Search results for: secure web sockets
258 Seismic Considerations in Case Study of Kindergartens Building Design: Ensuring Safety and Structural Integrity
Authors: Al-Naqdi Ibtehal Abdulmonem
Abstract:
Kindergarten buildings are essential for early childhood education, providing a secure environment for children's development. However, they are susceptible to seismic forces, which can endanger occupants during earthquakes. This article emphasizes the importance of conducting thorough seismic analysis and implementing proper structural design to protect the well-being of children, staff, and visitors. By prioritizing structural integrity and considering functional requirements, engineers can mitigate risks associated with seismic events. The use of specialized software like ETABS is crucial for designing earthquake-resistant kindergartens. An analysis using ETABS software compared the structural performance of two single-story kindergartens in Iraq's Ministry of Education, designed with and without seismic considerations. The analysis aimed to assess the impact of seismic design on structural integrity and safety. The kindergarten was designed with seismic considerations, including moment frames. In contrast, the same kindergarten was analyzed without seismic effects, revealing a lack of structural elements to resist lateral forces, rendering it vulnerable to structural failure during an earthquake. Maximum major shear increased over 4 times and over 5 times for bending moment in both kindergartens designed with seismic considerations induced by lateral loads and seismic forces. This component of shear force is vital for designing elements to resist lateral loads and ensure structural stability.Keywords: seismic analysis, structural design, lateral loads, earthquake resistance, major shear, ETABS
Procedia PDF Downloads 72257 Improving Cheon-Kim-Kim-Song (CKKS) Performance with Vector Computation and GPU Acceleration
Authors: Smaran Manchala
Abstract:
Homomorphic Encryption (HE) enables computations on encrypted data without requiring decryption, mitigating data vulnerability during processing. Usable Fully Homomorphic Encryption (FHE) could revolutionize secure data operations across cloud computing, AI training, and healthcare, providing both privacy and functionality, however, the computational inefficiency of schemes like Cheon-Kim-Kim-Song (CKKS) hinders their widespread practical use. This study focuses on optimizing CKKS for faster matrix operations through the implementation of vector computation parallelization and GPU acceleration. The variable effects of vector parallelization on GPUs were explored, recognizing that while parallelization typically accelerates operations, it could introduce overhead that results in slower runtimes, especially in smaller, less computationally demanding operations. To assess performance, two neural network models, MLPN and CNN—were tested on the MNIST dataset using both ARM and x86-64 architectures, with CNN chosen for its higher computational demands. Each test was repeated 1,000 times, and outliers were removed via Z-score analysis to measure the effect of vector parallelization on CKKS performance. Model accuracy was also evaluated under CKKS encryption to ensure optimizations did not compromise results. According to the results of the trail runs, applying vector parallelization had a 2.63X efficiency increase overall with a 1.83X performance increase for x86-64 over ARM architecture. Overall, these results suggest that the application of vector parallelization in tandem with GPU acceleration significantly improves the efficiency of CKKS even while accounting for vector parallelization overhead, providing impact in future zero trust operations.Keywords: CKKS scheme, runtime efficiency, fully homomorphic encryption (FHE), GPU acceleration, vector parallelization
Procedia PDF Downloads 27256 ‘Internationalize Yourself’: Mobility in Academia as a Form of Continuing Professional Training
Authors: Sonja Goegele, Petra Kletzenbauer
Abstract:
The FH JOANNEUM- a university of applied sciences based in Austria - cooperates in teaching and research with well-known international universities and thus aims to foster so-called strategic partnerships. The exchange of university lecturers and other faculty members is a way to achieve and secure strategic company goals, in which excellent research and teaching play a central role in order to improve both the development of academics and administration. Thanks to mobility not only the university but also the involved people truly benefit in their professional development which can be seen on several levels: increased foreign language proficiency, excellent networking possibilities within the scientific community as well as reinforced didactic competencies in the form of different teaching and learning methodologies. The paper discusses mobility in the light of the university’s strategic paper entitled ‘Hands on 2022’ by presenting results from an empirical research study among faculty members who participate in exchange programmes on a regular basis. In the form of an online questionnaire, mobility was discussed from different angles such as networking, collaborative research, professional training for academics and the overall impact of the exchange within and outside the organization. From the findings, it can be concluded that mobility is an asset for any university. However, keeping in constant dialogue with partner universities requires more than the purpose of the exchange itself. Building rapport and keeping a relationship of trust are challenges that need to be addressed more closely in order to run successful mobility programmes. Best Practice examples should highlight the importance of mobility as a vital initiative to transfer disciplines.Keywords: higher education, internationalization, mobility, strategic partnerships
Procedia PDF Downloads 141255 Hybrid Thresholding Lifting Dual Tree Complex Wavelet Transform with Wiener Filter for Quality Assurance of Medical Image
Authors: Hilal Naimi, Amelbahahouda Adamou-Mitiche, Lahcene Mitiche
Abstract:
The main problem in the area of medical imaging has been image denoising. The most defying for image denoising is to secure data carrying structures like surfaces and edges in order to achieve good visual quality. Different algorithms with different denoising performances have been proposed in previous decades. More recently, models focused on deep learning have shown a great promise to outperform all traditional approaches. However, these techniques are limited to the necessity of large sample size training and high computational costs. This research proposes a denoising approach basing on LDTCWT (Lifting Dual Tree Complex Wavelet Transform) using Hybrid Thresholding with Wiener filter to enhance the quality image. This research describes the LDTCWT as a type of lifting wavelets remodeling that produce complex coefficients by employing a dual tree of lifting wavelets filters to get its real part and imaginary part. Permits the remodel to produce approximate shift invariance, directionally selective filters and reduces the computation time (properties lacking within the classical wavelets transform). To develop this approach, a hybrid thresholding function is modeled by integrating the Wiener filter into the thresholding function.Keywords: lifting wavelet transform, image denoising, dual tree complex wavelet transform, wavelet shrinkage, wiener filter
