Search results for: secure mean and variance
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1873

Search results for: secure mean and variance

1393 A Smart Visitors’ Notification System with Automatic Secure Door Lock Using Mobile Communication Technology

Authors: Rabail Shafique Satti, Sidra Ejaz, Madiha Arshad, Marwa Khalid, Sadia Majeed

Abstract:

The paper presents the development of an automated security system to automate the entry of visitors, providing more flexibility of managing their record and securing homes or workplaces. Face recognition is part of this system to authenticate the visitors. A cost effective and SMS based door security module has been developed and integrated with the GSM network and made part of this system to allow communication between system and owner. This system functions in real time as when the visitor’s arrived it will detect and recognizes his face and on the result of face recognition process it will open the door for authorized visitors or notifies and allows the owner’s to take further action in case of unauthorized visitor. The proposed system is developed and it is successfully ensuring security, managing records and operating gate without physical interaction of owner.

Keywords: SMS, e-mail, GSM modem, authenticate, face recognition, authorized

Procedia PDF Downloads 789
1392 A Study on the Reliability Evaluation of a Timer Card for Air Dryer of the Railway Vehicle

Authors: Chul Su Kim, Jun Ku Lee, Won Jun Lee

Abstract:

The EMU (electric multiple unit) vehicle timer card is a PCB (printed circuit board) for controlling the air-dryer to remove the moisture of the generated air from the air compressor of the braking device. This card is exposed to the lower part of the railway vehicle, so it is greatly affected by the external environment such as temperature and humidity. The main cause of the failure of this timer card is deterioration of soldering area of the PCB surface due to temperature and humidity. Therefore, in the viewpoint of preventive maintenance, it is important to evaluate the reliability of the timer card and predict the replacement cycle to secure the safety of the air braking device is one of the main devices for driving. In this study, the existing and the improved products were evaluated on the reliability through ALT (accelerated life test). In addition, the acceleration factor by the 'Coffin-Manson' equation was obtained, and the remaining lifetime was compared and examined.

Keywords: reliability evaluation, timer card, Printed Circuit Board, Accelerated Life Test

Procedia PDF Downloads 279
1391 The Effectiveness of the Sensory-Motor and Spatial Perception Rehabilitation Program Based on Parent-Child Interaction and Its Effectiveness on Kinesio phobia in Children with Visually Impairment

Authors: Saheb Yousefi, Kim T. Zebehazy, Parviz Sharifi Daramadi, Tahereh Najafi Fard, Kevin Murfitt

Abstract:

Context: Children with visual impairments often face challenges in their cognitive, motor, and social development. Sensory-motor and spatial perception therapies can be beneficial for these children, but many existing programs only focus on a limited set of therapies. This study aims to investigate the effectiveness of a rehabilitation program for sensory- motor and spatial perception in reducing the fear of mobility in visually impaired children. Research Aim: The aim of this study is to determine if a rehabilitation program based on parent-child interaction can reduce the fear of mobility in visually impaired children. Methodology: This study uses a semi-experimental approach with an uneven control group design. Visually impaired children aged 10 to 14 and their parents from the Board of the Blind and Visually Impaired in Tehran Province were included in the study. The sample was divided into experimental and control groups, with a total of 30 participants. The experimental group participated in a rehabilitation program for sensory-motor and spatial perception based on parent-child interaction, while the control group did not receive this intervention. Data was collected using questionnaires on transportation issues and analyzed using multivariate and univariate mixed analysis of variance tests. Findings: The analysis of the data showed that the fear of movement was significantly improved in the experimental group compared to the control group after the intervention. Theoretical Importance: This study highlights the effectiveness of a rehabilitation program for sensory- motor and spatial perception based on parent-child interaction in reducing the fear of mobility in visually impaired children. It contributes to the existing knowledge by demonstrating the positive impact of this type of intervention on the cognitive, motor, and social development of these children. Data Collection and Analysis Procedures: Data was collected through the use of questionnaires administered to the children before and after the intervention. The data was analyzed using multivariate and univariate mixed analysis of variance tests to examine the effects of the rehabilitation program. Questions Addressed: This study addresses the question of whether a rehabilitation program based on parent-child interaction can reduce the fear of mobility in visually impaired children. Conclusion: The findings of this study support the effectiveness of the sensory-motor and spatial perception rehabilitation program based on parent-child interaction in reducing the fear of movement in visually impaired children. This intervention can be considered as a suitable method to enhance the fear of mobility in these children.

