Search results for: personal and sensitive data
27233 Examining the Modular End of Line Control Unit Design Criteria for Vehicle Sliding Door System Slide Profile
Authors: Orhan Kurtuluş, Cüneyt Yavuz
Abstract:
The end of the line controls of the finished products in the automotive industry is important. The control that has been conducted with the manual methods for the sliding doors tracks is not sufficient and faulty products cannot be identified. As a result, the customer has the faulty products. In the scope of this study, the design criteria of the PLC integrated modular end of line control unit has been examined, designed and manufactured to make the control of the 10 different track profile to 2 different vehicles with an objective to minimize the salvage costs by obtaining more sensitive, certain and accurate measurement results. In the study that started with literature and patent review, the design inputs have been specified, the technical concept has been developed, computer supported mechanic design, control system and automation design, design review and design improvement have been made. Laser analog sensors at high sensitivity, probes and modular blocks have been used in the unit. The measurement has been conducted in the system and it is observed that measurement results are more sensitive than the previous methods.Keywords: control unit design, end of line, modular design, sliding door system
Procedia PDF Downloads 44527232 Modification Encryption Time and Permutation in Advanced Encryption Standard Algorithm
Authors: Dalal N. Hammod, Ekhlas K. Gbashi
Abstract:
Today, cryptography is used in many applications to achieve high security in data transmission and in real-time communications. AES has long gained global acceptance and is used for securing sensitive data in various industries but has suffered from slow processing and take a large time to transfer data. This paper suggests a method to enhance Advance Encryption Standard (AES) Algorithm based on time and permutation. The suggested method (MAES) is based on modifying the SubByte and ShiftRrows in the encryption part and modification the InvSubByte and InvShiftRows in the decryption part. After the implementation of the proposal and testing the results, the Modified AES achieved good results in accomplishing the communication with high performance criteria in terms of randomness, encryption time, storage space, and avalanche effects. The proposed method has good randomness to ciphertext because this method passed NIST statistical tests against attacks; also, (MAES) reduced the encryption time by (10 %) than the time of the original AES; therefore, the modified AES is faster than the original AES. Also, the proposed method showed good results in memory utilization where the value is (54.36) for the MAES, but the value for the original AES is (66.23). Also, the avalanche effects used for calculating diffusion property are (52.08%) for the modified AES and (51.82%) percentage for the original AES.Keywords: modified AES, randomness test, encryption time, avalanche effects
Procedia PDF Downloads 24827231 Beyond Empathy: From Justice to Reconciliation
Authors: Nissim Avissar
Abstract:
This paper aims to question the practice of bringing together people belonging to groups in conflict with the aim of bridging differences through universal empathy and interpersonal connections. It is argued that in cases where one group has the power, and the other is in a struggle to change the balance assuming universal equality between the groups and encouraging emphatic understanding is a non-emphatic practice. Accordingly, a new concept is posited–justice-sensitive empathy, conditioning empathy in such situations on the acknowledgement of an imbalance of power/injustice. With this reframing in mind, educational practices promoting social justice are discussed. In order to create conditions for justice-seeking or politically sensitive empathy, we need to go beyond the conventional definitions of empathy and offer other means and possibilities. Three possibilities are discussed. The first focuses on intra-group (as opposed to inter-group) processes within each group. It means temporary and tactical separation that may allow each group to focus on its own needs and values and perhaps to return to the dialogue more confidently. The second option emphasizes the notion of "constructive conflict," which means that each side still aspires to promote his own interests but without demolishing the other side (which is a rival but also an unwanted and forced partner). Here, alongside the "obligation to resist" and to act to promote justice as we view and understand it, we have to take into account the other side. The third and last option relates to the practice of Restorative Justice. This practice originated in the Truth and Reconciliation committees in South Africa, but it is now widely used in other contexts. Those committees had the authority to punish (or pardon) people; however, their main purpose was to seek truth and, from there, nourish reconciliation. This is the main idea of restorative justice; it seeks justice for the sake of restoring relationships. All the above options involve action and are aware of power relations (i.e., politics). They all seek justice. They may create conditions for the more conventional empathic practice to evolve, but no less than that, they are examples of justice-seeking and politically sensitive empathetic practice.Keywords: education, empathy, justice, reconciliation
Procedia PDF Downloads 9727230 Filtration Efficacy of Reusable Full-Face Snorkel Masks for Personal Protective Equipment
Authors: Adrian Kong, William Chang, Rolando Valdes, Alec Rodriguez, Roberto Miki
Abstract:
