Search results for: household food security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6700

Search results for: household food security

2560 Classifying and Analysis 8-Bit to 8-Bit S-Boxes Characteristic Using S-Box Evaluation Characteristic

Authors: Muhammad Luqman, Yusuf Kurniawan

Abstract:

S-Boxes is one of the linear parts of the cryptographic algorithm. The existence of S-Box in the cryptographic algorithm is needed to maintain non-linearity of the algorithm. Nowadays, modern cryptographic algorithms use an S-Box as a part of algorithm process. Despite the fact that several cryptographic algorithms today reuse theoretically secure and carefully constructed S-Boxes, there is an evaluation characteristic that can measure security properties of S-Boxes and hence the corresponding primitives. Analysis of an S-Box usually is done using manual mathematics calculation. Several S-Boxes are presented as a Truth Table without any mathematical background algorithm. Then, it’s rather difficult to determine the strength of Truth Table S-Box without a mathematical algorithm. A comprehensive analysis should be applied to the Truth Table S-Box to determine the characteristic. Several important characteristics should be owned by the S-Boxes, they are Nonlinearity, Balancedness, Algebraic degree, LAT, DAT, differential delta uniformity, correlation immunity and global avalanche criterion. Then, a comprehensive tool will be present to automatically calculate the characteristics of S-Boxes and determine the strength of S-Box. Comprehensive analysis is done on a deterministic process to produce a sequence of S-Boxes characteristic and give advice for a better S-Box construction.

Keywords: cryptographic properties, Truth Table S-Boxes, S-Boxes characteristic, deterministic process

Procedia PDF Downloads 366
2559 Natural Dyeing on Wool Fabrics Using Some Red Rose Petals

Authors: Emrah Çimen, Mustafa Demirelli, Burcu Yilmaz Şahinbaşkan, Mahmure Üstün Özgür

Abstract:

Natural colours are used on a large area such as textile, food and pharmaceutical industries by many researchers. When tannic acid is used together with metal salts for dyeing with natural dyes, antibacterial and fastness properties of textile materials are increased. In addition, the allegens are removed on wool fabrics. In this experimental work, some red rose petals were applied as a natural dye with three different dyeing methods and eight different mordant salts. The effect of tannic acid and different metal salts on dyeing of wool fabric was studied. Colour differences ΔECMC (2:1) and fastness properties of dyed fabrics were investigated and compared with each other. Finally, dark colours and adequate colour fastness results (4+) were obtained after dyeing of wool fabrics with FeSO4.7H2O, FeCl3.6H2O and CuCl2.2H2O in the presence of the tannic acid.

Keywords: natural dye, red rose petals, tannic acid, mordant salts, wool fabric

Procedia PDF Downloads 635
2558 Livelihood Security and Mitigating Climate Changes in the Barind Tract of Bangladesh through Agroforestry Systems

Authors: Md Shafiqul Bari, Md Shafiqul Islam Sikdar

Abstract:

This paper summarizes the current knowledge on Agroforestry practices in the Barind tract of Bangladesh. The part of greater Rajshahi, Dinajpur, Rangpur and Bogra district of Bangladesh is geographically identified as the Barind tract. The hard red soil of these areas is very significant in comparison to that of the other parts of the country. A typical dry climate with comparatively high temperature prevails in the Barind area. Scanty rainfall and excessive extraction of groundwater have created an alarming situation among the Barind people and others about irrigation to the rice field. In addition, the situation may cause an adverse impact on the people whose livelihood largely depends on agriculture. The groundwater table has been declined by at least 10 to 15 meters in some areas of the Barind tract during the last 20 years. Due to absent of forestland in the Barind tract, the soil organic carbon content can decrease more rapidly because of the higher rate of decomposition. The Barind soils are largely carbon depleted but can be brought back to carbon-carrying capacity by bringing under suitable Agroforestry systems. Agroforestry has tremendous potential for carbon sequestration not only in above C biomass but also root C biomass in deeper soil depths. Agroforestry systems habitually conserve soil organic carbon and maintain a great natural nutrient pool. Cultivation of trees with arable crops under Agroforestry systems help in improving soil organic carbon content and sequestration carbon, particularly in the highly degraded Barind lands. Agroforestry systems are a way of securing the growth of cash crops that may constitute an alternative source of income in moments of crisis. Besides being a source of fuel wood, a greater presence of trees in cropping system contributes to decreasing temperatures and to increasing rainfall, thus contrasting the negative environmental impact of climate changes. In order to fulfill the objectives of this study, two experiments were conducted. The first experiment was survey on the impact of existing agroforestry system on the livelihood security in the Barind tract of Bangladesh and the second one was the role of agroforestry system on the improvement of soil properties in a multilayered coconut orchard. Agroforestry systems have been generated a lot of employment opportunities in the Barind area. More crops mean involvement of more people in various activities like involvements in dairying, sericulture, apiculture and additional associated agro-based interventions. Successful adoption of Agroforestry practices in the Barind area has shown that the Agroforestry practitioners of this area were very sound positioned economically, and had added social status too. However, from the findings of the present study, it may be concluded that the majority rural farmers of the Barind tract of Bangladesh had a very good knowledge and medium extension contact related to agroforestry production system. It was also observed that 85 per cent farmers followed agroforestry production system and received benefits to a higher extent. Again, from the research study on orchard based mutistoried agroforestry cropping system, it was evident that there was an important effect of agroforestry cropping systems on the improvement of soil chemical properties. As a result, the agroforestry systems may be helpful to attain the development objectives and preserve the biosphere core.

Keywords: agroforestry systems, Barind tract, carbon sequestration, climate changes

Procedia PDF Downloads 201
2557 Optimal Protection Coordination in Distribution Systems with Distributed Generations

Authors: Abdorreza Rabiee, Shahla Mohammad Hoseini Mirzaei

Abstract:

The advantages of distributed generations (DGs) based on renewable energy sources (RESs) leads to high penetration level of DGs in distribution network. With incorporation of DGs in distribution systems, the system reliability and security, as well as voltage profile, is improved. However, the protection of such systems is still challenging. In this paper, at first, the related papers are reviewed and then a practical scheme is proposed for coordination of OCRs in distribution system with DGs. The coordination problem is formulated as a nonlinear programming (NLP) optimization problem with the object function of minimizing total operating time of OCRs. The proposed method is studied based on a simple test system. The optimization problem is solved by General Algebraic Modeling System (GAMS) to calculate the optimal time dial setting (TDS) and also pickup current setting of OCRs. The results show the effectiveness of the proposed method and its applicability.

