Search results for: socially engineered attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1267

Search results for: socially engineered attacks

817 The Role of Official Languages and Language Training Policy in Adult Immigrant Integration in Canada

Authors: Lillie Lum

Abstract:

Focusing on the role of official language in immigrant integration, this paper will first report the results of a literature review and demonstrate that there is no doubt on the necessity of adequate language skills for newcomers to successfully settle, adapt, and integrate socially, culturally and economically in Canada. This paper attempts to synthesize the literature in order to shed light on the language policy terrain which is not easy to navigate. Then, by outlining what is currently available in the language policy environment, it will ask if the current state of language training in Canada is adequate to assist newcomers in their language acquisition process. At a deeper level, it aims to continue to raise questions in this policy area. Are current policy responses likely to improve linguistic capabilities in the future, particularly for immigrant workers with poor language proficiency? This paper is timely given the magnitude of the language issue and the value of immigrants for Canada’s economic, social, and political vitality.

Keywords: official language education, immigrant integration into Canada, economic factors, policy implications

Procedia PDF Downloads 283
816 Development and Characterization of Hydroxyapatite Based Nanocomposites for Local Drug Delivery to Periodontal Pockets

Authors: Indu Lata Kanwar, Preeti K. Suresh

Abstract:

The aim of this study is to fabricate hydroxyapatite based nanocomposites for local drug delivery in periodontal pockets. Hydroxyapatite is chemically similar to the mineral component of bones and hard tissues in mammals. Synthetic biocompatibility and bioactivity with human teeth and bone, making it very attractive for biomedical applications. Nanocomposite is a multiphase solid material where one of the phases has one, two or three dimensions of less than 100 nanometres (nm), or structures having nano­scale repeat distances between the different phases that make up the material. Nanostructured calcium phosphate materials play an important role in the formation of hard tissues in nature. It is reported that calcium phosphates materials in nano-size can mimic the dimensions of constituent components of calcified tissues. Nano-sized materials offer improved performances compared with conventional materials due to their large surface-to-volume ratios. The specific biological properties of the nanocomposites, as well as their interaction with cells, include the use of bioactive molecules. The approach of periodontal tissue engineering is considered promising to restore bone defect through the use of engineered materials with the aim that they will prohibit the invasion of fibrous connective tissue and help repair the function during bone regeneration.

Keywords: bioactive, hydroxyapatite, nanocomposities, periondontal

Procedia PDF Downloads 305
815 A Security Study for Smart Metering Systems

Authors: Musaab Hasan, Farkhund Iqbal, Patrick C. K. Hung, Benjamin C. M. Fung, Laura Rafferty

Abstract:

In modern societies, the smart cities concept raised simultaneously with the projection towards adopting smart devices. A smart grid is an essential part of any smart city as both consumers and power utility companies benefit from the features provided by the power grid. In addition to advanced features presented by smart grids, there may also be a risk when the grids are exposed to malicious acts such as security attacks performed by terrorists. Considering advanced security measures in the design of smart meters could reduce these risks. This paper presents a security study for smart metering systems with a prototype implementation of the user interfaces for future works.

Keywords: security design, smart city, smart meter, smart grid, smart metering system

Procedia PDF Downloads 308
814 A Research to Determine the Impact of Mobbing on Organizational Commitment

Authors: A. Bedük, k. Eryeşil, o. Eşmen, m. Onacak

Abstract:

The mobbing is a process that is consisting of negative behaviors such as, systematically and continuously insulting, offending against personal dignity, preventing access to necessary information and disseminating rumors against employee by one or more than one individuals in a work environment through which disturbing the employee physically, psychologically and socially to cause to quit his/her job. This research is aiming to explore the results of mobbing (psychological violence) on employees’ organizational commitment in workplaces. Mobbing takes many forms and is often used to force an employee to leave the work environment. Two different types of scales have been reviewed and revised for use in the research. The Heinz Leymann scale is the first measure, which was developed to define causes and effects, in addition to characteristic behaviors of mobbing. The second scale was developed by Allen and Mayer and indicates levels of organizational commitment. In this research, a questionnaire were applied to 50 employees in a special glass factory in Konya to search mobbing itself and indicate the effects of mobbing to organizational commitments. One of the important findings of this research is that there was no relation between mobbing and general organizational commitment.

