Search results for: data integrity and privacy
25385 Impact of Geomagnetic Storm on Ionosphere
Authors: Affan Ahmed
Abstract:
This research investigates the impact of the geomagnetic storm occurring from April 22 to April 26, 2023, on the Earth’s ionosphere, with a focus on analyzing specific ionospheric parameters to understand the storm's effects on ionospheric stability and GNSS signal propagation. Geomagnetic storms, caused by intensified solar wind-magnetosphere interactions, can significantly disturb ionospheric conditions, impacting electron density, Total Electron Content (TEC), and thermospheric composition. Such disturbances are particularly relevant to satellite-based navigation and communication systems, as fluctuations in ionospheric parameters can degrade signal integrity and reliability. In this study, data were obtained from multiple sources, including OMNIWeb for parameters like Dst, Kp, Bz, Electric Field, and solar wind pressure, GUVI for O/N₂ ratio maps, and TEC data from low-, mid-, and high-latitude stations available on the IONOLAB website. Additional Equatorial Electrojet (EEJ) and geomagnetic data were acquired from INTERMAGNET. The methodology involved comparing storm-affected data from April 22 to April 26 with quiet days in April 2023, using statistical and wavelet analysis to assess variations in parameters like TEC, O/N₂ ratio, and geomagnetic indices. The results show pronounced fluctuations in TEC and other ionospheric parameters during the main phase of the storm, with spatial variations observed across latitudes, highlighting the global response of the ionosphere to geomagnetic disturbances. The findings underline the storm’s significant impact on ionospheric composition, particularly in mid- and high-latitude regions, which correlates with increased GNSS signal interference in these areas. This study contributes to understanding the ionosphere’s response to geomagnetic activity, emphasizing the need for robust models to predict and mitigate space weather effects on GNSS-dependent technologies.Keywords: geomagnetic storms, ionospheric disturbances, space weather effects, magnetosphere-ionosphere coupling
Procedia PDF Downloads 025384 Cloud Computing: Deciding Whether It Is Easier or Harder to Defend Against Cyber Attacks
Authors: Emhemed Shaklawoon, Ibrahim Althomali
Abstract:
We propose that we identify different defense mechanisms that were used before the introduction of the cloud and compare if their protection mechanisms are still valuable and to what degree. Note that in order to defend against vulnerability, we must know how this vulnerability is abused in an attack. Only then, we will be able to recognize if it is easier or harder to defend against cyber attacks.Keywords: cloud computing, privacy, cyber attacks, defend the cloud
Procedia PDF Downloads 42225383 Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya
Authors: Samuel Mwangi, Josephine K. Mule
Abstract:
Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities.Keywords: facial recognition, access control, technology, learning
Procedia PDF Downloads 12525382 Influence of Geomagnetic Storms on Ionospheric Parameters
Authors: Affan Ahmed
Abstract:
This research investigates the Influence of geomagnetic storm occurring from April 22 to April 26, 2023, on the Earth’s ionosphere, with a focus on analyzing specific ionospheric parameters to understand the storm's effects on ionospheric stability and GNSS signal propagation. Geomagnetic storms, caused by intensified solar wind-magnetosphere interactions, can significantly disturb ionospheric conditions, impacting electron density, Total Electron Content (TEC), and thermospheric composition. Such disturbances are particularly relevant to satellite-based navigation and communication systems, as fluctuations in ionospheric parameters can degrade signal integrity and reliability. In this study, data were obtained from multiple sources, including OMNIWeb for parameters like Dst, Kp, Bz, Electric Field, and solar wind pressure, GUVI for O/N₂ ratio maps, and TEC data from low-, mid-, and high-latitude stations available on the IONOLAB website. Additional Equatorial Electrojet (EEJ) and geomagnetic data were acquired from INTERMAGNET. The methodology involved comparing storm-affected data from April 22 to April 26 with quiet days in April 2023, using statistical and wavelet analysis to assess variations in parameters like TEC, O/N₂ ratio, and geomagnetic indices. The results show pronounced fluctuations in TEC and other ionospheric parameters during the main phase of the storm, with spatial variations observed across latitudes, highlighting the global response of the ionosphere to geomagnetic disturbances. The findings underline the storm’s significant impact on ionospheric composition, particularly in mid- and high-latitude regions, which correlates with increased GNSS signal interference in these areas. This study contributes to understanding the ionosphere’s response to geomagnetic activity, emphasizing the need for robust models to predict and mitigate space weather effects on GNSS-dependent technologies.Keywords: geomagnetic storms, ionospheric disturbances, space weather effects, magnetosphere-ionopheric coupling
Procedia PDF Downloads 025381 The Internet of Things: A Survey of Authentication Mechanisms, and Protocols, for the Shifting Paradigm of Communicating, Entities
Authors: Nazli Hardy
Abstract:
Multidisciplinary application of computer science, interactive database-driven web application, the Internet of Things (IoT) represents a digital ecosystem that has pervasive technological, social, and economic, impact on the human population. It is a long-term technology, and its development is built around the connection of everyday objects, to the Internet. It is estimated that by 2020, with billions of people connected to the Internet, the number of connected devices will exceed 50 billion, and thus IoT represents a paradigm shift in in our current interconnected ecosystem, a communication shift that will unavoidably affect people, businesses, consumers, clients, employees. By nature, in order to provide a cohesive and integrated service, connected devices need to collect, aggregate, store, mine, process personal and personalized data on individuals and corporations in a variety of contexts and environments. A significant factor in this paradigm shift is the necessity for secure and appropriate transmission, processing and storage of the data. Thus, while benefits of the applications appear to be boundless, these same opportunities are bounded by concerns such as trust, privacy, security, loss of control, and related issues. This poster and presentation look at a multi-factor authentication (MFA) mechanisms that need to change from the login-password tuple to an Identity and Access Management (IAM) model, to the more cohesive to Identity Relationship Management (IRM) standard. It also compares and contrasts messaging protocols that are appropriate for the IoT ecosystem.Keywords: Internet of Things (IoT), authentication, protocols, survey