Keywords: vision impairment, sensory-motor rehabilitation, space perception, parent-child interaction, fear of movement.

Procedia PDF Downloads 63
1390 Exploring Probabilistic Models for Transient Stability Analysis of Renewable-Dominant Power Grid

Authors: Phuong Nguyen

Abstract:

Along with the ongoing energy transition, the electrical power system is getting more vulnerable with the increasing penetration of renewable energy sources (RES). By replacing a large amount of fossil fuel-based power plants with RES, the rotating mass of the power grid is decreasing drastically, which has been reported by a number of system operators. This leads to a huge challenge for operators to secure the operation of their grids in all-time horizon ranges, from sub-seconds to minutes and even hours. There is a need to revise the grid capabilities in dealing with transient (angle) stability and voltage dynamics. While the traditional approaches relied on deterministic scenarios (worst-case scenarios), there is also a need to cover a whole range of probabilities regarding a wide range of uncertainties coming from massive RES units. To contribute to handle these issues, this paper aims to focus on developing a new analytical approach for transient stability.

Keywords: transient stability, uncertainties, renewable energy sources, analytical approach

Procedia PDF Downloads 73
1389 Job Satisfaction and Commitment among Academic Staff of Selected Colleges of Education in Kano and Kaduna States of Nigeria

Authors: Mary Okonkwo Ekwy

Abstract:

The problem of the growing disillusionment of College of Education teachers with academic life vis-à-vis their job satisfaction and commitment was investigated in this study with a view to finding out if both their job satisfaction and commitment have suffered, and to find out if there was a relationship between job satisfaction and commitment among these College of Education teachers. Due consideration was also given in the study to the possible effects of demographic variables on attitudes to their job. To carry out a study of job satisfaction and commitment among the College of Education teachers and to explore the relationship between them, research instruments were used for measuring the levels of job satisfaction and commitment among them. A sample of 200 Colleges of Education teachers, comprising 15 Professors, 9 Principal Lecturers, 70 Senior Lecturer and 106 Lecturers was used for the study. Five major hypothesis were tested with regard to the relationship between job satisfaction and commitment among the teachers. The Pearson correlation, the F-ratio, and regression analysis were used for data analysis and hypothesis testing. The result of this investigation suggests that, perhaps the best way to secure the commitment of teachers is to ensure their job satisfaction. Future investigations will further enrich our knowledge about these very important themes.

Keywords: job satisfaction, commitment, academic staff, college of education

Procedia PDF Downloads 552
1388 Seasonal Variability of M₂ Internal Tides Energetics in the Western Bay of Bengal

Authors: A. D. Rao, Sachiko Mohanty

Abstract:

The Internal Waves (IWs) are generated by the flow of barotropic tide over the rapidly varying and steep topographic features like continental shelf slope, subsurface ridges, and the seamounts, etc. The IWs of the tidal frequency are generally known as internal tides. These waves have a significant influence on the vertical density and hence causes mixing in the region. Such waves are also important in submarine acoustics, underwater navigation, offshore structures, ocean mixing and biogeochemical processes, etc. over the shelf-slope region. The seasonal variability of internal tides in the Bay of Bengal with special emphasis on its energetics is examined by using three-dimensional MITgcm model. The numerical simulations are performed for different periods covering August-September, 2013; November-December, 2013 and March-April, 2014 representing monsoon, post-monsoon and pre-monsoon seasons respectively during which high temporal resolution in-situ data sets are available. The model is initially validated through the spectral estimates of density and the baroclinic velocities. From the estimates, it is inferred that the internal tides associated with semi-diurnal frequency are more dominant in both observations and model simulations for November-December and March-April. However, in August, the estimate is found to be maximum near-inertial frequency at all the available depths. The observed vertical structure of the baroclinic velocities and its magnitude are found to be well captured by the model. EOF analysis is performed to decompose the zonal and meridional baroclinic tidal currents into different vertical modes. The analysis suggests that about 70-80% of the total variance comes from Mode-1 semi-diurnal internal tide in both observations as well as in the model simulations. The first three modes are sufficient to describe most of the variability for semidiurnal internal tides, as they represent 90-95% of the total variance for all the seasons. The phase speed, group speed, and wavelength are found to be maximum for post-monsoon season compared to other two seasons. The model simulation suggests that the internal tide is generated all along the shelf-slope regions and propagate away from the generation sites in all the months. The model simulated energy dissipation rate infers that its maximum occurs at the generation sites and hence the local mixing due to internal tide is maximum at these sites. The spatial distribution of available potential energy is found to be maximum in November (20kg/m²) in northern BoB and minimum in August (14kg/m²). The detailed energy budget calculation are made for all the seasons and results are analysed.

Keywords: available potential energy, baroclinic energy flux, internal tides, Bay of Bengal

Procedia PDF Downloads 170
1387 Towards a Secure Storage in Cloud Computing

Authors: Mohamed Elkholy, Ahmed Elfatatry

Abstract:

Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.

Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security

Procedia PDF Downloads 335
1386 Identity-Based Encryption: A Comparison of Leading Classical and Post-Quantum Implementations in an Enterprise Setting

Authors: Emily Stamm, Neil Smyth, Elizabeth O'Sullivan

Abstract:

In Identity-Based Encryption (IBE), an identity, such as a username, email address, or domain name, acts as the public key. IBE consolidates the PKI by eliminating the repetitive process of requesting public keys for each message encryption. Two of the most popular schemes are Sakai-Kasahara (SAKKE), which is based on elliptic curve pairings, and the Ducas, Lyubashevsky, and Prest lattice scheme (DLP- Lattice), which is based on quantum-secure lattice cryptography. In or- der to embed the schemes in a standard enterprise setting, both schemes are implemented as shared system libraries and integrated into a REST service that functions at the enterprise level. The performance of both schemes as libraries and services is compared, and the practicalities of implementation and application are discussed. Our performance results indicate that although SAKKE has the smaller key and ciphertext sizes, DLP-Lattice is significantly faster overall and we recommend it for most enterprise use cases.

Keywords: identity-based encryption, post-quantum cryptography, lattice-based cryptography, IBE

Procedia PDF Downloads 136
1385 Analysis of Fixed Beamforming Algorithms for Smart Antenna Systems

Authors: Muhammad Umair Shahid, Abdul Rehman, Mudassir Mukhtar, Muhammad Nauman

Abstract:

The smart antenna is the prominent technology that has become known in recent years to meet the growing demands of wireless communications. In an overcrowded atmosphere, its application is growing gradually. A methodical evaluation of the performance of Fixed Beamforming algorithms for smart antennas such as Multiple Sidelobe Canceller (MSC), Maximum Signal-to-interference ratio (MSIR) and minimum variance (MVDR) has been comprehensively presented in this paper. Simulation results show that beamforming is helpful in providing optimized response towards desired directions. MVDR beamformer provides the most optimal solution.

Keywords: fixed weight beamforming, array pattern, signal to interference ratio, power efficiency, element spacing, array elements, optimum weight vector

Procedia PDF Downloads 185
1384 Secure Mobile E-Business Applications

Authors: Hala A. Alrumaih

Abstract:

It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy. One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly. Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.