Keywords: distributed generation, DG, distribution network, over current relay, OCR, protection coordination, pickup current, time dial setting, TDS

Procedia PDF Downloads 141
2556 Investigating the Rate of Migration of Plasticizers from PET Bottles into Salad Oil during Storage

Authors: Simin Asadollahi, Amir H. Soruri, Ali Moghimi

Abstract:

Nowadays, salad oils are used in many countries around the world. Therefore, it is of great importance to ensure the safety of these food products which are usually packaged in Polyethylene terephthalate (PET) bottles and come on the market. This study investigated the effects of storage time and temperature on the migration rate of phthalate compounds from PET bottle to salad oil. In more detail, migration rate of bis (2-ethylhexyl) phthalate from bottles to salad oil samples was measured in 1st, the 30th, and the 60th days of storage at a temperature of either 20 or 40 °C. At both storage temperatures, an increase in the storage time led to a statistically significant increase in the migration rate of phthalate compounds (p<.01). Regarding this, the highest migration rate occurred after 60 days of storage in to the samples. Furthermore, it was revealed bis (2-ethylhexyl) phthalate had a higher migration rate at 40 °C than at 20 °C which showed that an increase in the storage temperature would lead to an increase in the migration rate. The highest migration rate occurred in relation to salad oil stored at 40 °C and after 60 days of storage.

Keywords: salad oil, migration rate, polyethylene terephthalate, bis (2-ethylhexyl) phthalate

Procedia PDF Downloads 368
2555 The Forensic Swing of Things: The Current Legal and Technical Challenges of IoT Forensics

Authors: Pantaleon Lutta, Mohamed Sedky, Mohamed Hassan

Abstract:

The inability of organizations to put in place management control measures for Internet of Things (IoT) complexities persists to be a risk concern. Policy makers have been left to scamper in finding measures to combat these security and privacy concerns. IoT forensics is a cumbersome process as there is no standardization of the IoT products, no or limited historical data are stored on the devices. This paper highlights why IoT forensics is a unique adventure and brought out the legal challenges encountered in the investigation process. A quadrant model is presented to study the conflicting aspects in IoT forensics. The model analyses the effectiveness of forensic investigation process versus the admissibility of the evidence integrity; taking into account the user privacy and the providers’ compliance with the laws and regulations. Our analysis concludes that a semi-automated forensic process using machine learning, could eliminate the human factor from the profiling and surveillance processes, and hence resolves the issues of data protection (privacy and confidentiality).

Keywords: cloud forensics, data protection Laws, GDPR, IoT forensics, machine Learning

Procedia PDF Downloads 154
2554 Solid Waste Management Challenges and Possible Solution in Kabul City

Authors: Ghulam Haider Haidaree, Nsenda Lukumwena

Abstract:

Most developing nations face energy production and supply problems. This is also the case of Afghanistan whose generating capacity does not meet its energy demand. This is due in part to high security and risk caused by war which deters foreign investments and insufficient internal revenue. To address the issue above, this paper would like to suggest an alternative and affordable way to deal with the energy problem. That is by converting Solid Waste to energy. As a result, this approach tackles the municipal solid waste issue (potential cause of several diseases), contributes to the improvement of the quality of life, local economy, and so on. While addressing the solid waste problem in general, this paper samples specifically one municipality which is District-12, one of the 22 districts of Kabul city. Using geographic information system (GIS) technology, District-12 is divided into nine different zones whose municipal solid waste is respectively collected, processed, and converted into electricity and distributed to the closest area. It is important to mention that GIS has been used to estimate the amount of electricity to be distributed and to optimally position the production plant.

Keywords: energy problem, estimation of electricity, GIS zones, solid waste management system

Procedia PDF Downloads 340
2553 Assessment of Trace Metal Concentration of Soils Contaminated with Carbide in Abraka, Delta State, Nigeria

Authors: O.M. Agbogidi, I.M. Onochie

Abstract:

An investigation was carried out on trace metal concentration of soils contaminated with carbide in Abraka, Delta State, Nigeria in 2014 with a view to providing baseline formation on their status relative to the control plants and to the tolerable limits recommended by World standard bodies including WHO and FAO. The metals were analyzed using the Atomic Absorption Spectrophotometer which showed an elevated level when compared with the control plots. High level of metals including Fe, Pb, Zn, Cu, Cd, Ni, Cr and arsenic were recorded and these values were significantly different (P<0.05) from values obtained from the control plots. These results are indicative of the fact that carbide polluted soil had higher level of trace metals and because these metals are non-biodegradable elements in the ecosystem, a rise to their lethal levels in food chains is envisaged due to the interdependency of plants and animals stemming from soil-water organisms interrelationship.

Keywords: bio-concentration, carbide contaminated soils, heavy metals, trace metals

Procedia PDF Downloads 278
2552 Information System Development for Online Journal System Using Online Journal System for Journal Management of Suan Sunandha Rajabhat University

Authors: Anuphan Suttimarn, Natcha Wattanaprapa, Suwaree Yordchim

Abstract:

The aim of this study is to develop the online journal system using a web application to manage the journal service of Suan Sunandha Rajabhat University in order to improve the journal management of the university. The main structures of the system process consist of 1. journal content management system 2. membership system of the journal and 3. online submission or review process. The investigators developed the system based on a web application using open source OJS software and phpMyAdmin to manage a research database. The system test showed that this online system 'Online Journal System (OJS)' could shorten the time in the period of submission article to journal and helped in managing a journal procedure efficiently and accurately. The quality evaluation of Suan Sunandha Rajabhat online journal system (SSRUOJS) undertaken by experts and researchers in 5 aspects; design, usability, security, reducing time, and accuracy showed the highest average value (X=4.30) on the aspect of reducing time. Meanwhile, the system efficiency evaluation was on an excellent level (X=4.13).