Procedia PDF Downloads 29925380 Students’ Perceptions of the Use of Social Media in Higher Education in Saudi Arabia
Authors: Omar Alshehri, Vic Lally
Abstract:
This paper examined the attitudes of using social media tools to support learning at a university in Saudi Arabia. Moreover, it investigated the students’ current usage of these tools and examined the barriers they could face during the use of social media tools in the education process. Participants in this study were 42 university students. A web-based survey was used to collect data for this study. The results indicate that all of the students were familiar with social media and had used at least one type of social media for learning. It was found out that all students had very positive attitudes towards the use of social media and welcomed using these tools as a supplementary to the curriculum. However, the results indicated that the major barriers to using these tools in learning were distraction, opposing Islamic religious teachings, privacy issues, and cyberbullying. The study recommended that this study could be replicated at other Saudi universities to investigate factors and barriers that might affect Saudi students’ attitudes toward using social media to support learning.Keywords: barriers to social media use, benefits of social media use, higher education, Saudi Arabia, social media
Procedia PDF Downloads 16725379 Analysis of Big Data
Authors: Sandeep Sharma, Sarabjit Singh
Abstract:
As per the user demand and growth trends of large free data the storage solutions are now becoming more challenge-able to protect, store and to retrieve data. The days are not so far when the storage companies and organizations are start saying 'no' to store our valuable data or they will start charging a huge amount for its storage and protection. On the other hand as per the environmental conditions it becomes challenge-able to maintain and establish new data warehouses and data centers to protect global warming threats. A challenge of small data is over now, the challenges are big that how to manage the exponential growth of data. In this paper we have analyzed the growth trend of big data and its future implications. We have also focused on the impact of the unstructured data on various concerns and we have also suggested some possible remedies to streamline big data.Keywords: big data, unstructured data, volume, variety, velocity
Procedia PDF Downloads 54825378 Studies on the Characterization and Machinability of Duplex Stainless Steel 2205 during Dry Turning
Authors: Gaurav D. Sonawane, Vikas G. Sargade
Abstract:
The present investigation is a study of the effect of advanced Physical Vapor Deposition (PVD) coatings on cutting temperature residual stresses and surface roughness during Duplex Stainless Steel (DSS) 2205 turning. Austenite stabilizers like nickel, manganese, and molybdenum reduced the cost of DSS. Surface Integrity (SI) plays an important role in determining corrosion resistance and fatigue life. Resistance to various types of corrosion makes DSS suitable for applications with critical environments like Heat exchangers, Desalination plants, Seawater pipes and Marine components. However, lower thermal conductivity, poor chip control and non-uniform tool wear make DSS very difficult to machine. Cemented carbide tools (M grade) were used to turn DSS in a dry environment. AlTiN and AlTiCrN coatings were deposited using advanced PVD High Pulse Impulse Magnetron Sputtering (HiPIMS) technique. Experiments were conducted with cutting speed of 100 m/min, 140 m/min and 180 m/min. A constant feed and depth of cut of 0.18 mm/rev and 0.8 mm were used, respectively. AlTiCrN coated tools followed by AlTiN coated tools outperformed uncoated tools due to properties like lower thermal conductivity, higher adhesion strength and hardness. Residual stresses were found to be compressive for all the tools used for dry turning, increasing the fatigue life of the machined component. Higher cutting temperatures were observed for coated tools due to its lower thermal conductivity, which results in very less tool wear than uncoated tools. Surface roughness with uncoated tools was found to be three times higher than coated tools due to lower coefficient of friction of coating used.Keywords: cutting temperature, DSS2205, dry turning, HiPIMS, surface integrity
Procedia PDF Downloads 13425377 Adoption and Use of an Electronic Voting System in Ghana
Authors: Isaac Kofi Mensah
Abstract:
The manual system of voting has been the most widely used system of electing representatives around the globe, particularly in Africa. Due to the known numerous problems and challenges associated with the manual system of voting, many countries are migrating to the electronic voting system as a suitable and credible means of electing representatives over the manual paper-based system. This research paper therefore investigated the factors influencing adoption and use of an electronic voting system in Ghana. A total of 400 Questionnaire Instruments (QI) were administered to potential respondents in Ghana, of which 387 responded representing a response rate of 96.75%. The Technology Acceptance Model was used as the theoretical framework for the study. The research model was tested using a simple linear regression analysis with SPSS. A little of over 71.1% of the respondents recommended the Electoral Commission (EC) of Ghana to adopt an electronic voting system in the conduct of public elections in Ghana. The results indicated that all the six predictors such as perceived usefulness (PU), perceived ease of use (PEOU), perceived free and fair elections (PFFF), perceived credible elections (PCE), perceived system integrity (PSI) and citizens trust in the election management body (CTEM) were all positively significant in predicting the readiness of citizens to adopt and use an electronic voting system in Ghana. However, jointly, the hypotheses tested revealed that apart from Perceived Free and Fair Elections and Perceived Credible and Transparent Elections, all the other factors such as PU, Perceived System Integrity and Security and Citizen Trust in the Election Management Body were found to be significant predictors of the Willingness of Ghanaians to use an electronic voting system. All the six factors considered in this study jointly account for about 53.1% of the reasons determining the readiness to adopt and use an electronic voting system in Ghana. The implications of this research finding on elections in Ghana are discussed.Keywords: credible elections, Election Management Body (EMB), electronic voting, Ghana, Technology Acceptance Model (TAM)
