Search results for: Advanced Encryption Standard (AES)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7082

Search results for: Advanced Encryption Standard (AES)

6572 Standard Essential Patents for Artificial Intelligence Hardware and the Implications For Intellectual Property Rights

Authors: Wendy de Gomez

Abstract:

Standardization is a critical element in the ability of a society to reduce uncertainty, subjectivity, misrepresentation, and interpretation while simultaneously contributing to innovation. Technological standardization is critical to codify specific operationalization through legal instruments that provide rules of development, expectation, and use. In the current emerging technology landscape Artificial Intelligence (AI) hardware as a general use technology has seen incredible growth as evidenced from AI technology patents between 2012 and 2018 in the United States Patent Trademark Office (USPTO) AI dataset. However, as outlined in the 2023 United States Government National Standards Strategy for Critical and Emerging Technology the codification through standardization of emerging technologies such as AI has not kept pace with its actual technological proliferation. This gap has the potential to cause significant divergent possibilities for the downstream outcomes of AI in both the short and long term. This original empirical research provides an overview of the standardization efforts around AI in different geographies and provides a background to standardization law. It quantifies the longitudinal trend of Artificial Intelligence hardware patents through the USPTO AI dataset. It seeks evidence of existing Standard Essential Patents from these AI hardware patents through a text analysis of the Statement of patent history and the Field of the invention of these patents in Patent Vector and examines their determination as a Standard Essential Patent and their inclusion in existing AI technology standards across the four main AI standards bodies- European Telecommunications Standards Institute (ETSI); International Telecommunication Union (ITU)/ Telecommunication Standardization Sector (-T); Institute of Electrical and Electronics Engineers (IEEE); and the International Organization for Standardization (ISO). Once the analysis is complete the paper will discuss both the theoretical and operational implications of F/Rand Licensing Agreements for the owners of these Standard Essential Patents in the United States Court and Administrative system. It will conclude with an evaluation of how Standard Setting Organizations (SSOs) can work with SEP owners more effectively through various forms of Intellectual Property mechanisms such as patent pools.

Keywords: patents, artifical intelligence, standards, F/Rand agreements

Procedia PDF Downloads 70
6571 Main Chaos-Based Image Encryption Algorithm

Authors: Ibtissem Talbi

Abstract:

During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.

Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich

Procedia PDF Downloads 673
6570 A Blockchain-Based Privacy-Preserving Physical Delivery System

Authors: Shahin Zanbaghi, Saeed Samet

Abstract:

The internet has transformed the way we shop. Previously, most of our purchases came in the form of shopping trips to a nearby store. Now, it’s as easy as clicking a mouse. But with great convenience comes great responsibility. We have to be constantly vigilant about our personal information. In this work, our proposed approach is to encrypt the information printed on the physical packages, which include personal information in plain text, using a symmetric encryption algorithm; then, we store that encrypted information into a Blockchain network rather than storing them in companies or corporations centralized databases. We present, implement and assess a blockchain-based system using Ethereum smart contracts. We present detailed algorithms that explain the details of our smart contract. We present the security, cost, and performance analysis of the proposed method. Our work indicates that the proposed solution is economically attainable and provides data integrity, security, transparency, and data traceability.

Keywords: blockchain, Ethereum, smart contract, commit-reveal scheme

Procedia PDF Downloads 136
6569 Storage Tank Overfill Protection in Compliance with Functional Safety Standard: IEC 61511

Authors: Hassan Alsada

Abstract:

Tank overfill accidents are major concerns for industries handling large volumes of hydrocarbons. Buncefield, Jaipur, Puerto Rico, and West Virginia are just a few accidents with catastrophic consequences. Thus, it is very important for any industry to take the right safety measures for overfill prevention. Moreover, one of the main causative factors in the overfill accidents was inadequate risk analysis and, subsequently, inadequate design. This study aims to provide a full assessment in accordance with the Functional safety standard: “IEC 615 11 – Safety instrumented systems for the process industry” to the tank overfill scenario according to the standard’s Safety Life Cycle (SLC), which includes: the analysis phase, the implementation phase, and the operation phase. The paper discusses in depth the tank overfills Independent Protection Layers (IPLs) with systematic analysis to avoid the safety risks of under-design and the financial risk of facility overdesign. The result shows a clear and systematic assessment in compliance with the standards that can help to assist existing tank overfilling setup or a guide to support designing new storage facilities overfill protection.

