Search results for: halal integrity
395 Investigating Message Timing Side Channel Attacks on Networks on Chip with Ring Topology
Authors: Mark Davey
Abstract:
Communications on a Network on Chip (NoC) produce timing information, i.e., network injection delays, packet traversal times, throughput metrics, and other attributes relating to the traffic being sent across the chip. The security requirements of a platform encompass each node to operate with confidentiality, integrity, and availability (ISO 27001). Inherently, a shared NoC interconnect is exposed to analysis of timing patterns created by contention for the network components, i.e., links and switches/routers. This phenomenon is defined as information leakage, which represents a ‘side channel’ of sensitive information that can be correlated to platform activity. The key algorithm presented in this paper evaluates how an adversary can control two platform neighbouring nodes of a target node to obtain sensitive information about communication with the target node. The actual information obtained is the period value of a periodic task communication. This enacts a breach of the expected confidentiality of a node operating in a multiprocessor platform. An experimental investigation of the side channel is undertaken to judge the level and significance of inferred information produced by access times to the NoC. Results are presented with a series of expanding task set scenarios to evaluate the efficacy of the side channel detection algorithm as the network load increases.Keywords: embedded systems, multiprocessor, network on chip, side channel
Procedia PDF Downloads 71394 Comparative Study of Dose Calculation Accuracy in Bone Marrow Using Monte Carlo Method
Authors: Marzieh Jafarzadeh, Fatemeh Rezaee
Abstract:
Introduction: The effect of ionizing radiation on human health can be effective for genomic integrity and cell viability. It also increases the risk of cancer and malignancy. Therefore, X-ray behavior and absorption dose calculation are considered. One of the applicable tools for calculating and evaluating the absorption dose in human tissues is Monte Carlo simulation. Monte Carlo offers a straightforward way to simulate and integrate, and because it is simple and straightforward, Monte Carlo is easy to use. The Monte Carlo BEAMnrc code is one of the most common diagnostic X-ray simulation codes used in this study. Method: In one of the understudy hospitals, a certain number of CT scan images of patients who had previously been imaged were extracted from the hospital database. BEAMnrc software was used for simulation. The simulation of the head of the device with the energy of 0.09 MeV with 500 million particles was performed, and the output data obtained from the simulation was applied for phantom construction using CT CREATE software. The percentage of depth dose (PDD) was calculated using STATE DOSE was then compared with international standard values. Results and Discussion: The ratio of surface dose to depth dose (D/Ds) in the measured energy was estimated to be about 4% to 8% for bone and 3% to 7% for bone marrow. Conclusion: MC simulation is an efficient and accurate method for simulating bone marrow and calculating the absorbed dose.Keywords: Monte Carlo, absorption dose, BEAMnrc, bone marrow
Procedia PDF Downloads 213393 Investigation and Analysis on Pore Pressure Variation by Sonic Impedance under Influence of Compressional, Shear, and Stonely Waves in High Pressure Zones
Authors: Nouri, K., Ghassem Alaskari, M., K., Amiri Hazaveh, A., Nabi Bidhendi, M.
Abstract:
Pore pressure is one on the key Petrophysical parameter in exploration discussion and survey on hydrocarbon reservoir. Determination of pore pressure in various levels of drilling and integrity of drilling mud and high pressure zones in order to restrict blow-out and following damages are significant. The pore pressure is obtained by seismic and well logging data. In this study the pore pressure and over burden pressure through the matrix stress and Tarzaqi equation and other related formulas are calculated. By making a comparison on variation of density log in over normal pressure zones with change of sonic impedance under influence of compressional, shear, and Stonely waves, the correlation level of sonic impedance with density log is studied. The level of correlation and variation trend is recorded in sonic impedance under influence Stonely wave with density log that key factor in recording of over burden pressure and pore pressure in Tarzaqi equation is high. The transition time is in divert relation with porosity and fluid type in the formation and as a consequence to the pore pressure. The density log is a key factor in determination of pore pressure therefore sonic impedance under Stonley wave is denotes well the identification of high pressure besides other used factors.Keywords: pore pressure, stonely wave, density log, sonic impedance, high pressure zone
Procedia PDF Downloads 395392 Nursing Care Experience for a Patient with Type2 Diabetes Mellitus and Hyperglycemic Hyperosmolar State
Authors: Yen-Hsia Lin, Ya-Fang Cheng, Hui-Zhu Chen, Chi-Hui Tiao
Abstract:
This is a case study of a 70-year-old man suffering from Type 2 diabetes mellitus and hyperglycemia hyperosmolarity state. He was admitted into the intensive care unit from the 20th to 26th of October, 2015. After receiving relevant information through open-ended conversations, observation, and physical assessment, as well as the psychological, social and spiritual holistic nursing assessment, several clinical health problems such as unstable blood sugar, impaired skin integrity and lack of self-care management knowledge were identified by the author. During the period of care, the patient was encouraged to share and express his feelings, an active listening and initiating approach from the nursing team had led to the understanding of why the patient refused to use insulin. This knowledge enabled the nursing team to manage patient care by educating the patient with self-care management skills, such as foot wound care and insulin injection skills to slow the deterioration of complications. Also, the implementation of appropriate diet and exercise routine to improve patients’ style. By enhancing self-care ability in diabetic patients, they are able to return home with the skill to improve better quality life style.Keywords: hyperglycemia hyperosmolar state, type2 diabetes Mellitu, diabetes Mellitu foot care, intensive care
