Search results for: privacy preservation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1032

Search results for: privacy preservation

612 Perception of Consumer Behavior on Mobile Banking Offered by the National and Multinational Banks in UAE with Special Reference to Emirates NBD and Citibank

Authors: Aarohi Surya

Abstract:

The number of mobile banking users continues to climb across the world due to its increasing popularity, and UAE is no exception. This type of banking is part of the core strategy of most of the financial institutions that allows its customers to conduct a range of financial transactions through mobile apps to cash in the high demand from the bankers. This study aims at evaluating service quality of online banking in Dubai, one of the swiftly growing cities of Middle East. The paper mainly compares online banking services of Multinational bank and National Bank with special reference to Citibank and Emirates NBD. A structured questionnaire survey is conducted among various target groups. The research has been focused on mainly 4 significant areas of online banking, i.e. Privacy, Responsiveness, Reliability, and Efficiency of customer data. Information was analyzed statistically on SPSS to investigate the service quality of e-banking.

Keywords: customer satisfaction, service quality, responsiveness, online banking

Procedia PDF Downloads 251
611 A Blockchain-Based Privacy-Preserving Physical Delivery System

Authors: Shahin Zanbaghi, Saeed Samet

Abstract:

The internet has transformed the way we shop. Previously, most of our purchases came in the form of shopping trips to a nearby store. Now, it’s as easy as clicking a mouse. But with great convenience comes great responsibility. We have to be constantly vigilant about our personal information. In this work, our proposed approach is to encrypt the information printed on the physical packages, which include personal information in plain text, using a symmetric encryption algorithm; then, we store that encrypted information into a Blockchain network rather than storing them in companies or corporations centralized databases. We present, implement and assess a blockchain-based system using Ethereum smart contracts. We present detailed algorithms that explain the details of our smart contract. We present the security, cost, and performance analysis of the proposed method. Our work indicates that the proposed solution is economically attainable and provides data integrity, security, transparency, and data traceability.

Keywords: blockchain, Ethereum, smart contract, commit-reveal scheme

Procedia PDF Downloads 129
610 Innovation Mechanism in Developing Cultural and Creative Industries

Authors: Liou Shyhnan, Chia Han Yang

Abstract:

The study aims to investigate the promotion of innovation in the development of cultural and creative industries (CCI) and apply research on culture and creativity to this promotion. Using the research perspectives of culture and creativity as the starting points, this study has examined the challenges, trends, and opportunities that have emerged from the development of the CCI until the present. It is found that a definite context of cause and effect exist between them, and that a homologous theoretical basis can be used to understand and interpret them. Based on the characteristics of the aforementioned challenges and trends, this study has compiled two main theoretical systems for conducting research on culture and creativity: (i) reciprocal process between creativity and culture, and (ii) a mechanism for innovation involving multicultural convergence. Both theoretical systems were then used as the foundation to arrive at possible research propositions relating to the two developmental systems. This was respectively done through identification of the theoretical context through a literature review, and interviews and observations of actual case studies within Taiwan’s CCI. In so doing, the critical factors that can address the aforementioned challenges and trends were discovered. Our results indicated that, for reciprocal process between creativity and culture, we recognize that culture serves as creative resources in cultural and creative industries. According to shared consensus, culture provides symbolic meanings and emotional attachment for products and experiences offered by CCI. Besides, different cultures vary in their effects on creativity processes and standards, thus engendering distinctive preferences for and evaluations of the creative expressions and experiences of CCIs. In addition, we identify that creativity serves as the engine for driving the continuation and rebirth of cultures. Accounting for the core of culture, the employment of technology, design, and business facilitates the transformation and innovation mechanism for promoting culture continuity. In addition, with cultural centered, the digital technology, design thinking, and business model are critical constitutes of the innovation mechanism to promote the cultural continuity. Regarding cultural preservation and regeneration of local spaces and folk customs, we argue that the preservation and regeneration of local spaces and cultural cultures must embody the interactive experiences of present-day life. And cultural space and folk custom would regenerate with interact and experience in modern life. Regarding innovation mechanism for multicultural convergence, we propose that innovative stakeholders from different disciplines (e.g., creators, designers, engineers, and marketers) in CCIs rely on the establishment of a cocreation mechanism to promote interdisciplinary interaction. Furthermore, CCI development needs to develop a cocreation mechanism for enhancing the interdisciplinary collaboration among CCI innovation stakeholders. We further argue multicultural mixing would enhance innovation in developing CCI, and assuming an open and mutually enlightening attitude to enrich one another’s cultures in the multicultural exchanges under globalization will create diversity in homogenous CCIs. Finally, for promoting innovation in developing cultural and creative industries, we further propose a model for joint knowledge creation that can be established for enhancing the mutual reinforcement of theoretical and practical research on culture and creativity.

