an Islamic procedure for wealth distribution as a social protection mechanism for needy people. This study aimed to assess the possibility to expand the share of fund for national health insurance fund from zakat funds allocated for poor people by measuring the reduction of poverty that result from the investing on direct payment to the needy or by covering them in social health insurance. This study used stata regression as a statistical analysis tool and the finding clarified that there is no significant relationship between the poverty rate as the main indicator and, the number of poor people covered by national health insurance on one hand and the number of benefits poor people from the distribution of zakat fund. This study experienced many difficulties regarding the quality and the consistency of the data. The study suggested that a joint mission between national health insurance fund and zakat chamber to conduct study to assess the efficient use of zakat fund allocated to poor people.Keywords: health finance, poverty, social health insurance, zakat
Procedia PDF Downloads 1463407 Investigation of Additives' Corrosion Inhibition Effects on Dye
Authors: Abdullah Bilal Ozturk, Nil Acarali, Hediye Irem Ozgunduz, Hava Gizem Kandilci, Hanifi Sarac
Abstract:
In this study, zeolite, shellac and different boron chemicals were used as additive to dye and effects were comprehensively investigated. Considering previous studies additive materials that had not used before were determined for produce dye with physical properties. Literature research about the materials provides determining easily sufficient amount of additive materials. Accessible of additives or yearly production amounts are become important issue at selection of materials. Zeolite and boron chemicals are suitable selection in that easy access and has large amount of production in our country. Previous research about boron chemicals shows they have flame retardant effect on textile materials besides numerous usage areas. Also, from previous research, shellac was used widely for protection and insulation of metallic materials. Zeolite added to dye to increase adhesive effect of dye. In this study, corrosion tests were applied to find out if there are positive effects of zeolite, shellac, and boron chemicals to dye’s physical properties.Keywords: dye, corrosion, zeolite, shellac, boron
Procedia PDF Downloads 3383406 Engaging with Security and State from a Gendered Lens in the South Asian Context: Indian State’s Construction of Internal Security and State Responses
Authors: Pooja Bakshi
Abstract:
In the following paper, an attempt would be made to engage with the relationship between the state and the imperatives of security from a gendered lens. This will be juxtaposed with the feminist engagement with International Law. Theorizations from the literature on South Asian politics and Global politics would be applied to the manner in which the Indian state has defined and proposed to deal with concerns of internal security pertaining to the ‘Left Wing Extremism’ in 2010-2011. It would be argued that the state needs to be disaggregated into the legislature, executive and the judiciary; since there are times when some institutional parts of the state provide space for progressive democratic engagement whilst other institutions don’t. The specific contours of violence faced by women and children at the hands of the state, in the above-mentioned discourse would also be examined. In the end, implications of the security state discourse on debates in International Law would be elaborated.Keywords: feminist engagement, human rights, state response to left extremism, security studies in South Asia
Procedia PDF Downloads 494