Procedia PDF Downloads 39725376 Intrusion Detection In MANET Using Game Theory
Authors: S. B. Kumbalavati, J. D. Mallapur, K. Y. Bendigeri
Abstract:
A mobile Ad-hoc network (MANET) is a multihop wireless network where nodes communicate each other without any pre-deployed infrastructure. There is no central administrating unit. Hence, MANET is generally prone to many of the attacks. These attacks may alter, release or deny data. These attacks are nothing but intrusions. Intrusion is a set of actions that attempts to compromise integrity, confidentiality and availability of resources. A major issue in the design and operation of ad-hoc network is sharing the common spectrum or common channel bandwidth among all the nodes. We are performing intrusion detection using game theory approach. Game theory is a mathematical tool for analysing problems of competition and negotiation among the players in any field like marketing, e-commerce and networking. In this paper mathematical model is developed using game theory approach and intruders are detected and removed. Bandwidth utilization is estimated and comparison is made between bandwidth utilization with intrusion detection technique and without intrusion detection technique. Percentage of intruders and efficiency of the network is analysed.Keywords: ad-hoc network, IDS, game theory, sensor networks
Procedia PDF Downloads 38725375 Research of Data Cleaning Methods Based on Dependency Rules
Authors: Yang Bao, Shi Wei Deng, WangQun Lin
Abstract:
This paper introduces the concept and principle of data cleaning, analyzes the types and causes of dirty data, and proposes several key steps of typical cleaning process, puts forward a well scalability and versatility data cleaning framework, in view of data with attribute dependency relation, designs several of violation data discovery algorithms by formal formula, which can obtain inconsistent data to all target columns with condition attribute dependent no matter data is structured (SQL) or unstructured (NoSQL), and gives 6 data cleaning methods based on these algorithms.Keywords: data cleaning, dependency rules, violation data discovery, data repair
Procedia PDF Downloads 56425374 Effects and Coping Strategies of Cyber Bullying in Pakistan: A Gender Response
Authors: Rabia Qusien
Abstract:
New media has emerged as a significant force in the society which connects people across the globe. Where new media brought many advantages for its users, there is a darker aspect of new technology in the form of cyberbullying. Researcher has employed survey method to reach to its targeted audience. Sample of 604 respondents was selected from one of metropolitan city of Pakistan Lahore to collect the data. Equal sample from both genders was selected to apply gender analysis. Results of this study indicate that cyber bullying is having significant psychological and educational effects. Females face more cyber bullying incidents as compared to males so they face more severe effects of cyber bullying. A comprehensive analysis of managing strategies depicts that mostly youth tries to handle this issue personally but at times they seek the support of their family and friends when they face severe issues. Due to privacy concerns females get more upset and they are more likely to seek social support from friends and family.Keywords: cyber bullying, cyber victims, educational impacts, psychological impacts
Procedia PDF Downloads 14525373 Sex and Sexuality Communication in African Families: The Dynamics of Openness and Closedness
Authors: Victorine Mbong Shu
Abstract:
Very little research exists on family sex and sexuality communication and identity formation and how communication is helping adolescents in forming their sexual identities in South Africa. This study is designed to explore the impact of sexual communication in African families and the dynamics that influence the openness or closedness of adolescent sexual identities. The primary objectives of this study are threefold; to understand how sexuality communication in African families impacts the closedness and/or openness of adolescent African identities; to explore the nature of African children's sexuality given the status of their families’ communications on sex; to describe how parental or adult sexual knowledge, attitudes, values of sex, etc. are translated to children in African families, if at all. This study seeks answers to challenges faced by African parents and caregivers of adolescent children in South Africa regarding sex-sexuality communication and their shifting identities in different spaces. Its outcome seeks to empower these families on how to continue to effectively communicate sex and sexuality at different stages and circumstances. Two sets of people are interviewed separately in order to explore issues of familial communication and how to understand how together with religion and culture, adolescents are socialised to form the social and gender identities that they take to adulthood. They were parents of adolescents and young adult children who spoke in retrospect on when they were adolescents. The results of this study will fill knowledge gaps considering the chosen theory of communication that gives clarity to the topic of sex and sexuality communication in African families in South Africa and the dynamics of privacy that influence identity formation. A subset of the 40 conversations, 5 female parents, 5 male parents, 5 young female adults, and 5 male young adults, was used for this analysis. The preliminary results revealed five emergent themes informed by research questions and the theoretical framework of this study: Open communication, Discomfort discussing sex and sexuality, The importance of sex communication to African parents, Factors influencing African families’ communication about sex and sexuality and Privacy and boundaries.Keywords: sex, sexuality, communication, African families, adolescents
Procedia PDF Downloads 7925372 Runtime Monitoring Using Policy-Based Approach to Control Information Flow for Mobile Apps
Authors: Mohamed Sarrab, Hadj Bourdoucen
Abstract:
Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity, and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring non-trusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during non-trusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the run-time of mobile application in response to information flow events.Keywords: mobile application, run-time verification, usable security, direct information flow