Keywords: culture and creativity, innovation, cultural and creative industries, cultural mixing

Procedia PDF Downloads 299
609 A Semantical Investigation on Physician Assisted Suicide in Canada between 1993 and 2015

Authors: Gabrielle Pilliat

Abstract:

The Supreme Court of Canada rendered unconstitutional the sections of the Canadian Criminal Code which prohibited the Physician-assisted suicide in February 2015. However, in 1993, the same Supreme Court of Canada ruled that Physician-assisted suicide should remain absolutely prohibited. In the light of these historical facts, we will explore how the Supreme Court of Canada was able to make two different decisions 20 years apart. To understand how Canada could rule so differently between 1993 and 2015 about Physician-assisted suicide, we will analyze the content of the Supreme Court of Canada decisions’ discourse of 1993 and of 2015. Our preliminary results indicate that A) the patient autonomy (or the personal choice) has taken over the idea of the preservation of life (or the sacred character of life) in 2015. B) That between 1993 and 2015, the physician is seen differently by the Judges; like an abusive murderer in 1993 and like an objective evaluator in 2015. C) That the patient is seen as a victim in 1993 and more like a hero in 2015.

Keywords: physician-assisted suicide, patient autonomy, choice, sacred character of life, dignity

Procedia PDF Downloads 252
608 Recovery of an Area Degraded by Gullies in the Municipality of Monte Alto (SP), Brazil

Authors: Layane Sara Vieira, Paulo Egidio Bernardo, Roberto Saverio Souza Costa

Abstract:

Anthropogenic occupations and agricultural explorations without concern for the preservation and sustainability of the activity result in soil degradation that can make rural activity unfeasible. The objective of this work was to characterize and evaluate the recovery costs of an area degraded by major erosion (gully) in the municipality of Monte Alto (SP). Topographic characterization was carried out by means of a planialtimetric survey with a total station. The contours of the gully, internal area, slope height, contribution area, volume, and costs of operations for the recovery of the gully were delimited. The results obtained showed that the gully has a length of 145.56 m, a maximum width of 36.61 m, and a gap of 19.48 m. The external area of the gully is 1,039.8741 m², and the internal area is 119.3470 m². The calculated volume was 3,282.63 m³. The intervention area for breaking slopes was measured at 8,471.29 m², requiring the construction of 19 terraces in this area, vertically spaced at 2.8 m. The estimated costs for mechanical recovery of the gully were R$ 19,167.84 (US$ 3.657,98).

Keywords: erosion, volumetric assessment, soil degradation, terraces

Procedia PDF Downloads 80
607 International Investment Arbitration and Environment: Trends and Approaches within the Framework of the ICSID

Authors: Anuj Kumar Vaksha

Abstract:

The research paper examines the trends and approaches of the international investment arbitral tribunals to the issues of environment and the exercise of states' regulatory power for the preservation of environment vis-à-vis the rights of the affected foreign investors. The paper analyses arbitral awards, decisions and orders in the leading cases of international investment arbitrations involving issues of environment and finds that there has been strong trend among the arbitral tribunals to balance the imperatives of the environmental regulation and the interest of the foreign investors. The arbitral tribunals have reflected deference to States' competence for regulation of environment to the extent they were genuine, relevant and in proportion to the legitimate objective sought to be achieved. The arbitral tribunals have at times been innovative and non-conservative in promoting the cause of environment through the mechanism of investor-state arbitration.

Keywords: International Investment Arbitration, environmental regulations, bilateral investment treaties, ICSID, NAFTA, amicus curiae, pollution havens hypothesis, environmental race to the bottom hypothesis

Procedia PDF Downloads 296
606 Acrosomal Integrity, DNA Integrity and Post-Thawing Motility of Goat Semen after Methionine Supplementation

Authors: K. A. El-Battawy, W. S. El-Nattat

Abstract:

The aim of the present investigation was to evaluate the impact of methionine on the preservation, acrosomal integrity, DNA integrity and post thawing motility of extended goat semen. Semen samples were diluted with a Tris-based extender containing the additive methionine 1.5, 2.5 and 5mM then the diluted samples were kept in glass tubes and cooled from 37°C to 5°C in a cold cabinet, and maintained at 5°C. Sperm motility (SM%), alive sperm (AS%), sperm abnormalities (SA%) acrosomal integrity and DNA integrity were determined at 5°C for periods of 0,24, 48and 72 h of liquid storage. Furthermore, the influence of methionine on post-thawing motility was assessed. The results elaborated that the addition of methionine and L-tyrosine particularly 2.5mM of methionine significantly improved SM% and reduced dead sperm %. Furthermore, the addition of 2.5mM methionine improved post-thawing motility (43.75 ± 1.25% vs. 32.50 ± 3.23 in the control group). Moreover, the frequency of acrosomal defects was lower in treated groups than in control. In conclusion, the addition of methionine induced remarkable physiological effects on goat semen quality during conservation for 7-days-long period at 5°C and improved its freezability.

