Search results for: malicious smart contracts
1246 Urban and Building Information Modeling’s Applications for Environmental Education: Case Study of Educational Campuses
Authors: Samar Alarif
Abstract:
Smart sustainable educational campuses are the latest paradigm of innovation in the education domain. Campuses become a hub for sustainable environmental innovations. University has a vital role in paving the road for digital transformations in the infrastructure domain by preparing skilled engineers and specialists. The open digital platform enables smart campuses to simulate real education experience by managing their infrastructure within the curriculums. Moreover, it allows the engagement between governments, businesses, and citizens to push for innovation and sustainable services. Urban and building information modeling platforms have recently attained widespread attention in smart campuses due to their applications and benefits for creating the campus's digital twin in the form of an open digital platform. Qualitative and quantitative strategies were used in directing this research to develop and validate the UIM/BIM platform benefits for smart campuses FM and its impact on the institution's sustainable vision. The research findings are based on literature reviews and case studies of the TU berlin El-Gouna campus. Textual data will be collected using semi-structured interviews with actors, secondary data like BIM course student projects, documents, and publications related to the campus actors. The study results indicated that UIM/BIM has several benefits for the smart campus. Universities can achieve better capacity-building by integrating all the actors in the UIM/BIM process. Universities would achieve their community outreach vision by launching an online outreach of UIM/BIM course for the academic and professional community. The UIM/BIM training courses would integrate students from different disciplines and alumni graduated as well as engineers and planners and technicians. Open platforms enable universities to build a partnership with the industry; companies should be involved in the development of BIM technology courses. The collaboration between academia and the industry would fix the gap, promote the academic courses to reply to the professional requirements, and transfer the industry's academic innovations. In addition to that, the collaboration between academia, industry, government vocational and training centers, and civil society should be promoted by co-creation workshops, a series of seminars, and conferences. These co-creation activities target the capacity buildings and build governmental strategies and policies to support expanding the sustainable innovations and to agree on the expected role of all the stakeholders to support the transformation.Keywords: smart city, smart educational campus, UIM, urban platforms, sustainable campus
Procedia PDF Downloads 1231245 Smart Kids Coacher: Model for Childhood Obesity in Thailand
Authors: Pornwipa Daoduong, Jairak Loysongkroa, Napaphan Viriyautsahakul, Wachira Pengjuntr
Abstract:
Obesity is on of serious health problem in many countries including Thailand where the prevalence of childhood obesity has increased from 8.8 % in 2014 to 9.5 % in 2015 and 12.9 % in 2016. The Ministry of Public Health’s objective is to reduce prevalence of childhood Obesity to 10% or lower in 2017, by implementing the measure in relation to nutrition, physical activity (PA) and environment in 6,405 targeted school with proportion of school children with obesity is higher than 10 %. Smart Kids Coacher (SKC)” is a new innovative intervention created by Department of Health and consists of 252 regional and provincial officers. The SKC aims to train the super trainers about food and nutrition.PA and emotional control through implementing three learning activities including 1) Food for Fun is about Nutrition flag, Nutrition label, food portion and Nutrition surveillance; 2) Fun for Fit includes intermediated- and advanced level workouts within 60 minutes such as kangaroo dance, Chair stretching; and 3) Control emotional is about to prevent probability of access to unhealthy food, to ensure for having meal in appropriate time, and to recruit peers and family member to increase awareness among target groups. Apart from providing SKC lesson for 3,828 officers at district level, a number of students (2,176) as role model are selected through implementing “Smart Kids Leader: (SKL)”.Consequently. The SKC lowers proportion of childhood obesity from 17% in 2012 to 12.9% in 2016. Further, the SKC coverage should be expanded to other setting. Policy maker should be aware of the important of reduction of the prevalence of childhood obesity, and it’s related risk. Network and Collaboration between stakeholders are essential as well as an improvement of holistic intervention and knowledge “NuPETHS” for kids in the future.Keywords: childhood obesity, model, obesity, smart kids coacher
Procedia PDF Downloads 2441244 The Significance of Islamic Concept of Good Faith to Cure Flaws in Public International Law
Authors: M. A. H. Barry
Abstract:
The concept of Good faith (husn al-niyyah) and fair-dealing (Nadl) are the fundamental guiding elements in all contracts and other agreements under Islamic law. The preaching of Al-Quran and Prophet Muhammad’s (Peace Be upon Him) firmly command people to act in good faith in all dealings. There are several Quran verses and the Prophet’s saying which stressed the significance of dealing honestly and fairly in all transactions. Under the English law, the good faith is not considered a fundamental requirement for the formation of a legal contract. However, the concept of Good Faith in private contracts is recognized by the civil law system and in Article 7(1) of the Convention on International Sale of Goods (CISG-Vienna Convention-1980). It took several centuries for the international trading community to recognize the significance of the concept of good faith for the international sale of goods transactions. Nevertheless, the recognition of good faith in Civil law is only confined for the commercial contracts. Subsequently to the CISG, this concept has made inroads into the private international law. There are submissions in favour of applying the good faith concept to public international law based on tacit recognition by the international conventions and International Tribunals. However, under public international law the concept of good faith