Keywords: e-business, mobile applications, risk mitigations, security assurance

Procedia PDF Downloads 295
1383 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 345
1382 A Research on Inference from Multiple Distance Variables in Hedonic Regression Focus on Three Variables

Authors: Yan Wang, Yasushi Asami, Yukio Sadahiro

Abstract:

In urban context, urban nodes such as amenity or hazard will certainly affect house price, while classic hedonic analysis will employ distance variables measured from each urban nodes. However, effects from distances to facilities on house prices generally do not represent the true price of the property. Distance variables measured on the same surface are suffering a problem called multicollinearity, which is usually presented as magnitude variance and mean value in regression, errors caused by instability. In this paper, we provided a theoretical framework to identify and gather the data with less bias, and also provided specific sampling method on locating the sample region to avoid the spatial multicollinerity problem in three distance variable’s case.

Keywords: hedonic regression, urban node, distance variables, multicollinerity, collinearity

Procedia PDF Downloads 465
1381 The Relationship between Religiosity, Childhood Attachment, and Childhood Trauma in Adulthood

Authors: Ashley Sainvil

Abstract:

The present study explores the relationship and possible effects of religiosity on both adverse childhood experiences and childhood attachment. Furthermore, to explore the idea that adult religiousness may play as a protective role, specifically protecting adults with a past of adverse childhood experiences and an insecure childhood attachment from reporting depression. Analyses are based on 57 participants (N= 57, 32.1% of ages 18-22; 70.2% female, 28.1% male, 1.8% other). In the form of an online Qualtrics survey through questionnaires, childhood attachment, adverse childhood experiences, sense of religiosity, and depression were measured. While not significant at conventional levels, there was no direct relationship between adverse childhood experiences, insecure childhood attachment, and sense of religiosity, and when assessing age for the relationship in later adulthood, there was no significance. Positive childhood experiences of feeling protected, love, and special had a direct relationship with a positive image and sense of closeness to God. Results highlight the importance of positive childhood experiences, secure childhood attachment quality relationship, such as trust, communication for positive health outcomes, such as less depression.

Keywords: religiosity, childhood trauma, childhood attachment, depression

Procedia PDF Downloads 83
1380 Detection of Change Points in Earthquakes Data: A Bayesian Approach

Authors: F. A. Al-Awadhi, D. Al-Hulail

Abstract:

In this study, we applied the Bayesian hierarchical model to detect single and multiple change points for daily earthquake body wave magnitude. The change point analysis is used in both backward (off-line) and forward (on-line) statistical research. In this study, it is used with the backward approach. Different types of change parameters are considered (mean, variance or both). The posterior model and the conditional distributions for single and multiple change points are derived and implemented using BUGS software. The model is applicable for any set of data. The sensitivity of the model is tested using different prior and likelihood functions. Using Mb data, we concluded that during January 2002 and December 2003, three changes occurred in the mean magnitude of Mb in Kuwait and its vicinity.

Keywords: multiple change points, Markov Chain Monte Carlo, earthquake magnitude, hierarchical Bayesian mode

Procedia PDF Downloads 456
1379 Managing the Water Projects and Controlling Its Boundary Disturbances Which Affect the Water Supply

Authors: Sead A. Bakheet, Salah M. Elkoum, Asharaf A. Almaghribi

Abstract:

Disturbance defined as activity that malfunction, intrusion, or interruption. We have to look around for the source of the disturbance affecting the inputs and outputs of engineering projects, take the necessary actions to control them. In this paper we will present and discuss a production system consisting of three elements, inputs, the production process and outputs. The production process which we chose is the production of large diameter pre-stressed concrete cylinder pipes (out puts), in reality, the outputs are the starting points of the operation (laying the concrete pipes for transporting drinkable water). The main objective also to address the controlling methods of the natural resources and raw materials (basic inputs), study the disturbances affecting them as well as the output quality. The importance of making the right decision, which effect the final product quality will be summarized. Finally, we will address the proposals regarding the managing of secure water supply to the customers.