Keywords: methionine, acrosome, semen, cryopreservation

Procedia PDF Downloads 363
605 Intrinsic and Extrinsic Motivations in Organic Farming Practices and Farmers’ Subjective Well-Being: The Case of French Organic Farmers

Authors: Nguyen Thi Huong Nhai

Abstract:

This paper examines how different motivations to engage in organic farming may impact the farmers’ subjective well-being using a survey database from the French Agence Bio. Three measures representing the subjective well-being of farmers brought by their involvement in organic farming are used in this study: feelings of pride, satisfaction, and feeling of happiness. We focus on the effects of two different types of motivations: intrinsic motivations, such as preservation of human health and public health, concern about the environment, and autonomy in farming decisions; extrinsic motivations, such as fair price, income, and demand incentives. Results show that not all intrinsic motivations can increase farmers’s well-being. The intrinsic motivation relating to environment concern and aspiration seems to have the highest positive impact on the three proxies of SWB in our study. It is interesting to find out that the two extrinsic motivations (profitable price, satisfying the incentive of consumer and cooperative) are proven to have a negative influence. Some comparisons, explanations, and practical implications are also indicated in this research.

Keywords: intrinsic otivation, extrinsic motivation, subjective wellbeing, organic farmers

Procedia PDF Downloads 14
604 Antimicrobial Efficacy of 0.75% Metronidazole and 2% Chlorhexidine Gel Applied in Implant Screw Hole: A Clinical Trial

Authors: Mostafa Solati

Abstract:

Objectives: Considering the gap of information regarding the optimal antimicrobial efficacy of metronidazole for application in the implant screw hole, this study aimed to compare the antimicrobial efficacy of 0.75% metronidazole and 2% chlorhexidine (CHX) gel applied in the implant screw hole. Materials and Methods: This randomized controlled clinical trial evaluated 60 implants (20 patients, each requiring three implants) in three groups (n=20). In group 1, 0.75% metronidazole gel was applied to the implant screw hole. In group 2, 2% CHX gel was applied, and in group 3, no material was used. Microbial samples were collected from the screw holes after three months, and the microbial colonies were counted. Data were analyzed using ANOVA. Results: The number of bacteria in the control group was significantly higher than that in 0.75% metronidazole gel and 2% CHX groups (P<0.05). The CHX group caused the maximum reduction in colony count with no significant difference from the metronidazole group (P>0.05). Conclusion: The application of 0.75% metronidazole gel and 2% CHX can effectively decrease the colony count in the implant screw hole and can probably play a role in the preservation of peri-implant tissue health.

Keywords: dental implant, metronidazole, CHX, screw hole

Procedia PDF Downloads 53
603 Removal of Methyl Green by an Algerian Calcic Clay

Authors: Feddal Imene, Boumediene Youssra, Mimanne Goussem

Abstract:

The history of the environment and its chemistry is above all the history of its pollution. For a large part, it is the changes made in the air, water and soil by human beings. From there, we can define that pollution is an unfavorable modification of the natural environment that appears as a by-product of human action, through direct and indirect effects. The protection and preservation of the environment is one of the pillars of sustainable development, which is currently a major issue for the future of man and the planet. Currently, humanity is facing an alarming increase in the pollution of the natural environment by various organic or inorganic materials. The objective of our work is to study the adsorption of a textile dye which is known in the industrial environment, methyl green, on raw calcic clay. Our material was characterized by X-ray diffraction (XRD) Fourier transform infrared (FTIR), we also determined its cation exchange capacity (CEC), pHzc and specific surface by Methylene Blue method. The kinetic and thermodynamic study of the adsorption of methyl green was studied, these experiments resulted that the adsorption of the dye follows pseudo second order kinetics, and according to the thermodynamic study and the study of the probability we can say that we have a physisorption.

Keywords: calcic clay, dye, materials, environment

Procedia PDF Downloads 41
602 Consumer Experience of 3D Body Scanning Technology and Acceptance of Related E-Commerce Market Applications in Saudi Arabia

Authors: Moudi Almousa

Abstract:

This research paper explores Saudi Arabian female consumers’ experiences using 3D body scanning technology and their level of acceptance of possible market applications of this technology to adopt for apparel online shopping. Data was collected for 82 women after being scanned then viewed a short video explaining three possible scenarios of 3D body scanning applications, which include size prediction, customization, and virtual try-on, before completing the survey questionnaire. Although respondents have strong positive responses towards the scanning experience, the majority were concerned about their privacy during the scanning process. The results indicated that size prediction and virtual try on had greater market application potential and a higher chance of crossing the gap based on consumer interest. The results of the study also indicated a strong positive correlation between respondents’ concern with inability to try on apparel products in online environments and their willingness to use the 3D possible market applications.