Keywords: IEC 61511, PHA, LOPA, process safety, safety, health, environment, safety instrumented systems, safety instrumented function, functional safety, safety life cycle

Procedia PDF Downloads 75
6568 Student Records Management System Using Smart Cards and Biometric Technology for Educational Institutions

Authors: Patrick O. Bobbie, Prince S. Attrams

Abstract:

In recent times, the rapid change in new technologies has spurred up the way and manner records are handled in educational institutions. Also, there is a need for reliable access and ease-of use to these records, resulting in increased productivity in organizations. In academic institutions, such benefits help in quality assessments, institutional performance, and assessments of teaching and evaluation methods. Students in educational institutions benefit the most when advanced technologies are deployed in accessing records. This research paper discusses the use of biometric technologies coupled with smartcard technologies to provide a unique way of identifying students and matching their data to financial records to grant them access to restricted areas such as examination halls. The system developed in this paper, has an identity verification component as part of its main functionalities. A systematic software development cycle of analysis, design, coding, testing and support was used. The system provides a secured way of verifying student’s identity and real time verification of financial records. An advanced prototype version of the system has been developed for testing purposes.

Keywords: biometrics, smartcards, identity-verification, fingerprints

Procedia PDF Downloads 407
6567 Disparities Versus Similarities; WHO Good Practices for Pharmaceutical Quality Control Laboratories and ISO/IEC 17025:2017: International Standards for Quality Management Systems in Pharmaceutical Laboratories

Authors: Mercy Okezue, Kari Clase, Stephen Byrn, Paddy Shivanand

Abstract:

Medicines regulatory authorities expect pharmaceutical companies and contract research organizations to seek ways to certify that their laboratory control measurements are reliable. Establishing and maintaining laboratory quality standards are essential in ensuring the accuracy of test results. ‘ISO/IEC 17025:2017’ and ‘WHO Good Practices for Pharmaceutical Quality Control Laboratories (GPPQCL)’ are two quality standards commonly employed in developing laboratory quality systems. A review was conducted on the two standards to elaborate on areas on convergence and divergence. The goal was to understand how differences in each standard's requirements may influence laboratories' choices as to which document is easier to adopt for quality systems. A qualitative review method compared similar items in the two standards while mapping out areas where there were specific differences in the requirements of the two documents. The review also provided a detailed description of the clauses and parts covering management and technical requirements in these laboratory standards. The review showed that both documents share requirements for over ten critical areas covering objectives, infrastructure, management systems, and laboratory processes. There were, however, differences in standard expectations where GPPQCL emphasizes system procedures for planning and future budgets that will ensure continuity. Conversely, ISO 17025 was more focused on the risk management approach to establish laboratory quality systems. Elements in the two documents form common standard requirements to assure the validity of laboratory test results that promote mutual recognition. The ISO standard currently has more global patronage than GPPQCL.

Keywords: ISO/IEC 17025:2017, laboratory standards, quality control, WHO GPPQCL

Procedia PDF Downloads 180
6566 A Comparative Analysis of E-Government Quality Models

Authors: Abdoullah Fath-Allah, Laila Cheikhi, Rafa E. Al-Qutaish, Ali Idri

Abstract:

Many quality models have been used to measure e-government portals quality. However, the absence of an international consensus for e-government portals quality models results in many differences in terms of quality attributes and measures. The aim of this paper is to compare and analyze the existing e-government quality models proposed in literature (those that are based on ISO standards and those that are not) in order to propose guidelines to build a good and useful e-government portals quality model. Our findings show that, there is no e-government portal quality model based on the new international standard ISO 25010. Besides that, the quality models are not based on a best practice model to allow agencies to both; measure e-government portals quality and identify missing best practices for those portals.