Keywords: mobbing, organizational commitment, affective commitment, normative commitment, continuance commitment

Procedia PDF Downloads 197
813 Humanizing Industrial Architecture: When Form Meets Function and Emotion

Authors: Sahar Majed Asad

Abstract:

Industrial structures have historically focused on functionality and efficiency, often disregarding aesthetics and human experience. However, a new approach is emerging that prioritizes humanizing industrial architecture and creating spaces that promote well-being, sustainability, and social responsibility. This study explores the motivations and design strategies behind this shift towards more human-centered industrial environments, providing practical guidance for architects, designers, and other stakeholders interested in incorporating these principles into their work. Through in-depth interviews with architects, designers, and industry experts, as well as a review of relevant literature, this study uncovers the reasons for this change in industrial design. The findings reveal that this shift is driven by a desire to create environments that prioritize the needs and experiences of the people who use them. The study identifies strategies such as incorporating natural elements, flexible design, and advanced technologies as crucial in achieving human-centric industrial design. It also emphasizes that effective communication and collaboration among stakeholders are crucial for successful human-centered design outcomes. This paper provides a comprehensive analysis of the motivations and design strategies behind the humanization of industrial architecture. It begins by examining the history of industrial architecture and highlights the focus on functionality and efficiency. The paper then explores the emergence of human-centered design principles in industrial architecture, discussing the benefits of this approach, including creating more sustainable and socially responsible environments.The paper explains specific design strategies that prioritize the human experience of industrial spaces. It outlines how incorporating natural elements like greenery and natural lighting can create more visually appealing and comfortable environments for industrial workers. Flexible design solutions, such as movable walls and modular furniture, can make spaces more adaptable to changing needs and promote a sense of ownership and creativity among workers. Advanced technologies, such as sensors and automation, can improve the efficiency and safety of industrial spaces while also enhancing the human experience. To provide practical guidance, the paper offers recommendations for incorporating human-centered design principles into industrial structures. It emphasizes the importance of understanding the needs and experiences of the people who use these spaces and provides specific examples of how natural elements, flexible design, and advanced technologies can be incorporated into industrial structures to promote human well-being. In conclusion, this study demonstrates that the humanization of industrial architecture is a growing trend that offers tremendous potential for creating more sustainable and socially responsible built environments. By prioritizing the human experience of industrial spaces, designers can create environments that promote well-being, sustainability, and social responsibility. This research study provides practical guidance for architects, designers, and other stakeholders interested in incorporating human-centered design principles into their work, demonstrating that a human-centered approach can lead to functional and aesthetically pleasing industrial spaces that promote human well-being and contribute to a better future for all.

Keywords: human-centered design, industrial architecture, sustainability, social responsibility

Procedia PDF Downloads 132
812 Understanding the Qualities of Indian Neighborhoods: Understanding of Social Spaces

Authors: Venkata Ravi Kumar Veluru

Abstract:

Indian traditional neighborhoods are socially active and sometimes intrusive communities, which are losing their qualities due to western influences, undermining the traditional Indian values by blind adaptation of western neighborhood concepts since the scale is not suitable to the Indian context. This paper aims to understand the qualities of Indian traditional neighborhoods by evaluating a traditional neighborhood of Jaipur, comparing it with a modern planned neighborhood of Chandigarh, designed by a foreign planner, in the neighborhood concept of the western world, to find out the special qualities of traditional Indian neighborhoods as compared to western concepts in terms of social spaces, by way of physical observation of selected neighborhoods and residents structured questionnaire survey. The combined analysis found that social spaces are abundantly available in traditional neighborhoods, which are missing in modern neighborhoods, which are the main qualities where interactions happen, aiming towards the formation of social capital. The qualities of traditional neighborhoods have to be considered while designing new neighborhoods in India.

Keywords: Indian neighborhoods, modern neighborhoods, neighborhood planning, social spaces, traditional neighborhoods

Procedia PDF Downloads 95
811 Understanding Attitude about Landscape Preservation in Context of Place Attachment

Authors: Baiju Soren

Abstract:

This research investigates village residents' feelings about rural landscapes and their attitudes toward preserving them, as well as the impact of attachment on participation in preserving those environments. To understand these relationships, 100 respondents from Bandudumha village : a tribal village, Mayurbhanj district of Odisha, were interviewed with a set of questionnaires and photographs. This framework is based on the idea that establishing environmental oversight and desire to cooperate in the development and preservation process can help to establish community values and meaning tied to places. As a result, a personal connection to the rural environment will be explored through an examination of place attachment, landscape choice, and the possible conservation value of landscapes to the people who live there. The findings suggest that commitment to a place can lead to unique ideas on collaborative preservation and the creation of truly relevant, socially inclusive landscapes. Furthermore, the data show how emotional ties to locations provide social support and provide insight into people–place relationships.