Keywords: 3D body scanning, market applications, online, apparel fit

Procedia PDF Downloads 124
601 The Comparison of Open Source Software for Digital Libraries

Authors: Kanita Beširević

Abstract:

Open-source software development activities highly rely on Internet gathering communities volunteering in software development projects. Additionally, the libraries and cultural institutions share their metadata in the form of linked metadata to enable dissemination and enrichment. The open-source software provides free alternatives to traditional software solutions. The article aims to investigate the ever-increasing options for the digital library open source software adoption. The software available is presented and compared to other software solutions as well as to their previous versions. The top three open-source digital library software solutions are presented and compared. The comparison criteria are adopted from the UNESCO study by Bankier, J., & Gleason, K. Institutional Repository Software Comparison comprising of twelve criteria to appraise software, namely: infrastructure, front-end design, content discovery, publication tools, interoperability, and preservation. This article adopts a descriptive methodology based on data and information collected through selected software websites and the literature review.

Keywords: open source software, digital library, DSpace, Fedora, Greenstone

Procedia PDF Downloads 91
600 Proactive WPA/WPA2 Security Using DD-WRT Firmware

Authors: Mustafa Kamoona, Mohamed El-Sharkawy

Abstract:

Although the latest Wireless Local Area Network technology Wi-Fi 802.11i standard addresses many of the security weaknesses of the antecedent Wired Equivalent Privacy (WEP) protocol, there are still scenarios where the network security are still vulnerable. The first security model that 802.11i offers is the Personal model which is very cheap and simple to install and maintain, yet it uses a Pre Shared Key (PSK) and thus has a low to medium security level. The second model that 802.11i provide is the Enterprise model which is highly secured but much more expensive and difficult to install/maintain and requires the installation and maintenance of an authentication server that will handle the authentication and key management for the wireless network. A central issue with the personal model is that the PSK needs to be shared with all the devices that are connected to the specific Wi-Fi network. This pre-shared key, unless changed regularly, can be cracked using offline dictionary attacks within a matter of hours. The key is burdensome to change in all the connected devices manually unless there is some kind of algorithm that coordinate this PSK update. The key idea of this paper is to propose a new algorithm that proactively and effectively coordinates the pre-shared key generation, management, and distribution in the cheap WPA/WPA2 personal security model using only a DD-WRT router.

Keywords: Wi-Fi, WPS, TLS, DD-WRT

Procedia PDF Downloads 213
599 Post-Harvest Preservation of Mango Fruit Using Freeze and Tray Drying Methods

Authors: O. A. Adeyeye, E. R. Sadiku, Periyar Selvam Sellamuthu, Anand Babu Perumal, Reshma B. Nambiar

Abstract:

Mango is a tropical fruit which is often labelled as ‘super-fruit’ because of its unquantifiable benefits to human beings. However, despite its great importance, mango is a seasonal fruit and only very few off-seasonal cultivars are available in the market for consumption. Therefore, to overcome the seasonal variation and to increase the shelf-life of mango fruits, different drying methods are considered. In this study, freeze drying and tray drying methods were used to preserve two different cultivars of mango from South Africa. Moisture content, total soluble solid, ascorbic acid, total phenol content (TPC), antioxidant activity (DPPH) and organoleptic tests were carried out on the samples before and after drying. The effects of different edible preservatives and selected packaging materials used were analyzed on each sample. The result showed that freeze drying method is the best method of preserving the selected cultivar.

Keywords: postharvest, Mangos, cultivar, total soluble solid, total phenol content, antioxidant

Procedia PDF Downloads 330
598 Detection Method of Federated Learning Backdoor Based on Weighted K-Medoids

Authors: Xun Li, Haojie Wang

Abstract:

Federated learning is a kind of distributed training and centralized training mode, which is of great value in the protection of user privacy. In order to solve the problem that the model is vulnerable to backdoor attacks in federated learning, a backdoor attack detection method based on a weighted k-medoids algorithm is proposed. First of all, this paper collates the update parameters of the client to construct a vector group, then uses the principal components analysis (PCA) algorithm to extract the corresponding feature information from the vector group, and finally uses the improved k-medoids clustering algorithm to identify the normal and backdoor update parameters. In this paper, the backdoor is implanted in the federation learning model through the model replacement attack method in the simulation experiment, and the update parameters from the attacker are effectively detected and removed by the defense method proposed in this paper.