Procedia PDF Downloads 38125371 Behaviour of RC Columns at Elevated Temperatures by NDT Techniques
Authors: D. Jagath Kumari, K. Srinivasa Rao
Abstract:
Reinforced concrete column is an important structural element in a building. Concrete usually performs well in building fires. However, when it is subjected to prolonged fire exposure or unusually high temperatures, and then it will suffer significant distress. Because concrete pre-fire compressive strength generally exceeds design requirements, therefore an average strength reduction can be tolerated. However high temperature reduces the compressive strength of concrete so much that the concrete retains no useful structural strength. Therefore the residual strength and its performance of structure can be assed by NDT testing. In this paper, rebound hammer test and the ultrasonic pulse velocity (UPV) are used to evaluate the residual compressive strength and material integrity of post-fire-curing concrete subjected to elevated temperatures. Also considering the large availability of fly ash in most of the countries, an attempt was made to study the effect of high volume fly ash concrete exposed to elevated temperatures. 32 RC column specimens were made with a M20 grade concrete mix. Out of 32 column specimens 16 column specimens were made with OPC concrete and other 16 column specimens were made with HVFA concrete. All specimens having similar cross-section details. Columns were exposed to fire for temperatures from 100oC to 800o C with increments of 100o C for duration of 3 hours. Then the specimens allowed cooling to room temperature by two methods natural air cooling method and immediate water quenching method. All the specimens were tested identically, for the compressive strengths and material integrity by rebound hammer and ultrasonic pulse velocity meter respectively for study. These two tests were carried out on preheating and post heating of the column specimens. The percentage variation of compressive strengths of RCC columns with the increase in temperature has been studied and compared the results for both OPC and HVFA concretes. Physical observations of the heated columns were observed.Keywords: HVFA concrete, NDT testing, residual strength
Procedia PDF Downloads 38625370 Case Study of Sexual Violence Victim Assessment in Semarang Regency
Authors: Sujana T, Kurniasari MD, Ayakeding AM
Abstract:
Background: Sexual violence is one of the violence with high incidence in Indonesia. Purpose: This research aims to describe the implementation of sexual violence victim assessment in Semarang Regency. Method: This research is a qualitative research with embeded single case study design. Data is analized with two units of analysis. The first unit of analysis is victim’s examiner with minimum one year of work experience. Semi-structured interview method is used to obtain the data. The second unit of analysis is document related. The data is taken by observing the pathway and description of every document and how it supported each implementation of assessment. Results: This study is resulted with three themes, which are: The first theme is assessments of sexual violence in Semarang regency has been standardized. The laws of the Republic of Indonesia have regulated the handling of victims of sexual violence in outline. Victims of sexual violence can be dealt with by the police, the Integrated Service Center for Women and Children Empowerment and the Regional General Hospital. Each examination site has different operational procedures standards for dealing with victims of sexual violence. Cooperation with family and witnesses is also required in the review process to obtain accurate results and evidence; The second idea that resulted from this study is there are inhibits factors in the assessments process. Victims sometimes feel embarrassed and reluctant to recount the chronological events during reporting. The examining officer should be able to approach and build a trust to convince the victim to be able to cooperate. The third theme is there are other things to consider in the process of assessing victims of sexual violence. Ensuring implementation in accordance with applicable operational procedures standards, providing exclusive examination rooms, counseling and safeguarding the privacy of victims are important to be considered in the assessment.Keywords: assessment, case study, Semarang regency, sexual violence
Procedia PDF Downloads 14125369 Exploring the Applications of Modular Forms in Cryptography
Authors: Berhane Tewelday Weldhiwot
Abstract:
This research investigates the pivotal role of modular forms in modern cryptographic systems, particularly focusing on their applications in secure communications and data integrity. Modular forms, which are complex analytic functions with rich arithmetic properties, have gained prominence due to their connections to number theory and algebraic geometry. This study begins by outlining the fundamental concepts of modular forms and their historical development, followed by a detailed examination of their applications in cryptographic protocols such as elliptic curve cryptography and zero-knowledge proofs. By employing techniques from analytic number theory, the research delves into how modular forms can enhance the efficiency and security of cryptographic algorithms. The findings suggest that leveraging modular forms not only improves computational performance but also fortifies security measures against emerging threats in digital communication. This work aims to contribute to the ongoing discourse on integrating advanced mathematical theories into practical applications, ultimately fostering innovation in cryptographic methodologies.Keywords: modular forms, cryptography, elliptic curves, applications, mathematical theory
Procedia PDF Downloads 1725368 Enhancing Healthcare Delivery in Low-Income Markets: An Exploration of Wireless Sensor Network Applications
Authors: Innocent Uzougbo Onwuegbuzie
Abstract:
Healthcare delivery in low-income markets is fraught with numerous challenges, including limited access to essential medical resources, inadequate healthcare infrastructure, and a significant shortage of trained healthcare professionals. These constraints lead to suboptimal health outcomes and a higher incidence of preventable diseases. This paper explores the application of Wireless Sensor Networks (WSNs) as a transformative solution to enhance healthcare delivery in these underserved regions. WSNs, comprising spatially distributed sensor nodes that collect and transmit health-related data, present opportunities to address critical healthcare needs. Leveraging WSN technology facilitates real-time health monitoring and remote diagnostics, enabling continuous patient observation and early detection of medical issues, especially in areas with limited healthcare facilities and professionals. The implementation of WSNs can enhance the overall efficiency of healthcare systems by enabling timely interventions, reducing the strain on healthcare facilities, and optimizing resource allocation. This paper highlights the potential benefits of WSNs in low-income markets, such as cost-effectiveness, increased accessibility, and data-driven decision-making. However, deploying WSNs involves significant challenges, including technical barriers like limited internet connectivity and power supply, alongside concerns about data privacy and security. Moreover, robust infrastructure and adequate training for local healthcare providers are essential for successful implementation. It further examines future directions for WSNs, emphasizing innovation, scalable solutions, and public-private partnerships. By addressing these challenges and harnessing the potential of WSNs, it is possible to revolutionize healthcare delivery and improve health outcomes in low-income markets.Keywords: wireless sensor networks (WSNs), healthcare delivery, low-Income markets, remote patient monitoring, health data security
Procedia PDF Downloads 3625367 Microstructure and Mechanical Properties of Low Alloy Steel with Double Austenitizing Tempering Heat Treatment
Authors: Jae-Ho Jang, Jung-Soo Kim, Byung-Jun Kim, Dae-Geun Nam, Uoo-Chang Jung, Yoon-Suk Choi
Abstract:
Low alloy steels are widely used for pressure vessels, spent fuel storage, and steam generators required to withstand the internal pressure and prevent unexpected failure in nuclear power plants, which these may suffer embrittlement by high levels of radiation and heat for a long period. Therefore, it is important to improve mechanical properties of low alloy steels for the integrity of structure materials at an early stage of fabrication. Recently, it showed that a double austenitizing and tempering (DTA) process resulted in a significant improvement of strength and toughness by refinement of prior austenite grains. In this study, it was investigated that the mechanism of improving mechanical properties according to the change of microstructure by the second fully austenitizing temperature of the DAT process for low alloy steel required the structural integrity. Compared to conventional single austenitizing and tempering (SAT) process, the tensile elongation properties have improved about 5%, DBTTs have obtained result in reduction of about -65℃, and grain size has decreased by about 50% in the DAT process conditions. Grain refinement has crack propagation interference effect due to an increase of the grain boundaries and amount of energy absorption at low temperatures. The higher first austenitizing temperature in the DAT process, the more increase the spheroidized carbides and strengthening the effect of fine precipitates in the ferrite grain. The area ratio of the dimple in the transition area has increased by proportion to the effect of spheroidized carbides. This may the primary mechanisms that can improve low-temperature toughness and elongation while maintaining a similar hardness and strength.Keywords: double austenitizing, Ductile Brittle transition temperature, grain refinement, heat treatment, low alloy steel, low-temperature toughness
Procedia PDF Downloads 51025366 Effects of Pre-Storage Invigoration Treatments on Ageing Dendrocalamus hamiltonii Seeds
Authors: Geetika Richa, M. L. Sharma
Abstract:
Bamboo as an ancient herbal medicine has been used for thousands of years in Asia and goes by many names such as tabashir, banslochan etc. It is often used for its tonic and astringent properties. Modern analysis of bamboos show high amount of vitamins and minerals which makes them valuable as a curative. Bamboo leaf decoction and young shoots are known as remedy for intestinal worms, healing of ulcers and stomach disorders. Bamboos are known to be propagated by large scale plantations but propagation through seeds occurs very limited as they have very short viability of few months. Seeds loses viability over a period of time even under controlled conditions and important factors that affect seed viability is the decline in reserve food material, decrease in membrane integrity and fall in endogenous level of growth hormones. Invigoration treatments that include hydration, dehydration, incorporation of bioactive chemicals such as growth regulators, nutrients and antioxidants etc. improve the seed performance. Our studies were aimed to determine the most effective invigoration treatments to enhance vigour and viability of seeds by following invigoration treatments, i.e., hardening. Treated seeds were stored at controlled temperature and humidity (in desiccators at 4°C). In hardening, chemicals were applied in 3 different concentrations to three replicates of 10 seeds. Hardening was done withGA3, IAA, (each with concentrations of 10 ppm, 20 ppm and 50 ppm), calcium oxychloride, neem leaf powder and clay (each with concentrations of 2%, 5% and 10%). Statistically all the hardening materials were effective but GA3 50 ppm was the most effective one in maintaining germination percentage and vigour index. Hardening treatments increased the germination percentage of seeds, i.e. 86.2%, over control which showed germination percentage of 80.2%. It was concluded that in order to maintain seed viability during storage for longer period of time, invigoration treatments have been found to be very effective.Keywords: invigoration, seed quality, viability, hardening, membrane integrity, decoction
Procedia PDF Downloads 32125365 Substitution of Silver-Thiosulfate (STS) with Some Essential Oils on Vase-Life of Cut Carnation cv. Liberty
Authors: Mohammad Bagher Hassanpouraghdam, Mohammad Ali Aazami Mavaloo
Abstract:
Due to the huge side-effects of chemicals; essential oils have been considered as suitable alternatives for keeping the vase-life of cut flowers mainly owing to the availability and environment-friend nature of these bio-chemicals. In the present experiment, 50% substitution of STS was achieved and tested on cut carnation flowers cv. Liberty by using the essential oils from four plants; Satureja sahendica Bornm., Echinophora platyloba DC., Tanacetum balsamita L. and Cupressus arizonica Greene., as CRD with five treatments and 3 replications. Vase-life and flower diameter were affected with 50% substitution of STS by essential oils from C. arizonica and T. balsamita. Membrane stability index, Malondialdehyde (MDA) content and Hydrogen peroxide (H2O2) amounts were affected by the substitution treatments as well. The main preservative effect belonged to the substitution with C. arizonica. So that, 50% STS substitution with Cupressus oil holds the highest membrane integrity and the least data for MDA and H2O2 content.Keywords: Carnation, essential oil, Membrane stability index (MSI), vase life