is not recognized as a source of rights or obligations. This weakens the spirit of the good faith concept, particularly when determining the international disputes. This also creates a fundamental flaw because the absence of good faith application means the breaches tainted by bad faith are tolerated. The objective of this research is to evaluate, examine and analyze the application of the concept of good faith in the modern laws and identify its limitation, in comparison with Islamic concept of good faith. This paper also identifies the problems and issues connected with the non-application of this concept to public international law. This research consists of three key components (1) the preliminary inquiry (2) subject analysis and discovery of research results, and (3) examining the challenging problems, and concluding with proposals. The preliminary inquiry is based on both the primary and secondary sources. The same sources are used for the subject analysis. This research also has both inductive and deductive features. The Islamic concept of good faith covers all situations and circumstances where the bad faith causes unfairness to the affected parties, especially the weak parties. Under the Islamic law, the concept of good faith is a source of rights and obligations as Islam prohibits any person committing wrongful or delinquent acts in any dealing whether in a private or public life. This rule is applicable not only for individuals but also for institutions, states, and international organizations. This paper explains how the unfairness is caused by non-recognition of the good faith concept as a source of rights or obligations under public international law and provides legal and non-legal reasons to show why the Islamic formulation is important.Keywords: good faith, the civil law system, the Islamic concept, public international law
Procedia PDF Downloads 1471243 A Distributed Mobile Agent Based on Intrusion Detection System for MANET
Authors: Maad Kamal Al-Anni
Abstract:
This study is about an algorithmic dependence of Artificial Neural Network on Multilayer Perceptron (MPL) pertaining to the classification and clustering presentations for Mobile Adhoc Network vulnerabilities. Moreover, mobile ad hoc network (MANET) is ubiquitous intelligent internetworking devices in which it has the ability to detect their environment using an autonomous system of mobile nodes that are connected via wireless links. Security affairs are the most important subject in MANET due to the easy penetrative scenarios occurred in such an auto configuration network. One of the powerful techniques used for inspecting the network packets is Intrusion Detection System (IDS); in this article, we are going to show the effectiveness of artificial neural networks used as a machine learning along with stochastic approach (information gain) to classify the malicious behaviors in simulated network with respect to different IDS techniques. The monitoring agent is responsible for detection inference engine, the audit data is collected from collecting agent by simulating the node attack and contrasted outputs with normal behaviors of the framework, whenever. In the event that there is any deviation from the ordinary behaviors then the monitoring agent is considered this event as an attack , in this article we are going to demonstrate the signature-based IDS approach in a MANET by implementing the back propagation algorithm over ensemble-based Traffic Table (TT), thus the signature of malicious behaviors or undesirable activities are often significantly prognosticated and efficiently figured out, by increasing the parametric set-up of Back propagation algorithm during the experimental results which empirically shown its effectiveness for the ratio of detection index up to 98.6 percentage. Consequently it is proved in empirical results in this article, the performance matrices are also being included in this article with Xgraph screen show by different through puts like Packet Delivery Ratio (PDR), Through Put(TP), and Average Delay(AD).Keywords: Intrusion Detection System (IDS), Mobile Adhoc Networks (MANET), Back Propagation Algorithm (BPA), Neural Networks (NN)
Procedia PDF Downloads 1941242 Intrusion Detection in SCADA Systems
Authors: Leandros A. Maglaras, Jianmin Jiang
Abstract:
The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI). The paradox is that CIs massively rely on the newest interconnected and vulnerable Information and Communication Technology (ICT), whilst the control equipment, legacy software/hardware, is typically old. Such a combination of factors may lead to very dangerous situations, exposing systems to a wide variety of attacks. To overcome such threats, the CockpitCI project combines machine learning techniques with ICT technologies to produce advanced intrusion detection, analysis and reaction tools to provide intelligence to field equipment. This will allow the field equipment to perform local decisions in order to self-identify and self-react to abnormal situations introduced by cyberattacks. In this paper, an intrusion detection module capable of detecting malicious network traffic in a Supervisory Control and Data Acquisition (SCADA) system is presented. Malicious data in a SCADA system disrupt its correct functioning and tamper with its normal operation. OCSVM is an intrusion detection mechanism that does not need any labeled data for training or any information about the kind of anomaly is expecting for the detection process. This feature makes it ideal for processing SCADA environment data and automates SCADA performance monitoring. The OCSVM module developed is trained by network traces off line and detects anomalies in the system real time. The module is part of an IDS (intrusion detection system) developed under CockpitCI project and communicates with the other parts of the system by the exchange of IDMEF messages that carry information about the source of the incident, the time and a classification of the alarm.Keywords: cyber-security, SCADA systems, OCSVM, intrusion detection
Procedia PDF Downloads 5521241 Iot-Based Interactive Patient Identification and Safety Management System
Authors: Jonghoon Chun, Insung Kim, Jonghyun Lim, Gun Ro
Abstract:
We believe that it is possible to provide a solution to reduce patient safety accidents by displaying correct medical records and prescription information through interactive patient identification. Our system is based on the use of smart bands worn by patients and these bands communicate with the hybrid gateways which understand both BLE and Wifi communication protocols. Through the convergence of low-power Bluetooth (BLE) and hybrid gateway technology, which is one of short-range wireless communication technologies, we implement ‘Intelligent Patient Identification and Location Tracking System’ to prevent medical malfunction frequently occurring in medical institutions. Based on big data and IOT technology using MongoDB, smart band (BLE, NFC function) and hybrid gateway, we develop a system to enable two-way communication between medical staff and hospitalized patients as well as to store locational information of the patients in minutes. Based on the precise information provided using big data systems, such as location tracking and movement of in-hospital patients wearing smart bands, our findings include the fact that a patient-specific location tracking algorithm can more efficiently operate HIS (Hospital Information System) and other related systems. Through the system, we can always correctly identify patients using identification tags. In addition, the system automatically determines whether the patient is a scheduled for medical service by the system in use at the medical institution, and displays the appropriateness of the medical treatment and the medical information (medical record and prescription information) on the screen and voice. This work was supported in part by the Korea Technology and Information Promotion Agency for SMEs (TIPA) grant funded by the Korean Small and Medium Business Administration (No. S2410390).Keywords: BLE, hybrid gateway, patient identification, IoT, safety management, smart band
Procedia PDF Downloads 3111240 Email Based Global Automation with Raspberry Pi and Control Circuit Module: Development of Smart Home Application
Authors: Lochan Basyal
Abstract:
Global Automation is an emerging technology of today’s era and is based on Internet of Things (IoT). Global automation deals with the controlling of electrical appliances throughout the world. The fabrication of this system has been carried out with interfacing an electrical control system module to Raspberry Pi. An electrical control system module includes a relay driver mechanism through which appliances are controlled automatically in respective condition. In this research project, one email ID has been assigned to Raspberry Pi, and the users from different location having different email ID can mail to Raspberry Pi on assigned email address “[email protected]” with subject heading “Device Control” with predefined command on compose email line. Also, a notification regarding current working condition of this system has been updated on respective user email ID. This approach is an innovative way of implementing smart automation system through which a user can control their electrical appliances like light, fan, television, refrigerator, etc. in their home with the use of email facility. The development of this project helps to enhance the concept of smart home application as well as industrial automation.Keywords: control circuit, e-mail, global automation, internet of things, IOT, Raspberry Pi
Procedia PDF Downloads 1671239 A Study on User Authentication Method Using Haptic Actuator and Security Evaluation
Authors: Yo Han Choi, Hee Suk Seo, Seung Hwan Ju, Sung Hyu Han
Abstract:
As currently various portable devices were launched, smart business conducted using them became common. Since smart business can use company-internal resources in an external remote place, user authentication that can identify authentic users is an important factor. Commonly used user authentication is a method of using user ID and Password. In the user authentication using ID and Password, the user should see and enter authentication information him or herself. In this user authentication system depending on the user’s vision, there is the threat of password leaks through snooping in the process which the user enters his or her authentication information. This study designed and produced a user authentication module using an actuator to respond to the snooping threat.Keywords: actuator, user authentication, security evaluation, haptic actuator
Procedia PDF Downloads 3461238 Optimal Power Distribution and Power Trading Control among Loads in a Smart Grid Operated Industry
Authors: Vivek Upadhayay, Siddharth Deshmukh
Abstract:
In recent years utilization of renewable energy sources has increased majorly because of the increase in global warming concerns. Organization these days are generally operated by Micro grid or smart grid on a small level. Power optimization and optimal load tripping is possible in a smart grid based industry. In any plant or industry loads can be divided into different categories based on their importance to the plant and power requirement pattern in the working days. Coming up with an idea to divide loads in different such categories and providing different power management algorithm to each category of load can reduce the power cost and can come handy in balancing stability and reliability of power. An objective function is defined which is subjected to a variable that we are supposed to minimize. Constraint equations are formed taking difference between the power usages pattern of present day and same day of previous week. By considering the objectives of minimal load tripping and optimal power distribution the proposed problem formulation is a multi-object optimization problem. Through normalization of each objective function, the multi-objective optimization is transformed to single-objective optimization. As a result we are getting the optimized values of power required to each load for present day by use of the past values of the required power for the same day of last week. It is quite a demand response scheduling of power. These minimized values then will be distributed to each load through an algorithm used to optimize the power distribution at a greater depth. In case of power storage exceeding the power requirement, profit can be made by selling exceeding power to the main grid.Keywords: power flow optimization, power trading enhancement, smart grid, multi-object optimization
Procedia PDF Downloads 5251237 An Automated Business Process Management for Smart Medical Records
Authors: K. Malak, A. Nourah, S.Liyakathunisa
Abstract:
Nowadays, healthcare services are facing many challenges since they are becoming more complex and more needed. Every detail of a patient’s interactions with health care providers is maintained in Electronic Health Records (ECR) and Healthcare information systems (HIS). However, most of the existing systems are often focused on documenting what happens in manual health care process, rather than providing the highest quality patient care. Healthcare business processes and stakeholders can no longer rely on manual processes, to provide better patient care and efficient utilization of resources, Healthcare processes must be automated wherever it is possible. In this research, a detail survey and analysis is performed on the existing health care systems in Saudi Arabia, and an automated smart medical healthcare business process model is proposed. The business process management methods and rules are followed in discovering, collecting information, analysis, redesign, implementation and performance improvement analysis in terms of time and cost. From the simulation results, it is evident that our proposed smart medical records system can improve the quality of the service by reducing the time and cost and increasing efficiencyKeywords: business process management, electronic health records, efficiency, cost, time
Procedia PDF Downloads 3411236 Measurements for Risk Analysis and Detecting Hazards by Active Wearables
Authors: Werner Grommes
Abstract:
Intelligent wearables (illuminated vests or hand and foot-bands, smart watches with a laser diode, Bluetooth smart glasses) overflow the market today. They are integrated with complex electronics and are worn very close to the body. Optical measurements and limitation of the maximum light density are needed. Smart watches are equipped with a laser diode or control different body currents. Special glasses generate readable text information that is received via radio transmission. Small high-performance batteries (lithium-ion/polymer) supply the electronics. All these products have been tested and evaluated for risk. These products must, for example, meet the requirements for electromagnetic compatibility as well as the requirements for electromagnetic fields affecting humans or implant wearers. Extensive analyses and measurements were carried out for this purpose. Many users are not aware of these risks. The result of this study should serve as a suggestion to do it better in the future or simply to point out these risks. Commercial LED warning vests, LED hand and foot-bands, illuminated surfaces with inverter (high voltage), flashlights, smart watches, and Bluetooth smart glasses were checked for risks. The luminance, the electromagnetic emissions in the low-frequency as well as in the high-frequency range, audible noises, and nervous flashing frequencies were checked by measurements and analyzed. Rechargeable lithium-ion or lithium-polymer batteries can burn or explode under special conditions like overheating, overcharging, deep discharge or using out of the temperature specification. Some risk analysis becomes necessary. The result of this study is that many smart wearables are worn very close to the body, and an extensive risk analysis becomes necessary. Wearers of active implants like a pacemaker or implantable cardiac defibrillator must be considered. If the wearable electronics include switching regulators or inverter circuits, active medical implants in the near field can be disturbed. A risk analysis is necessary.Keywords: safety and hazards, electrical safety, EMC, EMF, active medical implants, optical radiation, illuminated warning vest, electric luminescent, hand and head lamps, LED, e-light, safety batteries, light density, optical glare effects
Procedia PDF Downloads 1101235 Application of Monitoring of Power Generation through GPRS Network in Rural Residênias Cabo Frio/Rj
Authors: Robson C. Santos, David D. Oliveira, Matheus M. Reis, Gerson G. Cunha, Marcos A. C. Moreira
Abstract:
The project demonstrates the construction of a solar power generation, integrated inverter equipment to a "Grid-Tie" by converting direct current generated by solar panels, into alternating current, the same parameters of frequency and voltage concessionaire distribution network. The energy generated is quantified by smart metering module that transmits the information in specified periods of time to a microcontroller via GSM modem. The modem provides the measured data on the internet, using networks and cellular antennas. The monitoring, fault detection and maintenance are performed by a supervisory station. Employed board types, best inverter selection and studies about control equipment and devices have been described. The article covers and explores the global trend of implementing smart distribution electrical energy networks and the incentive to use solar renewable energy. There is the possibility of the excess energy produced by the system be purchased by the local power utility. This project was implemented in residences in the rural community of the municipality of Cabo Frio/RJ. Data could be seen through daily measurements during the month of November 2013.Keywords: rural residence, supervisory, smart grid, solar energy
Procedia PDF Downloads 5931234 Human Rights in Cross-Border Surrogacy: An Exploratory Study Applied to Surrogacy Facilitators
Authors: Yingyi Luo
Abstract:
Cross-border commercial surrogacy, where Australians travel overseas to access reproduction through a surrogate mother, is an increasing phenomenon. This paper focuses on the role of Australian surrogacy facilitators, including lawyers, non-for-profit agents, fertility counselors, who act as intermediaries managing cross-border surrogacy arrangements in Australia. It explores the extent to which surrogacy facilitators are concerned with the human rights of children born through cross-border surrogacy, surrogate mothers in developing countries, and intended parents. Commercial surrogacy is a matter that is often cast in the language of human rights. This paper will contribute to an in-depth understanding of the dynamics between intended parents, surrogates, and surrogacy facilitators by adopting a human rights framework to inform data analysis regarding the role of facilitators. The purpose of this research is to inform debate and discussion on law reform related to surrogacy. This paper presented here centers on interviews with surrogacy facilitators in Australia and non-participant observations in Australia to generate thick, empirical data about the fertility industry. The data showed that the process of facilitating surrogacy arrangements had prompted facilitators to form a view on human rights as they applied to their works. Although facilitators claimed that the right of intended parents, surrogate mothers, and children were all taken into consideration, the researcher observed that the commercial surrogacy contracts described by these facilitators favored the interests of intended parents with the baby acting as their unique selling point. The interests and needs of surrogate mothers were not prioritized in the views or actions of facilitators. The result was a commercial transaction that entailed the purchase, through cross-border surrogacy, of a child, as a commodity, by relatively affluent intended parents from disadvantaged surrogate mothers through unfair contracts.Keywords: cross-border surrogacy, facilitators, human rights, surrogacy