The Pneumask consists of a custom snorkel-specific adapter that attaches a snorkel-port of the mask to a 3D-printed filter. This full-face snorkel mask was designed for use as personal protective equipment (PPE) during the COVID-19 pandemic when there was a widespread shortage of PPE for medical personnel. Various clinical validation tests have been conducted, including the sealing capability of the mask, filter performance, CO2 buildup, and clinical usability. However, data regarding the filter efficiencies of Pneumask and multiple filter types have not been determined. Using an experimental system, we evaluated the filtration efficiency across various masks and filters during inhalation. Eighteen combinations of respirator models (5 P100 FFRs, 4 Dolfino Masks) and filters (2091, 7093, 7093CN, BB50T) were evaluated for their exposure to airborne particles sized 0.3 - 10.0 microns using an electronic airborne particle counter. All respirator model combinations provided similar performance levels for 1.0-micron, 3.0-micron, 5.0-micron, 10.0-microns, with the greatest differences in the 0.3-micron and 0.5-micron range. All models provided expected performances against all particle sizes, with Class P100 respirators providing the highest performance levels across all particle size ranges. In conclusion, the modified snorkel mask has the potential to protect providers who care for patients with COVID-19 from increased airborne particle exposure.Keywords: COVID-19, PPE, mask, filtration, efficiency
Procedia PDF Downloads 16827229 Measuring the Academic Self-Efficacy of Undergraduates: The Role of Gender and Academic Year Experience
Authors: Vilani Sachitra, Udari Bandara
Abstract:
Self-efficacy beliefs provide the foundation for human motivation, well-being, and personal accomplishment. This study measured the levels of academic self-efficacy of undergraduates and also examined whether there any differences in academic self-efficacy with respect to gender and academic year. A structured questionnaire was employed to collect data from undergraduates who enrolled the Bachelor of Commerce degree programme at the University of Sri Jayewardenepura. The outcome of the study revealed that undergraduates lacked the confidence to ask and answer questions, seek help from lecturers, have a study plan and engage in academic discussion and note-taking. However, the findings also demonstrated that undergraduates were not hesitant about seeking help from friends, had confidence on meeting the deadlines and completing the degree within four years. Interestingly, females displayed higher academic self-efficacy than males. Specifically, the data were supported to conclude that there were significant differences in academic self-efficacy with respect to academic years.Keywords: academic year, bachelor of commerce undergraduates, gender, self-efficacy
Procedia PDF Downloads 35827228 Electrochemiluminescent Detection of DNA Damage Induced by Tetrachloro-1,4- Benzoquinone Using DNA Sensor
Authors: Tian-Fang Kang, Xue Sun
Abstract:
DNA damage induced by tetrachloro-1,4-benzoquinone (TCBQ), a reactive metabolite of pentachloro-phenol (PCP), was investigated using a glassy carbon electrode (GCE) modified with calf thymus double-stranded DNA (ds-DNA) in this work. DNA modified films were constructed by layer-by-layer adsorption of polycationic poly(diallyldimethyl- ammonium chloride) (PDDA) and negatively charged ds-DNA on the surface of a glassy carbon electrode. The DNA intercalator [Ru(bpy)2(dppz)]2+ (bpy=2, 2′-bipyridine, dppz0dipyrido [3, 2-a: 2′,3′-c] phenazine) was chosen as an electrochemical probe to detect DNA damage. After the sensor was incubated in 0.1 M pH 7.3 phosphate buffer solution (PBS) for 30min, the intact PDDA/DNA film produced a sensitive electrochemiluminescent (ECL) signal. However, after the sensor was incubated in 100 μM TCBQ or a mixed solution of 100 μM TCBQ and 2 mM H2O2, ECL signal decreased significantly. During the incubation of DNA in TCBQ or TCBQ-H2O2 solution, the double-helix of DNA was damaged, which resulted in the decrease of Ru-dppz bound to DNA. Additionally, the results were verified independently by fluorescence experiments. This paper provides a sensitive method to directly screen DNA damage induced by chemicals in the environment.Keywords: DNA damage, detection, electrochemiluminescence, sensor
Procedia PDF Downloads 41027227 Assessing a Potential Conceive Design Implement Operate Curricular Change in an Engineering Degree
Authors: L. Miranda
Abstract:
The requirements of the engineering education are nowadays very broad and demand a set of skills which demands not only technical knowledge but also the ability to lead and innovate and personal and interpersonal skills. A framework for the assessment of a potential curricular change is necessary to guide the analysis of the program with respect to the stakeholders and the legislation of the country, in order to develop appropriate learning outcomes. A Conceive-Design-Implement-Operate (CDIO) approach was chosen for an evaluation conducted in a mechanical engineering degree in Brazil. The work consisted in the application of a survey with students and professors and a literature review of the legislation and studies that raised the required competences and skills for the modern engineer. The results show a great potential for a CDIO set of skills in engineering degrees in Brazil and reveal the frequent demands of stakeholders before a curricular change.Keywords: curriculum change, conceive design implement operate, accreditation, personal and interpersonal skills
Procedia PDF Downloads 36227226 Simulated Microgravity Inhibits L-Type Calcium Channel Currents by Up-Regulation of miR-103 in Osteoblasts
Authors: Zhongyang Sun, Shu Zhang
Abstract:
In osteoblasts, L-type voltage sensitive calcium channels (LTCCs), especially the Cav1.2 LTCCs, play fundamental roles in cellular responses to external stimuli including both mechanical forces and hormonal signals. Several lines of evidence have revealed that the density of bone is increased and the resorption of bone is decreased when these calcium channels in osteoblasts are activated. And numerous studies have shown that mechanical loading promotes bone formation in the modeling skeleton, whereas removal of this stimulus in microgravity results in a reduction in bone mass. However, the effect of microgravity on LTCCs in osteoblasts is still unknown. The aim of this study was to determine whether microgravity exerts influence on LTCCs in osteoblasts and the possible mechanisms underlying. In this study, we demonstrate that simulated microgravity substantially inhibits LTCCs in osteoblast by suppressing the expression of Cav1.2. Then we show that the up-regulation of miR-103 is involved in the down-regulation of Cav1.2 expression and inhibition of LTCCs by simulated microgravity in osteoblasts. Our study provides a novel mechanism of simulated microgravity-induced adverse effects on osteoblasts, offering a new avenue to further investigate the bone loss caused by microgravity.Keywords: L-type voltage sensitive calcium channels, Cav1.2, osteoblasts, microgravity