Procedia PDF Downloads 49625364 Implementation of Proof of Work Using Ganache
Authors: Sakshi Singh, Shampa Chakraverty
Abstract:
One of the essential characteristics of Blockchain is the ability to validate the integrity of new transactions added to the Blockchain. Moreover, one of the essential consensus algorithms, Proof of Work, performs this job. In this work, we implemented the Proof of Work consensus method on the block formed by performing the transaction using Ganache. The primary goal of this implementation is to understand the process and record how Proof of Work works in reality on newly created blocks.Keywords: proof of work, blockchain, ganache, smart contract
Procedia PDF Downloads 16625363 Oxidative Damage to Lipids, Proteins, and DNA during Differentiation of Mesenchymal Stem Cells Derived from Umbilical Cord into Biologically Active Hepatocytes
Authors: Abdolamir Allameh, Shahnaz Esmaeili, Mina Allameh, Safoura Khajeniazi
Abstract:
Stem cells with therapeutic applications can be isolated from human placenta/umblical cord blood (UCB) as well as the cord tissue (UC). Stem cells in culture are vulnerable to oxidative stress, particularly when subjected to differentiation process. The aim of this study was to examine the chnages in the rate of oxidation that occurs to cellular macromolecules during hepatic differentiation of mononuclear cells (MSCs). In addition, the impact of the hepatic differentiation process of MSC on cellular and biological activity of the cells will be undertaken. For this purpose, first mononuclear cells (MNCs) were isolated from human UCB which was obtained from a healthy full-term infant. The cells were cultured at a density of 3×10⁵ cells/cm² in DMEM- low-glucose culture media supplemented with 20% FBS, 2 mM L-glutamine, 100 μg/ml streptomycin and 100 U/ml penicillin. Cell cultures were then incubated at 37°C in a humidified 5% CO₂ incubator. After removing non-adherent cells by replacing culture medium, fibroblast-like adherent cells were resuspended in 0.25% trypsin-EDTA and plated in 25 cm² flasks (1×10⁴/ml). Characterization of the MSCs was routinely done by observing their morphology and growth curve. MSCs were subjected to a 2-step hepatocyte differentiation protocol in presence of hepatocyte growth factor (HGF), dexamethazone (DEX) and oncostatin M (OSM). The hepatocyte-like cells derived from MSCs were checked every week for 3 weeks for changes in lipid peroxidation, protein carbonyl formation and DNA oxidation i.e., 8-hydroxy-2'-deoxyguanosine (8-OH-dG) assay. During the 3-week differentiation process of MSCs to hepatocyte-like cells we found that expression liver-specific markers such as albumin, was associated with increased levels of lipid peroxidation and protein carbonyl formation. Whereas, undifferentiated MSCs has relatively low levels of lipid peroxidation products. There was a significant increase ( p < 0.05) in lipid peroxidation products in hepatocytes on days 7, 14, and 21 of differentiation. Likewise, the level of protein carbonyls in the cells was elevated during the differentiation. The level of protein carbonyls measured in hepatocyte-like cells obtained 3 weeks after differentiation induction was estimated to be ~6 fold higher compared to cells recovered on day 7 of differentiation. On the contrary, there was a small but significant decrease in DNA damage marker (8-OH-dG) in hepatocytes recovered 3 weeks after differentiation onset. The level of 8-OHdG which was in consistent with formation of reactive oxygen species (ROS). In conclusion, this data suggest that despite the elevation in oxidation of lipid and protein molecules during hepatocyte development, the cells were normal in terms of DNA integrity, morphology, and biologically activity.Keywords: adult stem cells, DNA integrity, free radicals, hepatic differentiation
Procedia PDF Downloads 15025362 Stakeholder Mapping and Requirements Identification for Improving Traceability in the Halal Food Supply Chain
Authors: Laila A. H. F. Dashti, Tom Jackson, Andrew West, Lisa Jackson
Abstract:
Traceability systems are important in the agri-food and halal food sectors for monitoring ingredient movements, tracking sources, and ensuring food integrity. However, designing a traceability system for the halal food supply chain is challenging due to diverse stakeholder requirements and complex needs. Existing literature on stakeholder mapping and identifying requirements for halal food supply chains is limited. To address this gap, a pilot study was conducted to identify the objectives, requirements, and recommendations of stakeholders in the Kuwaiti halal food industry. The study collected data through semi-structured interviews with an international halal food manufacturer based in Kuwait. The aim was to gain a deep understanding of stakeholders' objectives, requirements, processes, and concerns related to the design of a traceability system in the country's halal food sector. Traceability systems are being developed and tested in the agri-food and halal food sectors due to their ability to monitor ingredient movements, track sources, and detect potential issues related to food integrity. Designing a traceability system for the halal food supply chain poses significant challenges due to diverse stakeholder requirements and the complexity of their needs (including varying food ingredients, different sources, destinations, supplier processes, certifications, etc.). Achieving a halal food traceability solution tailored to stakeholders' requirements within the supply chain necessitates prior knowledge of these needs. Although attempts have been made to address design-related issues in traceability systems, literature on stakeholder mapping and identification of requirements specific to halal food supply chains is scarce. Thus, this pilot study aims to identify the objectives, requirements, and recommendations of stakeholders in the halal food industry. The paper presents insights gained from the pilot study, which utilized semi-structured interviews to collect data from a Kuwait-based international halal food manufacturer. The objective was to gain an in-depth understanding of