Keywords: participation in preservation, place attachment, preservation, rural landscape, sense of place

Procedia PDF Downloads 96
810 Drivers of the Performance of Members of a Social Incubator Considering the Values of Work: A Qualitative Study with Social Entrepreneurs

Authors: Leticia Lengler, Vania Estivalete, Vivian Flores Costa, Tais De Andrade, Lisiane Fellini Faller

Abstract:

Social entrepreneurship has emerged and driven a new development perspective, and as the literature mentions, it is based on innovation, and mainly, on the creation of social value, rather than personal wealth and shareholders. In this field of study, one of the focuses of discussion refers to the distinct characteristics of the individuals responsible for socially directed initiatives, named as social entrepreneurs. To contribute to this perspective, the present study aims to identify the values related to work that guide the performance of social entrepreneurs, members of enterprises that have developed themselves within a social incubator at a federal institution of higher education in Brazil. Each person's value system is present in different facets of his life, manifesting himself in his choices and in the way he conducts the relationship with other people in society. Especially the values of work, the focus of this research, play a significant role in organizational studies, since they are considered one of the important guiding principles of the behavior of individuals in the work environment. Regarding the method of the study, a descriptive and qualitative research was carried out. In the data collection, 24 entrepreneurs, members of five different enterprises belonging to the social incubator, were interviewed. The research instrument consisted of three open questions, which could be answered with the support of a "disc of values", an artifact organized to clearly demonstrate the values of the work to the respondents. The analysis of the interviews took into account the categories defined a priori, based on the model proposed by previous authors who validated these constructs within their research contexts, contemplating the following dimensions: Self-determination and stimulation; Safety; Conformity; Universalism and benevolence; Achievement; and Power. It should be noted that, in order to provide a better understanding of the interviewees, in the "disc of values" used in the research, these dimensions were represented by the objectives that define them, being respectively: Challenge; Financial independence; Commitment; Welfare of others; Personal success; And Power. Some preliminary results show that, as guiding principles of the investigation, priority is given to work values related to Self-determination and stimulation, Conformity and Universalism and benevolence. Such findings point to the importance given by these individuals to independent thinking and acting, as well as to novelty and constant challenge. Still, they demonstrate the appreciation of commitment to their enterprise, the people who make it and the quality of their work. They also point to the relevance of the possibility of contributing to the greater social good, that is, of the search for the well-being of close people and of society, as it is implied in models of social entrepreneurship coming from literature. With a lower degree of priority, the values denominated Safety and Realization, as the financial question at work and the search for satisfaction and personal success, through the use of socially recognized skills were mentioned aspects with little emphasis by social entrepreneurs. The Power value was not considered as guiding principle of the work for the respondents.

Keywords: qualitative study, social entrepreneur, social incubator, values of work

Procedia PDF Downloads 234
809 TRNG Based Key Generation for Certificateless Signcryption

Authors: S.Balaji, R.Sujatha, M. Ramakrishnan

Abstract:

Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously in low cost when compared with the traditional signature-then-encryption approach. In this paper, we propose a novel mouse movement based key generation technique to generate secret keys which is secure against the outer and insider attacks. Tag Key Encapsulation Mechanism (KEM) process is implemented using True Random Number Generator (TRNG) method. This TRNG based key is used for data encryption in the Data Encapsulation Mechanism (DEM). We compare the statistical reports of the proposed system with the previous methods which implements TKEM based on pseudo random number generator

Keywords: pseudo random umber generator, signcryption, true random number generator, node deployment

Procedia PDF Downloads 316
808 Study on Evaluating the Utilization of Social Media Tools (SMT) in Collaborative Learning Case Study: Faculty of Medicine, King Khalid University

Authors: Vasanthi Muniasamy, Intisar Magboul Ejalani, M.Anandhavalli, K. Gauthaman

Abstract:

Social Media (SM) are websites increasingly popular and built to allow people to express themselves and to interact socially with others. Most SMT are dominated by youth particularly college students. The proliferation of popular social media tools, which can accessed from any communication devices has become pervasive in the lives of today’s student life. Connecting traditional education to social media tools are a relatively new era and any collaborative tool could be used for learning activities. This study focuses (i) how the social media tools are useful for the learning activities of the students of faculty of medicine in King Khalid University (ii) whether the social media affects the collaborative learning with interaction among students, among course instructor, their engagement, perceived ease of use and perceived ease of usefulness (TAM) (iii) overall, the students satisfy with this collaborative learning through Social media.