Procedia PDF Downloads 30627225 Sensing of Cancer DNA Using Resonance Frequency
Authors: Sungsoo Na, Chanho Park
Abstract:
Lung cancer is one of the most common severe diseases driving to the death of a human. Lung cancer can be divided into two cases of small-cell lung cancer (SCLC) and non-SCLC (NSCLC), and about 80% of lung cancers belong to the case of NSCLC. From several studies, the correlation between epidermal growth factor receptor (EGFR) and NSCLCs has been investigated. Therefore, EGFR inhibitor drugs such as gefitinib and erlotinib have been used as lung cancer treatments. However, the treatments result showed low response (10~20%) in clinical trials due to EGFR mutations that cause the drug resistance. Patients with resistance to EGFR inhibitor drugs usually are positive to KRAS mutation. Therefore, assessment of EGFR and KRAS mutation is essential for target therapies of NSCLC patient. In order to overcome the limitation of conventional therapies, overall EGFR and KRAS mutations have to be monitored. In this work, the only detection of EGFR will be presented. A variety of techniques has been presented for the detection of EGFR mutations. The standard detection method of EGFR mutation in ctDNA relies on real-time polymerase chain reaction (PCR). Real-time PCR method provides high sensitive detection performance. However, as the amplification step increases cost effect and complexity increase as well. Other types of technology such as BEAMing, next generation sequencing (NGS), an electrochemical sensor and silicon nanowire field-effect transistor have been presented. However, those technologies have limitations of low sensitivity, high cost and complexity of data analyzation. In this report, we propose a label-free and high-sensitive detection method of lung cancer using quartz crystal microbalance based platform. The proposed platform is able to sense lung cancer mutant DNA with a limit of detection of 1nM.Keywords: cancer DNA, resonance frequency, quartz crystal microbalance, lung cancer
Procedia PDF Downloads 23327224 Intuitional Insight in Islamic Mysticism
Authors: Maryam Bakhtyar, Pegah Akrami
Abstract:
Intuitional insight or mystical cognition is a different insight from common, concrete and intellectual insights. This kind of insight is not achieved by visionary contemplation but by the recitation of God, self-purification, and mystical life. In this insight, there is no distance or medium between the subject of cognition and its object, and they have a sort of unification, unison, and incorporation. As a result, knowledgeable consider this insight as direct, immediate, and personal. The goal of this insight is God, cosmos’ creatures, and the general inner and hidden aspect of the world that is nothing except God’s manifestations in the view of mystics. AS our common cognitions have diversity and stages, intuitional insight also has diversity and levels. As our senses are divided into concrete and rational, mystical discovery is divided into superficial discovery and spiritual one. Based on Islamic mystics, the preferable way to know God and believe in him is intuitional insight. There are two important criteria for evaluating mystical intuition, especially for beginner mystics of intellect and revelation. Indeed, the conclusion and a brief evaluation of Islamic mystics’ viewpoint is the main subject of this paper.Keywords: intuition, discovery, mystical insight, personal knowledge, superficial discovery, spiritual discovery
Procedia PDF Downloads 9427223 Assessment of Petrophysical Parameters Using Well Log and Core Data
Authors: Khulud M. Rahuma, Ibrahim B. Younis
Abstract:
Assessment of petrophysical parameters are very essential for reservoir engineer. Three techniques can be used to predict reservoir properties: well logging, well testing, and core analysis. Cementation factor and saturation exponent are very required for calculation, and their values role a great effect on water saturation estimation. In this study a sensitive analysis was performed to investigate the influence of cementation factor and saturation exponent variation applying logs, and core analysis. Measurements of water saturation resulted in a maximum difference around fifteen percent.Keywords: porosity, cementation factor, saturation exponent, formation factor, water saturation
Procedia PDF Downloads 69327222 Moving Target Defense against Various Attack Models in Time Sensitive Networks
Authors: Johannes Günther
Abstract:
Time Sensitive Networking (TSN), standardized in the IEEE 802.1 standard, has been lent increasing attention in the context of mission critical systems. Such mission critical systems, e.g., in the automotive domain, aviation, industrial, and smart factory domain, are responsible for coordinating complex functionalities in real time. In many of these contexts, a reliable data exchange fulfilling hard time constraints and quality of service (QoS) conditions is of critical importance. TSN standards are able to provide guarantees for deterministic communication behaviour, which is in contrast to common best-effort approaches. Therefore, the superior QoS guarantees of TSN may aid in the development of new technologies, which rely on low latencies and specific bandwidth demands being fulfilled. TSN extends existing Ethernet protocols with numerous standards, providing means for synchronization, management, and overall real-time focussed capabilities. These additional QoS guarantees, as well as management mechanisms, lead to an increased attack surface for potential malicious attackers. As TSN guarantees certain deadlines for priority traffic, an attacker may degrade the QoS by delaying a packet beyond its deadline or even execute a denial of service (DoS) attack if the delays lead to packets being dropped. However, thus far, security concerns have not played a major role in the design of such standards. Thus, while TSN does provide valuable additional characteristics to existing common Ethernet protocols, it leads to new attack vectors on networks and allows for a range of potential attacks. One answer to these security risks is to deploy defense mechanisms according to a moving target defense (MTD) strategy. The core idea relies on the reduction of the attackers' knowledge about the network. Typically, mission-critical systems suffer from an asymmetric disadvantage. DoS or QoS-degradation attacks may be preceded by long periods of reconnaissance, during which the attacker may learn about the network topology, its characteristics, traffic patterns, priorities, bandwidth demands, periodic characteristics on links and switches, and so on. Here, we implemented and tested several MTD-like defense strategies against different attacker models of varying capabilities and budgets, as well as collaborative attacks of multiple attackers within a network, all within the context of TSN networks. We modelled the networks and tested our defense strategies on an OMNET++ testbench, with networks of different sizes and topologies, ranging from a couple dozen hosts and switches to significantly larger set-ups.Keywords: network security, time sensitive networking, moving target defense, cyber security