Procedia PDF Downloads 163254 Power-Sharing Politics: A Panacea to Conflict Resolution and Stability in Africa
Authors: Emmanuel Dangana Monday
Abstract:
Africa as a continent has been ravaged and bedeviled by series of political conflicts associated with politics and power-sharing maneuvering. As a result it has become the most unstable continent in the world in terms of power distribution and stable political culture. This paper examines the efficacy of conscious and deliberate power-sharing strategies to settle or resolve political conflicts in Africa in the arrangements of creation of states, revenue and resources allocation, and office distribution systems. The study is concerned with the spatial impact of conflicts generated in some renowned African countries in which power-sharing would have been a solution. Ethno-regional elite groups are identified as the major actors in the struggles for the distribution of territorial, economic and political powers in Africa. The struggle for power has become so intense that it has degenerated to conflicts and wars of inter and intra-political classes and parties respectively. Secondary data and deductive techniques were used in data collection and analysis. It is discovered that power-sharing has become an indispensable tool to curb the incessant political and power crisis in Africa. It is one of the finest tolerable modality of mediating elite’ competition, since it reflects the interests of both the dominant and the perceived marginalized groups. The study recommends that countries and regions of political, ethnic and religious differences in Africa should employed power-sharing strategy in order to avoid unnecessary political tension and resultant crisis. Interest groups should always come to the negotiation table to reach a realistic, durable and expected compromise to secure a peacefully resolute Africa.Keywords: Africa, power-sharing, conflicts, politics and political stability
Procedia PDF Downloads 327253 Variance-Aware Routing and Authentication Scheme for Harvesting Data in Cloud-Centric Wireless Sensor Networks
Authors: Olakanmi Oladayo Olufemi, Bamifewe Olusegun James, Badmus Yaya Opeyemi, Adegoke Kayode
Abstract:
The wireless sensor network (WSN) has made a significant contribution to the emergence of various intelligent services or cloud-based applications. Most of the time, these data are stored on a cloud platform for efficient management and sharing among different services or users. However, the sensitivity of the data makes them prone to various confidentiality and performance-related attacks during and after harvesting. Various security schemes have been developed to ensure the integrity and confidentiality of the WSNs' data. However, their specificity towards particular attacks and the resource constraint and heterogeneity of WSNs make most of these schemes imperfect. In this paper, we propose a secure variance-aware routing and authentication scheme with two-tier verification to collect, share, and manage WSN data. The scheme is capable of classifying WSN into different subnets, detecting any attempt of wormhole and black hole attack during harvesting, and enforcing access control on the harvested data stored in the cloud. The results of the analysis showed that the proposed scheme has more security functionalities than other related schemes, solves most of the WSNs and cloud security issues, prevents wormhole and black hole attacks, identifies the attackers during data harvesting, and enforces access control on the harvested data stored in the cloud at low computational, storage, and communication overheads.Keywords: data block, heterogeneous IoT network, data harvesting, wormhole attack, blackhole attack access control
Procedia PDF Downloads 85252 US-Iran Hostage Crisis by the Metaphor of Argo in the Light of Post-Modernist Post-Colonial and Realist Theories
Authors: Hatice Idil Gorgen
Abstract:
This paper argues that discourses and textuality which is literary tool of Western ethnocentrism create aggressive foreign policy against the West by Non-West countries. Quasi-colonial experiences create an inferiority complex on officially or not colonized areas by reconstructing their identity. This reconstructed identity leads revolution and resistance movement to feel secure themselves as a psychological defense against colonial powers. Knowledge learned by successful implementation of discourses grants right to has power for authority, in addition to serving as a tool to reinforce power of authority by its cognitive traits on foreign policy decision making. The combination of these points contributes to shaping and then make predictable state policies. In the methodology of paper, secondary data was firstly reviewed through university library using a range of sources such as academic abstract, OPAC system, bibliography databases and internet search engines. The film of Argo was used to strengthen and materialize theoretical explanations as a metaphor. This paper aims to highlight the cumulative effects on the construction of the identity throughout embedded discourses by textuality. To demonstrate it by a metaphor, Argo will be used as a primary source for good story-telling about history. U.S-Iran hostage crisis is mainly applied by aiming to see foundations Iran’s behavior in the context of its revolutionary identity and major influences of actions of U.S on it.Keywords: discourse, post colonialism, post modernism, objectivity
Procedia PDF Downloads 160251 Cybersecurity Strategies for Protecting Oil and Gas Industrial Control Systems
Authors: Gaurav Kumar Sinha
Abstract:
The oil and gas industry is a critical component of the global economy, relying heavily on industrial control systems (ICS) to manage and monitor operations. However, these systems are increasingly becoming targets for cyber-attacks, posing significant risks to operational continuity, safety, and environmental integrity. This paper explores comprehensive cybersecurity strategies for protecting oil and gas industrial control systems. It delves into the unique vulnerabilities of ICS in this sector, including outdated legacy systems, integration with IT networks, and the increased connectivity brought by the Industrial Internet of Things (IIoT). We propose a multi-layered defense approach that includes the implementation of robust network security protocols, regular system updates and patch management, advanced threat detection and response mechanisms, and stringent access control measures. We illustrate the effectiveness of these strategies in mitigating cyber risks and ensuring the resilient and secure operation of oil and gas industrial control systems. The findings underscore the necessity for a proactive and adaptive cybersecurity framework to safeguard critical infrastructure in the face of evolving cyber threats.Keywords: cybersecurity, industrial control systems, oil and gas, cyber-attacks, network security, IoT, threat detection, system updates, patch management, access control, cybersecurity awareness, critical infrastructure, resilience, cyber threats, legacy systems, IT integration, multi-layered defense, operational continuity, safety, environmental integrity