Keywords: social media, Web 2.0, perceived ease of use, perceived usefulness, collaborative Learning

Procedia PDF Downloads 479
807 An Enhanced Digital Forensic Model for Internet of Things Forensic

Authors: Tina Wu, Andrew Martin

Abstract:

The expansion of the Internet of Things (IoT) brings a new level of threat. Attacks on IoT are already being used by criminals to form botnets, launch Distributed Denial of Service (DDoS) and distribute malware. This opens a whole new digital forensic arena to develop forensic methodologies in order to have the capability to investigate IoT related crimes. However, existing proposed IoT forensic models are still premature requiring further improvement and validation, many lack details on the acquisition and analysis phase. This paper proposes an enhanced theoretical IoT digital forensic model focused on identifying and acquiring the main sources of evidence in a methodical way. In addition, this paper presents a theoretical acquisition framework of the different stages required in order to be capable of acquiring evidence from IoT devices.

Keywords: acquisition, Internet of Things, model, zoning

Procedia PDF Downloads 240
806 Democratic Citizenship Education in the Context of Bildung Perspectives

Authors: Sigrid Haukanes

Abstract:

Implementation of democratic citizenship as a crossdisciplinary concept in educational practice has been problematic because of a vague and divided understanding of what the concept entails. This is underlined by a divide between understanding democracy as external to the educational sphere or understanding education as an internal part of a democratic society. This theoretical contribution aims to explore the concept of democratic citizenship in relation to Bildung perspectives. The methodology of this paper is grounded in a hermeneutical approach to interpret three philosophical perspectives from Immanuel Kant, John Dewey and Gert Biesta. These perspectives are chosen to explore democratic citizenship as: (1) an individual oriented concept, (2) a socially oriented concept and (3) a critical-social oriented concept. This theoretical paper argues that different orientations toward Bildung change the content of democratic citizenship as a cross-disciplinary concept in education. It argues that a Dewian or a Biestian notion could enrich our understanding of democratic citizenship, drawing on a critical-social perspective of Bildung.

Keywords: bildung, citizenship, democracy, education

Procedia PDF Downloads 41
805 Vibration Energy Harvesting from Aircraft Structure Using Piezoelectric Transduction

Authors: M. Saifudin Ahmed Atique, Santosh Paudyal, Caixia Yang

Abstract:

In an aircraft, a great portion of energy is wasted due to its inflight structural vibration. Structural components vibrate due to aeroelastic instabilities, gust perturbations and engine rotation at very high rpm. Energy losses due to mechanical vibration can be utilized by harvesting energy from aircraft structure as electrical energy. This harvested energy can be stored in battery panels built into aircraft fuselage and can be used to power inflight auxiliary accessories i.e., lighting and entertainment systems. Moreover, this power can be used for wireless Structural Health Monitoring System (SHM) for aircraft and as an excellent replacement of aircraft Ground Power Unit (GPU)/Auxiliary Power Unit (APU) during passenger onboard time to power aircraft cabin accessories to reduce aircraft ground operation cost significantly. In this paper, we propose the design of a noble aircraft wing in which Piezoelectric panels placed under the composite skin of aircraft wing will generate electrical charges from any inflight aerodynamics or mechanical vibration and store it into battery to power auxiliary inflight systems/accessories as per requirement. Experimental results show that a well-engineered piezoelectric energy harvester based aircraft wing can produce adequate energy to support in-flight lighting and auxiliary cabin accessories.

Keywords: vibration energy, aircraft wing, piezoelectric material, inflight accessories

Procedia PDF Downloads 131
804 UV Resistibility of a Carbon Nanofiber Reinforced Polymer Composite

Authors: A. Evcin, N. Çiçek Bezir, R. Duman, N. Duman

Abstract:

Nowadays, a great concern is placed on the harmfulness of ultraviolet radiation (UVR) which attacks human bodies. Nanocarbon materials, such as carbon nanotubes (CNTs), carbon nanofibers (CNFs) and graphene, have been considered promising alternatives to shielding materials because of their excellent electrical conductivities, very high surface areas and low densities. In the present work, carbon nanofibers have been synthesized from solutions of Polyacrylonitrile (PAN)/ N,N-dimethylformamide (DMF) by electrospinning method. The carbon nanofibers have been stabilized by oxidation at 250 °C for 2 h in air and carbonized at 750 °C for 1 h in H2/N2. We present the fabrication and characterization of transparent and ultraviolet (UV) shielding CNF/polymer composites. The content of CNF filler has been varied from 0.2% to 0.6 % by weight. UV Spectroscopy has been performed to study the effect of composition on the transmittance of polymer composites.