Procedia PDF Downloads 146391 Cause of the Disappearance of Wild Bees in Kinshasa, Democratic Republic of Congo
Authors: Sarah Ekuwo Okende, Armand Lokolo
Abstract:
Gradually, the recognition of wild bees in processes affecting ecosystems and as major components of biodiversity has led to their protection as well as their areas in Kinshasa. And despite their decisive role in the well-being of men, the general public and decision-makers know nothing of the consequences of the loss of these, which are nevertheless of considerable magnitude. On this, they provide the pollination of sexual plants, and they also provide us with a number of goods that have a direct economic value, such as food, medicines, etc. And yet today, more than half of these wild bee species are threatened in Kinshasa. The causes of this phenomenon are largely unknown to the general public in the Kinshasa region. The objective of this study is to find the causes leading to the disappearance of wild bee species in Kinshasa. Also, this research contributes to current knowledge of the biodiversity of wild bees in the Kinshasa region and helps the authorities to develop a good policy for the conservation or safeguarding of this biodiversity, which plays a key role in maintaining the integrity of our ecosystems. We carried out field surveys using interview sheets in the forest areas of Kinshasa where wild bees populated them. To achieve this, an interview sheet was made, and it included questions on the causes of the disappearance of wild bees and the destruction of forest areas. The interviews were carried out with the natives of these forest areas. The results of this study show us that the destruction of habitats or natural areas and the use of pesticides are the causes of the disappearance of these wild bees.Keywords: wild bees, pollinisation, forest, biodiversity, habitats, ecosystem, destruction, pesticide
Procedia PDF Downloads 91390 The Development of Small and Medium Enterprise Entrepreneurs’ Potential Based on Sufficiency Economics Philosophy
Authors: Luedech Girdwichai, Witthaya Mekhum
Abstract:
This research analyses the factors affecting the success and develops a guideline for self- reliance planning of the entrepreneurs for effective implementation. Samples in this study included 42 awarded winners from the 2nd Sufficiency Economics Philosophy (SEP) National Contest arranged by Office of the Royal Development Projects Board. The results revealed 4 main factors affecting the success as follows: 1) there is a need to encourage unity and cooperation in the enterprise in conducting development plan. 2) The entrepreneur must be a knowledge seeker and lead by example on SEP life. 3) The entrepreneur must be able to apply traditional local wisdom with his present experience and knowledge in defining product identity. 4) The entrepreneur should provide career training for the staffs to develop their competencies. The guideline for self-reliance planning consisted of 4 aspects: 1) Human resource development: the enterprise should develop its staffs especially on integrity, honesty, and public minded. 2) Local community development: there should be a clear target for the local community development. 3) Local community economic development: by encouraging additional incomes through experience sharing. 4) Enterprise development planning: by arranging monthly meeting to conduct the development plan including analysing problems and synthesizing data.Keywords: potential development, SME entrepreneurs, sufficiency economics philosophy, finance, management
Procedia PDF Downloads 345389 Application of the Mobile Phone for Occupational Self-Inspection Program in Small-Scale Industries
Authors: Jia-Sin Li, Ying-Fang Wang, Cheing-Tong Yan
Abstract:
In this study, an integrated approach of Google Spreadsheet and QR code which is free internet resources was used to improve the inspection procedure. The mobile phone Application(App)was also designed to combine with a web page to create an automatic checklist in order to provide a new integrated information of inspection management system. By means of client-server model, the client App is developed for Android mobile OS and the back end is a web server. It can set up App accounts including authorized data and store some checklist documents in the website. The checklist document URL could generate QR code first and then print and paste on the machine. The user can scan the QR code by the app and filled the checklist in the factory. In the meanwhile, the checklist data will send to the server, it not only save the filled data but also executes the related functions and charts. On the other hand, it also enables auditors and supervisors to facilitate the prevention and response to hazards, as well as immediate report data checks. Finally, statistics and professional analysis are performed using inspection records and other relevant data to not only improve the reliability, integrity of inspection operations and equipment loss control, but also increase plant safety and personnel performance. Therefore, it suggested that the traditional paper-based inspection method could be replaced by the APP which promotes the promotion of industrial security and reduces human error.Keywords: checklist, Google spreadsheet, APP, self-inspection
Procedia PDF Downloads 118388 Image Multi-Feature Analysis by Principal Component Analysis for Visual Surface Roughness Measurement
Authors: Wei Zhang, Yan He, Yan Wang, Yufeng Li, Chuanpeng Hao
Abstract:
Surface roughness is an important index for evaluating surface quality, needs to be accurately measured to ensure the performance of the workpiece. The roughness measurement based on machine vision involves various image features, some of which are redundant. These redundant features affect the accuracy and speed of the visual approach. Previous research used correlation analysis methods to select the appropriate features. However, this feature analysis is independent and cannot fully utilize the information of data. Besides, blindly reducing features lose a lot of useful information, resulting in unreliable results. Therefore, the focus of this paper is on providing a redundant feature removal approach for visual roughness measurement. In this paper, the statistical methods and gray-level co-occurrence matrix(GLCM) are employed to extract the texture features of machined images effectively. Then, the principal component analysis(PCA) is used to fuse all extracted features into a new one, which reduces the feature dimension and maintains the integrity of the original information. Finally, the relationship between new features and roughness is established by the support vector machine(SVM). The experimental results show that the approach can effectively solve multi-feature information redundancy of machined surface images and provides a new idea for the visual evaluation of surface roughness.Keywords: feature analysis, machine vision, PCA, surface roughness, SVM