Keywords: online journal system, Journal management, Information system development, OJS

Procedia PDF Downloads 182
2551 Subsea Control Module (SCM) - A Vital Factor for Well Integrity and Production Performance in Deep Water Oil and Gas Fields

Authors: Okoro Ikechukwu Ralph, Fuat Kara

Abstract:

The discoveries of hydrocarbon reserves has clearly drifted offshore, and in deeper waters - areas where the industry still has limited knowledge; and that were hitherto, regarded as being out of reach. This shift presents significant and increased challenges in technology requirements needed to guarantee safety of personnel, environment and equipment; ensure high reliability of installed equipment; and provide high level of confidence in security of investment and company reputation. Nowhere are these challenges more apparent than on subsea well integrity and production performance. The past two decades has witnessed enormous rise in deep and ultra-deep water offshore field developments for the recovery of hydrocarbons. Subsea installed equipment at the seabed has been the technology of choice for these developments. This paper discusses the role of Subsea Control module (SCM) as a vital factor for deep-water well integrity and production performance. A case study for Deep-water well integrity and production performance is analysed.

Keywords: offshore reliability, production performance, subsea control module, well integrity

Procedia PDF Downloads 515
2550 SkyCar Rapid Transit System: An Integrated Approach of Modern Transportation Solutions in the New Queen Elizabeth Quay, Perth, Western Australia

Authors: Arfanara Najnin, Michael W. Roach, Jr., Dr. Jianhong Cecilia Xia

Abstract:

The SkyCar Rapid Transit System (SRT) is an innovative intelligent transport system for the sustainable urban transport system. This system will increase the urban area network connectivity and decrease urban area traffic congestion. The SRT system is designed as a suspended Personal Rapid Transit (PRT) system that travels under a guideway 5m above the ground. A driver-less passenger is via pod-cars that hang from slender beams supported by columns that replace existing lamp posts. The beams are setup in a series of interconnecting loops providing non-stop travel from beginning to end to assure journey time. The SRT forward movement is effected by magnetic motors built into the guideway. Passenger stops are at either at line level 5m above the ground or ground level via a spur guideway that curves off the main thoroughfare. The main objective of this paper is to propose an integrated Automated Transit Network (ATN) technology for the future intelligent transport system in the urban built environment. To fulfil the objective a 4D simulated model in the urban built environment has been proposed by using the concept of SRT-ATN system. The methodology for the design, construction and testing parameters of a Technology Demonstrator (TD) for proof of concept and a Simulator (S) has been demonstrated. The completed TD and S will provide an excellent proving ground for the next development stage, the SRT Prototype (PT) and Pilot System (PS). This paper covered by a 4D simulated model in the virtual built environment is to effectively show how the SRT-ATN system works. OpenSim software has been used to develop the model in a virtual environment, and the scenario has been simulated to understand and visualize the proposed SkyCar Rapid Transit Network model. The SkyCar system will be fabricated in a modular form which is easily transported. The system would be installed in increasingly congested city centers throughout the world, as well as in airports, tourist resorts, race tracks and other special purpose for the urban community. This paper shares the lessons learnt from the proposed innovation and provides recommendations on how to improve the future transport system in urban built environment. Safety and security of passengers are prime factors to be considered for this transit system. Design requirements to meet the safety needs to be part of the research and development phase of the project. Operational safety aspects would also be developed during this period. The vehicles, the track and beam systems and stations are the main components that need to be examined in detail for safety and security of patrons. Measures will also be required to protect columns adjoining intersections from errant vehicles in vehicular traffic collisions. The SkyCar Rapid Transit takes advantage of all current disruptive technologies; batteries, sensors and 4G/5G communication and solar energy technologies which will continue to reduce the costs and make the systems more profitable. SkyCar's energy consumption is extremely low compared to other transport systems.

Keywords: SkyCar, rapid transit, Intelligent Transport System (ITS), Automated Transit Network (ATN), urban built environment, 4D Visualization, smart city

Procedia PDF Downloads 222
2549 Inventory and Pollinating Role of Bees (Hymenoptera: apoidea) on Turnip (Brassica rapa L.) and Radish (Raphanus sativus L.) (Brassicaceae) in Constantine Area (Algeria)

Authors: Benachour Karima

Abstract:

Pollination is a key factor in crop production and the presence of insect pollinators, mainly wild bees, is essential for improving yields. In this work, visiting apoids of two vegetable crops, the turnip (Brassica rapa L.) and the radish (Raphanus sativus L.) (Brassicaceae) were recorded during flowering times of 2003 and 2004 in Constantine area (36°22’N 06°37’E, 660 m). The observations were conducted in a plot of approximately 308 m2 of the Institute of Nutrition, Food and Food Technology (University of Mentouri Brothers). To estimate the density of bees (per 100 flowers or m2), 07 plots (01m2 for each one) are defined from the edge of the culture and in the first two rows. From flowering and every two days, foraging insects are recorded from 09 am until 17 pm (Gmt+1).The purpose of visit (collecting nectar, pollen or both) and pollinating efficiency (estimated by the number of flowers visited per minute and the number of positive visits) were noted for the most abundant bees on flowers. The action of pollinating insects is measured by comparing seed yields of 07 plots covered with tulle with 07 other accessible to pollinators. 04 families of Apoidea: Apidae, Halictidae, Andrenidae and Megachilidae were observed on the two plants. On turnip, the honeybee is the most common visitor (on average 214visites/ m2), it is followed by the Halictidae Lasioglossum mediterraneum whose visits are less intense (20 individuals/m2). Visits by Andrenidae, represented by several species such as Andrena lagopus, A.flavipes, A.agilissima and A.rhypara were episodic. The honeybee collected mainly nectar, its visits were all potentially fertilizing (contact with stigma) and more frequent (on average 14 flowers/min. L.mediterraneum visited only 05 flrs/min, it collected mostly the two products together and all its visits were also positive. On radish, the wild bee Ceratina cucurbitina recorded the highest number of visits (on average 06 individuals/100flo wers), the Halictidae represented mainly by L.mediterraneum, and L.malachurum, L.pauxillum were less abundant. C.cucurbitina visited on average 10 flowers /min and all its visits are positive. Visits of Halictidae were less frequent (05-06 flowers/min) and not all fertilizing. Seed yield of Brassica rapa (average number of pods /plant, seeds/ pods and average weight of 1000 seeds) was significantly higher in the presence of pollinators. Similarly, the pods of caged plants gave a percentage of aborted seeds (10.3%) significantly higher than that obtained on free plants (4.12%), the pods of caged plants also gave a percentage of malformed seeds (1.9%) significantly higher than that of the free plants (0.9%). For radish, the seed yield in the presence and absence of insects are almost similar. Only the percentage of malformed seeds (3.8%) obtained from the pods of caged plants was significantly higher in comparison with pods of free plants (1.9%). Following these results, it is clear that pollinators especially bees are essential for the production and improvement of crop yields and therefore it is necessary to protect this fauna increasingly threatened.