Keywords: electrospinning, carbon nanofiber, characterization, composites, nanofiber, ultraviolet radiation

Procedia PDF Downloads 195
803 Cryptographic Protocol for Secure Cloud Storage

Authors: Luvisa Kusuma, Panji Yudha Prakasa

Abstract:

Cloud storage, as a subservice of infrastructure as a service (IaaS) in Cloud Computing, is the model of nerworked storage where data can be stored in server. In this paper, we propose a secure cloud storage system consisting of two main components; client as a user who uses the cloud storage service and server who provides the cloud storage service. In this system, we propose the protocol schemes to guarantee against security attacks in the data transmission. The protocols are login protocol, upload data protocol, download protocol, and push data protocol, which implement hybrid cryptographic mechanism based on data encryption before it is sent to the cloud, so cloud storage provider does not know the user's data and cannot analysis user’s data, because there is no correspondence between data and user.

Keywords: cloud storage, security, cryptographic protocol, artificial intelligence

Procedia PDF Downloads 324
802 Hyperchaos-Based Video Encryption for Device-To-Device Communications

Authors: Samir Benzegane, Said Sadoudi, Mustapha Djeddou

Abstract:

In this paper, we present a software development of video streaming encryption for Device-to-Device (D2D) communications by using Hyperchaos-based Random Number Generator (HRNG) implemented in C#. The software implements and uses the proposed HRNG to generate key stream for encrypting and decrypting real-time video data. The used HRNG consists of Hyperchaos Lorenz system which produces four signal outputs taken as encryption keys. The generated keys are characterized by high quality randomness which is confirmed by passing standard NIST statistical tests. Security analysis of the proposed encryption scheme confirms its robustness against different attacks.

Keywords: hyperchaos Lorenz system, hyperchaos-based random number generator, D2D communications, C#

Procedia PDF Downloads 343
801 The Lightener of Love, the World Piece Religion

Authors: Abdul Razzaq Azad

Abstract:

It is known that every human society throughout the world and throughout history, the various religions and their theologies, ethics, and traditions influence everything in their life, shaping socio-economic and political ideas, attitudes and institutions. It is observed that religious teachings and traditions shape how people respond to each other in their daily social inter-course and interaction in the community at large. The majorities of us preserves and protect our own religious beliefs and traditions as generally they symbolize our essential identities, theologically, historically, culturally, socially, and even politically. Our religious faiths symbolize our dignity as persons and our very souls as communities and individuals. It thus goes without saying that in our multi racial and multi religious society, the only way for us to live in peace and harmony is for us to live in peaceful co-existence. It is important for us to recognize, understand, accept and respect each other regardless of our respective belief. The history of interfaith is as ancient as the religions since men and women when not at war with their neighbors have always made an effort to understand them (not least because understanding is a strategy for defense, but also because for as long as there is dialogue wars are delayed).

Keywords: interfaith harmony, world piece order, Islam, religions, lightness,

Procedia PDF Downloads 601
800 Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure

Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh

Abstract:

Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.

Keywords: anonymity, authentication, Internet of Things, lightweight, un-traceability

Procedia PDF Downloads 266
799 Secure E-Pay System Using Steganography and Visual Cryptography

Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi

Abstract:

Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.

Keywords: image security, random LSB, steganography, visual cryptography

Procedia PDF Downloads 308
798 Probabilistic-Based Design of Bridges under Multiple Hazards: Floods and Earthquakes

Authors: Kuo-Wei Liao, Jessica Gitomarsono

Abstract:

Bridge reliability against natural hazards such as floods or earthquakes is an interdisciplinary problem that involves a wide range of knowledge. Moreover, due to the global climate change, engineers have to design a structure against the multi-hazard threats. Currently, few of the practical design guideline has included such concept. The bridge foundation in Taiwan often does not have a uniform width. However, few of the researches have focused on safety evaluation of a bridge with a complex pier. Investigation of the scouring depth under such situation is very important. Thus, this study first focuses on investigating and improving the scour prediction formula for a bridge with complicated foundation via experiments and artificial intelligence. Secondly, a probabilistic design procedure is proposed using the established prediction formula for practical engineers under the multi-hazard attacks.