Keywords: federated learning, backdoor attack, PCA, k-medoids, backdoor defense

Procedia PDF Downloads 88
597 Post Harvest Preservation of Mango Fruit Using Freeze Drying and Tray Drying Methods

Authors: O. A. Adeyeye, E. R. Sadiku, Selvam Sellamuthu Periyar, Babu Perumal Anand, B. Nambiar Reshma

Abstract:

Mango is a tropical fruit which is often labelled as ‘super-fruit’ because of its unquantifiable benefits to human beings. However, despite its great importance, mango is a seasonal fruit, and only very few off-seasonal species are available in the market for consumption. Therefore, in order to overcome the seasonal variation and to increase the shelf-life of mango fruits, different drying methods are considered In this study, freeze drying and tray drying methods were used to preserve two different cultivars of mango from South Africa. Moisture content, total soluble solid, ascorbic acid, total phenol content (TPC), antioxidant activity (DPPH) and organoleptic tests were carried out on the samples before and after drying. The effects of different edible preservatives and selected packaging materials used were analyzed on each sample. The result showed that freeze drying method is the best method of preserving the selected cultivar.

Keywords: postharvest, mangos, cultivar, total soluble solid, total phenol content, antioxidant

Procedia PDF Downloads 365
596 An Efficient Mitigation Plan to Encounter Various Vulnerabilities in Internet of Things Enterprises

Authors: Umesh Kumar Singh, Abhishek Raghuvanshi, Suyash Kumar Singh

Abstract:

As IoT networks gain popularity, they are more susceptible to security breaches. As a result, it is crucial to analyze the IoT platform as a whole from the standpoint of core security concepts. The Internet of Things relies heavily on wireless networks, which are well-known for being susceptible to a wide variety of attacks. This article provides an analysis of many techniques that may be used to identify vulnerabilities in the software and hardware associated with the Internet of Things (IoT). In the current investigation, an experimental setup is built with the assistance of server computers, client PCs, Internet of Things development boards, sensors, and cloud subscriptions. Through the use of network host scanning methods and vulnerability scanning tools, raw data relating to IoT-based applications and devices may be collected. Shodan is a tool that is used for scanning, and it is also used for effective vulnerability discovery in IoT devices as well as penetration testing. This article presents an efficient mitigation plan for encountering vulnerabilities in the Internet of Things.

Keywords: internet of things, security, privacy, vulnerability identification, mitigation plan

Procedia PDF Downloads 20
595 The Effectiveness of Using MS SharePoint for the Curriculum Repository System

Authors: Misook Ahn

Abstract:

This study examines the Institutional Curriculum Repository (ICR) developed with MS SharePoint. The purpose of using MS SharePoint is to organize, share, and manage the curriculum data. The ICR aims to build a centralized curriculum infrastructure, preserve all curriculum materials, and provide academic service to users (faculty, students, or other agencies). The ICR collection includes core language curriculum materials developed by each language school—foreign language textbooks, language survival kits, and audio files currently in or not in use at the schools. All core curriculum materials with audio and video files have been coded, collected, and preserved at the ICR. All metadata for the collected curriculum materials have been input by language, code, year, book type, level, user, version, and current status (in use/not in use). The qualitative content analysis, including the survey data, is used to evaluate the effectiveness of using MS SharePoint for the repository system. This study explains how to manage and preserve curriculum materials with MS SharePoint, along with challenges and suggestions for further research. This study will be beneficial to other universities or organizations considering archiving or preserving educational materials.

Keywords: digital preservation, ms sharepoint, repository, curriculum materials

Procedia PDF Downloads 80
594 The Influence of Website Quality on Customer E-Satisfaction in Low Cost Airline

Authors: Zainab Khalifah, Wong Chiet Bing, Noor Hazarina Hashim

Abstract:

The evolution of customer behavior in purchasing products or services through the Internet leads to airline companies engaging in the e-ticketing process in order to maintain their business. A well-designed website is vitally significant for the airline companies to provide effective communication, support, and competitive advantage. This study was conducted to identify the dimensions of website quality for low cost airline and to investigate the relationship between the website quality and customer e-satisfaction at low cost airline. A total of 381 responses were conveniently collected among local passengers at Low Cost Carrier Terminal, Kuala Lumpur via questionnaire distribution. This study found that the five determinant factors of website quality for AirAsia were Information Content, Navigation, Responsiveness, Personalization, and Security and Privacy. The results of this study revealed that there is a positive relationship between the five dimensions of website quality and customer e-satisfaction, and also information content was the most significant contributor to customer e-satisfaction.

Keywords: website quality, customer e-satisfaction, low cost airline, e-ticketing

Procedia PDF Downloads 401
593 Development of a Data Security Model Using Steganography

Authors: Terungwa Simon Yange, Agana Moses A.