Keywords: disturbances, management, inputs, outputs, decision

Procedia PDF Downloads 62
1378 Facial Biometric Privacy Using Visual Cryptography: A Fundamental Approach to Enhance the Security of Facial Biometric Data

Authors: Devika Tanna

Abstract:

'Biometrics' means 'life measurement' but the term is usually associated with the use of unique physiological characteristics to identify an individual. It is important to secure the privacy of digital face image that is stored in central database. To impart privacy to such biometric face images, first, the digital face image is split into two host face images such that, each of it gives no idea of existence of the original face image and, then each cover image is stored in two different databases geographically apart. When both the cover images are simultaneously available then only we can access that original image. This can be achieved by using the XM2VTS and IMM face database, an adaptive algorithm for spatial greyscale. The algorithm helps to select the appropriate host images which are most likely to be compatible with the secret image stored in the central database based on its geometry and appearance. The encryption is done using GEVCS which results in a reconstructed image identical to the original private image.

Keywords: adaptive algorithm, database, host images, privacy, visual cryptography

Procedia PDF Downloads 130
1377 An Experimental Analysis of Squeeze Casting Parameters for 2017 a Wrought Al Alloy

Authors: Mohamed Ben Amar, Najib Souissi, Chedly Bradai

Abstract:

A Taguchi design investigation has been made into the relationship between the ductility and process variables in a squeeze cast 2017A wrought aluminium alloy. The considered process parameters were: squeeze pressure, melt temperature and die preheating temperature. An orthogonal array (OA), main effect, signal-to-noise (S/N) ratio, and the analysis of variance (ANOVA) are employed to analyze the effect of casting parameters. The results have shown that the selected parameters significantly affect the ductility of 2017A wrought Al alloy castings. Optimal squeeze cast process parameters were provided to illustrate the proposed approach and the results were proven to be trustworthy through practical experiments.

Keywords: Taguchi method, squeeze casting, process parameters, ductility, microstructure

Procedia PDF Downloads 400
1376 Different Biological and Chemical Parameters that Influence the Polyphenols from Some Medicinal Plants in Western Algeria

Authors: Mustapha Mahmoud, Fouzia Toumi Benali, Mohamed Benyahia, Sofiane Bouazza

Abstract:

This work focuses on the influences of biological and chemical parameters on the phenolic compounds such as flavonoids and tannins in different medicinal plants in western Algeria (Papaver rhoeas, Daphnegnidium, Lavandula multifida, Lavandula dentata, Lavandula stoicha, ...). Thus we look the difference between species of the same genus, difference between the different organs of the same species, the influence of environment all temperature influences, time, percentage of solvent on the extraction. Quantification of the phenolic compounds was performed by spectrophotometric method then treated with statistics tools such as variance analysis, multivariant analyzes, response surface methodology). The results show that the polyphenols are influenced by the parameters mentioned.

Keywords: polyphenols, influences, medicinal plants, west Algeria

Procedia PDF Downloads 294
1375 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble

Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi

Abstract:

Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.

Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble

Procedia PDF Downloads 221
1374 The Role of Access Control Techniques in Creating a Safe Cyberspace for Children

Authors: Sara Muslat Alsahali, Nout Mohammed Alqahtani

Abstract:

Digital technology has changed the world, and with the increasing number of children accessing the Internet, it has now become an integral part of children's lives from their early years. With the rapid development of digital technology, the risks children face on the internet also evolve from cyberbullying to misuse, sexual exploitation, and abuse of their private information over the Internet. Digital technology, with its advantages and disadvantages, is now a fact of our life. Therefore, knowledge of how to reduce its risks and maximize its benefits will help shape the growth and future of a new generation of digital citizens. This paper will discuss access control techniques that help to create secure cyberspace where children can be safe without depriving them of their rights and freedom to use the internet and preventing them from its benefits. Also, it sheds light on its challenges and problems by classifying the methods of parental controlling into two possibilities asynchronous and synchronous techniques and choosing YouTube as a case study of access control techniques.