Procedia PDF Downloads 212387 Low Power Glitch Free Dual Output Coarse Digitally Controlled Delay Lines
Authors: K. Shaji Mon, P. R. John Sreenidhi
Abstract:
In deep-submicrometer CMOS processes, time-domain resolution of a digital signal is becoming higher than voltage resolution of analog signals. This claim is nowadays pushing toward a new circuit design paradigm in which the traditional analog signal processing is expected to be progressively substituted by the processing of times in the digital domain. Within this novel paradigm, digitally controlled delay lines (DCDL) should play the role of digital-to-analog converters in traditional, analog-intensive, circuits. Digital delay locked loops are highly prevalent in integrated systems.The proposed paper addresses the glitches present in delay circuits along with area,power dissipation and signal integrity.The digitally controlled delay lines(DCDL) under study have been designed in a 90 nm CMOS technology 6 layer metal Copper Strained SiGe Low K Dielectric. Simulation and synthesis results show that the novel circuits exhibit no glitches for dual output coarse DCDL with less power dissipation and consumes less area compared to the glitch free NAND based DCDL.Keywords: glitch free, NAND-based DCDL, CMOS, deep-submicrometer
Procedia PDF Downloads 245386 Managing the Architectural Heritage of Tripoli-Libya: The Red Castle as a Case Study
Authors: Eman Mohamed Ali Elalwani
Abstract:
The Libyan heritage buildings are currently facing a number of crises that pose a threat to their structural integrity, functionality, and overall performance. One of the challenges pertains to the loss of community identity, which has arisen due to the lack of awareness and unconscious behavior of the residents. An additional issue arises from inadequate site management practices, including the implementation of modern techniques and innovative building materials that are incompatible with structural elements, resulting in the deformation of certain sections of the buildings. The security concerns of the city, along with the ongoing civil conflict, fostered a conducive environment for violations, resulting in the vandalism of certain monuments in the city. However, the degradation of this valuable heritage is mainly attributed to the city's neglect and pollution. The elevated groundwater level resulting from pollution has led to erosion in the building's foundations. Mitigating these negative consequences through strategic interventions and rehabilitation is required to preserve this treasure. In order to assist the local community in recovering from those crises, this paper stated a viable strategy for promoting preservation efforts that aimed at safeguarding the heritage sites while also providing guidance to decision-makers and the local community on how to avoid these crises, preserve, enhance, and recognize the significance of the Libyan heritage.Keywords: cultural heritage, historical buildings, Tripoli’s old city, Red Castle, crises, preservation
Procedia PDF Downloads 125385 Empowering Certificate Management with Blockchain Technology
Authors: Yash Ambekar, Kapil Vhatkar, Prathamesh Swami, Kartikey Singh, Yashovardhan Kaware
Abstract:
The rise of online courses and certifications has created new opportunities for individuals to enhance their skills. However, this digital transformation has also given rise to coun- terfeit certificates. To address this multifaceted issue, we present a comprehensive certificate management system founded on blockchain technology and strengthened by smart contracts. Our system comprises three pivotal components: certificate generation, authenticity verification, and a user-centric digital locker for certificate storage. Blockchain technology underpins the entire system, ensuring the immutability and integrity of each certificate. The inclusion of a cryptographic hash for each certificate is a fundamental aspect of our design. Any alteration in the certificate’s data will yield a distinct hash, a powerful indicator of potential tampering. Furthermore, our system includes a secure digital locker based on cloud storage that empowers users to efficiently manage and access all their certificates in one place. Moreover, our project is committed to providing features for certificate revocation and updating, thereby enhancing the system’s flexibility and security. Hence, the blockchain and smart contract-based certificate management system offers a robust and one-stop solution to the escalating problem of counterfeit certificates in the digital era.Keywords: blockchain technology, smart contracts, counterfeit certificates, authenticity verification, cryptographic hash, digital locker
Procedia PDF Downloads 46384 Assets Misappropriation in the Malaysian Public and Private Sectors
Authors: I. K. Norziaton, M. D. Ridhuan, A. N. Nur Adura
Abstract:
Assets misappropriation is becoming a major concern in organizations. Over the years, the Malaysian Auditor General has reported high occurrences of assets misappropriation at the federal, state and even local governments. It is surprising that assets misappropriation is not the only major concern in the public sector but it has also indicates a common sight in private sector. The current situation is rather disconcerting because employees are accountable to perform their jobs at the interest of the organizations. Various researches in the past has found that the incidence of assets misappropriation occurs when employees used the official vehicles, internet connection, computers, stationery and facilities for personal and family benefits. The issue of assets misappropriation has continue to be a major concern for organizations and its impact on the reputation and financial health can be enormous. Even though the issue seems to be trivial, yet, if it is left untreated, the symptoms will become an incurable disease that it will cause major leakages to the organizations. Hence, this paper highlights the common practices of assets misappropriation in public and private sectors. It also discusses why the acts of assets misappropriation occurs. Using the data through questionnaire survey, a total of 250 questionnaires were distributed to the private and public sectors employees. However 173 (69.2%) were returned and usable. This paper concludes that it is vital to promote awareness to the public and private sectors employees on issues of assets misappropriation. Assets misappropriation could have been avoided provided that the officers in charge are more vigilant, competent and practice high level of integrity in discharging their responsibilities towards the organizations.Keywords: assets misappropriation, fraud, public sector, private sector
Procedia PDF Downloads 197383 Biosurfactant: A Greener Approach for Enhanced Concrete Rheology and Strength
Authors: Olivia Anak Rayeg, Clotilda Binti Petrus, Arnel Reanturco Ascotia, Ang Chung Huap, Caroline Marajan, Rudy Tawie Joseph Sipi
Abstract:
Concrete is essential for global infrastructure, yet enhancing its rheology and strength in an environmentally sustainable manner remains a significant challenge. Conventional chemical admixtures often pose environmental and health risks. This study explores the use of a phospholipid biosurfactant, derived from Rhizopus oryzae, as an environmentally friendly admixture in concrete. Various concentrations of the biosurfactant were integrated into fresh concrete, partially replacing the water content. The inclusion of the biosurfactant markedly enhanced the workability of the concrete, as demonstrated by Vertical Slump, Slump Flow, and T50 tests. After a 28-day curing period, the concrete's mechanical properties were assessed through compressive strength and bonding tests. Results revealed that substituting up to 10% of the water with the biosurfactant not only improved workability but also significantly increased both compressive and flexural strength. These findings highlight the potential of phospholipid biosurfactant as a biodegradable and non-toxic alternative to traditional admixtures, enhancing both structural integrity and sustainability in concrete. This approach reduces environmental impact and production costs, marking a significant advancement in sustainable construction technology.Keywords: concrete rheology, green admixture, fungal biosurfactant, phospholipids, rhizopus oryzae
Procedia PDF Downloads 43382 Ambient Vibration Test and Numerical Modelling of Wind Turbine Towers including Soil Structure Interaction
Authors: Heba Kamal, Ghada Saudi
Abstract:
Due to The rapid expansion of energy and growing number of wind turbines construction in earthquake areas, a design method for simple and accurate evaluation of seismic load to ensure structural integrity is required. In Egypt, there are some appropriate places to build wind turbine towers lie in active seismically regions, so accurate analysis is necessary for prediction of seismic loads with consideration of intensity of the earthquake, soil and structural characteristics. In this research, seismic behavior of wind turbine towers Gamesa Type G52 in Zafarana Wind Farm Egypt is investigated using experimental work by ambient vibration test, and fully dynamic analysis based on time history from El Aqaba Earthquake 1995 using 3D by PLAXIS 3D software, including the soil structure interaction effect. The results obtained from dynamic analyses are discussed. From this study, it is concluded that, the fully dynamic seismic analysis based on used PLAXIS 3D with the aid of the full scale ambient vibration test gives almost good simulation for the seismic loads that can be applied to wind turbine tower design in Egypt.Keywords: Wind turbine towers, Zafarana Wind Farm, Gamesa Type G52, ambient vibration test
Procedia PDF Downloads 208381 Rapid Evidence Remote Acquisition in High-Availability Server and Storage System for Digital Forensic to Unravel Academic Crime
Authors: Bagus Hanindhito, Fariz Azmi Pratama, Ulfah Nadiya
Abstract:
Nowadays, digital system including, but not limited to, computer and internet have penetrated the education system widely. Critical information such as students’ academic records is stored in a server off- or on-campus. Although several countermeasures have been taken to protect the vital resources from outsider attack, the defense from insiders threat is not getting serious attention. At the end of 2017, a security incident that involved academic information system in one of the most respected universities in Indonesia affected not only the reputation of the institution and its academia but also academic integrity in Indonesia. In this paper, we will explain our efforts in investigating this security incident where we have implemented a novel rapid evidence remote acquisition method in high-availability server and storage system thus our data collection efforts do not disrupt the academic information system and can be conducted remotely minutes after incident report has been received. The acquired evidence is analyzed during digital forensic by constructing the model of the system in an isolated environment which allows multiple investigators to work together. In the end, the suspect is identified as a student (insider), and the investigation result is used by prosecutors to charge the suspect as an academic crime.Keywords: academic information system, academic crime, digital forensic, high-availability server and storage, rapid evidence remote acquisition, security incident
Procedia PDF Downloads 152380 Application of Remote Sensing Technique on the Monitoring of Mine Eco-Environment
Authors: Haidong Li, Weishou Shen, Guoping Lv, Tao Wang
Abstract:
Aiming to overcome the limitation of the application of traditional remote sensing (RS) technique in the mine eco-environmental monitoring, in this paper, we first classified the eco-environmental damages caused by mining activities and then introduced the principle, classification and characteristics of the Light Detection and Ranging (LiDAR) technique. The potentiality of LiDAR technique in the mine eco-environmental monitoring was analyzed, particularly in extracting vertical structure parameters of vegetation, through comparing the feasibility and applicability of traditional RS method and LiDAR technique in monitoring different types of indicators. The application situation of LiDAR technique in extracting typical mine indicators, such as land destruction in mining areas, damage of ecological integrity and natural soil erosion. The result showed that the LiDAR technique has the ability to monitor most of the mine eco-environmental indicators, and exhibited higher accuracy comparing with traditional RS technique, specifically speaking, the applicability of LiDAR technique on each indicator depends on the accuracy requirement of mine eco-environmental monitoring. In the item of large mine, LiDAR three-dimensional point cloud data not only could be used as the complementary data source of optical RS, Airborne/Satellite LiDAR could also fulfill the demand of extracting vertical structure parameters of vegetation in large areas.Keywords: LiDAR, mine, ecological damage, monitoring, traditional remote sensing technique
Procedia PDF Downloads 397379 Comparison of Authentication Methods in Internet of Things Technology
Authors: Hafizah Che Hasan, Fateen Nazwa Yusof, Maslina Daud
Abstract:
Internet of Things (IoT) is a powerful industry system, which end-devices are interconnected and automated, allowing the devices to analyze data and execute actions based on the analysis. The IoT technology leverages the technology of Radio-Frequency Identification (RFID) and Wireless Sensor Network (WSN), including mobile and sensor. These technologies contribute to the evolution of IoT. However, due to more devices are connected each other in the Internet, and data from various sources exchanged between things, confidentiality of the data becomes a major concern. This paper focuses on one of the major challenges in IoT; authentication, in order to preserve data integrity and confidentiality are in place. A few solutions are reviewed based on papers from the last few years. One of the proposed solutions is securing the communication between IoT devices and cloud servers with Elliptic Curve Cryptograhpy (ECC) based mutual authentication protocol. This solution focuses on Hyper Text Transfer Protocol (HTTP) cookies as security parameter. Next proposed solution is using keyed-hash scheme protocol to enable IoT devices to authenticate each other without the presence of a central control server. Another proposed solution uses Physical Unclonable Function (PUF) based mutual authentication protocol. It emphasizes on tamper resistant and resource-efficient technology, which equals a 3-way handshake security protocol.Keywords: Internet of Things (IoT), authentication, PUF ECC, keyed-hash scheme protocol
Procedia PDF Downloads 264378 Effects of Dietary E on Semen, Hormonal Profile and Testicular Biometry in Teddy Goat Bucks
Authors: Muhammad Zubair, Maqbool Ahmad, Al-Hafizah Shafia Tehseen Gul, Shujait Ali
Abstract:
The use of vitamins has significant effects on the reproductive system of mammals. The present study was conducted to investigate the useful effects of vitamin E on reproductive functions of Teddy bucks. For this purpose, 8 adult Teddy bucks were randomly divided into two treatment groups viz; A (control) and B (vitamin E with dose of 200 mg/kg BW/day). These treatments continued for 12 weeks. Semen quality parameters (volume, motility, sperm morphology and sperm DNA integrity) of experimental bucks of each group was evaluated on weekly basis, while testicular measurements (length, scrotal circumference and weights) were recorded at 0 and 12th week of experiment. Serum concentrations of male sex hormones (testosterone, LH, FSH) and cortisol were recorded fortnightly. Similarly, body weights of bucks were also measured fortnightly until completion of the study. The data were subjected to two-way analysis of variance, followed by Duncan test for multiple mean comparisons. Supplementation of vitamin E improved significantly (P<0.05) the semen quality parameter, body weights, testicular measurements and serum levels of sex hormones. However, there was no effect on serum cortisol. It was concluded from the present study that dietary supplementation of vitamin E has beneficial effects on the semen and hormones in male reproductive system.Keywords: hormones, semen, teddy bucks, testicular measurements
Procedia PDF Downloads 293377 To Ensure Maximum Voter Privacy in E-Voting Using Blockchain, Convolutional Neural Network, and Quantum Key Distribution
Authors: Bhaumik Tyagi, Mandeep Kaur, Kanika Singla
Abstract:
The advancement of blockchain has facilitated scholars to remodel e-voting systems for future generations. Server-side attacks like SQL injection attacks and DOS attacks are the most common attacks nowadays, where malicious codes are injected into the system through user input fields by illicit users, which leads to data leakage in the worst scenarios. Besides, quantum attacks are also there which manipulate the transactional data. In order to deal with all the above-mentioned attacks, integration of blockchain, convolutional neural network (CNN), and Quantum Key Distribution is done in this very research. The utilization of blockchain technology in e-voting applications is not a novel concept. But privacy and security issues are still there in a public and private blockchains. To solve this, the use of a hybrid blockchain is done in this research. This research proposed cryptographic signatures and blockchain algorithms to validate the origin and integrity of the votes. The convolutional neural network (CNN), a normalized version of the multilayer perceptron, is also applied in the system to analyze visual descriptions upon registration in a direction to enhance the privacy of voters and the e-voting system. Quantum Key Distribution is being implemented in order to secure a blockchain-based e-voting system from quantum attacks using quantum algorithms. Implementation of e-voting blockchain D-app and providing a proposed solution for the privacy of voters in e-voting using Blockchain, CNN, and Quantum Key Distribution is done.Keywords: hybrid blockchain, secure e-voting system, convolutional neural networks, quantum key distribution, one-time pad
Procedia PDF Downloads 94376 Numerical Investigation of Beam-Columns Subjected to Non-Proportional Loadings under Ambient Temperature Conditions