Keywords: bridge, reliability, multi-hazards, scour

Procedia PDF Downloads 347
797 Nano Ceramics Materials in Clean Rooms: Properties and Characterization

Authors: HebatAllah Tarek, Zeyad El-Sayad, Ali F. Bakr

Abstract:

Surface coating can permit the bulk materials to remain unchanged, whereas the surface functionality is engineered to afford a more required characteristic. Nano-Ceramic coatings are considered ideal coatings on materials that can significantly improve the surface properties, including anti-fouling, self-cleaning, corrosion resistance, wear resistance, anti-scratch, waterproof, anti-acid rain and anti-asphalt. Furthermore, various techniques have been utilized to fabricate a range of different ceramic coatings with more desirable properties on Nano-ceramics, which make the materials usually used in in-service environments and worth mentioning that the practical part of this study will be applied in one of the most important architectural applications due to the contamination-free conditions provided by it in the manufacturing industry. Without cleanrooms, products will become contaminated and either malfunction or infect people with bacteria. Cleanrooms are used for the manufacture of items used in computers, cars, airplanes, spacecraft, televisions, disc players and many other electronic and mechanical devices, as well as the manufacture of medicines, medical devices, and foods. The aim of this study will be to examine the Nano-ceramics on porcelain and glass panels. The investigation will be included fabrications, methods, surface properties and applications in clean rooms. The unfamiliarity in this study is using Nano-ceramics in clean rooms instead of using them on metallic materials.

Keywords: nano-ceramic coating, clean rooms, porcelain, surface properties

Procedia PDF Downloads 68
796 Wetland Community and Their Livelihood Opportunities in the Face of Changing Climatic Condition in Southwest Bangladesh

Authors: Mohsina Aktar, Bishawjit Mallick

Abstract:

Bangladesh faces the multidimensional manifestations of climate change e.g. flood, cyclone, sea level rise, drainage congestion, salinity, etc. This study aimed at to find out the community’s perception of the perceived impact of climate change on their wetland resource based livelihood, to analyze their present livelihood scenario and to find out required institutional setup to strengthen present livelihood scenario. Therefore, this study required both quantitative analysis like quantification of wetland resources, occupation, etc. and also exploratory information like policy and institutional reform. For quantitative information 200 questionnaire survey and in some cases observation survey and for socially shareable qualitative and quantitative issues case study and focus group discussion were conducted. In-Depth interview was conducted for socially non-shareable qualitative issues. The overall findings of this study have been presented maintaining a sequence- perception about climate change effect, livelihood scenario and required institutional support of the wetland community. Flood has been ranked where cyclone effect is comparatively less disastrous in this area. Heavy rainfall comes after the cyclone. Female members responded almost same about the ranking and effects of frequently occurred and devastating effects of climate change. People are much more aware of the impact of climate change. Training of Care in RVCC project helps to increase their knowledge level. If the level of education can be increased, people can fight against calamity and poverty with more confidence. People seem to overcome the problems of water logging and thus besides involving in Hydroponics (33.3%) as prime occupation in monsoon; they are also engaged in other business related activities. January to May is the low-income season for the farmers. But some people don’t want to change their traditional occupation and their age is above 45. The young earning member wants to utilize their lean income period by alternative occupation. People who do not have own land and performing water transportation or other types of occupation are now interested about Hydroponics. People who give their land on rent are now thinking about renting their land in monsoon as through that they can earn a sound amount rather than get nothing. What they require is just seed, training, and capital. Present marketing system faces the problem of communication. So this sector needed to be developed. Involvement of women in income earning activity is very low (5.1%), and 100% women are housewives. They became inferior due to their educational level and dominance of their husband. Only one NGO named BCAS (Bangladesh Center for Advanced Studies) has been found engage training facilities and advocacy for this purpose. Upazilla agricultural extension office like other GO remains inactive to give support the community for extension and improvement of Hydroponics agriculture. If the community gets proper support and inspiration, they can fight against crisis of low-income and climate change, with the Hydroponics cultivation system successfully.

Keywords: wetland community, hydroponics, climate change adaptation, livelihood

Procedia PDF Downloads 249
795 Analysis of Cracked Beams with Spalling Having Different Arrangements of the Reinforcement Bars Using Finite Element Analysis (FEA)

Authors: Rishabh Shukla, Achin Agrawal, Anupam Saxena, S. Mandal

Abstract:

The existence of a crack, affects the mechanical behaviour and various properties of a structure to a great degree. This paper focuses on recognizing the parameters that gets changed due to the formation of cracks and have a great impact on the performance of the structure. Spalling is a major concern as it leaves the reinforcement bars more susceptible to environmental attacks. Beams of cross section 300 mm × 500 mm are designed and for a calculated area of steel, two different arrangements of reinforced bars are analysed. Results are prepared for different stages of cracking for each arrangement of rebars. The parameters for both arrangements are then compared. The Finite Element Analysis (FEA) is carried out and changes in the properties like flexural strength, Elasticity and modal frequency are reported. The conclusions have been drawn by comparing the results.