Keywords: access control, cyber security, kids, parental monitoring

Procedia PDF Downloads 137
1373 Development of a Low-Cost Smart Insole for Gait Analysis

Authors: S. M. Khairul Halim, Mojtaba Ghodsi, Morteza Mohammadzaheri

Abstract:

Gait analysis is essential for diagnosing musculoskeletal and neurological conditions. However, current methods are often complex and expensive. This paper introduces a methodology for analysing gait parameters using a smart insole with a built-in accelerometer. The system measures stance time, swing time, step count, and cadence and wirelessly transmits data to a user-friendly IoT dashboard for centralized processing. This setup enables remote monitoring and advanced data analytics, making it a versatile tool for medical diagnostics and everyday usage. Integration with IoT enhances the portability and connectivity of the device, allowing for secure, encrypted data access over the Internet. This feature supports telemedicine and enables personalized treatment plans tailored to individual needs. Overall, the approach provides a cost-effective (almost 25 GBP), accurate, and user-friendly solution for gait analysis, facilitating remote tracking and customized therapy.

Keywords: gait analysis, IoT, smart insole, accelerometer sensor

Procedia PDF Downloads 17
1372 The New Propensity Score Method and Assessment of Propensity Score: A Simulation Study

Authors: Azam Najafkouchak, David Todem, Dorothy Pathak, Pramod Pathak, Joseph Gardiner

Abstract:

Propensity score (PS) methods have recently become the standard analysis tool for causal inference in observational studies where exposure is not randomly assigned. Thus, confounding can impact the estimation of treatment effect on the outcome. Due to the dangers of discretizing continuous variables, the focus of this paper will be on how the variation in cut-points or boundaries will affect the average treatment effect utilizing the stratification of the PS method. In this study, we will develop a new methodology to improve the efficiency of the PS analysis through stratification and simulation study. We will also explore the property of empirical distribution of average treatment effect theoretically, including asymptotic distribution, variance estimation and 95% confident Intervals.

Keywords: propensity score, stratification, emprical distribution, average treatment effect

Procedia PDF Downloads 97
1371 Factors Related to Teachers’ Analysis of Classroom Assessments

Authors: Hussain A. Alkharusi, Said S. Aldhafri, Hilal Z. Alnabhani, Muna Alkalbani

Abstract:

Analysing classroom assessments is one of the responsibilities of the teacher. It aims improving teacher’s instruction and assessment as well as student learning. The present study investigated factors that might explain variation in teachers’ practices regarding analysis of classroom assessments. The factors considered in the investigation included gender, in-service assessment training, teaching load, teaching experience, knowledge in assessment, attitude towards quantitative aspects of assessment, and self-perceived competence in analysing assessments. Participants were 246 in-service teachers in Oman. Results of a stepwise multiple linear regression analysis revealed that self-perceived competence was the only significant factor explaining the variance in teachers’ analysis of assessments. Implications for research and practice are discussed.

Keywords: analysis of assessment, classroom assessment, in-service teachers, self-competence

Procedia PDF Downloads 333
1370 BigCrypt: A Probable Approach of Big Data Encryption to Protect Personal and Business Privacy

Authors: Abdullah Al Mamun, Talal Alkharobi

Abstract:

As data size is growing up, people are became more familiar to store big amount of secret information into cloud storage. Companies are always required to need transfer massive business files from one end to another. We are going to lose privacy if we transmit it as it is and continuing same scenario repeatedly without securing the communication mechanism means proper encryption. Although asymmetric key encryption solves the main problem of symmetric key encryption but it can only encrypt limited size of data which is inapplicable for large data encryption. In this paper we propose a probable approach of pretty good privacy for encrypt big data using both symmetric and asymmetric keys. Our goal is to achieve encrypt huge collection information and transmit it through a secure communication channel for committing the business and personal privacy. To justify our method an experimental dataset from three different platform is provided. We would like to show that our approach is working for massive size of various data efficiently and reliably.