Procedia PDF Downloads 1161233 A Literature Study on IoT Based Monitoring System for Smart Agriculture
Authors: Sonu Rana, Jyoti Verma, A. K. Gautam
Abstract:
In most developing countries like India, the majority of the population heavily relies on agriculture for their livelihood. The yield of agriculture is heavily dependent on uncertain weather conditions like a monsoon, soil fertility, availability of irrigation facilities and fertilizers as well as support from the government. The agricultural yield is quite less compared to the effort put in due to inefficient agricultural facilities and obsolete farming practices on the one hand and lack of knowledge on the other hand, and ultimately agricultural community does not prosper. It is therefore essential for the farmers to improve their harvest yield by the acquisition of related data such as soil condition, temperature, humidity, availability of irrigation facilities, availability of, manure, etc., and adopt smart farming techniques using modern agricultural equipment. Nowadays, using IOT technology in agriculture is the best solution to improve the yield with fewer efforts and economic costs. The primary focus of this work-related is IoT technology in the agriculture field. By using IoT all the parameters would be monitored by mounting sensors in an agriculture field held at different places, will collect real-time data, and could be transmitted by a transmitting device like an antenna. To improve the system, IoT will interact with other useful systems like Wireless Sensor Networks. IoT is exploring every aspect, so the radio frequency spectrum is getting crowded due to the increasing demand for wireless applications. Therefore, Federal Communications Commission is reallocating the spectrum for various wireless applications. An antenna is also an integral part of the newly designed IoT devices. The main aim is to propose a new antenna structure used for IoT agricultural applications and compatible with this new unlicensed frequency band. The main focus of this paper is to present work related to these technologies in the agriculture field. This also presented their challenges & benefits. It can help in understanding the job of data by using IoT and correspondence advancements in the horticulture division. This will help to motivate and educate the unskilled farmers to comprehend the best bits of knowledge given by the huge information investigation utilizing smart technology.Keywords: smart agriculture, IoT, agriculture technology, data analytics, smart technology
Procedia PDF Downloads 1161232 Security Analysis of SIMSec Protocol
Authors: Kerem Ok, Cem Cevikbas, Vedat Coskun, Mohammed Alsadi, Busra Ozdenizci
Abstract:
Un-keyed SIM cards do not contain the required security infrastructure to provide end-to-end encryption with Service Providers. Hence, new, emerging, or smart services those require end-to-end encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform end-to-end data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol.Keywords: End-to-end encryption, key exchange, SIM card, smart card
Procedia PDF Downloads 2841231 Intelligent IT Infrastructure in the Gas and Oil Industry
Authors: Ahmad Fahad Alotaibi, Khalid Hamed Hajri, Humoud Hudiban Rashidi
Abstract:
Intelligent information technology infrastructure is considered one of the enablers to enhance digital transformation in the gas and oil fields to optimize IT infrastructure reliability by supporting operations and maintenance in a safe and secure method to optimize resources. Smart IT buildings, communication rooms and shelters with intelligent technologies can strengthen the performance and profitability of gas and oil companies by ensuring business continuity. This paper describes the advantages of deploying intelligent IT infrastructure in the oil and gas industry by illustrating its positive impacts on some development aspects, for instance, operations, maintenance, safety, security and resource optimization. Moreover, it highlights the challenges and difficulties of providing smart IT services in a remote area and proposes solutions to overcome such difficulties.Keywords: intelligent IT infrastructure, remote areas, oil and gas field, digitalization
Procedia PDF Downloads 601230 Smart Material for Bacterial Detection Based on Polydiacetylene/Polyvinyl Butyrate Fiber Composites
Authors: Pablo Vidal, Misael Martinez, Carlos Hernandez, Ananta R. Adhikari, Luis Materon, Yuanbing Mao, Karen Lozano
Abstract:
Conjugated polymers are smart materials that show tremendous practical applications in diverse subjects. Polydiacetylenes are conjugated polymers with special optical properties. In response to the environmental changes such as pH and molecular binding, it changes its color. Such an interesting chromic and emissive behavior of polydiacetylenes make them a highly popular polymer in wide areas, including biomedicine such as a biosensor. In this research, we used polyvinyl butyrate as a matrix to fibrillate polydiacetylenes. We initially prepared polyvinyl butyrate/diacetylene matrix using forcespinning technique. They were then polymerized to form polyvinyl butyrate/polydiacetylene (PVB/PDA). These matrices then studied for their bio-sensing response to gram-positive and gram-negative bacteria. The sensing ability of the PVB/PDA biosensor was observed as early as 30 min in the presence of bacteria at 37°C. Now our effort is to decrease this effective temperature to room temperature to make this device applicable in the general daily life. These chromic biosensors will find extensive application not only alert the infection but also find other promising applications such as wearable sensors and diagnostic systems.Keywords: smart material, conjugated polymers, biosensor, polyvinyl butyrate/polydiacetylene