Keywords: cracks, elasticity, spalling, FEA

Procedia PDF Downloads 246
794 Symmetric Arabic Language Encryption Technique Based on Modified Playfair Algorithm

Authors: Fairouz Beggas

Abstract:

Due to the large number of exchanges in the networks, the security of communications is essential. Most ways of keeping communication secure rely on encryption. In this work, a symmetric encryption technique is offered to encrypt and decrypt simple Arabic scripts based on a multi-level security. A proposed technique uses an idea of Playfair encryption with a larger table size and an additional layer of encryption to ensure more security. The idea of the proposed algorithm aims to generate a dynamic table that depends on a secret key. The same secret key is also used to create other secret keys to over-encrypt the plaintext in three steps. The obtained results show that the proposed algorithm is faster in terms of encryption/decryption speed and can resist to many types of attacks.

Keywords: arabic data, encryption, playfair, symmetric algorithm

Procedia PDF Downloads 60
793 Benign Recurrent Unilateral Abducens (6th) Nerve Palsy in 14 Months Old Girl: A Case Report

Authors: Khaled Alabduljabbar

Abstract:

Background: Benign, isolated, recurrent sixth nerve palsy is very rare in children. Here we report a case of recurrent abducens nerve palsy with no obvious etiology. It is a diagnosis of exclusion. A recurrent benign form of 6th nerve palsy, a rarer still palsy, has been described in the literature, and it is of most likely secondary to inflammatory causes, e.g, following viral and bacterial infections. Purpose: To present a case of 14 months old girl with recurrent attacks of isolated left sixth cranial nerve palsy following upper respiratory tract infection. Observation: The patient presented to opthalmology clinic with sudden onset of inward deviation (esotropia) of the left eye with a compensatory left face turn one week following signs of upper respiratory tract infection. Ophthalmological examination revealed large angle esotropia of the left eye in primary position, with complete limitation of abduction of the left eye, no palpebral fissure changes, and abnormal position of the head (left face turn). Visual acuity was normal, and no significant refractive error on cycloplegic refraction for her age. Fundus examination was normal with no evidence of papilledema. There was no relative afferent pupillary defect (RAPD) and no anisocoria. Past medical history and family history were unremarkable, with no history of convulsion attacks or head trauma. Additional workout include CBC. Erythrocyte sedimentation rate, Urgent magnetic resonance imaging (MRI), and angiography of the brain were performed and demonstrated the absence of intracranial and orbital lesions. Referral to pediatric neurologist was also done and concluded no significant finding. The patient showed improvement of the left sixth cranial nerve palsy and left face turn over a period of two months. Seven months since the first attack, she experienced a recurrent attack of left eye esotropia with left face turn concurrent with URTI. The rest of eye examination was again unremarkable. CT scan and MRI scan of brain and orbit were performed and showed only signs of sinusitis with no intracranial pathology. The palsy resolved spontaneously within two months. A third episode of left 6th nerve palsy occurred 6 months later, whichrecovered over one month. Examination and neuroimagingwere unremarkable. A diagnosis of benign recurrent left 6th cranial nerve palsy was made. Conclusion: Benign sixth cranial nerve palsy is always a diagnosis of exclusion given the more serious and life-threatening alternative causes. It seems to have a good prognosis with only supportive measures. The likelihood of benign 6th cranial nerve palsy to resolve completely and spontaneously is high. Observation for at least 6 months without intervention is advisable.

Keywords: 6th nerve pasy, abducens nerve pasy, recurrent nerve palsy, cranial nerve palsy

Procedia PDF Downloads 65
792 Concealed Objects Detection in Visible, Infrared and Terahertz Ranges

Authors: M. Kowalski, M. Kastek, M. Szustakowski

Abstract:

Multispectral screening systems are becoming more popular because of their very interesting properties and applications. One of the most significant applications of multispectral screening systems is prevention of terrorist attacks. There are many kinds of threats and many methods of detection. Visual detection of objects hidden under clothing of a person is one of the most challenging problems of threats detection. There are various solutions of the problem; however, the most effective utilize multispectral surveillance imagers. The development of imaging devices and exploration of new spectral bands is a chance to introduce new equipment for assuring public safety. We investigate the possibility of long lasting detection of potentially dangerous objects covered with various types of clothing. In the article we present the results of comparative studies of passive imaging in three spectrums – visible, infrared and terahertz

Keywords: terahertz, infrared, object detection, screening camera, image processing

Procedia PDF Downloads 330
791 Using Machine Learning Techniques for Autism Spectrum Disorder Analysis and Detection in Children