Procedia PDF Downloads 7327221 The Effect of Transactional Analysis Group Training on Self-Knowledge and Its Ego States (The Child, Parent, and Adult): A Quasi-Experimental Study Applied to Counselors of Tehran
Authors: Mehravar Javid, Sadrieh Khajavi Mazanderani, Kelly Gleischman, Zoe Andris
Abstract:
The present study was conducted with the aim of investigating the effectiveness of transactional analysis group training on self-knowledge and Its dimensions (self, child, and adult) in counselors working in public and private high schools in Tehran. Counseling has become an important job for society, and there is a need for consultants in organizations. Providing better and more efficient counseling is one of the goals of the education system. The personal characteristics of counselors are important for the success of the therapy. In TA, humans have three ego states, which are named parent, adult, and child, and the main concept in the transactional analysis is self-state, which means a stable feeling and pattern of thinking related to behavioral patterns. Self-knowledge, considered a prerequisite to effective communication, fosters psychological growth, and recognizing it, is pivotal for emotional development, leading to profound insights. The research sample included 30 working counselors (22 women and 8 men) in the academic year 2019-2020 who achieved the lowest scores on the self-knowledge questionnaire. The research method was quasi-experimental with a control group (15 people in the experimental group and 15 people in the control group). The research tool was a self-awareness questionnaire with 29 questions and three subscales (child, parent, and adult Ego state). The experimental group was exposed to transactional analysis training for 10 once-weekly 2-hour sessions; the questionnaire was implemented in both groups (post-test). Multivariate covariance analysis was used to analyze the data. The data showed that the level of self-awareness of counselors who received transactional analysis training is higher than that of counselors who did not receive any training (p<0.01). The result obtained from this analysis shows that transactional analysis training is an effective therapy for enhancing self-knowledge and its subscales (Adult ego state, Parent ego state, and Child ego state). Teaching transactional analysis increases self-knowledge, and self-realization and helps people to achieve independence and remove irresponsibility to improve intra-personal and interpersonal relationships.Keywords: ego state, group, transactional analysis, self-knowledge
Procedia PDF Downloads 7627220 Determination of the Bank's Customer Risk Profile: Data Mining Applications
Authors: Taner Ersoz, Filiz Ersoz, Seyma Ozbilge
Abstract:
In this study, the clients who applied to a bank branch for loan were analyzed through data mining. The study was composed of the information such as amounts of loans received by personal and SME clients working with the bank branch, installment numbers, number of delays in loan installments, payments available in other banks and number of banks to which they are in debt between 2010 and 2013. The client risk profile was examined through Classification and Regression Tree (CART) analysis, one of the decision tree classification methods. At the end of the study, 5 different types of customers have been determined on the decision tree. The classification of these types of customers has been created with the rating of those posing a risk for the bank branch and the customers have been classified according to the risk ratings.Keywords: client classification, loan suitability, risk rating, CART analysis
Procedia PDF Downloads 33827219 Public Bus Transport Passenger Safety Evaluations in Ghana: A Phenomenological Constructivist Exploration
Authors: Enoch F. Sam, Kris Brijs, Stijn Daniels, Tom Brijs, Geert Wets
Abstract:
Notwithstanding the growing body of literature that recognises the importance of personal safety to public transport (PT) users, it remains unclear what PT users consider regarding their safety. In this study, we explore the criteria PT users in Ghana use to assess bus safety. This knowledge will afford a better understanding of PT users’ risk perceptions and assessments which may contribute to theoretical models of PT risk perceptions. We utilised phenomenological research methodology, with data drawn from 61 purposively sampled participants. Data collection (through focus group discussions and in-depth interviews) and analyses were done concurrently to the point of saturation. Our inductive data coding and analyses through the constant comparison and content analytic techniques resulted in 4 code categories (conceptual dimensions), 27 codes (safety items/criteria), and 100 quotations (data segments). Of the number of safety criteria participants use to assess bus safety, vehicle condition, driver’s marital status, and transport operator’s safety records were the most considered. With each criterion, participants rightly demonstrated its respective relevance to bus safety. These findings imply that investment in and maintenance of safer vehicles, and responsible and safety-conscious drivers, and prioritization of passengers’ safety are key-targets for public bus/minibus operators in Ghana.Keywords: safety evaluations, public bus/minibus, passengers, phenomenology, Ghana
Procedia PDF Downloads 33727218 Analysis of Expert Possibilities While Identifying Human Teeth
Authors: Saule Mussabekova
Abstract:
Forensic investigation of human teeth plays an important role in detection of crime, particularly in cases of personal identification of dead bodies changed by putrefactive processes or skeletonized bodies as well as when finding bodies of unknown persons. 152 teeth have been investigated; 85 of them belonged to men and 67 belonged to women taken from alive people of different age. Teeth have been investigated after extraction. Two types of teeth have been investigated: teeth without integrity violation of dental crown and teeth with different degrees of its violation. Additionally, 517 teeth have been investigated that were collected from dead bodies, 252 of which belonged to women and 265 belonged to men, whatever the cause of death with death limitation from 1 month to 20 years. Isohemagglutinating serums and Coliclons of different series have been used for the research of tooth-group specificity by serological methods according to the AB0 system. Standard protocols of different techniques have been used for DNA purification from teeth (by reagent Chelex 100 produced by Bio-Rad using reagent kit 'DNA IQTM System' produced by Promega company (USA) and using columns 'QIAamp DNA Investigator Kit' produced by Qiagen company). Results of comparative forensic investigation of human teeth using serological and molecular genetic methods have shown that use of serological methods for forensic identification is sensible only in cases of preselection prior to the next molecular genetic investigation as well as in cases of impossibility of corresponding genetic investigation for different objective reasons. A number of advantages of methods of molecular genetics in the dental investigation have been marked, particularly in putrefactive changes, in personal identification. Key moments of modern condition of personal identification have been reflected according to dental state. Prospective directions of advance preparation of material have been emphasized for identification of teeth in forensic practice.Keywords: dental state, forensic identification, molecular genetic analysis, teeth
Procedia PDF Downloads 14127217 Enhancing EFL Learners' Motivation and Classroom Interaction through Self-Disclosure in Moroccan Higher Education
Authors: Mohsine Jebbour
Abstract:
Motivation and classroom interaction are of prime significance for second/foreign language learning to take place effectively. Thus, a considerable amount of motivation and classroom interaction helps ensure students’ success in and continuation of learning the TL. One way to enhance students’ motivation and classroom interaction in the Moroccan EFL classroom then is through the use of self-disclosure. For the purposes of this study, self-disclosure has been defined as the verbal communication of positive personal information including opinions, feelings, experiences, family and friendship stories to classmates and teachers. This paper is meant to demonstrate that positive self-disclosure can serve as an effective tool for helping students develop favorable attitudes toward the EFL classroom (i.e., English courses, teacher of English, and classroom activities) and promoting their intrinsic motivation (IM to know and IM toward stimulation). A further objective is that since self-disclosure is reciprocal, when teachers of English reveal their personal information, students will uncover their personal matters in return. This will help ensure effective classroom participation, foster teacher-student communication, and encourage students to practice and hence improve their oral proficiency (i.e., the speaking skill). A questionnaire was used to collect data in this study. 164 undergraduate students (99 females and 65 males) from the department of English at the faculty of letters and humanities, Dher el Mehraz, Sidi Mohammed Ben Abd Allah University completed a questionnaire that assessed self-disclosure in relation to motivation (i.e., attitudes toward the learning situation and intrinsic motivation) and classroom interaction (i.e., teacher-student interaction, participation, and out-of-class communication) on a 1 to 5 scale with (1) Strongly Disagree and (5) Strongly Agree. The level of agreement on the positive dimension of self-disclosure was ranked first by the respondents. The hypothesis set at the very beginning of the study, which posited that positive self-disclosure is essential to enhancing motivation and classroom interaction in the EFL context, was confirmed. In this regard, the findings suggest that implementing self-disclosure in the Moroccan EFL classroom may serve as an effective tool to have positive affect of teacher, class and classroom activities. This in turn will encourage the learners to attend classes, enjoy the language learning activity, complete classroom assignments, participate in class discussions, and interact with their teachers and classmates. It is hoped that teachers benefit from the results of this study and hence encourage the use of positive self-disclosure to develop English language learning in the Moroccan context where opportunities of using English outside the classroom are limited.Keywords: EFL classroom, classroom interaction, motivation, self-disclosure
Procedia PDF Downloads 31327216 Implementing Zero-Trust Security with Passwordless Authentication Gateways for Privacy-Oriented Organizations Using Keycloak
Authors: Andrei Bogdan Stanescu, Laura Diaconescu
Abstract:
With the increasing concerns about data breaches and privacy violations, organizations seek robust security measures to protect sensitive information. This research paper highlights the importance of implementing the Zero-Trust Security methodology using Passwordless Authentication Gateways that leverage Keycloak, an open-source Identity and Access Management (IAM) software, as a solution to address the security challenges these organizations face. The paper presents the successful implementation and deployment of such a solution in a mid-size, privacy-oriented organization. The implementation resulted in significant security improvements, reducing the risk of unauthorized access and potential data breaches. Moreover, user feedback indicated enhanced convenience and streamlined authentication experiences. The results of this study bring solid contributions in the field of cybersecurity and provide practical insights for organizations aiming to strengthen their security practices.Keywords: identity and access management, passwordless authentication, privacy, zero-trust security