stakeholders' objectives, requirements, processes, and concerns pertaining to the design of a traceability system in Kuwait's halal food sector. The stakeholder mapping results revealed that government entities, food manufacturers, retailers, and suppliers are key stakeholders in Kuwait's halal food supply chain. Lessons learned from this pilot study regarding requirement capture for traceability systems include the need to streamline communication, focus on communication at each level of the supply chain, leverage innovative technologies to enhance process structuring and operations and reduce halal certification costs. The findings also emphasized the limitations of existing traceability solutions, such as limited cooperation and collaboration among stakeholders, high costs of implementing traceability systems without government support, lack of clarity regarding product routes, and disrupted communication channels between stakeholders. These findings contribute to a broader research program aimed at developing a stakeholder requirements framework that utilizes "business process modelling" to establish a unified model for traceable stakeholder requirements.Keywords: supply chain, traceability system, halal food, stakeholders’ requirements
Procedia PDF Downloads 11325361 Biomechanical Perspectives on the Urinary Bladder: Insights from the Hydrostatic Skeleton Concept
Authors: Igor Vishnevskyi
Abstract:
Introduction: The urinary bladder undergoes repeated strain during its working cycle, suggesting the presence of an efficient support system, force transmission, and mechanical amplification. The concept of a "hydrostatic skeleton" (HS) could contribute to our understanding of the functional relationships among bladder constituents. Methods: A multidisciplinary literature review was conducted to identify key features of the HS and to gather evidence supporting its applicability in urinary bladder biomechanics. The collected evidence was synthesized to propose a framework for understanding the potential hydrostatic properties of the urinary bladder based on existing knowledge and HS principles. Results: Our analysis revealed similarities in biomechanical features between living fluid-filled structures and the urinary bladder. These similarities include the geodesic arrangement of fibres, the role of enclosed fluid (urine) in force transmission, prestress as a determinant of stiffness, and the ability to maintain shape integrity during various activities. From a biomechanical perspective, urine may be considered an essential component of the bladder. The hydrostatic skeleton, with its autonomy and flexibility, may provide insights for researchers involved in bladder engineering. Discussion: The concept of a hydrostatic skeleton offers a holistic perspective for understanding bladder function by considering multiple mechanical factors as a single structure with emergent properties. Incorporating viewpoints from various fields on HS can help identify how this concept applies to live fluid-filled structures or organs and reveal its broader relevance to biological systems, both natural and artificial. Conclusion: The hydrostatic skeleton (HS) design principle can be applied to the urinary bladder. Understanding the bladder as a structure with HS can be instrumental in biomechanical modelling and engineering. Further research is required to fully elucidate the cellular and molecular mechanisms underlying HS in the bladder.Keywords: hydrostatic skeleton, urinary bladder morphology, shape integrity, prestress, biomechanical modelling
Procedia PDF Downloads 7825360 Social Media and Counseling: Opportunities, Risks and Ethical Considerations
Authors: Kyriaki G. Giota, George Kleftaras
Abstract:
The purpose of this article is to briefly review the opportunities that social media presents to counselors and psychologists. Particular attention was given to understanding some of the more important common risks inherent in social media and the potential ethical dilemmas which may arise for counselors and psychologists who embrace them in their practice. Key considerations of issues pertinent to an online presence such as multiple relationships, visibility and privacy, maintaining ethical principles and professional boundaries are being discussed.Keywords: social media, counseling, risks, ethics
Procedia PDF Downloads 42525359 Quantification of Global Cerebrovascular Reactivity in the Principal Feeding Arteries of the Human Brain
Authors: Ravinder Kaur
Abstract:
Introduction Global cerebrovascular reactivity (CVR) mapping is a promising clinical assessment for stress-testing the brain using physiological challenges, such as CO₂, to elicit changes in perfusion. It enables real-time assessment of cerebrovascular integrity and health. Conventional imaging approaches solely use steady-state parameters, like cerebral blood flow (CBF), to evaluate the integrity of the resting parenchyma and can erroneously show a healthy brain at rest, despite the underlying pathogenesis in the presence of cerebrovascular disease. Conversely, coupling CO₂ inhalation with phase-contrast MRI neuroimaging interrogates the capacity of the vasculature to respond to changes under stress. It shows promise in providing prognostic value as a novel health marker to measure neurovascular function in disease and to detect early brain vasculature dysfunction. Objective This exploratory study was established to:(a) quantify the CBF response to CO₂ in hypocapnia and hypercapnia,(b) evaluate disparities in CVR between internal carotid (ICA) and vertebral artery (VA), and (c) assess sex-specific variation in CVR. Methodology Phase-contrast MRI was employed to measure the cerebrovascular reactivity to CO₂ (±10 mmHg). The respiratory interventions were presented using the prospectively end-tidal targeting RespirActTM Gen3 system. Post-processing and statistical analysis were conducted. Results In 9 young, healthy subjects, the CBF increased from hypocapnia to hypercapnia in all vessels (4.21±0.76 to 7.20±1.83 mL/sec in ICA, 1.36±0.55 to 2.33±1.31 mL/sec in VA, p < 0.05). The CVR was quantitatively higher in ICA than VA (slope of linear regression: 0.23 vs. 0.07 mL/sec/mmHg, p < 0.05). No statistically significant effect was observed in CVR between male and female (0.25 vs 0.20 mL/sec/mmHg in ICA, 0.09 vs 0.11 mL/sec/mmHg in VA, p > 0.05). Conclusions The principal finding in this investigation validated the modulation of CBF by CO₂. Moreover, it has indicated that regional heterogeneity in hemodynamic response exists in the brain. This study provides scope to standardize the quantification of CVR prior to its clinical translation.Keywords: cerebrovascular disease, neuroimaging, phase contrast MRI, cerebrovascular reactivity, carbon dioxide