Keywords: foraging behavior, honey bee, radish, seed yield, turnip, wild bee

Procedia PDF Downloads 215
2548 Hybrid Anomaly Detection Using Decision Tree and Support Vector Machine

Authors: Elham Serkani, Hossein Gharaee Garakani, Naser Mohammadzadeh, Elaheh Vaezpour

Abstract:

Intrusion detection systems (IDS) are the main components of network security. These systems analyze the network events for intrusion detection. The design of an IDS is through the training of normal traffic data or attack. The methods of machine learning are the best ways to design IDSs. In the method presented in this article, the pruning algorithm of C5.0 decision tree is being used to reduce the features of traffic data used and training IDS by the least square vector algorithm (LS-SVM). Then, the remaining features are arranged according to the predictor importance criterion. The least important features are eliminated in the order. The remaining features of this stage, which have created the highest level of accuracy in LS-SVM, are selected as the final features. The features obtained, compared to other similar articles which have examined the selected features in the least squared support vector machine model, are better in the accuracy, true positive rate, and false positive. The results are tested by the UNSW-NB15 dataset.

Keywords: decision tree, feature selection, intrusion detection system, support vector machine

Procedia PDF Downloads 269
2547 The Life Skills Project: Client-Centered Approaches to Life Skills Acquisition for Homeless and At-Risk Populations

Authors: Leah Burton, Sara Cumming, Julianne DiSanto

Abstract:

Homelessness is a widespread and complex problem in Canada and around the globe. Many Canadians will face homelessness at least once in their lifetime, with several experiencing subsequent bouts or cyclical patterns of housing precarity. While a Housing First approach to homelessness is a long-standing and widely accepted best practice, it is also recognized that the acquisition of life skills is an effective way to reduce cycles of homelessness. Indeed, when individuals are provided with a range of life skills—such as (but not limited to) financial literacy, household management, interpersonal skills, critical thinking, and resource management—they are given the tools required to maintain long-term Housing for a lifetime; thus reducing a repetitive need for services. However, there is limited research regarding the best ways to teach life skills, a problem that has been further complicated in a post-pandemic world, where services are being delivered online or in a hybrid model of care. More than this, it is difficult to provide life skills on a large scale without losing a client-centered approach to services. This lack of client-centeredness is also seen in the lack of attention to culturally sensitive life skills, which consider the diverse needs of individuals and imbed equity, diversity, and inclusion (EDI) within the skills being taught. This study aims to fill these identified gaps in the literature by employing a community-engaged (CER) approach. Academic, government, funders, front-line staff, and clients at 15 not-for-profits from across the Greater Toronto Area in Ontario, Canada, collaborated to co-create a virtual, client-centric, EDI-informed life skill learning management system. A triangulation methodology was utilized for this research. An environmental scan was conducted for current best practices, and over 100 front-line staff (including workers, managers, and executive directors who work with homeless populations) participated in two separate Creative Problem Solving Sessions. Over 200 individuals with experience in homelessness completed quantitative and open-ended surveys. All sections of this research aimed to discover the areas of skills that individuals need to maintain Housing and to ascertain what a more client-driven EDI approach to life skills training should include. This presentation will showcase the findings on which life skills are deemed essential for homeless and precariously housed individuals.

Keywords: homelessness, housing first, life skills, community engaged research, client- centered

Procedia PDF Downloads 104
2546 Torture, Inhuman and Degrading Treatment in Nigeria: A Time for Legislative Intervention

Authors: Kolawole Oyekan

Abstract:

Torture, cruel, inhuman and degrading treatment is one of the issues dealt with by the United Nations in its development of human rights standard. Torture and other ill -treatments is banned at all times in all places including in times of war. There is no justification for torture, cruel, inhuman and degrading treatment under any law in Nigeria. All statutes; local, regional and international on human rights prohibits all forms of degrading treatment. This paper examines the definition of torture, inhuman and degrading treatment and the prevalence of confessional statements obtain through torture by security agencies during the interrogation of crime suspects and are mostly relied upon during trial even in cases involving capital punishment. The paper further reviews the Violence against Persons Prohibition Act 2015 which prohibits torture and other forms of ill-treatment. Presently, the Act is applicable only to the federal Federal Capital Territory, Abuja. Consequently, the paper concludes that the Act should be adopted as a matter of urgency by the 36 states of the Federation of Nigeria and in addition, cogent steps must be taken to ensure that the provisions of the Act are strictly complied with in order to eliminate torture, cruel and inhuman degrading treatment in Nigeria.