Procedia PDF Downloads 9127215 Modeling Drying and Pyrolysis of Moist Wood Particles at Slow Heating Rates
Authors: Avdhesh K. Sharma
Abstract:
Formulation for drying and pyrolysis process in packed beds at slow heating rates is presented. Drying of biomass particles bed is described by mass diffusion equation and local moisture-vapour-equilibrium relations. In gasifiers, volatilization rate during pyrolysis of biomass is modeled by using apparent kinetic rate expression, while product compositions at slow heating rates is modeled using empirical fitted mass ratios (i.e., CO/CO2, ME/CO2, H2O/CO2) in terms of pyrolysis temperature. The drying module is validated fairly with available chemical kinetics scheme and found that the testing zone in gasifier bed constituted of relatively smaller particles having high airflow with high isothermal temperature expedite the drying process. Further, volatile releases more quickly within the shorter zone height at high temperatures (isothermal). Both, moisture loss and volatile release profiles are found to be sensitive to temperature, although the influence of initial moisture content on volatile release profile is not so sensitive.Keywords: modeling downdraft gasifier, drying, pyrolysis, moist woody biomass
Procedia PDF Downloads 11827214 Supply Chains Resilience within Machine-Made Rug Producers in Iran
Authors: Malihe Shahidan, Azin Madhi, Meisam Shahbaz
Abstract:
In recent decades, the role of supply chains in sustaining businesses and establishing their superiority in the market has been under focus. The realization of the goals and strategies of a business enterprise is largely dependent on the cooperation of the chain, including suppliers, distributors, retailers, etc. Supply chains can potentially be disrupted by both internal and external factors. In this paper, resilience strategies have been identified and analyzed in three levels: sourcing, producing, and distributing by considering economic depression as a current risk factor for the machine-made rugs industry. In this study, semi-structured interviews for data gathering and thematic analysis for data analysis are applied. Supply chain data has been gathered from seven rug factories before and after the economic depression through semi-structured interviews. The identified strategies were derived from literature review and validated by collecting data from a group of eighteen industry and university experts, and the results were analyzed using statistical tests. Finally, the outsourcing of new products and products in the new market, the development and completion of the product portfolio, the flexibility in the composition and volume of products, the expansion of the market to price-sensitive, direct sales, and disintermediation have been determined as strategies affecting supply chain resilience of machine-made rugs' industry during an economic depression.Keywords: distribution, economic depression, machine-made rug, outsourcing, production, sourcing, supply chain, supply chain resilience
Procedia PDF Downloads 16227213 Impact of Interest and Foreign Exchange Rates Liberalization on Investment Decision in Nigeria
Authors: Kemi Olalekan Oduntan
Abstract:
This paper was carried out in order to empirical, and descriptively analysis how interest rate and foreign exchange rate liberalization influence investment decision in Nigeria. The study spanned through the period of 1985 – 2014, secondary data were restricted to relevant variables such as investment (Proxy by Gross Fixed Capital Formation) saving rate, interest rate and foreign exchange rate. Theories and empirical literature from various scholars were reviews in the paper. Ordinary Least Square regression method was used for the analysis of data collection. The result of the regression was critically interpreted and discussed. It was discovered for empirical finding that tax investment decision in Nigeria is highly at sensitive rate. Hence, all the alternative hypotheses were accepted while the respective null hypotheses were rejected as a result of interest rate and foreign exchange has significant effect on investment in Nigeria. Therefore, impact of interest rate and foreign exchange rate on the state of investment in the economy cannot be over emphasized.Keywords: interest rate, foreign exchange liberalization, investment decision, economic growth
Procedia PDF Downloads 36427212 Indigenous Engagement: Towards a Culturally Sensitive Approach for Inclusive Economic Development
Authors: Karla N. Penna, Eloise J. Hoffman, Tonya R. Carter
Abstract:
This paper suggests that effective cultural landscape management plans in an Indigenous context should be undertaken using multidisciplinary approach taken into consideration context-related social and cultural aspects. In relation to working in Indigenous and mining contexts, we draw upon and contribute to International policies on human rights that promote the development of management plans on that are co-designed through genuine engagement processes. We suggest that the production of management plans that are built upon culturally relevant frameworks, lead to more inclusive economic development, a greater sense of trust, and shared managerial responsibilities. In this paper, three issues related to Indigenous engagement and cultural landscape management plans will be addressed: (1) the need for effective communication channels between proponents and Traditional Owners (Australian original Aboriginal peoples who inhabited specific regions), (2) the use of a culturally sensitive approach to engage local representatives in the decision making processes, and (3) how design of new management plans can help in establishing shared management.Keywords: culture-centred approach, Holons’ hierarchy, inclusive economic development, indigenous engagement
Procedia PDF Downloads 20227211 Sensitive Determination of Copper(II) by Square Wave Anodic Stripping Voltammetry with Tetracarbonylmolybdenum(0) Multiwalled Carbon Nanotube Paste Electrode
Authors: Illyas Md Isa, Mohamad Idris Saidin, Mustaffa Ahmad, Norhayati Hashim
Abstract:
A highly selective and sensitive carbon paste electrode modified with multiwall carbon nanotubes and 2,6–diacetylpyridine-di-(1R)–(-)–fenchone diazine tetracarbonylmolybdenum(0) complex was used for determination of trace amounts of Cu(II) using square wave anodic stripping voltammetry (SWASV). The influences of experimental variables on the proposed electrode such as pH, supporting electrolyte, preconcentration potential and time, and square wave parameters were investigated. Under optimal conditions, the proposed electrode showed a linear relationship with concentration in the range of 1.0 × 10–10 to 1.0 × 10– 6 M Cu(II) with a limit of detection 8.0 × 10–11 M. The relative standard deviation (n = 5) for a solution containing 1.0 × 10– 6 M of Cu(II) was 0.036. The presence of various cations (in 10 and 100-folds concentration) did not interfere. Electrochemical impedance spectroscopy (EIS) showed that the charge transfer at the electrode-solution interface was favourable. The proposed electrode was applied for the determination of Cu(II) in several water samples. Results agreed very well with those obtained by inductively coupled plasma-optical emission spectrometry. The modified electrode was then proposed as an alternative for determination of Cu(II).Keywords: chemically modified electrode, Cu(II), square wave anodic stripping voltammetry, tetracarbonylmolybdenum(0)
Procedia PDF Downloads 27027210 Using Risk Management Indicators in Decision Tree Analysis
Authors: Adel Ali Elshaibani
Abstract:
Risk management indicators augment the reporting infrastructure, particularly for the board and senior management, to identify, monitor, and manage risks. This enhancement facilitates improved decision-making throughout the banking organization. Decision tree analysis is a tool that visually outlines potential outcomes, costs, and consequences of complex decisions. It is particularly beneficial for analyzing quantitative data and making decisions based on numerical values. By calculating the expected value of each outcome, decision tree analysis can help assess the best course of action. In the context of banking, decision tree analysis can assist lenders in evaluating a customer’s creditworthiness, thereby preventing losses. However, applying these tools in developing countries may face several limitations, such as data availability, lack of technological infrastructure and resources, lack of skilled professionals, cultural factors, and cost. Moreover, decision trees can create overly complex models that do not generalize well to new data, known as overfitting. They can also be sensitive to small changes in the data, which can result in different tree structures and can become computationally expensive when dealing with large datasets. In conclusion, while risk management indicators and decision tree analysis are beneficial for decision-making in banks, their effectiveness is contingent upon how they are implemented and utilized by the board of directors, especially in the context of developing countries. It’s important to consider these limitations when planning to implement these tools in developing countries.Keywords: risk management indicators, decision tree analysis, developing countries, board of directors, bank performance, risk management strategy, banking institutions
Procedia PDF Downloads 6027209 Exploring Nature and Pattern of Mentoring Practices: A Study on Mentees' Perspectives
Authors: Nahid Parween Anwar, Sadia Muzaffar Bhutta, Takbir Ali
Abstract:
Mentoring is a structured activity which is designed to facilitate engagement between mentor and mentee to enhance mentee’s professional capability as an effective teacher. Both mentor and mentee are important elements of the ‘mentoring equation’ and play important roles in nourishing this dynamic, collaborative and reciprocal relationship. Cluster-Based Mentoring Programme (CBMP) provides an indigenous example of a project which focused on development of primary school teachers in selected clusters with a particular focus on their classroom practice. A study was designed to examine the efficacy of CBMP as part of Strengthening Teacher Education in Pakistan (STEP) project. This paper presents results of one of the components of this study. As part of the larger study, a cross-sectional survey was employed to explore nature and patterns of mentoring process from mentees’ perspectives in the selected districts of Sindh and Balochistan. This paper focuses on the results of the study related to the question: What are mentees’ perceptions of their mentors’ support for enhancing their classroom practice during mentoring process? Data were collected from mentees (n=1148) using a 5-point scale -‘Mentoring for Effective Primary Teaching’ (MEPT). MEPT focuses on seven factors of mentoring: personal attributes, pedagogical knowledge, modelling, feedback, system requirement, development and use of material, and gender equality. Data were analysed using SPSS 20. Mentees perceptions of mentoring practice of their mentors were summarized using mean and standard deviation. Results showed that mean scale scores on mentees’ perceptions of their mentors’ practices fell between 3.58 (system requirement) and 4.55 (personal attributes). Mentees’ perceives personal attribute of the mentor as the most significant factor (M=4.55) towards streamlining mentoring process by building good relationship between mentor and mentees. Furthermore, mentees have shared positive views about their mentors efforts towards promoting gender impartiality (M=4.54) during workshop and follow up visit. Contrary to this, mentees felt that more could have been done by their mentors in sharing knowledge about system requirement (e.g. school policies, national curriculum). Furthermore, some of the aspects in high scoring factors were highlighted by the mentees as areas for further improvement (e.g. assistance in timetabling, written feedback, encouragement to develop learning corners). Mentees’ perceptions of their mentors’ practices may assist in determining mentoring needs. The results may prove useful for the professional development programme for the mentors and mentees for specific mentoring programme in order to enhance practices in primary classrooms in Pakistan. Results would contribute into the body of much-needed knowledge from developing context.Keywords: cluster-based mentoring programme, mentoring for effective primary teaching (MEPT), professional development, survey
Procedia PDF Downloads 23327208 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism
Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun
Abstract:
The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorismKeywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution
Procedia PDF Downloads 9627207 Stature Prediction from Anthropometry of Extremities among Jordanians
Authors: Amal A. Mashali, Omar Eltaweel, Elerian Ekladious
Abstract:
Stature of an individual has an important role in identification, which is often required in medico-legal practice. The estimation of stature is an important step in the identification of dismembered remains or when only a part of a skeleton is only available as in major disasters or with mutilation. There is no published data on anthropological data among Jordanian population. The present study was designed in order to find out relationship of stature to some anthropometric measures among a sample of Jordanian population and to determine the most accurate and reliable one in predicting the stature of an individual. A cross sectional study was conducted on 336 adult healthy volunteers , free of bone diseases, nutritional diseases and abnormalities in the extremities after taking their consent. Students of Faculty of Medicine, Mutah University helped in collecting the data. The anthropometric measurements (anatomically defined) were stature, humerus length, hand length and breadth, foot length and breadth, foot index and knee height on both right and left sides of the body. The measurements were typical on both sides of the bodies of the studied samples. All the anthropologic data showed significant relation with age except the knee height. There was a significant difference between male and female measurements except for the foot index where F= 0.269. There was a significant positive correlation between the different measures and the stature of the individuals. Three equations were developed for estimation of stature. The most sensitive measure for prediction of a stature was found to be the humerus length.Keywords: foot index, foot length, hand length, humerus length, stature
Procedia PDF Downloads 30627206 A Nanosensor System Based on Disuccinimydyl – CYP2E1 for Amperometric Detection of the Anti-Tuberculosis Drug, Pyrazinamide
Authors: Rachel F. Ajayi, Unathi Sidwaba, Usisipho Feleni, Samantha F. Douman, Ezo Nxusani, Lindsay Wilson, Candice Rassie, Oluwakemi Tovide, Priscilla G.L. Baker, Sibulelo L. Vilakazi, Robert Tshikhudo, Emmanuel I. Iwuoha
Abstract:
Pyrazinamide (PZA) is among the first-line pro-drugs in the tuberculosis (TB) combination chemotherapy used to treat Mycobacterium tuberculosis. Numerous reports have suggested that hepatotoxicity due to pyrazinamide in patients is due to inappropriate dosing. It is therefore necessary to develop sensitive and reliable techniques for determining the PZA metabolic profile of diagnosed patients promptly and at point-of-care. This study reports the determination of PZA based on nanobiosensor systems developed from disuccinimidyl octanedioate modified Cytochrome P450-2E1 (CYP2E1) electrodeposited on gold substrates derivatised with (poly(8-anilino-1-napthalene sulphonic acid) PANSA/PVP-AgNPs nanocomposites. The rapid and sensitive amperometric PZA detection gave a dynamic linear range of 2 µM to 16 µM revealing a limit of detection of 0.044 µM and a sensitivity of 1.38 µA/µM. The Michaelis-Menten parameters; KM, KMapp and IMAX were also calculated and found to be 6.0 µM, 1.41 µM and 1.51 µA respectively indicating a nanobiosensor suitable for use in serum.Keywords: tuberculosis, cytochrome P450-2E1, disuccinimidyl octanedioate, pyrazinamide
Procedia PDF Downloads 41427205 Self-Assembled Nano Aggregates Based On Polyaspartamide Graft Copolymers for pH-Controlled Release of Doxorubicin
Authors: Van Tran Thi Thuy, Cheol Won Lim, Dukjoon Kim
Abstract:
A series of biodegradable copolymers based on polyaspartamide (PASPAM) were synthesized by grafting hydrophilic O-(2-aminoethyl)-O'-methylpoly(ethylene glycol) (MPEG), hydrophobic cholic acid (CA), and pH-sensitive hydrazine (Hyd) segments on a PASPAM backbone. The hydrazine group was effectively cleaved to release doxorubicin (DOX) conjugated on PASPAM in an acidic environment. The chemical structure of the polymer and the degree of substitution of each graft segment were analyzed using FT-IR and 1H-NMR spectroscopy. The size of the MPEG/Hyd/CA-g-PASPAM copolymer self-aggregates was examined by dynamic light scattering (DLS) and transmission electron microscope (TEM). The mean diameter of the self - aggregates increased from 125 to 200 nm at pH 7.4, as the degree of substitution of CA increased from 10 to 20 %. The release kinetics of DOX was strongly affected by the pH of the releasing medium. While less than 30% of the DOX-loaded was released in about 30 h at pH 7.4, more than 60% was released at pH 5.0 within the same time. The viability tests of human breast cancer cells (MCF-7) and human embryonic kidney cells (293T) show the potential application of MPEG/Hyd/CA-g-PASPAM copolymer self-aggregates in the controlled intracellular delivery for cancer treatments.Keywords: pH-sensitive, drug delivery, polyaspartamide, self-assembly, nano-aggregates
Procedia PDF Downloads 35827204 A Pervasive System Architecture for Smart Environments in Internet of Things Context
Authors: Patrick Santos, João Casal, João Santos Luis Varandas, Tiago Alves, Carlos Romeiro, Sérgio Lourenço
Abstract:
Nowadays, technology makes it possible to, in one hand, communicate with various objects of the daily life through the Internet, and in the other, put these objects interacting with each other through this channel. Simultaneously, with the raise of smartphones as the most ubiquitous technology on persons lives, emerge new agents for these devices - Intelligent Personal Assistants. These agents have the goal of helping the user manage and organize his information as well as supporting the user in his/her day-to-day tasks. Moreover, other emergent concept is the Cloud Computing, which allows computation and storage to get out of the users devices, bringing benefits in terms of performance, security, interoperability and others. Connecting these three paradigms, in this work we propose an architecture for an intelligent system which provides an interface that assists the user on smart environments, informing, suggesting actions and allowing to manage the objects of his/her daily life.Keywords: internet of things, cloud, intelligent personal assistant, architecture
Procedia PDF Downloads 515