Abstract:

This paper studied steganography and designed a simplistic approach to a steganographic tool for hiding information in image files with the view of addressing the security challenges with data by hiding data from unauthorized users to improve its security. The Structured Systems Analysis and Design Method (SSADM) was used in this work. The system was developed using Java Development Kit (JDK) 1.7.0_10 and MySQL Server as its backend. The system was tested with some hypothetical health records which proved the possibility of protecting data from unauthorized users by making it secret so that its existence cannot be easily recognized by fraudulent users. It further strengthens the confidentiality of patient records kept by medical practitioners in the health setting. In conclusion, this work was able to produce a user friendly steganography software that is very fast to install and easy to operate to ensure privacy and secrecy of sensitive data. It also produced an exact copy of the original image and the one carrying the secret message when compared with each.

Keywords: steganography, cryptography, encryption, decryption, secrecy

Procedia PDF Downloads 244
592 Antifungal Lactobacilli Affect Mycelium Morphology and Protect Apricot Juice against Mold Spoilage

Authors: Nora Laref, Bettache Guessas

Abstract:

Preservation of foods mainly depends on delaying or inhibiting the growth of spoilage microorganisms, and antifungal activity of lactic acid bacteria is one of the technological properties researched. The antifungal activity was screened with overlay method of six strains of lactic acid bacteria (Lactobacillus plantarum LB54, LB52, LB51, LB20, LB24 Lactobacillus farciminis LB53) isolated from silage, camel milk and carrot against Aspergillus sp. Lactobacillus plantarum and farciminis inhibit spore germination and mycelia growth of Aspergillus sp., the production of antifungal compounds by these strains was detectable after 4h of incubation at 30°C and show total inhibition after 24h in liquid media, but in solid media showed a good inhibition after 96h of incubation, these compounds cause malformations in the thalle, conidiophore and conidia. These strains could be used as agents of biopreservation since have the ability to retard Aspergillus sp., growth in apricot juice with and without sugar conserved in refrigerator but not in bread.

Keywords: lactobacillus, antifungal substances, aspergillus, biopreservation

Procedia PDF Downloads 322
591 Digital Reconstruction of Museum's Statue Using 3D Scanner for Cultural Preservation in Indonesia

Authors: Ahmad Zaini, F. Muhammad Reza Hadafi, Surya Sumpeno, Muhtadin, Mochamad Hariadi

Abstract:

The lack of information about museum’s collection reduces the number of visits of museum. Museum’s revitalization is an urgent activity to increase the number of visits. The research's roadmap is building a web-based application that visualizes museum in the virtual form including museum's statue reconstruction in the form of 3D. This paper describes implementation of three-dimensional model reconstruction method based on light-strip pattern on the museum statue using 3D scanner. Noise removal, alignment, meshing and refinement model's processes is implemented to get a better 3D object reconstruction. Model’s texture derives from surface texture mapping between object's images with reconstructed 3D model. Accuracy test of dimension of the model is measured by calculating relative error of virtual model dimension compared against the original object. The result is realistic three-dimensional model textured with relative error around 4.3% to 5.8%.

Keywords: 3D reconstruction, light pattern structure, texture mapping, museum

Procedia PDF Downloads 442
590 Time-Series Load Data Analysis for User Power Profiling

Authors: Mahdi Daghmhehci Firoozjaei, Minchang Kim, Dima Alhadidi

Abstract:

In this paper, we present a power profiling model for smart grid consumers based on real time load data acquired smart meters. It profiles consumers’ power consumption behaviour using the dynamic time warping (DTW) clustering algorithm. Due to the invariability of signal warping of this algorithm, time-disordered load data can be profiled and consumption features be extracted. Two load types are defined and the related load patterns are extracted for classifying consumption behaviour by DTW. The classification methodology is discussed in detail. To evaluate the performance of the method, we analyze the time-series load data measured by a smart meter in a real case. The results verify the effectiveness of the proposed profiling method with 90.91% true positive rate for load type clustering in the best case.

Keywords: power profiling, user privacy, dynamic time warping, smart grid

Procedia PDF Downloads 122
589 Decentralized Data Marketplace Framework Using Blockchain-Based Smart Contract

Authors: Meshari Aljohani, Stephan Olariu, Ravi Mukkamala

Abstract:

Data is essential for enhancing the quality of life. Its value creates chances for users to profit from data sales and purchases. Users in data marketplaces, however, must share and trade data in a secure and trusted environment while maintaining their privacy. The first main contribution of this paper is to identify enabling technologies and challenges facing the development of decentralized data marketplaces. The second main contribution is to propose a decentralized data marketplace framework based on blockchain technology. The proposed framework enables sellers and buyers to transact with more confidence. Using a security deposit, the system implements a unique approach for enforcing honesty in data exchange among anonymous individuals. Before the transaction is considered complete, the system has a time frame. As a result, users can submit disputes to the arbitrators which will review them and respond with their decision. Use cases are presented to demonstrate how these technologies help data marketplaces handle issues and challenges.