Authors: Norah Mohammed Alshahrani, Abdulaziz Almaleh

Abstract:

Autism Spectrum Disorder (ASD) is a condition related to issues with brain development that affects how a person recognises and communicates with others which results in difficulties with interaction and communication socially and it is constantly growing. Early recognition of ASD allows children to lead safe and healthy lives and helps doctors with accurate diagnoses and management of conditions. Therefore, it is crucial to develop a method that will achieve good results and with high accuracy for the measurement of ASD in children. In this paper, ASD datasets of toddlers and children have been analyzed. We employed the following machine learning techniques to attempt to explore ASD and they are Random Forest (RF), Decision Tree (DT), Na¨ıve Bayes (NB) and Support Vector Machine (SVM). Then Feature selection was used to provide fewer attributes from ASD datasets while preserving model performance. As a result, we found that the best result has been provided by the Support Vector Machine (SVM), achieving 0.98% in the toddler dataset and 0.99% in the children dataset.

Keywords: autism spectrum disorder, machine learning, feature selection, support vector machine

Procedia PDF Downloads 120
790 Lessons Learnt from Moment Magnitude 7.8 Gorkha, Nepal Earthquake

Authors: Narayan Gurung, Fawu Wang, Ranjan Kumar Dahal

Abstract:

Nepal is highly prone to earthquakes and has witnessed at least one major earthquake in 80 to 90 years interval. The Gorkha earthquake, that measured 7.8 RS in magnitude and struck Nepal on 25th April 2015, after 81 years since Mw 8.3 Nepal Bihar earthquake in 1934, was the largest earthquake after Mw 8.3 Nepal Bihar earthquake. In this paper, an attempt has been made to highlight the lessons learnt from the MwW 7.8 Gorkha (Nepal) earthquake. Several types of damage patterns in buildings were observed for reinforced concrete buildings, as well as for unreinforced masonry and adobe houses in the earthquake of 25 April 2015. Many field visits in the affected areas were conducted, and thus, associated failure and damage patterns were identified and analyzed. Damage patterns in non-engineered buildings, middle and high-rise buildings, commercial complexes, administrative buildings, schools and other critical facilities are also included from the affected districts. For most buildings, the construction and structural deficiencies have been identified as the major causes of failure; however, topography, local soil amplification, foundation settlement, liquefaction associated damages and buildings built in hazard-prone areas were also significantly observed for the failure or damages to buildings and hence are reported. Finally, the lessons learnt from Mw 7.8 Gorkha (Nepal) earthquake are presented in order to mitigate impacts of future earthquakes in Nepal.

Keywords: Gorkha earthquake, reinforced concrete structure, Nepal, lesson learnt

Procedia PDF Downloads 165
789 Ethereum Based Smart Contracts for Trade and Finance

Authors: Rishabh Garg

Abstract:

Traditionally, business parties build trust with a centralized operating mechanism, such as payment by letter of credit. However, the increase in cyber-attacks and malicious hacking has jeopardized business operations and finance practices. Emerging markets, owing to their higher banking risks and bigger presence of digital financing, are looking forward to technology-driven solutions, financial inclusion and innovative working paradigms. Blockchain has the potential to enhance transaction transparency and supply chain traceability. It has captured a vast landscape with 200 million crypto users worldwide. Fintech and blockchain products are popping up across brokerage, digital wallets, exchanges, post-trade clearance, settlement, middleware, infrastructure, and base protocols.

Keywords: blockchain, distributed ledger technology, decentralized applications, ethereum, smart contracts, trade finance

Procedia PDF Downloads 132
788 Computational Fluid Dynamics Analysis of an RC Airplane Wing Using a NACA 2412 Profile at Different Angle of Attacks

Authors: Huseyin Gokberk, Shian Gao

Abstract:

CFD analysis of the relationship between the coefficients of lift and drag with respect to the angle of attack on a NACA 2412 wing section of an RC plane is conducted. Both the 2D and 3D models are investigated with the turbulence model. The 2D analysis has a free stream velocity of 10m/s at different AoA of 0°, 2°, 5°, 10°, 12°, and 15°. The induced drag and drag coefficient increased throughout the changes in angles even after the critical angle had been exceeded, whereas the lift force and coefficient of lift increased but had a limit at the critical stall angle, which results in values to reduce sharply. Turbulence flow characteristics are analysed around the aerofoil with the additions caused due to a finite 3D model. 3D results highlight how wing tip vortexes develop and alter the flow around the wing with the effects of the tapered configuration.

Keywords: CFD, turbulence modelling, aerofoil, angle of attack

Procedia PDF Downloads 182