Procedia PDF Downloads 48250 Resilience with Spontaneous Volunteers in Disasters-Coordination Using an It System
Authors: Leo Latasch, Mario Di Gennaro
Abstract:
Introduction: The goal of this project was to increase the resilience of the population as well as rescue organizations to make both quality and time-related improvements in handling crises. A helper network was created for this purpose. Methods: Social questions regarding the structure and purpose of helper networks were considered - specifically with regard to helper motivation, the level of commitment and collaboration between populations and agencies. The exchange of information, the coordinated use of volunteers, and the distribution of available resources will be ensured through defined communication and cooperation routines. Helper smartphones will also be used provide a picture of the situation on the ground. Results: The helper network was established and deployed based on the RESIBES information technology system. It consists of a service platform, a web portal and a smartphone app. The service platform is the central element for collaboration between the various rescue organizations, as well as for persons, associations, and companies from the population offering voluntary aid. The platform was used for: Registering helpers and resources and then requesting and assigning it in case of a disaster. These services allow the population's resources to be organized. The service platform also allows for a secure data exchange between services and external systems. Conclusions: The social and technical work priorities have allowed us to cover a full cycle of advance structural work, gaining an overview, damage management, evaluation, and feedback on experiences. This cycle allows experiences gained while handling the crisis to feed back into the cycle and improve preparations and management strategies.Keywords: coordination, disaster, resilience, volunteers
Procedia PDF Downloads 144249 A Literature Review on Emotion Recognition Using Wireless Body Area Network
Authors: Christodoulou Christos, Politis Anastasios
Abstract:
The utilization of Wireless Body Area Network (WBAN) is experiencing a notable surge in popularity as a result of its widespread implementation in the field of smart health. WBANs utilize small sensors implanted within the human body to monitor and record physiological indicators. These sensors transmit the collected data to hospitals and healthcare facilities through designated access points. Bio-sensors exhibit a diverse array of shapes and sizes, and their deployment can be tailored to the condition of the individual. Multiple sensors may be strategically placed within, on, or around the human body to effectively observe, record, and transmit essential physiological indicators. These measurements serve as a basis for subsequent analysis, evaluation, and therapeutic interventions. In conjunction with physical health concerns, numerous smartwatches are engineered to employ artificial intelligence techniques for the purpose of detecting mental health conditions such as depression and anxiety. The utilization of smartwatches serves as a secure and cost-effective solution for monitoring mental health. Physiological signals are widely regarded as a highly dependable method for the recognition of emotions due to the inherent inability of individuals to deliberately influence them over extended periods of time. The techniques that WBANs employ to recognize emotions are thoroughly examined in this article.Keywords: emotion recognition, wireless body area network, WBAN, ERC, wearable devices, psychological signals, emotion, smart-watch, prediction
Procedia PDF Downloads 52248 The Effects of T-Walls on Urban Landscape and Quality of Life and Anti-Terror Design Concept in Kabul, Afghanistan
Authors: Fakhrullah Sarwari, Hiroko Ono
Abstract:
Kabul city has suffered a lot in 40 years of conflict of civil war and “The war on terror”. After the invasion of Afghanistan by the United States of America and its allies in 2001, the Taliban was removed from operational power, but The Taliban and other terrorist groups remained in remote areas of the country, they started suicide attacks and bombings. Hence to protect from these attacks officials surrounded their office buildings and houses with concrete blast walls. It gives a bad landscape to the city and creates traffic congestions. Our research contains; questionnaire, reviewing Kabul Municipality documents and literature review. Questionnaires were distributed to Kabul citizens to find out how people feel by seeing the T-Walls on Kabul streets? And what problems they face with T-Walls. “The T-Walls pull down commission” of Kabul Municipality documents were reviewed to find out what caused the failure of this commission. A literature review has been done to compare Kabul with Washington D.C on how they designed the city against terrorism threat without turning the cities into lock down. Bogota city of Columbia urban happiness movement is reviewed and compared with Kabul. The finding of research revealed that citizens of Kabul want security but not at the expense of public realm and creating the architecture of fear. It also indicates that increasing the T-walls do not give secure feeling but instead; it increases terror, hatred and affect people’s optimism. At the end, a series of recommendation is suggested on the issue.Keywords: anti-terror design, Kabul, T-Walls, urban happiness
Procedia PDF Downloads 172247 Differential Impact of Parenting on Mental Health Functioning of Pakistani Adolescents: A Cultural Perspective
Authors: Zahid Mahmood
Abstract:
Mental health problems in adolescents are said to be increasing tremendously, and a large proportion of adolescents are suffering from serious mental health problems that result in short and long term socio-emotional negative consequences. Contemporary clinical and school psychology is now focused on prevention rather than intervene in the mental health concerns of adolescents. Therefore, a wealth of literature is devoted to identify the risk and protective factors so that adolescents may be prevented and identified earlier. This quest has led to identify many risk factors including the early parent-child relationship. Parenting has a long last impact on the growth and development of an individual. If the parent-child relationship is secure and warm, the child tends to have a positive psychological outcome. On the other hand, if parenting is rejecting and distant, it may lead to more mental health problems. Keeping in view the cross-cultural influence of parenting, the current study was aimed to explore the relationship between parental rearing practices and mental health problems on a group of Pakistani adolescents. A sample of 805 participants (49% boys and 51% girls) were selected through a stratified sample with the age range of 13-18 years. All the participants were given protocol of EMBU-C and School Children Problem Scale (SCPS). Results indicate that age, the gender of the participant and parental rejection were found to be a significant positive predictor of mental health problems in adolescents. It can be concluded that parenting may be a universal phenomenon comprising rejection and acceptance yet the differential impact on mental health varies from culture to culture.Keywords: parenting, mental health, adolescents, cross cultural