Procedia PDF Downloads 1281229 Resisting Adversarial Assaults: A Model-Agnostic Autoencoder Solution
Authors: Massimo Miccoli, Luca Marangoni, Alberto Aniello Scaringi, Alessandro Marceddu, Alessandro Amicone
Abstract:
The susceptibility of deep neural networks (DNNs) to adversarial manipulations is a recognized challenge within the computer vision domain. Adversarial examples, crafted by adding subtle yet malicious alterations to benign images, exploit this vulnerability. Various defense strategies have been proposed to safeguard DNNs against such attacks, stemming from diverse research hypotheses. Building upon prior work, our approach involves the utilization of autoencoder models. Autoencoders, a type of neural network, are trained to learn representations of training data and reconstruct inputs from these representations, typically minimizing reconstruction errors like mean squared error (MSE). Our autoencoder was trained on a dataset of benign examples; learning features specific to them. Consequently, when presented with significantly perturbed adversarial examples, the autoencoder exhibited high reconstruction errors. The architecture of the autoencoder was tailored to the dimensions of the images under evaluation. We considered various image sizes, constructing models differently for 256x256 and 512x512 images. Moreover, the choice of the computer vision model is crucial, as most adversarial attacks are designed with specific AI structures in mind. To mitigate this, we proposed a method to replace image-specific dimensions with a structure independent of both dimensions and neural network models, thereby enhancing robustness. Our multi-modal autoencoder reconstructs the spectral representation of images across the red-green-blue (RGB) color channels. To validate our approach, we conducted experiments using diverse datasets and subjected them to adversarial attacks using models such as ResNet50 and ViT_L_16 from the torch vision library. The autoencoder extracted features used in a classification model, resulting in an MSE (RGB) of 0.014, a classification accuracy of 97.33%, and a precision of 99%.Keywords: adversarial attacks, malicious images detector, binary classifier, multimodal transformer autoencoder
Procedia PDF Downloads 1121228 Comparative Study of Ad Hoc Routing Protocols in Vehicular Ad-Hoc Networks for Smart City
Authors: Khadija Raissi, Bechir Ben Gouissem
Abstract:
In this paper, we perform the investigation of some routing protocols in Vehicular Ad-Hoc Network (VANET) context. Indeed, we study the efficiency of protocols like Dynamic Source Routing (DSR), Ad hoc On-demand Distance Vector Routing (AODV), Destination Sequenced Distance Vector (DSDV), Optimized Link State Routing convention (OLSR) and Vehicular Multi-hop algorithm for Stable Clustering (VMASC) in terms of packet delivery ratio (PDR) and throughput. The performance evaluation and comparison between the studied protocols shows that the VMASC is the best protocols regarding fast data transmission and link stability in VANETs. The validation of all results is done by the NS3 simulator.Keywords: VANET, smart city, AODV, OLSR, DSR, OLSR, VMASC, routing protocols, NS3
Procedia PDF Downloads 2971227 OSEME: A Smart Learning Environment for Music Education
Authors: Konstantinos Sofianos, Michael Stefanidakis
Abstract:
Nowadays, advances in information and communication technologies offer a range of opportunities for new approaches, methods, and tools in the field of education and training. Teacher-centered learning has changed to student-centered learning. E-learning has now matured and enables the design and construction of intelligent learning systems. A smart learning system fully adapts to a student's needs and provides them with an education based on their preferences, learning styles, and learning backgrounds. It is a wise friend and available at any time, in any place, and with any digital device. In this paper, we propose an intelligent learning system, which includes an ontology with all elements of the learning process (learning objects, learning activities) and a massive open online course (MOOC) system. This intelligent learning system can be used in music education.Keywords: intelligent learning systems, e-learning, music education, ontology, semantic web
Procedia PDF Downloads 3111226 The Evolution of Amazon Alexa: From Voice Assistant to Smart Home Hub
Authors: Abrar Abuzaid, Maha Alaaeddine, Haya Alesayi
Abstract:
This project is centered around understanding the usage and impact of Alexa, Amazon's popular virtual assistant, in everyday life. Alexa, known for its integration into devices like Amazon Echo, offers functionalities such as voice interaction, media control, providing real-time information, and managing smart home devices. Our primary focus is to conduct a straightforward survey aimed at uncovering how people use Alexa in their daily routines. We plan to reach out to a wide range of individuals to get a diverse perspective on how Alexa is being utilized for various tasks, the frequency and context of its use, and the overall user experience. The survey will explore the most common uses of Alexa, its impact on daily life, features that users find most beneficial, and improvements they are looking for. This project is not just about collecting data but also about understanding the real-world applications of a technology like Alexa and how it fits into different lifestyles. By examining the responses, we aim to gain a practical understanding of Alexa's role in homes and possibly in workplaces. This project will provide insights into user satisfaction and areas where Alexa could be enhanced to meet the evolving needs of its users. It’s a step towards connecting technology with everyday life, making it more accessible and user-friendlyKeywords: Amazon Alexa, artificial intelligence, smart speaker, natural language processing
Procedia PDF Downloads 621225 Legal Considerations in Fashion Modeling: Protecting Models' Rights and Ensuring Ethical Practices
Authors: Fatemeh Noori
Abstract:
The fashion industry is a dynamic and ever-evolving realm that continuously shapes societal perceptions of beauty and style. Within this industry, fashion modeling plays a crucial role, acting as the visual representation of brands and designers. However, behind the glamorous façade lies a complex web of legal considerations that govern the rights, responsibilities, and ethical practices within the field. This paper aims to explore the legal landscape surrounding fashion modeling, shedding light on key issues such as contract law, intellectual property, labor rights, and the increasing importance of ethical considerations in the industry. Fashion modeling involves the collaboration of various stakeholders, including models, designers, agencies, and photographers. To ensure a fair and transparent working environment, it is imperative to establish a comprehensive legal framework that addresses the rights and obligations of each party involved. One of the primary legal considerations in fashion modeling is the contractual relationship between models and agencies. Contracts define the terms of engagement, including payment, working conditions, and the scope of services. This section will delve into the essential elements of modeling contracts, the negotiation process, and the importance of clarity to avoid disputes. Models are not just individuals showcasing clothing; they are integral to the creation and dissemination of artistic and commercial content. Intellectual property rights, including image rights and the use of a model's likeness, are critical aspects of the legal landscape. This section will explore the protection of models' image rights, the use of their likeness in advertising, and the potential for unauthorized use. Models, like any other professionals, are entitled to fair and ethical treatment. This section will address issues such as working conditions, hours, and the responsibility of agencies and designers to prioritize the well-being of models. Additionally, it will explore the global movement toward inclusivity, diversity, and the promotion of positive body image within the industry. The fashion industry has faced scrutiny for perpetuating harmful standards of beauty and fostering a culture of exploitation. This section will discuss the ethical responsibilities of all stakeholders, including the promotion of diversity, the prevention of exploitation, and the role of models as influencers for positive change. In conclusion, the legal considerations in fashion modeling are multifaceted, requiring a comprehensive approach to protect the rights of models and ensure ethical practices within the industry. By understanding and addressing these legal aspects, the fashion industry can create a more transparent, fair, and inclusive environment for all stakeholders involved in the art of modeling.Keywords: fashion modeling contracts, image rights in modeling, labor rights for models, ethical practices in fashion, diversity and inclusivity in modeling
Procedia PDF Downloads 771224 Limit State of Heterogeneous Smart Structures under Unknown Cyclic Loading
Authors: M. Chen, S-Q. Zhang, X. Wang, D. Tate
Abstract:
This paper presents a numerical solution, namely limit and shakedown analysis, to predict the safety state of smart structures made of heterogeneous materials under unknown cyclic loadings, for instance, the flexure hinge in the micro-positioning stage driven by piezoelectric actuator. In combination of homogenization theory and finite-element method (FEM), the safety evaluation problem is converted to a large-scale nonlinear optimization programming for an acceptable bounded loading as the design reference. Furthermore, a general numerical scheme integrated with the FEM and interior-point-algorithm based optimization tool is developed, which makes the practical application possible.Keywords: limit state, shakedown analysis, homogenization, heterogeneous structure
Procedia PDF Downloads 3391223 Lightweight and Seamless Distributed Scheme for the Smart Home
Authors: Muhammad Mehran Arshad Khan, Chengliang Wang, Zou Minhui, Danyal Badar Soomro
Abstract:
Security of the smart home in terms of behavior activity pattern recognition is a totally dissimilar and unique issue as compared to the security issues of other scenarios. Sensor devices (low capacity and high capacity) interact and negotiate each other by detecting the daily behavior activity of individuals to execute common tasks. Once a device (e.g., surveillance camera, smart phone and light detection sensor etc.) is compromised, an adversary can then get access to a specific device and can damage daily behavior activity by altering the data and commands. In this scenario, a group of common instruction processes may get involved to generate deadlock. Therefore, an effective suitable security solution is required for smart home architecture. This paper proposes seamless distributed Scheme which fortifies low computational wireless devices for secure communication. Proposed scheme is based on lightweight key-session process to upheld cryptic-link for trajectory by recognizing of individual’s behavior activities pattern. Every device and service provider unit (low capacity sensors (LCS) and high capacity sensors (HCS)) uses an authentication token and originates a secure trajectory connection in network. Analysis of experiments is revealed that proposed scheme strengthens the devices against device seizure attack by recognizing daily behavior activities, minimum utilization memory space of LCS and avoids network from deadlock. Additionally, the results of a comparison with other schemes indicate that scheme manages efficiency in term of computation and communication.Keywords: authentication, key-session, security, wireless sensors
Procedia PDF Downloads 3181222 Smart Food Packaging Using Natural Dye and Nanoclay as a Meat Freshness Indicator
Authors: Betina Luiza Koop, Lenilton Santos Soares, Karina Cesca, Germán Ayala Valencia, Alcilene Rodrigues Monteiro
Abstract:
Active and smart food packaging has been studied to control and extend the food shelf-life. However, active compounds such as anthocyanins (ACNs) are unstable to high temperature, light, and pH changes. Several alternatives to stabilize and protect the anthocyanins have been researched, such as adsorption on nanoclays. Thus, this work aimed to stabilize anthocyanin extracted from jambolan fruit (Syzygium cumini), a noncommercial fruit, to development of food package sensors. The anthocyanin extract from jambolan pulp was concentrated by ultrafiltration and adsorbed on montmorillonite. The final biohybrid material was characterized by pH and color. Anthocyanins were adsorbed on nanoclay at pH 1.5, 2.5, and 3.5 and temperatures of 10 and 20 °C. The highest adsorption values were obtained at low pH at high temperatures. The color and antioxidant activity of the biohybrid was maintained for 60 days. A test of the color stability at pH from 1 to 13, simulating spoiled food using ammonia vapor, was performed. At pH from 1 to 5, the ACNs pink color was maintained, indicating that the flavylium cation form was preserved. At pH 13, the biohybrid presented yellow color due to the ACN oxidation. These results showed that the biohybrid material developed has potential application as a sensor to indicate the freshness of meat products.Keywords: anthocyanin, biohybrid, food, smart packaging