Keywords: confessional statement, human rights, torture, United Nations

Procedia PDF Downloads 309
2545 Non-Contact Human Movement Monitoring Technique for Security Control System Based 2n Electrostatic Induction

Authors: Koichi Kurita

Abstract:

In this study, an effective non-contact technique for the detection of human physical activity is proposed. The technique is based on detecting the electrostatic induction current generated by the walking motion under non-contact and non-attached conditions. A theoretical model for the electrostatic induction current generated because of a change in the electric potential of the human body is proposed. By comparing the obtained electrostatic induction current with the theoretical model, it becomes obvious that this model effectively explains the behavior of the waveform of the electrostatic induction current. The normal walking motions are recorded using a portable sensor measurement located in a passageway of office building. The obtained results show that detailed information regarding physical activity such as a walking cycle can be estimated using our proposed technique. This suggests that the proposed technique which is based on the detection of the walking signal, can be successfully applied to the detection of human walking motion in a secured building.

Keywords: human walking motion, access control, electrostatic induction, alarm monitoring

Procedia PDF Downloads 359
2544 Incorporating Multiple Supervised Learning Algorithms for Effective Intrusion Detection

Authors: Umar Albalawi, Sang C. Suh, Jinoh Kim

Abstract:

As internet continues to expand its usage with an enormous number of applications, cyber-threats have significantly increased accordingly. Thus, accurate detection of malicious traffic in a timely manner is a critical concern in today’s Internet for security. One approach for intrusion detection is to use Machine Learning (ML) techniques. Several methods based on ML algorithms have been introduced over the past years, but they are largely limited in terms of detection accuracy and/or time and space complexity to run. In this work, we present a novel method for intrusion detection that incorporates a set of supervised learning algorithms. The proposed technique provides high accuracy and outperforms existing techniques that simply utilizes a single learning method. In addition, our technique relies on partial flow information (rather than full information) for detection, and thus, it is light-weight and desirable for online operations with the property of early identification. With the mid-Atlantic CCDC intrusion dataset publicly available, we show that our proposed technique yields a high degree of detection rate over 99% with a very low false alarm rate (0.4%).

Keywords: intrusion detection, supervised learning, traffic classification, computer networks

Procedia PDF Downloads 355
2543 Trusting Smart Speakers: Analysing the Different Levels of Trust between Technologies

Authors: Alec Wells, Aminu Bello Usman, Justin McKeown

Abstract:

The growing usage of smart speakers raises many privacy and trust concerns compared to other technologies such as smart phones and computers. In this study, a proxy measure of trust is used to gauge users’ opinions on three different technologies based on an empirical study, and to understand which technology most people are most likely to trust. The collected data were analysed using the Kruskal-Wallis H test to determine the statistical differences between the users’ trust level of the three technologies: smart speaker, computer and smart phone. The findings of the study revealed that despite the wide acceptance, ease of use and reputation of smart speakers, people find it difficult to trust smart speakers with their sensitive information via the Direct Voice Input (DVI) and would prefer to use a keyboard or touchscreen offered by computers and smart phones. Findings from this study can inform future work on users’ trust in technology based on perceived ease of use, reputation, perceived credibility and risk of using technologies via DVI.

Keywords: direct voice input, risk, security, technology, trust

Procedia PDF Downloads 195
2542 Polish Operational Plans During Cold War as Part of Warsaw Pact Strategic Culture

Authors: Wiktor Stypczyński

Abstract:

During the Cold War, both sides of the conflict developed advanced operational plans in case of a Third World War outbreak. In the Warsaw Pact, Soviet generals in Moscow chose targets for each army, but each country's General Staff had to create specific plans for their nation. This led to the creation of a Strategic Culture within the Warsaw Pact that was reflected in the plans of each army. This paper aims to showcase the Strategic Culture of the Warsaw Pact by using the plans of the People's Polish Army as an example. Examining one army at a time will allow for a more detailed and unique perspective on the matter. Understanding the past Strategic Culture is crucial in comprehending the current post-Soviet strategic situation in Eastern Europe, especially with the current situation in Ukraine. This paper is based on Benon Miśkiewicz's classic methodology of military history. While this methodology is the foundation, the research findings will also draw on the Strategic Studies methodology and the accomplishments of war and military science. Additionally, the Security and Political Studies methodology will be a crucial element in constructing the narrative.

Keywords: cold war, operetional plans, strategic culture, polish people's army

Procedia PDF Downloads 76
2541 [Keynote]: No-Trust-Zone Architecture for Securing Supervisory Control and Data Acquisition

Authors: Michael Okeke, Andrew Blyth

Abstract:

Supervisory Control And Data Acquisition (SCADA) as the state of the art Industrial Control Systems (ICS) are used in many different critical infrastructures, from smart home to energy systems and from locomotives train system to planes. Security of SCADA systems is vital since many lives depend on it for daily activities and deviation from normal operation could be disastrous to the environment as well as lives. This paper describes how No-Trust-Zone (NTZ) architecture could be incorporated into SCADA Systems in order to reduce the chances of malicious intent. The architecture is made up of two distinctive parts which are; the field devices such as; sensors, PLCs pumps, and actuators. The second part of the architecture is designed following lambda architecture, which is made up of a detection algorithm based on Particle Swarm Optimization (PSO) and Hadoop framework for data processing and storage. Apache Spark will be a part of the lambda architecture for real-time analysis of packets for anomalies detection.

Keywords: industrial control system (ics, no-trust-zone (ntz), particle swarm optimisation (pso), supervisory control and data acquisition (scada), swarm intelligence (SI)

Procedia PDF Downloads 346
2540 Recovery of Wastewater Treated of Boumerdes Step for Irrigation

Authors: N. Ouslimani, M. T. Abadlia, S. Yakoub, F. Tebbani

Abstract:

Water has always been synonymous with life and growth. Blue gold is first essential to the survival of the human being whose body consists of more than 65% with the development of industrialization and consumption patterns; volumes of wastewater discharges have increased considerably whether industrial or domestic, waste water must be purified before discharge. Treatment, therefore, aims to reduce the pollution load which contain. The resources in Algeria are limited and unevenly distributed. Thus, to meet all the water needs of the country and to preserve the waters of good quality drinking water supply, one solution would be to use them according to their quality and to irrigate crops for the food or be directed to the irrigation of green areas or sports complex. The purification performance of this STEP has been established since the pH analyzed pollution criteria (7.36) and temperature (16°C), MES (10 mg / l), electrical conductivity (1122 / µs / cm), DBO5 (6mg / l), DCO (15mg / l) meet the discharge standards. Arguably the purified water discharged out of the boumerdes STEP comply with Algerian regulations and can be reused in agriculture. COD biodegradability of the coefficient / BOD5 is 2.5 (less than 3) indicates that of the effluent are biodegradable hence their urban origin.