Keywords: big data, cloud computing, cryptography, hadoop, public key

Procedia PDF Downloads 320
1369 Assessment of Dietary Patterns of Saudi Patients with Type 2 Diabetes Mellitus in Ramadan and Non-Ramadan Periods

Authors: Abdullah S. Alghamdi, Khaled Alghamdi, Richard O. Jenkins, Parvez I. Haris

Abstract:

Background: Unhealthy diet is one of the modifiable risk factors for developing type 2 diabetes mellitus (T2DM). Improvement in diet can be beneficial for countering diabetes. For example, HbA1c, an important biomarker for diabetes, can be reduced by 1.1% through only alteration in diet. Ramadan fasting has been reported to provide positive health benefits. However, optimal benefits are not achieved, often due to poor dietary habits and lifestyle. There is a need to better understand the dietary habits of people fasting during Ramadan, so that necessary improvements can be made to develop this form of fasting as a non-pharmacological strategy for management and prevention of T2DM. Aim: This study aimed to assess the dietary patterns of Saudi adult patients with T2DM over three different periods (before, during, and after Ramadan) and relate this to HbA1c levels. Methods: This study recruited 82 Saudi with T2DM, who chose to fast during Ramadan, from the Endocrine and Diabetic Centre of Al Iman General Hospital, Riyadh, Saudi Arabia. Ethical approvals for the study were obtained from De Montfort University and Saudi Ministry of Health. Dietary patterns were assessed by a self-administered questionnaire in each period. This assessment included the diet type and frequency. Blood samples were collected in each period for determination of HbA1c. Results: The number of meals per day for the participants significantly decreased during Ramadan (P < 0.001). The consumption of fruit and vegetables significantly increased during Ramadan (P = 0.017). However, the consumption of sugary drinks significantly increased during and after Ramadan (P = 0.005). Approximately 60% of the patients indicated that they ate sugary foods at least once per week. The consumption of bread and rice was reported to be at least two times per week. The consumption of rice significantly reduced during Ramadan (P = 0.002). The mean HbA1c significantly varied between periods (P = 0.001), with lowest level during Ramadan compared to before and after Ramadan. The increase in the consumption of fruits and vegetables had a medium effect size on the reduction in HbA1c during Ramadan. There was a variance of 7.7% in the mean difference in HbA1c levels between groups (who changed their fruit and vegetable consumption) which can be accounted for by the increase in the consumption of fruits and vegetables. Likewise, 9.3% of the variance in the mean HbA1c difference between the groups was accounted for by a decrease in the consumption of rice. Conclusion: The increase in the frequency of fruit and vegetables intake, and especially the reduction in the frequency of rice consumption, during Ramadan produce beneficial effects in reducing HbA1c level. Therefore, further improving the dietary habits of patients with T2DM, such as reducing their sugary drinks intake, may help them to obtain greater benefits from Ramadan fasting in the management of their diabetes. It is recommended that dietary guidance is provided to the public to maximise health benefits through Ramadan fasting.

Keywords: Diabetes, Diet, Fasting, HbA1c, Ramadan

Procedia PDF Downloads 165
1368 Security Risks Assessment: A Conceptualization and Extension of NFC Touch-And-Go Application

Authors: Ku Aina Afiqah Ku Adzman, Manmeet Mahinderjit Singh, Zarul Fitri Zaaba

Abstract:

NFC operates on low-range 13.56 MHz frequency within a distance from 4cm to 10cm, and the applications can be categorized as touch and go, touch and confirm, touch and connect, and touch and explore. NFC applications are vulnerable to various security and privacy attacks such due to its physical nature; unprotected data stored in NFC tag and insecure communication between its applications. This paper aims to determine the likelihood of security risks happening in an NFC technology and application. We present an NFC technology taxonomy covering NFC standards, types of application and various security and privacy attack. Based on observations and the survey presented to evaluate the risk assessment within the touch and go application demonstrates two security attacks that are high risks namely data corruption and DOS attacks. After the risks are determined, risk countermeasures by using AHP is adopted. The guideline and solutions to these two high risks, attacks are later applied to a secure NFC-enabled Smartphone Attendance System.