Procedia PDF Downloads 121246 Influence of Humidity on Environmental Sustainability, Air Quality and Occupant Health
Authors: E. Cintura, M. I. Gomes
Abstract:
Nowadays, sustainable development issues have a key role in the planning of the man-made environment. Ensuring this development means limiting the impact of human activity on nature. It is essential to secure healthy places and good living conditions. For these reasons, indoor air quality and building materials play a fundamental role in sustainable architectural projects. These factors significantly affect human health: they can radically change the quality of the internal environment and energy consumption. The use of natural materials such as earth has many beneficial aspects in comfort and indoor air quality. As well as advantages in the environmental impact of the construction, they ensure a low energy consumption. Since they are already present in nature, their production and use do not require a high-energy consumption. Furthermore, they have a high thermo-hygrometric capacity, being able to absorb moisture, contributing positively to indoor conditions. Indoor air quality is closely related to relative humidity. For these reasons, it can be affirmed that the use of earth materials guarantees a sustainable development and at the same time improves the health of the building users. This paper summarizes several researches that demonstrate the importance of indoor air quality for human health and how it strictly depends on the building materials used. Eco-efficient plasters are also considered: earth and ash mortar. The bibliography consulted has the objective of supporting future experimental and laboratory analyzes. It is necessary to carry on with research by the use of simulations and testing to confirm the hygrothermal properties of eco-efficient plasters and therefore their ability to improve indoor air quality.Keywords: hygroscopicity, hygrothermal comfort, mortar, plaster
Procedia PDF Downloads 140245 Under the 'Umbrella' Project: A Volunteer-Mentoring Approach for Socially Disadvantaged University Students
Authors: Evridiki Zachopoulou, Vasilis Grammatikopoulos, Michail Vitoulis, Athanasios Gregoriadis
Abstract:
In the last ten years, the recent economic crisis in Greece has decreased the financial ability and strength of several families when it comes to supporting their children’s studies. As a result, the number of students who are significantly delaying or even dropping out of their university studies is constantly increasing. The students who are at greater risk for academic failure are those who are facing various problems and social disadvantages, like health problems, special needs, family poverty or unemployment, single-parent students, immigrant students, etc. The ‘Umbrella’ project is a volunteer-based initiative to tackle this problem at International Hellenic University. The main purpose of the project is to provide support to disadvantaged students at a socio-emotional, academic, and practical level in order to help them complete their undergraduate studies. More specifically, the ‘Umbrella’ project has the following goals: (a) to develop a consulting-supporting network based on volunteering senior students, called ‘i-mentors’. (b) to train the volunteering i-mentors and create a systematic and consistent support procedure for students at-risk, (c), to develop a service that, parallel to the i-mentor network will be ensuring opportunities for at-risk students to find a job, (d) to support students who are coping with accessibility difficulties, (e) to secure the sustainability of the ‘Umbrella’ project after the completion of the funding of the project. The innovation of the Umbrella project is in its holistic-person-centered approach that will be providing individualized support -via the i-mentors network- to any disadvantaged student that will come ‘under the Umbrella.’Keywords: peer mentoring, student support, socially disadvantaged students, volunteerism in higher education
Procedia PDF Downloads 235244 Choosing the Lesser Evil: Tribal Alignment Formation in Civil Wars
Authors: Busra Nur Ozguler Aktel
Abstract:
This research aims to understand the factors that affect the ways in which tribes perceive and respond to violent conflicts in fragile states, given that tribes are essential stakeholders in many conflict-ridden fragile states, whether Afghanistan, Iraq, Syria, Libya, Somalia, Nigeria, or Yemen. It explores the primary questions of why some tribes align with extremist groups while others align with states during civil wars and why some tribes switch alignments. It argues that tribes form and switch alignments based on their perception of threats to their traditional tribal structure (internal dynamics) and clientelist relationships (external dynamics). Put differently; threat perceptions lead them to choose either the state or extremist groups that will more likely secure their traditional structure and patronage networks. This study focuses on Iraqi tribes as a case study. It builds a theory of tribal alignment formation based on ethnographic fieldwork in the Middle East, with a particular focus on Iraqi Sunni tribes living in the Kurdish region of Iraq and Jordan. As a result of the interviews with tribal leaders and members, local journalists, researchers, and politicians, it concludes that complex (re)alignments of tribes can determine the course and outcome of the conflicts, either mitigating or escalating violence. This study contributes to the larger body of conflict management and peacebuilding literature by introducing tribes as non-state actors and exploring their interactions with other actors in civil wars.Keywords: civil wars, tribes, alignment formation, side-switching, Iraq
Procedia PDF Downloads 88243 Development of a Matlab® Program for the Bi-Dimensional Truss Analysis Using the Stiffness Matrix Method
Authors: Angel G. De Leon Hernandez
Abstract:
A structure is defined as a physical system or, in certain cases, an arrangement of connected elements, capable of bearing certain loads. The structures are presented in every part of the daily life, e.g., in the designing of buildings, vehicles and mechanisms. The main goal of a structure designer is to develop a secure, aesthetic and maintainable system, considering the constraint imposed to every case. With the advances in the technology during the last decades, the capabilities of solving engineering problems have increased enormously. Nowadays the computers, play a critical roll in the structural analysis, pitifully, for university students the vast majority of these software are inaccessible due to the high complexity and cost they represent, even when the software manufacturers offer student versions. This is exactly the reason why the idea of developing a more reachable and easy-to-use computing tool. This program is designed as a tool for the university students enrolled in courser related to the structures analysis and designs, as a complementary instrument to achieve a better understanding of this area and to avoid all the tedious calculations. Also, the program can be useful for graduated engineers in the field of structural design and analysis. A graphical user interphase is included in the program to make it even simpler to operate it and understand the information requested and the obtained results. In the present document are included the theoretical basics in which the program is based to solve the structural analysis, the logical path followed in order to develop the program, the theoretical results, a discussion about the results and the validation of those results.Keywords: stiffness matrix method, structural analysis, Matlab® applications, programming