Keywords: blockchain, data, data marketplace, smart contract, reputation system

Procedia PDF Downloads 140
588 Students’ Perceptions of the Use of Social Media in Higher Education in Saudi Arabia

Authors: Omar Alshehri, Vic Lally

Abstract:

This paper examined the attitudes of using social media tools to support learning at a university in Saudi Arabia. Moreover, it investigated the students’ current usage of these tools and examined the barriers they could face during the use of social media tools in the education process. Participants in this study were 42 university students. A web-based survey was used to collect data for this study. The results indicate that all of the students were familiar with social media and had used at least one type of social media for learning. It was found out that all students had very positive attitudes towards the use of social media and welcomed using these tools as a supplementary to the curriculum. However, the results indicated that the major barriers to using these tools in learning were distraction, opposing Islamic religious teachings, privacy issues, and cyberbullying. The study recommended that this study could be replicated at other Saudi universities to investigate factors and barriers that might affect Saudi students’ attitudes toward using social media to support learning.

Keywords: barriers to social media use, benefits of social media use, higher education, Saudi Arabia, social media

Procedia PDF Downloads 146
587 Avian Bioecological Status In Batna Wetlands (NE, Algeria)

Authors: Marref C., Bezzalla A., Marref S., Houhamdi M.

Abstract:

Wetlands represent ecosystems of great importance through their ecological and socio-economic functions and biological diversity, even if they are most threatened by anthropization. This study aimed to contribute to the creation of an inventory of bird species in Batna, on Algeria from 2020 to 2022. Counts were carried out from 8:00 to 19:00 using a telescope (20 × 60) and a pair of binoculars (10 × 50) and by employing absolute and relative methods. Birds were categorized by phenology, habitat, biogeography, and diet. A total of 80 species in 58 genera and 19 families were observed. Migratory birds were dominant (38%) phenologically, and the birds of Palearctic origin dominated (26.25%) biogeographically. Invertivorous and carnivorous species were most common (35%). Ecologically, the majority of species were waterbirds (73.75%), which are protected in Algeria. This study highlights the need for the preservation of ecosystem components and enhancement of biological resources of protected, rare, and key species. it observed 43797 individuals of Marmaronetta angustirostris during our study and reported the nesting of Podiceps nigricollis, Porphyrio porphyrio, and Tadorna ferruginea. For this reason, it is recommended to propose the area as a Ramsar site.

Keywords: biodiversity, avifauna, ecologicat status, zone humide, algerie

Procedia PDF Downloads 36
586 Improving the Security of Internet of Things Using Encryption Algorithms

Authors: Amirhossein Safi

Abstract:

Internet of things (IOT) is a kind of advanced information technology which has drawn societies’ attention. Sensors and stimulators are usually recognized as smart devices of our environment. Simultaneously, IOT security brings up new issues. Internet connection and possibility of interaction with smart devices cause those devices to involve more in human life. Therefore, safety is a fundamental requirement in designing IOT. IOT has three remarkable features: overall perception, reliable transmission, and intelligent processing. Because of IOT span, security of conveying data is an essential factor for system security. Hybrid encryption technique is a new model that can be used in IOT. This type of encryption generates strong security and low computation. In this paper, we have proposed a hybrid encryption algorithm which has been conducted in order to reduce safety risks and enhancing encryption's speed and less computational complexity. The purpose of this hybrid algorithm is information integrity, confidentiality, non-repudiation in data exchange for IOT. Eventually, the suggested encryption algorithm has been simulated by MATLAB software, and its speed and safety efficiency were evaluated in comparison with conventional encryption algorithm.

Keywords: internet of things, security, hybrid algorithm, privacy

Procedia PDF Downloads 438
585 Automatic Content Curation of Visual Heritage

Authors: Delphine Ribes Lemay, Valentine Bernasconi, André Andrade, Lara DéFayes, Mathieu Salzmann, FréDéRic Kaplan, Nicolas Henchoz

Abstract:

Digitization and preservation of large heritage induce high maintenance costs to keep up with the technical standards and ensure sustainable access. Creating impactful usage is instrumental to justify the resources for long-term preservation. The Museum für Gestaltung of Zurich holds one of the biggest poster collections of the world from which 52’000 were digitised. In the process of building a digital installation to valorize the collection, one objective was to develop an algorithm capable of predicting the next poster to show according to the ones already displayed. The work presented here describes the steps to build an algorithm able to automatically create sequences of posters reflecting associations performed by curator and professional designers. The exposed challenge finds similarities with the domain of song playlist algorithms. Recently, artificial intelligence techniques and more specifically, deep-learning algorithms have been used to facilitate their generations. Promising results were found thanks to Recurrent Neural Networks (RNN) trained on manually generated playlist and paired with clusters of extracted features from songs. We used the same principles to create the proposed algorithm but applied to a challenging medium, posters. First, a convolutional autoencoder was trained to extract features of the posters. The 52’000 digital posters were used as a training set. Poster features were then clustered. Next, an RNN learned to predict the next cluster according to the previous ones. RNN training set was composed of poster sequences extracted from a collection of books from the Gestaltung Museum of Zurich dedicated to displaying posters. Finally, within the predicted cluster, the poster with the best proximity compared to the previous poster is selected. The mean square distance between features of posters was used to compute the proximity. To validate the predictive model, we compared sequences of 15 posters produced by our model to randomly and manually generated sequences. Manual sequences were created by a professional graphic designer. We asked 21 participants working as professional graphic designers to sort the sequences from the one with the strongest graphic line to the one with the weakest and to motivate their answer with a short description. The sequences produced by the designer were ranked first 60%, second 25% and third 15% of the time. The sequences produced by our predictive model were ranked first 25%, second 45% and third 30% of the time. The sequences produced randomly were ranked first 15%, second 29%, and third 55% of the time. Compared to designer sequences, and as reported by participants, model and random sequences lacked thematic continuity. According to the results, the proposed model is able to generate better poster sequencing compared to random sampling. Eventually, our algorithm is sometimes able to outperform a professional designer. As a next step, the proposed algorithm should include a possibility to create sequences according to a selected theme. To conclude, this work shows the potentiality of artificial intelligence techniques to learn from existing content and provide a tool to curate large sets of data, with a permanent renewal of the presented content.

Keywords: Artificial Intelligence, Digital Humanities, serendipity, design research

Procedia PDF Downloads 158
584 Investigation the Polluting Effect of Heavy Elements on Underground Water in Behbahan Plain, South West Zagros

Authors: Zohreh Marbooti, Rezvan Khavari

Abstract:

Groundwater as an essential part of natural resources seems to be an important issue in environmental engineering, so preservation and purification of it can have a critical value for any community. This paper investigates the concentration of elements of Pb, Cd, As, Se. For ground water in Behbahan (a city on south west of Iran), to this purpose a group of 30 wells were studied to examine the concentration of the elements of Pb, Cd, As, Se, and also to determine PH, EC, TDS, temperature and the ions of HCO32-, SO42-, Cl-, Na+, Mg2+, Ca2+, K+ for the wells. Results of the analyses show that the concentration of the elements of Pb, As and, Cd in 33,13,56 percent of the wells respectively and Se in all the samples were greater than normal range of WHO. Since there is a low correlation between Pb and major ions of (HCO32-, SO42-, Cl-, Na+, Mg2+, Ca2+, K+) it can be revealed that Pb overconcentration caused by human contamination. Relative great correlation between Se and the ions showed that Se derived from Gypsum and Dolomit. The big correlation between As and major cations and onions, imply that As can originate from dissolution and liquidation of mineral evaporation in the zone. The high rate of Cadmium concentration in urban sewagewater is due to the small industries, workshops and, mills wastewater.

Keywords: heavy elements, underground water, pollution, waste water

Procedia PDF Downloads 545
583 Using a Robot Companion to Detect and Visualize the Indicators of Dementia Progression and Quality of Life of People Aged 65 and Older

Authors: Jeoffrey Oostrom, Robbert James Schlingmann, Hani Alers

Abstract:

This document depicts the research into the indicators of dementia progression, the automation of quality of life assignments, and the visualization of it. To do this, the Smart Teddy project was initiated to make a smart companion that both monitors the senior citizen as well as processing the captured data into an insightful dashboard. With around 50 million diagnoses worldwide, dementia proves again and again to be a bothersome strain on the lives of many individuals, their relatives, and society as a whole. In 2015 it was estimated that dementia care cost 818 billion U.S Dollars globally. The Smart Teddy project aims to take away a portion of the burden from caregivers by automating the collection of certain data, like movement, geolocation, and sound-levels. This paper proves that the Smart Teddy has the potential to become a useful tool for caregivers but won’t pose as a solution. The Smart Teddy still faces some problems in terms of emotional privacy, but its non-intrusive nature, as well as diversity in usability, can make up for it.

Keywords: dementia care, medical data visualization, quality of life, smart companion

Procedia PDF Downloads 118