Keywords: irrigation, recovery, treated, wastewater

Procedia PDF Downloads 258
2539 Keyloggers Prevention with Time-Sensitive Obfuscation

Authors: Chien-Wei Hung, Fu-Hau Hsu, Chuan-Sheng Wang, Chia-Hao Lee

Abstract:

Nowadays, the abuse of keyloggers is one of the most widespread approaches to steal sensitive information. In this paper, we propose an On-Screen Prompts Approach to Keyloggers (OSPAK) and its analysis, which is installed in public computers. OSPAK utilizes a canvas to cue users when their keystrokes are going to be logged or ignored by OSPAK. This approach can protect computers against recoding sensitive inputs, which obfuscates keyloggers with letters inserted among users' keystrokes. It adds a canvas below each password field in a webpage and consists of three parts: two background areas, a hit area and a moving foreground object. Letters at different valid time intervals are combined in accordance with their time interval orders, and valid time intervals are interleaved with invalid time intervals. It utilizes animation to visualize valid time intervals and invalid time intervals, which can be integrated in a webpage as a browser extension. We have tested it against a series of known keyloggers and also performed a study with 95 users to evaluate how easily the tool is used. Experimental results made by volunteers show that OSPAK is a simple approach.

Keywords: authentication, computer security, keylogger, privacy, information leakage

Procedia PDF Downloads 125
2538 Hydration Evaluation In A Working Population in Greece

Authors: Aikaterini-Melpomeni Papadopoulou, Kyriaki Apergi, Margarita-Vasiliki Panagopoulou, Olga Malisova

Abstract:

Introduction: Adequate hydration is a vital factor that enhances concentration, memory, and decision-making abilities throughout the workday. Various factors may affect hydration status in workplace settings, and many variables, such as age, gender and activity level affect hydration needs. Employees frequently overlook their hydration needs amid busy schedules and demanding tasks, leading to dehydration that can negatively affect cognitive function, productivity, and overall well-being In addition, dietary habits, including fluid intake and food choices, can either support or hinder optimal hydration. However, factors that affect hydration balance among workers in Greece have not been adequately studied. Objective: This study aims to evaluate the hydration status of the working population in Greece and investigate the various factors that impact hydration status in workplace settings, considering demographic, dietary, and occupational influences in a Greek sample of employees from diverse working environments Materials & Methods: The study included 212 participants (46.2% women) from the working population in Greece. Water intake from both solid and liquid foods was recorded using a semi-quantified drinking frequency questionnaire the validated Water Balance Questionnaire was used to evaluate hydration status. The calculation of water from solid and liquid foods was based on data from the USDA National Nutrient Database. Water balance was calculated subtracting the total fluid loss from the total fluid intake in the body. Furthermore, the questionnaire including additional questions on drinking habits and work-related factors.volunteers answered questions of different categories such as a) demographic socio-economic b) work style characteristics c) health, d) physical activity, e) food and fluid intake, f) fluid excretion and g) trends on fluid and water intake. Individual and multivariate regression analyses were performed to assess the relationships between demographic, work-related factors, and hydration balance. Results: Analysis showed that demographic factors like gender, age, and BMI, as well as certain work-related factors, had a weak and statistically non-significant effect on hydration balance. However, the use of a bottle or water container during work hours (b = 944.93, p < 0.001) and engaging in intense physical activity outside of work (b = -226.28, p < 0.001) were found to have a significant impact. Additionally, the consumption of beverages other than water (b = -416.14, p = 0.059) could negatively impact hydration balance. On average, the total consumption of the sample is 3410 ml of water daily, with men consuming approximately 440 ml / day more water (3470 ml / day) compared to women (3030 ml / day) with this difference also being statistically significant. Finally, the water balance, defined as the difference between water intake and water excretion, was found to be negative on average for the entire sample. Conclusions: This study is among the first to explore hydration status within the Greek working population. Findings indicate that awareness of adequate hydration and individual actions, such as using a water bottle during work, may influence hydration balance.

Keywords: hydration, working population, water balance, workplace behavior

Procedia PDF Downloads 27
2537 Microwave-Assisted Extraction of Lycopene from Gac Arils (Momordica cochinchinensis (Lour.) Spreng)

Authors: Yardfon Tanongkankit, Kanjana Narkprasom, Nukrob Narkprasom, Khwanruthai Saiupparat, Phatthareeya Siriwat

Abstract:

Gac fruit (Momordica cochinchinensis (Lour.) Spreng) possesses high potential for health food as it contains high lycopene contents. The objective of this study was to optimize the extraction of lycopene from gac arils using the microwave extraction method. Response surface method was used to find the conditions that optimize the extraction of lycopene from gac arils. The parameters of extraction used in this study were extraction time (120-600 seconds), the solvent to sample ratio (10:1, 20:1, 30:1, 40:1 and 50:1 mL/g) and set microwave power (100-800 watts). The results showed that the microwave extraction condition at the extraction time of 360 seconds, the sample ratio of 30:1 mL/g and the microwave power of 450 watts were suggested since it exhibited the highest value of lycopene content of 9.86 mg/gDW. It was also observed that lycopene contents extracted from gac arils by microwave method were higher than that by the conventional method.