Procedia PDF Downloads 14925358 Exploring Attachment Mechanisms of Sulfate-Reducing Bacteria Biofilm to X52 Carbon Steel and Effective Mitigation Through Moringa Oleifera Extract
Authors: Hadjer Didouh, Mohammed Hadj Melliani, Izzeddine Sameut Bouhaik
Abstract:
Corrosion is a serious problem in industrial installations or metallic transport pipes. Corrosion is an interfacial process controlled by several parameters. The presence of microorganisms affects the kinetics of corrosion. This type of corrosion is often referred as bio-corrosion or corrosion influenced by microorganisms (MIC). The action of a microorganism or a bacterium is carried out by the formation of biofilm following its attachment to the metal surface. The formation of biofilm isolates the metal surface from its environment and allows the bacteria to control the parameters of the metal/bacteria interface. Biofilm formation by sulfate-reducing bacteria (SRB) X52 steel, poses substantial challenges in oil and gas industry SONATRACH of Algeria. This research delves into the complex attachment mechanisms employed by SRB biofilm on X52 carbon steel and investigates strategies for effective mitigation using biocides. The exploration commences by elucidating the underlying mechanisms facilitating SRB biofilm adhesion to X52 carbon steel, considering factors such as surface morphology, electrostatic interactions, and microbial extracellular substances. Advanced microscopy and spectroscopic techniques provide a support to the attachment processes, laying the foundation for targeted mitigation strategies. The use of 100 ppm of Moringa Oleifera extract biocide as a promising approach to control and prevent SRB biofilm formation on X52 carbon steel surfaces. Green extract undergo evaluation for their effectiveness in disrupting biofilm development while ensuring the integrity of the steel substrate. Systematic analysis is conducted on the biocide's impact on the biofilm's structural integrity, microbial viability, and overall attachment strength. This two-pronged investigation aims to deepen our comprehension of SRB biofilm dynamics and contribute to the development of effective strategies for mitigating its impact on X52 carbon steel.Keywords: bio-corrosion, biofilm, attachement, metal/bacteria interface
Procedia PDF Downloads 2325357 Design of a Small and Medium Enterprise Growth Prediction Model Based on Web Mining
Authors: Yiea Funk Te, Daniel Mueller, Irena Pletikosa Cvijikj
Abstract:
Small and medium enterprises (SMEs) play an important role in the economy of many countries. When the overall world economy is considered, SMEs represent 95% of all businesses in the world, accounting for 66% of the total employment. Existing studies show that the current business environment is characterized as highly turbulent and strongly influenced by modern information and communication technologies, thus forcing SMEs to experience more severe challenges in maintaining their existence and expanding their business. To support SMEs at improving their competitiveness, researchers recently turned their focus on applying data mining techniques to build risk and growth prediction models. However, data used to assess risk and growth indicators is primarily obtained via questionnaires, which is very laborious and time-consuming, or is provided by financial institutes, thus highly sensitive to privacy issues. Recently, web mining (WM) has emerged as a new approach towards obtaining valuable insights in the business world. WM enables automatic and large scale collection and analysis of potentially valuable data from various online platforms, including companies’ websites. While WM methods have been frequently studied to anticipate growth of sales volume for e-commerce platforms, their application for assessment of SME risk and growth indicators is still scarce. Considering that a vast proportion of SMEs own a website, WM bears a great potential in revealing valuable information hidden in SME websites, which can further be used to understand SME risk and growth indicators, as well as to enhance current SME risk and growth prediction models. This study aims at developing an automated system to collect business-relevant data from the Web and predict future growth trends of SMEs by means of WM and data mining techniques. The envisioned system should serve as an 'early recognition system' for future growth opportunities. In an initial step, we examine how structured and semi-structured Web data in governmental or SME websites can be used to explain the success of SMEs. WM methods are applied to extract Web data in a form of additional input features for the growth prediction model. The data on SMEs provided by a large Swiss insurance company is used as ground truth data (i.e. growth-labeled data) to train the growth prediction model. Different machine learning classification algorithms such as the Support Vector Machine, Random Forest and Artificial Neural Network are applied and compared, with the goal to optimize the prediction performance. The results are compared to those from previous studies, in order to assess the contribution of growth indicators retrieved from the Web for increasing the predictive power of the model.Keywords: data mining, SME growth, success factors, web mining
Procedia PDF Downloads 26725356 Trusting Smart Speakers: Analysing the Different Levels of Trust between Technologies
Authors: Alec Wells, Aminu Bello Usman, Justin McKeown
Abstract:
The growing usage of smart speakers raises many privacy and trust concerns compared to other technologies such as smart phones and computers. In this study, a proxy measure of trust is used to gauge users’ opinions on three different technologies based on an empirical study, and to understand which technology most people are most likely to trust. The collected data were analysed using the Kruskal-Wallis H test to determine the statistical differences between the users’ trust level of the three technologies: smart speaker, computer and smart phone. The findings of the study revealed that despite the wide acceptance, ease of use and reputation of smart speakers, people find it difficult to trust smart speakers with their sensitive information via the Direct Voice Input (DVI) and would prefer to use a keyboard or touchscreen offered by computers and smart phones. Findings from this study can inform future work on users’ trust in technology based on perceived ease of use, reputation, perceived credibility and risk of using technologies via DVI.Keywords: direct voice input, risk, security, technology, trust
Procedia PDF Downloads 191