Keywords: Near Field Communication (NFC), risk assessment, multi-criteria decision making, Analytical Hierarchy Process (AHP)

Procedia PDF Downloads 302
1367 Face Tracking and Recognition Using Deep Learning Approach

Authors: Degale Desta, Cheng Jian

Abstract:

The most important factor in identifying a person is their face. Even identical twins have their own distinct faces. As a result, identification and face recognition are needed to tell one person from another. A face recognition system is a verification tool used to establish a person's identity using biometrics. Nowadays, face recognition is a common technique used in a variety of applications, including home security systems, criminal identification, and phone unlock systems. This system is more secure because it only requires a facial image instead of other dependencies like a key or card. Face detection and face identification are the two phases that typically make up a human recognition system.The idea behind designing and creating a face recognition system using deep learning with Azure ML Python's OpenCV is explained in this paper. Face recognition is a task that can be accomplished using deep learning, and given the accuracy of this method, it appears to be a suitable approach. To show how accurate the suggested face recognition system is, experimental results are given in 98.46% accuracy using Fast-RCNN Performance of algorithms under different training conditions.

Keywords: deep learning, face recognition, identification, fast-RCNN

Procedia PDF Downloads 140
1366 Required SNR for PPM in Downlink Gamma-Gamma Turbulence Channel

Authors: Selami Şahin

Abstract:

In this paper, in order to achieve sufficient bit error rate (BER) according to zenith angle of the satellite to ground station, SNR requirement is investigated utilizing pulse position modulation (PPM). To realize explicit results, all parameters such as link distance, Rytov variance, scintillation index, wavelength, aperture diameter of the receiver, Fried's parameter and zenith angle have been taken into account. Results indicate that after some parameters are determined since the constraints of the system, to achieve desired BER, required SNR values are in wide range while zenith angle changes from small to large values. Therefore, in order not to utilize high link margin, either SNR should adjust according to zenith angle or link should establish with predetermined intervals of the zenith angle.

Keywords: Free-space optical communication, optical downlink channel, atmospheric turbulence, wireless optical communication

Procedia PDF Downloads 401
1365 Comparison of Web Development Using Framework over Library

Authors: Syamsul Syafiq, Maslina Daud, Hafizah Hasan, Ahmad Zairi, Shazil Imri, Ezaini Akmar, Norbazilah Rahim

Abstract:

Over recent years, web development has changed significantly. Driven largely by the rise of trends like mobiles, the world of development is rapidly evolving. The rise of the Internet makes web applications crucial nowadays. The web application has been an interface for a company and one of the ways they present their portfolio to the client. On the other hand, the web has become part of the file management system which takes over the role of paper. Due to high demand in web applications, developers are required to develop a web application that are cost-effective, secure and well coded. A framework has been proposed to develop an application rather than using library style development. The framework is helping the developer in creating the structure of a web automatically. This paper will compare the advantages and disadvantages of web development using framework against library-style development. This comparison is based on a previous research paper focusing on two main indicators, which are the impact to management and impact to the developer.

Keywords: framework, library style development, web application development, traditional web, static web, dynamic web

Procedia PDF Downloads 225
1364 On the Impact of Oil Price Fluctuations on Stock Markets: A Multivariate Long-Memory GARCH Framework

Authors: Manel Youssef, Lotfi Belkacem

Abstract:

This paper employs multivariate long memory GARCH models to simultaneously estimate mean and conditional variance spillover effects between oil prices and different financial markets. Since different financial assets are traded based on these market sector returns, it’s important for financial market participants to understand the volatility transmission mechanism over time and across these series in order to make optimal portfolio allocation decisions. We examine weekly returns from January 1, 2003 to November 30, 2012 and find evidence of significant transmission of shocks and volatilities between oil prices and some of the examined financial markets. The findings support the idea of cross-market hedging and sharing of common information by investors.

Keywords: oil prices, stock indices returns, oil volatility, contagion, DCC-multivariate (FI) GARCH

Procedia PDF Downloads 533