Keywords: conventional extraction, Gac arils, microwave-assisted extraction, Lycopene

Procedia PDF Downloads 393
2536 The Relationship between Violence against Women in the Family and Common Mental Disorders in Urban Informal Settlements of Mumbai, India: A Cross-Sectional Study

Authors: Abigail Bentley, Audrey Prost, Nayreen Daruwalla, Apoorwa Gupta, David Osrin

Abstract:

BACKGROUND: Intimate partner violence (IPV) can impact a woman’s physical, reproductive and mental health, including common mental disorders such as anxiety and depression. However, people other than an intimate partner may also perpetrate violence against women in the family, particularly in India. This study aims to investigate the relationship between experiences of violence perpetrated by the husband and other members of the wider household and symptoms of common mental disorders in women residing in informal settlement (slum) areas of Mumbai. METHODS: Experiences of violence were assessed through a detailed cross-sectional survey of 598 women, including questions about specific acts of emotional, economic, physical and sexual violence across different time points in the woman’s life and the main perpetrator of each act. Symptoms of common mental disorders were assessed using the 12-item General Health Questionnaire (GHQ-12). The GHQ-12 scores were divided into four groups and the relationship between experiences of each type of violence in the last 12 months and GHQ-12 score group was analyzed using ordinal logistic regression, adjusted for the woman’s age and clustering. RESULTS: 482 (81%) women consented to interview. On average, they were 28.5 years old, had completed 7 years of education and had been married 9 years. 88% were Muslim and 47% lived in joint and 53% in nuclear families. 44% of women had experienced at least one act of violence in their lifetime (33% emotional, 22% economic, 23% physical, 12% sexual). 7% had a high GHQ-12 score (6 or above). For violence experiences in the last 12 months, the odds of being in the highest GHQ-12 score group versus the lower groups combined were 13.1 for emotional violence, 6.5 for economic, 5.7 for physical and 6.3 for sexual (p<0.001 for all outcomes). DISCUSSION: The high level of violence reported across the lifetime could be due to the detailed assessment of violent acts at multiple time points and the inclusion of perpetrators within the family other than the husband. Each type of violence was associated with greater odds of a higher GHQ-12 score and therefore more symptoms of common mental disorders. Emotional violence was far more strongly associated with symptoms of common mental disorders than physical or sexual violence. However, it is not possible to attribute causal directionality to the association. Further work to investigate the relationship between differing severity of violence experiences and women’s mental health and the components of emotional violence that make it so strongly associated with symptoms of common mental disorders would be beneficial.

Keywords: common mental disorders, family violence, India, informal settlements, mental health, violence against women

Procedia PDF Downloads 364
2535 Materialized View Effect on Query Performance

Authors: Yusuf Ziya Ayık, Ferhat Kahveci

Abstract:

Currently, database management systems have various tools such as backup and maintenance, and also provide statistical information such as resource usage and security. In terms of query performance, this paper covers query optimization, views, indexed tables, pre-computation materialized view, query performance analysis in which query plan alternatives can be created and the least costly one selected to optimize a query. Indexes and views can be created for related table columns. The literature review of this study showed that, in the course of time, despite the growing capabilities of the database management system, only database administrators are aware of the need for dealing with archival and transactional data types differently. These data may be constantly changing data used in everyday life, and also may be from the completed questionnaire whose data input was completed. For both types of data, the database uses its capabilities; but as shown in the findings section, instead of repeating similar heavy calculations which are carrying out same results with the same query over a survey results, using materialized view results can be in a more simple way. In this study, this performance difference was observed quantitatively considering the cost of the query.

Keywords: cost of query, database management systems, materialized view, query performance

Procedia PDF Downloads 282
2534 Disconnect between Water, Sanitation and Hygiene Related Behaviours of Children in School and Family

Authors: Rehan Mohammad

Abstract:

Background: Improved Water, Sanitation and Hygiene (WASH) practices in schools ensure children’s health, well-being and cognitive performance. In India under various WASH interventions in schools, teachers, and other staff make every possible effort to educate children about personal hygiene, sanitation practices and harms of open defecation. However, once children get back to their families, they see other practicing inappropriate WASH behaviors, and they consequently start following them. This show disconnect between school behavior and family behavior, which needs to be bridged to achieve desired WASH outcomes. Aims and Objectives: The aim of this study is to assess the factors causing disconnect of WASH-related behaviors between school and the family of children. It also suggests behavior change interventions to bridge the gap. Methodology: The present study has chosen a mixed- method approach. Both quantitative and qualitative methods of data collection have been used in the present study. The purposive sampling for data collection has been chosen. The data have been collected from 20% children in each age group of 04-08 years and 09-12 years spread over three primary schools and 20% of households to which they belong to which is spread over three slum communities in south district of Delhi. Results: The present study shows that despite of several behavior change interventions at school level, children still practice inappropriate WASH behaviors due to disconnect between school and family behaviors. These behaviors show variation from one age group to another. The inappropriate WASH behaviors being practiced by children include open defecation, wrong disposal of garbage, not keeping personal hygiene, not practicing hand washing practices during critical junctures and not washing fruits and vegetables before eating. The present study has highlighted that 80% of children in the age group of 04-08 years still practice inappropriate WASH behaviors when they go back to their families after school whereas, this percentage has reduced to 40% in case of children in the age group 09-12 years. Present study uncovers association between school and family teaching which creates a huge gap between WASH-related behavioral practices. The study has established that children learn and de-learn the WASH behaviors due to the evident disconnect between behavior change interventions at schools and household level. The study has also made it clear that children understand the significance of appropriate WASH practices but owing to the disconnect the behaviors remain unsettled. The study proposes several behavior change interventions to sync the behaviors of children at school and family level to ensure children’s health, well-being and cognitive performance.

Keywords: behavioral interventions, child health, family behavior, school behavior, WASH

Procedia PDF Downloads 116
2533 Nitrogen Fixation, Cytokinin and Exopolysachharide Production by indigenous Azotobacter spp. from East Nusa Tenggara

Authors: Reginawanti Hindersah, Widiya Septiani Perdanawati, Dewi Azizah Sulaksana, Hidiyah Ayu Ma’rufah

Abstract:

Maize in some region in East Nusa Tenggara Indonesia bordering Republic Democratic of Timor Leste is important local food crop and commonly cultivated using conventional method without appropriate plant nutrition system so that productivity is still low. A way to enhance local corn yield is adding biofertilizer containing nitrogen (N2) fixing bacteria such as Azotobacter. The purpose of this research was to determine N2 fixation, cytokinin as well as exopolysachharide production capacity of six indigenous Azotobacter strains in pure culture. The N2 fixation capacities of native 3 day old Azotobacter strains added to Ashby Media varied from 0.01 to 0.39 µM/g/hour. Cytokinin production of these strain in liquid culture of N-free Media was 0.11 to 40.04 ppm while exopolysachharide content in liquid culture of Vermani Media varied from 0.4 to 27.3 g/L. This results demonstrate that some local Azotobacter strains might be used as biofertilizer.