Procedia PDF Downloads 122242 Triple Intercell Bar for Electrometallurgical Processes: A Design to Increase PV Energy Utilization
Authors: Eduardo P. Wiechmann, Jorge A. Henríquez, Pablo E. Aqueveque, Luis G. Muñoz
Abstract:
PV energy prices are declining rapidly. To take advantage of the benefits of those prices and lower the carbon footprint, operational practices must be modified. Undoubtedly, it challenges the electrowinning practice to operate at constant current throughout the day. This work presents a technology that contributes in providing modulation capacity to the electrode current distribution system. This is to raise the day time dc current and lower it at night. The system is a triple intercell bar that operates in current-source mode. The design is a capping board free dogbone type of bar that ensures an operation free of short circuits, hot swapability repairs and improved current balance. This current-source system eliminates the resetting currents circulating in equipotential bars. Twin auxiliary connectors are added to the main connectors providing secure current paths to bypass faulty or impaired contacts. All system conductive elements are positioned over a baseboard offering a large heat sink area to the ventilation of a facility. The system works with lower temperature than a conventional busbar. Of these attributes, the cathode current balance property stands out and is paramount for day/night modulation and the use of photovoltaic energy. A design based on a 3D finite element method model predicting electric and thermal performance under various industrial scenarios is presented. Preliminary results obtained in an electrowinning facility with industrial prototypes are included.Keywords: electrowinning, intercell bars, PV energy, current modulation
Procedia PDF Downloads 155241 The Effect of Sustainable Land Management Technologies on Food Security of Farming Households in Kwara State, Nigeria
Authors: Shehu A. Salau, Robiu O. Aliu, Nofiu B. Nofiu
Abstract:
Nigeria is among countries of the world confronted with food insecurity problem. The agricultural production systems that produces food for the teaming population is not endurable. Attention is thus being given to alternative approaches of intensification such as the use of Sustainable Land Management (SLM) technologies. Thus, this study assessed the effect of SLM technologies on food security of farming households in Kwara State, Nigeria. A-three stage sampling technique was used to select a sample of 200 farming households for this study. Descriptive statistics, Shriar index, Likert scale, food security index and logistic regression were employed for the analysis. The result indicated that majority (41%) of the household heads were between the ages of 51 and 70 years with an average of 60.5 years. Food security index revealed that 35% and 65% of the households were food secure and food insecure respectively. The logistic regression showed that SLM technologies, estimated income, household size, gender and age of the household heads were the critical determinants of food security among farming households. The most effective coping strategies adopted by households geared towards lessening the effects of food insecurity are reduced quality of food consumed, employed off-farm jobs to raise household income and diversion of money budgeted for other uses to purchase foods. Governments should encourage the adoption and use of SLM technologies at all levels. Policies and strategies that reduce household size should be enthusiastically pursued to reduce food insecurity.Keywords: agricultural practices, coping strategies, farming households, food security, SLM technologies, logistic regression
Procedia PDF Downloads 174240 Reversible Information Hitting in Encrypted JPEG Bitstream by LSB Based on Inherent Algorithm
Authors: Vaibhav Barve
Abstract:
Reversible information hiding has drawn a lot of interest as of late. Being reversible, we can restore unique computerized data totally. It is a plan where mystery data is put away in digital media like image, video, audio to maintain a strategic distance from unapproved access and security reason. By and large JPEG bit stream is utilized to store this key data, first JPEG bit stream is encrypted into all around sorted out structure and then this secret information or key data is implanted into this encrypted region by marginally changing the JPEG bit stream. Valuable pixels suitable for information implanting are computed and as indicated by this key subtle elements are implanted. In our proposed framework we are utilizing RC4 algorithm for encrypting JPEG bit stream. Encryption key is acknowledged by framework user which, likewise, will be used at the time of decryption. We are executing enhanced least significant bit supplanting steganography by utilizing genetic algorithm. At first, the quantity of bits that must be installed in a guaranteed coefficient is versatile. By utilizing proper parameters, we can get high capacity while ensuring high security. We are utilizing logistic map for shuffling of bits and utilization GA (Genetic Algorithm) to find right parameters for the logistic map. Information embedding key is utilized at the time of information embedding. By utilizing precise picture encryption and information embedding key, the beneficiary can, without much of a stretch, concentrate the incorporated secure data and totally recoup the first picture and also the original secret information. At the point when the embedding key is truant, the first picture can be recouped pretty nearly with sufficient quality without getting the embedding key of interest.Keywords: data embedding, decryption, encryption, reversible data hiding, steganography
Procedia PDF Downloads 288239 Labour Productivity Measurement and Control Standards for Hotels
Authors: Kristine Joy Simpao
Abstract:
Improving labour productivity is one of the most enthralling and challenging aspects of managing hotels and restaurant business. The demand to secure countless productivity became an increasingly pivotal role of managers to survive and sustain the business. Besides making business profitable, they are in the doom to make every resource to become productive and effective towards achieving company goal while maximizing the value of organization. This paper examines what productivity means to the services industry, in particular, to the hotel industry. This is underpinned by an investigation of the extent of practice of respondent hotels to the labour productivity aspect in the areas of materials management, human resource management and leadership management and in a way, computing the labour productivity ratios using the hotel simple ratios of productivity in order to find a suitable measurement and control standards for hotels with SBMA, Olongapo City as the locale of the study. The finding shows that hotels labour productivity ratings are not perfect with some practices that are far below particularly on strategic and operational decisions in improving performance and productivity of its human resources. It further proves of the no significant difference ratings among the respondent’s type in all areas which indicated that they are having similar perception of the weak implementation of some of the indicators in the labour productivity practices. Furthermore, the results in the computation of labour productivity efficiency ratios resulted relationship of employees versus labour productivity practices are inversely proportional. This study provides a potential measurement and control standards for the enhancement of hotels labour productivity. These standards should also contain labour productivity customized for standard hotels in Subic Bay Freeport Zone to assist hotel owners in increasing the labour productivity while meeting company goals and objectives effectively.Keywords: labour productivity, hotel, measurement and control, standards, efficiency ratios, practices
Procedia PDF Downloads 318238 Associations between Parental Divorce Process Variables and Parent-Child Relationships Quality in Young Adulthood
Authors: Klara Smith-Etxeberria
Abstract:
main goal of this study was to analyze the predictive ability of some variables associated with the parental divorce process alongside attachment history with parents on both, mother-child and father-child relationship quality. Our sample consisted of 173 undergraduate and vocational school students from the Autonomous Community of the Basque Country. All of them belonged to a divorced family. Results showed that adequate maternal strategies during the divorce process (e.g.: stable, continuous and positive role as a mother) was the variable with greater predictive ability on mother-child relationships quality. In addition, secure attachment history with mother also predicted positive mother-child relationships. On the other hand, father-child relationship quality was predicted by adequate paternal strategies during the divorce process, such as his stable, continuous and positive role as a father, along with not badmouthing the mother and promoting good mother-child relationships. Furthermore, paternal negative emotional state due to divorce was positively associated with father-child relationships quality, and both, history of attachment with mother and with father predicted father-child relationships quality. In conclusion, our data indicate that both, paternal and maternal strategies for children´s adequate adjustment during the divorce process influence on mother-child and father-child relationships quality. However, these results suggest that paternal strategies during the divorce process have a greater predictive ability on father-child relationships quality, whereas maternal positive strategies during divorce determine positive mother-child relationships among young adults.Keywords: father-child relationships quality, mother-child relationships quality, parental divorce process, young adulthood
Procedia PDF Downloads 260237 Simulation-Based Control Module for Offshore Single Point Mooring System
Authors: Daehyun Baek, Seungmin Lee, Minju Kim Jangik Park, Hyeong-Soon Moon
Abstract:
SPM (Single Point Mooring) is one of the mooring buoy facilities installed on a coast near oil and gas terminal which is not able to berth FPSO or large oil tankers under the condition of high draft due to geometrical limitation. Loading and unloading of crude oil and gas through a subsea pipeline can be carried out between the mooring buoy, ships and onshore facilities. SPM is an offshore-standalone system which has to withstand the harsh marine environment with harsh conditions such as high wind, current and so on. Therefore, SPM is required to have high stability, reliability and durability. Also, SPM is comprised to be integrated systems which consist of power management, high pressure valve control, sophisticated hardware/software and a long distance communication system. In order to secure required functions of SPM system, a simulation model for the integrated system of SPM using MATLAB Simulink and State flow tool has been developed. The developed model consists of configuration of hydraulic system for opening and closing of PLEM (Pipeline End Manifold) valves and control system logic. To verify functions of the model, an integrated simulation model for overall systems of SPM was also developed by considering handshaking variables between individual systems. In addition to the dynamic model, a self-diagnostic function to determine failure of the system was configured, which enables the SPM system itself to alert users about the failure once a failure signal comes to arise. Controlling and monitoring the SPM system is able to be done by a HMI system which is capable of managing the SPM system remotely, which was carried out by building a communication environment between the SPM system and the HMI system.Keywords: HMI system, mooring buoy, simulink simulation model, single point mooring, stateflow
Procedia PDF Downloads 419236 Flood Devastation Assessment Through Mapping in Nigeria-2022 using Geospatial Techniques
Authors: Hafiz Muhammad Tayyab Bhatti, Munazza Usmani
Abstract:
One of nature's most destructive occurrences, floods do immense damage to communities and economic losses. Nigeria country, specifically southern Nigeria, is known for being prone to flooding. Even though periodic flooding occurs in Nigeria frequently, the floods of 2022 were the worst since those in 2012. Flood vulnerability analysis and mapping are still lacking in this region due to the very limited historical hydrological measurements and surveys on the effects of floods, which makes it difficult to develop and put into practice efficient flood protection measures. Remote sensing and Geographic Information Systems (GIS) are useful approaches to detecting, determining, and estimating the flood extent and its impacts. In this study, NOAA VIIR has been used to extract the flood extent using the flood water fraction data and afterward fused with GIS data for some zonal statistical analysis. The estimated possible flooding areas are validated using satellite imagery from the Moderate Resolution Imaging Spectroradiometer (MODIS). The goal is to map and studied flood extent, flood hazards, and their effects on the population, schools, and health facilities for each state of Nigeria. The resulting flood hazard maps show areas with high-risk levels clearly and serve as an important reference for planning and implementing future flood mitigation and control strategies. Overall, the study demonstrated the viability of using the chosen GIS and remote sensing approaches to detect possible risk regions to secure local populations and enhance disaster response capabilities during natural disasters.Keywords: flood hazards, remote sensing, damage assessment, GIS, geospatial analysis