Authors: George Adomako Kumi
Abstract:
The response of structural members, when subjected to various forms of non-proportional loading, plays a major role in the overall stability and integrity of a structure. This research seeks to present the outcome of a finite element investigation conducted by the use of finite element programming software ABAQUS to validate the experimental results of elastic and inelastic behavior and strength of beam-columns subjected to axial loading, biaxial bending, and torsion under ambient temperature conditions. The application of the rigorous and highly complicated ABAQUS finite element software will seek to account for material, non-linear geometry, deformations, and, more specifically, the contact behavior between the beam-columns and support surfaces. Comparisons of the three-dimensional model with the results of actual tests conducted and results from a solution algorithm developed through the use of the finite difference method will be established in order to authenticate the veracity of the developed model. The results of this research will seek to provide structural engineers with much-needed knowledge about the behavior of steel beam columns and their response to various non-proportional loading conditions under ambient temperature conditions.Keywords: beam-columns, axial loading, biaxial bending, torsion, ABAQUS, finite difference method
Procedia PDF Downloads 180375 Deformation Severity Prediction in Sewer Pipelines
Authors: Khalid Kaddoura, Ahmed Assad, Tarek Zayed
Abstract:
Sewer pipelines are prone to deterioration over-time. In fact, their deterioration does not follow a fixed downward pattern. This is in fact due to the defects that propagate through their service life. Sewer pipeline defects are categorized into distinct groups. However, the main two groups are the structural and operational defects. By definition, the structural defects influence the structural integrity of the sewer pipelines such as deformation, cracks, fractures, holes, etc. However, the operational defects are the ones that affect the flow of the sewer medium in the pipelines such as: roots, debris, attached deposits, infiltration, etc. Yet, the process for each defect to emerge follows a cause and effect relationship. Deformation, which is the change of the sewer pipeline geometry, is one type of an influencing defect that could be found in many sewer pipelines due to many surrounding factors. This defect could lead to collapse if the percentage exceeds 15%. Therefore, it is essential to predict the deformation percentage before confronting such a situation. Accordingly, this study will predict the percentage of the deformation defect in sewer pipelines adopting the multiple regression analysis. Several factors will be considered in establishing the model, which are expected to influence the defamation defect severity. Besides, this study will construct a time-based curve to understand how the defect would evolve overtime. Thus, this study is expected to be an asset for decision-makers as it will provide informative conclusions about the deformation defect severity. As a result, inspections will be minimized and so the budgets.Keywords: deformation, prediction, regression analysis, sewer pipelines
Procedia PDF Downloads 188374 Damage of Laminated Corrugated Sandwich Panels under Inclined Impact Loading
Authors: Muhammad Kamran, Xue Pu, Naveed Ahmed
Abstract:
Sandwich foam structures are efficient in impact energy absorption and making components lightweight; however their efficient use require a detailed understanding of its mechanical response. In this study, the foam core, laminated facings’ sandwich panel with internal triangular rib configuration is impacted by a spherical steel projectile at different angles using ABAQUS finite element package and damage mechanics is studied. Laminated ribs’ structure is sub-divided into three formations; all zeros, all 45 and optimized combination of zeros and 45 degrees. Impact velocity is varied from 250 m/s to 500 m/s with an increment of 50 m/s. The impact damage can significantly demolish the structural integrity and energy absorption due to fiber breakage, matrix cracking, and de-bonding. Macroscopic fracture study of the panel and core along with load-displacement responses and failure modes are the key parameters in the design of smart ballistic resistant structures. Ballistic impact characteristics of panels are studied on different speed, different inclination angles and its dependency on the base, and core materials, ribs formation, and cross-sectional spaces among them are determined. Impact momentum, penetration and kinetic energy absorption data and curves are compiled to predict the first and proximity impact in an effort to enhance the dynamic energy absorption.Keywords: dynamic energy absorption, proximity impact, sandwich panels, impact momentum
Procedia PDF Downloads 388373 Corruption and Anti-Corruption Policies: The Case of Iraq
Authors: Sarwan Hasan
Abstract:
This article is to investigate the main forms and causes of corruption and provides anti-corruption policies. It is significant to find out how both interact and affect each other. The research focuses particularly on the case study of Iraq from 2003 to 2023. In this way, the main methods of analysis will be the system approach to analyze the relationship of different elements of the political system of Iraq in the context of corruption, the process-tracing method to explain the reasons for corruption, and content analysis of the official documents important for the research topic. Moreover, the SWOT analysis will be used in the part about the anti-corruption policies. This article concludes that the main causes behind corruption in Iraq are power distribution based on muhassasa tayifiya (power apportionment based on ethno-sectarianism), decentralized political system, sectarian division, Iran, and socio-cultural structure. The main forms of corruption in the country are illegal enrichment, using public positions for sectarian agenda, criminal corruption, bribery, political patronage, clientelism, cronyism, nepotism, embezzlement, kickback, extortion, money laundry, speed money, theft, and justice obstruction. The main anti-corruption policies in Iraq are establishing the Commission of Integrity, Board of Supreme Audit, Inspectors General and Parliamentary Committee, Internalization (assistance from foreign actors), economic adjustment and financial reform, and the new anti-corruption program of the new Prime Minister (Mohamed Shiyah al-Sudani).Keywords: anti-corruption, corruption, Iraq, anti-corruption policies