Keywords: azotobacter, local isolate, N fixation, phythohormone, exopolysaccaride

Procedia PDF Downloads 438
2532 Electronic Waste Analysis And Characterization Study: Management Input For Highly Urbanized Cities

Authors: Jilbert Novelero, Oliver Mariano

Abstract:

In a world where technological evolution and competition to create innovative products are at its peak, problems on Electronic Waste (E-Waste) are now becoming a global concern. E-waste is said to be any electrical or electronic devices that have reached the terminal of its useful life. The major issue are the volume and the raw materials used in crafting E-waste which is non-biodegradable and contains hazardous substances that are toxic to human health and the environment. The objective of this study is to gather baseline data in terms of the composition of E-waste in the solid waste stream and to determine the top 5 E-waste categories in a highly urbanized city. Recommendations in managing these wastes for its reduction were provided which may serve as a guide for acceptance and implementation in the locality. Pasig City was the chosen beneficiary of the research output and through the collaboration of the City Government of Pasig and its Solid Waste Management Office (SWMO); the researcher successfully conducted the Electronic Waste Analysis and Characterization Study (E-WACS) to achieve the objectives. E-WACS that was conducted on April 2019 showed that E-waste ranked 4th which comprises the 10.39% of the overall solid waste volume. Out of 345, 127.24kg which is the total daily domestic waste generation in the city, E-waste covers 35,858.72kg. Moreover, an average of 40 grams was determined to be the E-waste generation per person per day. The top 5 E-waste categories were then classified after the analysis. The category which ranked first is the office and telecommunications equipment that contained the 63.18% of the total generated E-waste. Second in ranking was the household appliances category with 21.13% composition. Third was the lighting devices category with 8.17%. Fourth on ranking was the consumer electronics and batteries category which was composed of 5.97% and fifth was the wires and cables category where it comprised the 1.41% of the average generated E-waste samples. One of the recommendations provided in this research is the implementation of the Pasig City Waste Advantage Card. The card can be used as a privilege card and earned points can be converted to avail of and enjoy services such as haircut, massage, dental services, medical check-up, and etc. Another recommendation raised is for the LGU to encourage a communication or dialogue with the technology and electronics manufacturers and distributors and international and local companies to plan the retrieval and disposal of the E-wastes in accordance with the Extended Producer Responsibility (EPR) policy where producers are given significant responsibilities for the treatment and disposal of post-consumer products.

Keywords: E-waste, E-WACS, E-waste characterization, electronic waste, electronic waste analysis

Procedia PDF Downloads 120
2531 Recovery of Polyphenolic Phytochemicals From Greek Grape Pomace (Vitis Vinifera L.)

Authors: Christina Drosou, Konstantina E. Kyriakopoulou, Andreas Bimpilas, Dimitrios Tsimogiannis, Magdalini C. Krokida

Abstract:

Rationale: Agiorgitiko is one of the most widely-grown and commercially well-established red wine varieties in Greece. Each year viticulture industry produces a large amount of waste consisting of grape skins and seeds (pomace) during a short period. Grapes contain polyphenolic compounds which are partially transferred to wine during winemaking. Therefore, winery wastes could be an alternative cheap source for obtaining such compounds with important antioxidant activity. Specifically, red grape waste contains anthocyanins and flavonols which are characterized by multiple biological activities, including cardioprotective, anti-inflammatory, anti-carcinogenic, antiviral and antibacterial properties attributed mainly to their antioxidant activity. Ultrasound assisted extraction (UAE) is considered an effective way to recover phenolic compounds, since it combines the advantage of mechanical effect with low temperature. Moreover, green solvents can be used in order to recover extracts intended for used in the food and nutraceutical industry. Apart from the extraction, pre-treatment process like drying can play an important role on the preservation of the grape pomace and the enhancement of its antioxidant capacity. Objective: The aim of this study is to recover natural extracts from winery waste with high antioxidant capacity using green solvents so they can be exploited and utilized as enhancers in food or nutraceuticals. Methods: Agiorgitiko grape pomace was dehydrated by air drying (AD) and accelerated solar drying (ASD) in order to explore the effect of the pre-treatment on the recovery of bioactive compounds. UAE was applied in untreated and dried samples using water and water: ethanol (1:1) as solvents. The total antioxidant potential and phenolic content of the extracts was determined using the 1,1-diphenyl-2-picrylhydrazyl (DPPH) radical scavenging assay and Folin-Ciocalteu method, respectively. Finally, the profile of anthocyanins and flavonols was specified using HPLC-DAD analysis. The efficiency of processes was determined in terms of extraction yield, antioxidant activity, phenolic content and the anthocyanins and flavovols profile. Results & Discussion: The experiments indicated that the pre-treatment was essential for the recovery of highly nutritious compounds from the pomace as long as the extracts samples showed higher phenolic content and antioxidant capacity. Water: ethanol (1:1) was considered a more effective solvent on the recovery of phenolic compounds. Moreover, ASD grape pomace extracted with the solvent system exhibited the highest antioxidant activity (IC50=0.36±0.01mg/mL) and phenolic content (TPC=172.68±0.01mgGAE/g dry extract), followed by AD and untreated pomace. The major compounds recovered were malvidin3-O-glucoside and quercetin3-O-glucoside according to the HPLC analysis. Conclusions: Winery waste can be exploited for the recovery of nutritious compounds using green solvents such as water or ethanol. The pretreatment of the pomace can significantly affect the concentration of phenolic compounds, while UAE is considered a highly effective extraction process.

Keywords: agiorgitico grape pomace, antioxidants, phenolic compounds, ultrasound assisted extraction

Procedia PDF Downloads 395