Procedia PDF Downloads 140235 Through-Bolt Moment Connection in HSS Column
Authors: Bardia Khafaf, Mehrdad Ghaffari, Amir Hussein Samakar
Abstract:
It is currently desirable to use Hollow Square Sections (HSS) in moment resistant structures in construction of building because they offer fewer restrictions for designing and more useful space while adhering to build design codes. This paper present a through bolt connection in HSS column. This connection meets building code standards that require the moment resistant connections to deflect and absorb energy resulting from gravity and seismic loads. Connection through bolts is installed and pretension to provide the connection strength needed to make a beam–column moment rigid zone. A rigid joint is typically used to resist lateral forces by holding columns and beams fixed in relation to one another. With bolted moment frames using HSS columns, a through–bolt connection could be used to secure the beam and end plate to the column. However, when multiple columns and beams are used to span a length of building, the use of through-bolts would necessities aligning multiple beams simultaneously to the columns. In the case of a linear span, the assembly process requires the holes of a first beam end plate to be aligned with through bolt holes in a column and aligning the holes of a second, opposing beam plate with the column through bolt, then inserting the through bolts in each hole for tightening with nuts and washers. In moment resistant building, a problem arises when assembling beams to columns where multiple beams and columns are required. Through bolt, moment connections are among the economical, practical and not difficult rigid steel connection for HSS column building. In this paper, the results of numerous analytical studies performed for moment structures with HSS columns with through bolt based on AISC standard codes are shown.Keywords: through bolt, moment resistant connection, HSS columns section, construction engineering
Procedia PDF Downloads 470234 Hybrid Velocity Control Approach for Tethered Aerial Vehicle
Authors: Lovesh Goyal, Pushkar Dave, Prajyot Jadhav, GonnaYaswanth, Sakshi Giri, Sahil Dharme, Rushika Joshi, Rishabh Verma, Shital Chiddarwar
Abstract:
With the rising need for human-robot interaction, researchers have proposed and tested multiple models with varying degrees of success. A few of these models performed on aerial platforms are commonly known as Tethered Aerial Systems. These aerial vehicles may be powered continuously by a tether cable, which addresses the predicament of the short battery life of quadcopters. This system finds applications to minimize humanitarian efforts for industrial, medical, agricultural, and service uses. However, a significant challenge in employing such systems is that it necessities attaining smooth and secure robot-human interaction while ensuring that the forces from the tether remain within the standard comfortable range for the humans. To tackle this problem, a hybrid control method that could switch between two control techniques: constant control input and the steady-state solution, is implemented. The constant control approach is implemented when a person is far from the target location, and error is thought to be eventually constant. The controller switches to the steady-state approach when the person reaches within a specific range of the goal position. Both strategies take into account human velocity feedback. This hybrid technique enhances the outcomes by assisting the person to reach the desired location while decreasing the human's unwanted disturbance throughout the process, thereby keeping the interaction between the robot and the subject smooth.Keywords: unmanned aerial vehicle, tethered system, physical human-robot interaction, hybrid control
Procedia PDF Downloads 98233 Quantifying the UK’s Future Thermal Electricity Generation Water Use: Regional Analysis
Authors: Daniel Murrant, Andrew Quinn, Lee Chapman
Abstract:
A growing population has led to increasing global water and energy demand. This demand, combined with the effects of climate change and an increasing need to maintain and protect the natural environment, represents a potentially severe threat to many national infrastructure systems. This has resulted in a considerable quantity of published material on the interdependencies that exist between the supply of water and the thermal generation of electricity, often known as the water-energy nexus. Focusing specifically on the UK, there is a growing concern that the future availability of water may at times constrain thermal electricity generation, and therefore hinder the UK in meeting its increasing demand for a secure, and affordable supply of low carbon electricity. To provide further information on the threat the water-energy nexus may pose to the UK’s energy system, this paper models the regional water demand of UK thermal electricity generation in 2030 and 2050. It uses the strategically important Energy Systems Modelling Environment model developed by the Energy Technologies Institute. Unlike previous research, this paper was able to use abstraction and consumption factors specific to UK power stations. It finds that by 2050 the South East, Yorkshire and Humber, the West Midlands and North West regions are those with the greatest freshwater demand and therefore most likely to suffer from a lack of resource. However, it finds that by 2050 it is the East, South West and East Midlands regions with the greatest total water (fresh, estuarine and seawater) demand and the most likely to be constrained by environmental standards.Keywords: climate change, power station cooling, UK water-energy nexus, water abstraction, water resources
Procedia PDF Downloads 294232 Smoking, Bullying, and Being Bullied among Secondary School Students: Their Associations with Attachment Styles
Authors: Ruziana Masiran, Hamidin Awang, Cheah Y. T. Jun, Nor Fauziah Hashim, Archana Premkumar, Mohd. Feizel Aisiddiq, Mohd. Fakharuddin
Abstract:
Risk behaviours among secondary school students are common and show an increasing trend over the years. Existing attachment styles between the students and their parents influence the psychosocial development of this group of population hence contributing to the adoption of risk behaviours. The aim of this study was to determine the associations between three risk behaviours; smoking, bullying and being bullied among secondary school students and their styles of attachment to parents in a district in Malaysia. Using multistage simple random sampling, a cross-sectional study was designed with the level of significance, α set at 0.05. The validated self-administered Inventory of Parent and Peer Attachment (IPPA) and Youth Risk Behaviours Surveillance Questionnaire focusing on smoking and bullying were utilized. Secondary school students aged 13 to 17 years old from ten schools in the district of Hulu Langat, Malaysia were sampled. Prevalence of smoking was 15.8%, bullying 8.5% and being bully victims 19.0%. It was found that male gender was a significant risk factor for smoking (p < 0.001), while being Chinese (OR=0.156, 95%CI=0.029-0.837, p=0.030) and having married parents (OR=0.490, 95%CI=0.302-0.796, p=0.490) are protective against smoking. Students with insecure attachment to mothers (OR=1.650, 95%CI=1.018-2.675, p=0.042) and fathers (OR=2.039, 95%CI=1.285-3.234, p=0.002) are at 1.6 and 2 times risk respectively to smoke compared to those with secure attachment. The odds of male students bullying is almost twice than that for female students (OR=2.017, 95%CI=1.416-2.873, p < 0.001), and the odds of being bullied is 1.5 times higher for male students (OR=1.519, 95%CI=1.183-1.950, p=0.001). Those who are insecurely attached to fathers are at 1.8 times higher risk to be bullies (OR=1.867, 95%CI=1.272-2.740, p < 0.001) and 1.5 times higher risk to be bullied (OR=1.546, 95%CI=1.026-2.329, p=0.037). In conclusion, insecure attachment shows a strong association with smoking, bullying and being bullied among secondary school students in Malaysia.Keywords: attachment styles, bullied, bullying, insecure attachment, risk behaviours, smoking and attachment
Procedia PDF Downloads 332231 Nonlinear Estimation Model for Rail Track Deterioration
Authors: M. Karimpour, L. Hitihamillage, N. Elkhoury, S. Moridpour, R. Hesami
Abstract:
Rail transport authorities around the world have been facing a significant challenge when predicting rail infrastructure maintenance work for a long period of time. Generally, maintenance monitoring and prediction is conducted manually. With the restrictions in economy, the rail transport authorities are in pursuit of improved modern methods, which can provide precise prediction of rail maintenance time and location. The expectation from such a method is to develop models to minimize the human error that is strongly related to manual prediction. Such models will help them in understanding how the track degradation occurs overtime under the change in different conditions (e.g. rail load, rail type, rail profile). They need a well-structured technique to identify the precise time that rail tracks fail in order to minimize the maintenance cost/time and secure the vehicles. The rail track characteristics that have been collected over the years will be used in developing rail track degradation prediction models. Since these data have been collected in large volumes and the data collection is done both electronically and manually, it is possible to have some errors. Sometimes these errors make it impossible to use them in prediction model development. This is one of the major drawbacks in rail track degradation prediction. An accurate model can play a key role in the estimation of the long-term behavior of rail tracks. Accurate models increase the track safety and decrease the cost of maintenance in long term. In this research, a short review of rail track degradation prediction models has been discussed before estimating rail track degradation for the curve sections of Melbourne tram track system using Adaptive Network-based Fuzzy Inference System (ANFIS) model.Keywords: ANFIS, MGT, prediction modeling, rail track degradation
Procedia PDF Downloads 337230 Standardization of Propagation Techniques in Selected Native Plants of Kuwait
Authors: Laila Almulla, Narayana Bhat, Majda Suleiman, Sheena Jacob
Abstract:
Biodiversity conservation has become one of the challenging priorities to combat species extinction for many countries, including the state of Kuwait. Since native plants are better adapted to the local environment, can endure long spells of drought, withstand high soil salinity levels and provide a more natural effect to landscape projects, their use will both conserve natural resources and produce sustainable greenery. When native plants are properly blended with naturalized exotic ornamental plants in a landscape, they can improve social and cultural benefits. Screening of exotic and native plants in Kuwait during the past two decades has led to the selection of some very promising plants. Continuation of evaluation of additional native and exotic plants is essential to increase diversity of plant resources for greenery projects. Therefore, an effort was made to evaluate further native plants for their suitability for greenery applications. In the present study, various treatments were used to mass multiply selected plants using seeds to secure maximum germination. Seeds were subjected to nine treatments, and each treatment was replicated five times with ten seeds per treatment unit. After the treatment, the seeds of Zygophyllum qatarense were incubated at 30 °C, three lights for 12 h, at 40% humidity; where as the seeds of Haloxylon salicornicum were incubated at 22 °C with continuous light, at 40% humidity. Soaking in 250-ppm GA3 resulted in highest germination percentage of 20% in Zygophyllum qatarense and, Soaking in 500-ppm GA3 resulted in 6% germination in Haloxylon salicornicum. Germination of the viable seeds is influenced by various external and internal factors, seed must not be in a state of dormancy and the environmental requirements for germination of that seed must be met, before germination can occur.Keywords: landscape, native plants, revegetation, seed germination
Procedia PDF Downloads 526229 Cybersecurity Challenges in the Era of Open Banking
Authors: Krish Batra
Abstract:
The advent of open banking has revolutionized the financial services industry by fostering innovation, enhancing customer experience, and promoting competition. However, this paradigm shift towards more open and interconnected banking ecosystems has introduced complex cybersecurity challenges. This research paper delves into the multifaceted cybersecurity landscape of open banking, highlighting the vulnerabilities and threats inherent in sharing financial data across a network of banks and third-party providers. Through a detailed analysis of recent data breaches, phishing attacks, and other cyber incidents, the paper assesses the current state of cybersecurity within the open banking framework. It examines the effectiveness of existing security measures, such as encryption, API security protocols, and authentication mechanisms, in protecting sensitive financial information. Furthermore, the paper explores the regulatory response to these challenges, including the implementation of standards such as PSD2 in Europe and similar initiatives globally. By identifying gaps in current cybersecurity practices, the research aims to propose a set of robust, forward-looking strategies that can enhance the security and resilience of open banking systems. This includes recommendations for banks, third-party providers, regulators, and consumers on how to mitigate risks and ensure a secure open banking environment. The ultimate goal is to provide stakeholders with a comprehensive understanding of the cybersecurity implications of open banking and to outline actionable steps for safeguarding the financial ecosystem in an increasingly interconnected world.Keywords: open banking, financial services industry, cybersecurity challenges, data breaches, phishing attacks, encryption, API security protocols, authentication mechanisms, regulatory response, PSD2, cybersecurity practices
Procedia PDF Downloads 62