Procedia PDF Downloads 721221 Design of Permanent Sensor Fault Tolerance Algorithms by Sliding Mode Observer for Smart Hybrid Powerpack
Authors: Sungsik Jo, Hyeonwoo Kim, Iksu Choi, Hunmo Kim
Abstract:
In the SHP, LVDT sensor is for detecting the length changes of the EHA output, and the thrust of the EHA is controlled by the pressure sensor. Sensor is possible to cause hardware fault by internal problem or external disturbance. The EHA of SHP is able to be uncontrollable due to control by feedback from uncertain information, on this paper; the sliding mode observer algorithm estimates the original sensor output information in permanent sensor fault. The proposed algorithm shows performance to recovery fault of disconnection and short circuit basically, also the algorithm detect various of sensor fault mode.Keywords: smart hybrid powerpack (SHP), electro hydraulic actuator (EHA), permanent sensor fault tolerance, sliding mode observer (SMO), graphic user interface (GUI)
Procedia PDF Downloads 5481220 Artificial Intelligence in Duolingo
Authors: Jwana Khateeb, Lamar Bawazeer, Hayat Sharbatly, Mozoun Alghamdi
Abstract:
This research paper explores the idea of learning new languages through an innovative-mobile based learning technology. Throughout this paper we will discuss and examine a mobile-based application called Duolingo. Duolingo is a college standard application for learning foreign languages such as Spanish and English. It is a smart application where it uses smart adaptive technologies to advance the level of their students at each period of time by offering new tasks. Furthermore, we will discuss the history of the application and the methodology used within it. We have conducted a study in which we surveyed ten people about their experience using Duolingo. The results are examined and analyzed in which it indicates the effectiveness on Duolingo students who are seeking to learn new languages. Thus, the research paper will furthermore discuss the diverse methods and approaches in learning new languages through this mobile-based application.Keywords: Duolingo, AI, personalized, customized
Procedia PDF Downloads 2891219 Ethical Concerns in the Internet of Things and Smart Devices: Case Studies and Analysis
Authors: Mitchell Browe, Oriehi Destiny Anyaiwe, Zahraddeen Gwarzo
Abstract:
The Internet of Things (IoT) is a major evolution of technology and of the internet, which has the power to revolutionize the way people live. IoT has the power to change the way people interact with each other and with their homes; It has the ability to give people new ways to interact with and monitor their health; It can alter socioeconomic landscapes by providing new and efficient methods of resource management, saving time and money for both individuals and society as a whole; It even has the potential to save lives through autonomous vehicle technology and smart security measures. Unfortunately, nearly every revolution bears challenges which must be addressed to minimize harm by the new technology upon its adopters. IoT represents an internet technology revolution which has the potential to risk privacy, safety, and security of its users, should devices be developed, implemented, or utilized improperly. This article examines past and current examples of these ethical faults in an attempt to highlight the importance of consumer awareness of potential dangers of these technologies in making informed purchasing and utilization decisions, as well as to reveal how deficiencies and limitations of IoT devices should be better addressed by both companies and by regulatory bodies. Aspects such as consumer trust, corporate transparency, and misuse of individual data are all factors in the implementation of proper ethical boundaries in the IoT.Keywords: IoT, ethical concerns, privacy, safety, security, smart devices
Procedia PDF Downloads 851218 A Lightweight Authentication and Key Exchange Protocol Design for Smart Homes
Authors: Zhifu Li, Lei Li, Wanting Zhou, Yuanhang He
Abstract:
This paper proposed a lightweight certificate-less authentication and key exchange protocol (Light-CL-PKC) based on elliptic curve cryptography and the Chinese Remainder Theorem for smart home scenarios. Light-CL-PKC can efficiently reduce the computational cost of both sides of authentication by forgoing time-consuming bilinear pair operations and making full use of point-addition and point-multiplication operations on elliptic curves. The authentication and key exchange processes in this system are also completed in a a single round of communication between the two parties. The analysis result demonstrates that it can significantly minimize the communication overhead of more than 32.14% compared with the referenced protocols, while the runtime for both authentication and key exchange have also been significantly reduced.Keywords: authentication, key exchange, certificateless public key cryptography, elliptic curve cryptography
Procedia PDF Downloads 981217 Fractional Order Controller Design for Vibration Attenuation in an Airplane Wing
Authors: Birs Isabela, Muresan Cristina, Folea Silviu, Prodan Ovidiu
Abstract:
The wing is one of the most important parts of an airplane because it ensures stability, sustenance and maneuverability of the airplane. Because of its shape, the airplane wing can be simplified to a smart beam. Active vibration suppression is realized using piezoelectric actuators that are mounted on the surface of the beam. This work presents a tuning procedure of fractional order controllers based on a graphical approach of the frequency domain representation. The efficacy of the method is proven by practically testing the controller on a laboratory scale experimental stand.
Keywords: fractional order control, piezoelectric actuators, smart beam, vibration suppression
Procedia PDF Downloads 314