Procedia PDF Downloads 75372 Exploring RQ-EQ Relatons among Psychology Majors
Authors: Maria T. Mamba, Febe Marl G. Paat
Abstract:
The illustrious estimation that psychology majors, psychologists and allied psychology practitioners as expert behavior analysts, if not, “life enthusiasts” spurred two essentially linked endeavors. First, the reconsideration of the time-honored ingenuity and expectations from psychologists such as the ability to perceive ways to undertake a range of difficulties, the ability to apply psychology in order to self-regulate and to display personal integrity, and among others. Second, is to ascertain solid support to uphold aforesaid expectations. This study achieved its goals by having explored how two burgeoning constructs- RQ and EQ play parts in the lives of psychology people. Having involved the total population of psychology majors in Cagayan State University along with the use of Emotional Quotient Test and Resilience Assessment Questionnaire, the study provides a précis of how perceived “champions” of psychological well-being respond emotionally to different situations and deal effectively with and even thrive on the demands of frequently changing environmental circumstances. Significant findings about how the major variables correlated with the population’s demographic profile (e.g. age, sex, and year level) were also accounted. To realize a more academic concept with the present study, significant connections between RQ (self-assurance, personal vision, flexible and adaptable, organized, problem solver, interpersonal competence, socially connected, and active) and EQ (e.g. emotional maturity, emotional sensitivity, and emotional competency) dimensions were uncovered.Keywords: emotional quotient, resilience quotient, psychology majors, exploring
Procedia PDF Downloads 450371 Information Security Dilemma: Employees' Behaviour on Three-Dimensions to Failure
Authors: Dyana Zainudin, Atta Ur-Rahman, Thaier Hamed
Abstract:
This paper explains about human nature concept as to understand the significance of information security in employees’ mentality including leaders in an organisation. By studying on a theory concept of the latest Von Solms fourth waves, information security governance basically refers to the concept of a set of methods, techniques and tools that responsible for protecting resources of a computer system to ensure service availability, confidentiality and integrity of information. However, today’s information security dilemma relates to the acceptance of employees mentality. The major causes are a lack of communication and commitment. These types of management in an organisation are labelled as immoral/amoral management which effects on information security compliance. A recovery action is taken based on ‘learn a lesson from incident events’ rather than prevention. Therefore, the paper critically analysed the Von Solms fourth waves’ theory with current human events and its correlation by studying secondary data and also from qualitative analysis among employees in public sectors. ‘Three-dimensions to failure’ of information security dilemma are explained as deny, don’t know and don’t care. These three-dimensions are the most common vulnerable behaviour owned by employees. Therefore, by avoiding the three-dimensions to failure may improve the vulnerable behaviour of employees which is often related to immoral/amoral management.Keywords: information security management system, information security behaviour, information security governance, information security culture
Procedia PDF Downloads 208370 Assessing EU-China Security Interests from Contradiction to Convergence
Authors: Julia Gurol
Abstract:
Why do we observe a shift towards convergence in EU-China security interests? While contradicting attitudes towards key principles of inter-state and region-to-state relations, including state sovereignty, territorial integrity, and intervention policies have ever since hindered EU-China inter-regional cooperation beyond the economic realm, collaboration in peace and security issues is now becoming a key pillar of European-Chinese relations. In addition, the Belt and Road Initiative as most ambitious Chinese foreign policy project explicitly touches upon several European foreign policy and security preferences. Based on these counterintuitive findings, this paper traces the process of convergence of Sino-European security interests. Drawing on qualitative text analysis of official Chinese and European policy papers and documents from the establishment of diplomatic relations in 1975 until today, it assesses the striking change over time. On this basis, the paper uses theories of neo-functionalism, inter-regionalism, and securitization and borrows from constructivist views in International Relations’ theory, to expound possible motives for the change in Chinese and respectively European preferences in the security realm. The results reveal interesting insights into the decisive factors and motives behind both countries’ foreign policies. The paper concludes with a discussion of further potential and difficulties of EU-China security cooperation.Keywords: belt and road initiative, China, European Union, foreign policy, neo-functionalism, security
Procedia PDF Downloads 285369 Feasibility Study of Iraq' Decomposition and Its Effects on the Region
Authors: Ebrahim Rahmani, Siyamak Moazeni
Abstract:
According to the Iraq's first constitutional law (approved 2005), Iraq is an independent with sovereignty and its governmental structure is parliamentary democratic republic and federal. Even in reforms in 2009, this article of law did not changed at all. But considering the existence of this emphasis and clarity which is mentioned in the law, different and sometimes contradictory interpretations and positions are expressed about federalism in the way that we can say, considering the importance of the matter, federalism is a focus point to create and expansion of the cold war among leaders of different groups of the country. Iraq's today political and security position has granted the suitable opportunity to Iraq's Kurdistan in appearing of the recent security crisis to increase its share from the central political power or to achieve to its independent dream. The federalism the weakest point of Iraq's territorial integrity in a way that if different groups do not come to a consensus about it and do not think about a mechanism which is accepted by all of them, this can effect on and Iraq's political stability and security. Iraq's Kurdistan follows the option of disintegration and separation under the shadow of political and security changes, even with existence of some Iraqi groups' hopes regarding the improvement of situation after parliament election and also considering Masoud Barezani's power will for separation from Iraq as well as regarding special international changes and disintegration of Karime from Ukraine and ISIS crises; concerns have been created among regional and international powers and interior players. In this article, a paradox due constitutional law about federalism, Iraq's central government view and its politicians to the matter and the regional effect of this action on region's geopolitics are reviewed as well.Keywords: constitutional law, federalism, decomposition, Iraq's Kurdistan
Procedia PDF Downloads 328368 Feasibility of Building Structure Due to Decreased Concrete Quality of School Building in Banda Aceh City 19 Years after Tsunami
Authors: Rifqi Irvansyah, Abdullah Abdullah, Yunita Idris, Bunga Raihanda
Abstract:
Banda Aceh is particularly susceptible to heightened vulnerability during natural disasters due to its concentrated exposure to multi-hazard risks. Despite urgent priorities during the aftermath of natural disasters, such as the 2004 Indian Ocean earthquake and tsunami, several public facilities, including school buildings, sustained damage yet continued operations without adequate repairs, even though they were submerged by the tsunami. This research aims to evaluate the consequences of column damage induced by tsunami inundation on the structural integrity of buildings. The investigation employs interaction diagrams for columns to assess their capacity, taking into account factors such as rebar deterioration and corrosion. The analysis result shows that one-fourth of the K1 columns on the first floor fall outside of the column interaction diagram, indicating that the column structure cannot handle the load above it, as evidenced by the presence of Pu and Mu, which are greater than the column's design strength. This suggests that the five columns of K1 should be cause for concern, as the column's capacity is decreasing. These results indicate that the structure of the building cannot sustain the applied load because the column cross-section has deteriorated. In contrast, all K2 columns meet the design strength, indicating that the column structure can withstand the structural loads.Keywords: tsunami inundation, column damage, column interaction diagram, mitigation effort
Procedia PDF Downloads 67367 Graphene Reinforced Magnesium Metal Matrix Composites for Biomedical Applications
Authors: Khurram Munir, Cuie Wen, Yuncang Li
Abstract:
Magnesium (Mg) metal matrix composites (MMCs) reinforced with graphene nanoplatelets (GNPs) have been developed by powder metallurgy (PM). In this study, GNPs with different concentrations (0.1-0.3 wt.%) were dispersed into Mg powders by high-energy ball-milling processes. The microstructure and resultant mechanical properties of the fabricated nanocomposites were characterized using transmission electron microscopy (TEM), scanning electron microscopy (SEM), energy dispersive X-ray spectroscopy (EDX), X-ray diffraction (XRD), Raman spectroscopy (RS), compression and nano-wear tests. The corrosion resistance of the fabricated composites was evaluated by electrochemical tests and hydrogen evolution measurements. Finally, the biological response of Mg-GNPs composites was assessed using osteoblast-like SaOS2 cells. The results indicate that GNPs are excellent candidates as reinforcements in Mg matrices for the manufacture of biodegradable Mg-based composite implants. GNP addition improved the mechanical properties of Mg via synergetic strengthening modes. Moreover, retaining the structural integrity of GNPs during PM processing improved the ductility, compressive strength, and corrosion resistance of the Mg-GNP composites as compared to monolithic Mg. Cytotoxicity assessments did not reveal any significant toxicity with the addition of GNPs to Mg matrices. This study demonstrates that Mg-xGNPs with x < 0.3 wt.%, may constitute novel biodegradable implant materials for load-bearing applications.Keywords: magnesium-graphene composites, strengthening mechanisms, In vitro cytotoxicity, biocorrosion
Procedia PDF Downloads 158366 Ideological and Poetological Tensions: Wu Mi’s Enterprise of Imitating and Translating George Gordon Byron
Authors: Hanjin Yan
Abstract:
The English Romantic George Gordon Byron (1788-1824) was widely celebrated by men of letters in early republican China as a Satanic freedom fighter challenging classical poetics and traditional values. However, Wu Mi (1894-1978), the most persistent critic of contemporary iconoclasm, perceived Byron as a paragon of self-righteous poet-exiles who maintained moral integrity and achieved poetic excellence during times of frustration, just like canonized classical Chinese poets. Wu Mi not only composed lengthy imitations of the third canto of Byron’s Childe Harold’s Pilgrimage (1816) but also patronized a rendering of the canto. Taking André Lefevere’s rewriting theory as a framework, this paper explores the interplay of ideology and poetics by examining Wu Mi’s imitations against Byron’s original and its Chinese translation patronized by Wu Mi. Textual analysis shows that Wu Mi’s approach to Byron’s poetry was informed not only by his endeavor to invigorate classical Chinese poetics, but also by his program to preserve China’s cultural traditions and integrate Western new humanism, a theory proposed by his Harvard mentor Irving Babbitt (1865-1933). This study reveals how Byron was appropriated to serve conflicting poetic and ideological purposes in early republican China and suggests that imitation as a type of rewriting merits further attention.Keywords: George Gordon Byron, ideology, imitation, poetics, translation
Procedia PDF Downloads 230