Keywords: e-government, portal, best practices, quality model, ISO, standard, ISO 25010, ISO 9126

Procedia PDF Downloads 542
6565 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 218
6564 Issues of Accounting of Lease and Revenue according to International Financial Reporting Standards

Authors: Nadezhda Kvatashidze, Elena Kharabadze

Abstract:

It is broadly known that lease is a flexible means of funding enterprises. Lease reduces the risk related to access and possession of assets, as well as obtainment of funding. Therefore, it is important to refine lease accounting. The lease accounting regulations under the applicable standard (International Accounting Standards 17) make concealment of liabilities possible. As a result, the information users get inaccurate and incomprehensive information and have to resort to an additional assessment of the off-balance sheet lease liabilities. In order to address the problem, the International Financial Reporting Standards Board decided to change the approach to lease accounting. With the deficiencies of the applicable standard taken into account, the new standard (IFRS 16 ‘Leases’) aims at supplying appropriate and fair lease-related information to the users. Save certain exclusions; the lessee is obliged to recognize all the lease agreements in its financial report. The approach was determined by the fact that under the lease agreement, rights and obligations arise by way of assets and liabilities. Immediately upon conclusion of the lease agreement, the lessee takes an asset into its disposal and assumes the obligation to effect the lease-related payments in order to meet the recognition criteria defined by the Conceptual Framework for Financial Reporting. The payments are to be entered into the financial report. The new lease accounting standard secures supply of quality and comparable information to the financial information users. The International Accounting Standards Board and the US Financial Accounting Standards Board jointly developed IFRS 15: ‘Revenue from Contracts with Customers’. The standard allows the establishment of detailed revenue recognition practical criteria such as identification of the performance obligations in the contract, determination of the transaction price and its components, especially price variable considerations and other important components, as well as passage of control over the asset to the customer. IFRS 15: ‘Revenue from Contracts with Customers’ is very similar to the relevant US standards and includes requirements more specific and consistent than those of the standards in place. The new standard is going to change the recognition terms and techniques in the industries, such as construction, telecommunications (mobile and cable networks), licensing (media, science, franchising), real property, software etc.

Keywords: assessment of the lease assets and liabilities, contractual liability, division of contract, identification of contracts, contract price, lease identification, lease liabilities, off-balance sheet, transaction value

Procedia PDF Downloads 307
6563 The Fuzzy Logic Modeling of Performance Driver Seat’s Localised Cooling and Heating in Standard Car Air Conditioning System

Authors: Ali Ates, Sadık Ata, Kevser Dincer

Abstract:

In this study, performance of the driver seat‘s localized cooling and heating in a standard car air conditioning system was experimentally investigated and modeled with Rule-Based Mamdani-Type Fuzzy (RBMTF) modeling technique. Climate function at automobile is an important variable for thermal comfort. In the experimental study localized heating and cooling performances have been examined with the aid of a mechanism established to a vehicle. The equipment’s used in the experimental setup/mechanism have been provided and assembled. During the measurement, the status of the performance level has been determined. Input parameters revolutions per minute and time; output parameters car seat cooling temperature, car back cooling temperature, car seat heating temperature, car back heating temperature were described by RBMTF if-the rules. Numerical parameters of input and output variables were fuzzificated as linguistic variables: Very Very Low (L1), Very Low (L2), Low (L3), Negative Medium (L4), Medium (L5), High (L7), Very High (L8) and Very Very High (L9) linguistic classes. The comparison between experimental data and RBMTF is done by using statistical methods like absolute fraction of variance (R2). The actual values and RBMTF results indicated that RBMTF could be successfully used in standard car air conditioning system.

Keywords: air conditioning system, cooling-heating, RMBTF modelling, car seat

Procedia PDF Downloads 340
6562 The Effect of Environmental Enrichment on Anxiety and Stress Hormone in Maternally Separated Male Rats

Authors: Özge Selin Çevik, Leyla Şahin, Gülhan Örekeci Temel

Abstract:

The early postnatal period is critical for the development of cognitive and emotional functions. Maternal separation is a detrimental postnatal influence, whereas environmental enrichment is a therapeutic and protective agent. It is unclear if long-term environmental enrichment can compensate for the effects of maternal separation stress on anxiety behavior. This study was designed to examine how environmental enrichment affects anxiety levels and corticosterone levels in maternally separated rats. There are six main groups in this study: control (C), maternal separation+standard cage (MS), maternal separation+enriched environment (MSE), enriched environment (E), the maternal separation that decapitated at postnatal (PN) 21 (MS21), and standard cage that decapitated at PN21 (STD21). The maternal separation procedure consisted of PN for 21 days (between 09:00 a.m and 12:00 a.m). Enriched (E, MSE) or standard cage environment rats (MS, C) spent PN (22-55) days in either enriched cages or standard cages. Anxiety and locomotor activity were examined with the open field and elevated plus-maze test. Blood corticosterone level was evaluated by the enzyme-linked immunosorbent assay (ELISA) method. Results showed that maternal separation (MS) increased locomotor activity and anxiety. An enriched environment (E) did not change the locomotor activity. MSE group’s anxiety and locomotor activity did not change. Corticosterone levels increased in the maternal separation group that decapitated at the PN 21 days. Maternal separation increases anxiety. Environmental enrichment alone was insufficient to cause alterations in the anxiety level. In addition, environmental enrichment did not ameliorate the anxiety level in maternally separated rats. However, environmental enrichment decreased the locomotor activity in the maternally separated rats.

Keywords: maternal separation, environment enrichment, stress, hippocampus, anxiety, memory, rat

Procedia PDF Downloads 74
6561 Facial Biometric Privacy Using Visual Cryptography: A Fundamental Approach to Enhance the Security of Facial Biometric Data

Authors: Devika Tanna

Abstract:

'Biometrics' means 'life measurement' but the term is usually associated with the use of unique physiological characteristics to identify an individual. It is important to secure the privacy of digital face image that is stored in central database. To impart privacy to such biometric face images, first, the digital face image is split into two host face images such that, each of it gives no idea of existence of the original face image and, then each cover image is stored in two different databases geographically apart. When both the cover images are simultaneously available then only we can access that original image. This can be achieved by using the XM2VTS and IMM face database, an adaptive algorithm for spatial greyscale. The algorithm helps to select the appropriate host images which are most likely to be compatible with the secret image stored in the central database based on its geometry and appearance. The encryption is done using GEVCS which results in a reconstructed image identical to the original private image.

Keywords: adaptive algorithm, database, host images, privacy, visual cryptography

Procedia PDF Downloads 114
6560 Innovations for Freight Transport Systems

Authors: M. Lu

Abstract:

The paper presents part of the results of EU-funded projects: SoCool@EU (Sustainable Organisation between Clusters Of Optimized Logistics @ Europe), DG-RTD (Research and Innovation), Regions of Knowledge Programme (FP7-REGIONS-2011-1). It will provide an in-depth review of emerging technologies for further improving urban mobility and freight transport systems, such as (information and physical) infrastructure, ICT-based Intelligent Transport Systems (ITS), vehicles, advanced logistics, and services. Furthermore, the paper will provide an analysis of the barriers and will review business models for the market uptake of innovations. From a perspective of science and technology, the challenges of urbanization could be mainly handled through adequate (human-oriented) solutions for urban planning, sustainable energy, the water system, building design and construction, the urban transport system (both physical and information aspects), and advanced logistics and services. Implementation of solutions for these domains should be follow a highly integrated and balanced approach, a silo approach should be avoided. To develop a sustainable urban transport system (for people and goods), including inter-hubs and intra-hubs, a holistic view is needed. To achieve a sustainable transport system for people and goods (in terms of cost-effectiveness, efficiency, environment-friendliness and fulfillment of the mobility, transport and logistics needs of the society), a proper network and information infrastructure, advanced transport systems and operations, as well as ad hoc and seamless services are required. In addition, a road map for an enhanced urban transport system until 2050 will be presented. This road map aims to address the challenges of urban transport, and to provide best practices in inter-city and intra-city environments from various perspectives, including policy, traveler behaviour, economy, liability, business models, and technology.

Keywords: synchromodality, multimodal transport, logistics, Intelligent Transport Systems (ITS)

Procedia PDF Downloads 306
6559 The Spiritual Distress of Women Coping with the End of Life and Death of Their Spouses

Authors: Szu-Mei Hsiao

Abstract:

Many nurses have concerns about the difficulties of providing spiritual care for ethnic-Chinese patients and family members within their cultural context. This is due to a lack of knowledge and training. Most family caregivers are female. There has been little research exploring the potential impact of Chinese cultural values on the spiritual distress of couple dyadic participants in Taiwan. This study explores the spiritual issues of Taiwanese women coping with their husband’s advanced cancer during palliative care to death. Qualitative multiple case studies were used. Data was collected through participant observation and in-depth face-to-face interviews. Transcribed interview data was analyzed by using qualitative content analysis. Three couples were recruited from a community-based rural hospital in Taiwan where the husbands were hospitalized in a medical ward. Four spiritual distress themes emerged from the analysis: (1) A personal conflict in trying to come to terms with love and forgiveness; the inability to forgive their husband’s mistakes; and, lack of their family’s love and support. (2) A feeling of hopelessness due to advanced cancer, such as a feeling of disappointment in their destiny and karma, including expressing doubt on survival. (3) A feeling of uncertainty in facing death peacefully, such as fear of facing the unknown world; and, (4) A feeling of doubt causing them to question the meaning and values in their lives. This research has shown that caregivers needed family support, friends, social welfare, and the help of their religion to meet their spiritual needs in coping within the final stages of life and death. The findings of this study could assist health professionals to detect the spiritual distress of ethnic-Chinese patients and caregivers in the context of their cultural or religious background as early as possible.

Keywords: advanced cancer, Buddhism, Confucianism, Taoism, qualitative research, spiritual distress

Procedia PDF Downloads 166
6558 Active Learning Management for Teacher's Professional Courses in Curriculum and Instruction, Faculty of Education Thaksin University

Authors: Chuanphit Chumkhong

Abstract:

This research aimed 1) to study the effects of the management of Active Learning among 3rd year students enrolled in teacher’s profession courses and 2) to assess the satisfaction of the students with courses using the Active Learning approach. The population for the study consisted of 442 3rd year undergraduate students enrolled in two teacher education courses in 2015: Curriculum Development and Learning Process Management. They were 442 from 11 education programs. Respondents for evaluation of satisfaction with Active Learning management comprised 432 students. The instruments used in research included a detailed course description and rating scale questionnaire on Active Learning. The data were analyzed using arithmetic mean and standard deviation. The results of the study reveal the following: 1. Overall, students gain a better understanding of the Active Learning due to their actual practice on the activity of course. Students have the opportunity to exchange learning knowledge and skills. The AL teaching activities make students interested in the contents and they seek to search for knowledge on their own. 2. Overall, 3rd year students are satisfied with the Active Learning management at a ‘high’ level with a mean score (μ) of 4.12 and standard deviation (σ) of. 51. By individual items, students are satisfied with the 10 elements in the two courses at a ‘high’ level with the mean score (μ) between 3.79 to 4.41 and a standard deviation (σ) between to 68. 79.

Keywords: active learning teaching model, teacher’s professional courses, professional courses, curriculum and instruction teacher's

Procedia PDF Downloads 234
6557 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble

Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi

Abstract:

Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.

Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble

Procedia PDF Downloads 209
6556 Contamination of the Groundwater by the Flow of the Discharge in Khouribga City (Morocco) and the Danger It Presents to the Health of the Surrounding Population.

Authors: Najih Amina

Abstract:

Our study focuses on monitoring the spatial evolution of a number of physico-chemical parameters of wells waters located at different distances from the discharge of the city of Khouribga (S0 upstream station, S1, S2 et S3 are respectively located at 5.5, 7.5, 11 Km away from solid waste discharge of the city). The absence of a source of drinking water in this region involves the population to feeding on its groundwater wells. Through the results, we note that most of the analyzed parameters exceed the potable water standards from S1. At this source of water, we find that the conductivity (1290 μmScm-1; Standard 1000 μmScm-1), Total Hardness TH (67.2°F/ Standard 50° F), Ca2 + (146 mg l-1 standard 60 mg l-1), Cl- (369 mg l-1 standard 150 mg l-1), NaCl (609 mgl-1), Methyl orange alakanity “M. alk” (280 mg l-1) greatly exceed the drinking water standards. By following these parameters, it is obvious that some values have decreased in the downstream stations, while others become important. We find that the conductivity is always higher than 950 μmScm-1; the TH registers 72°F in S3; Ca 2+ is in the range of 153 mg l-1 in S3, Cl- and NaCl- reached 426 mg l-1 and 702 mg l-1 respectively in S2, M alk becomes higher and reaches 430 to 350 in S3. At the wells S2, we found that the nitrites are well beyond the standard 1.05 mg l-1. Whereas, at the control station S0, the values are lower or at the limit of drinking water standards: conductivity (452 μmScm-1), TH (34 F°), Ca2+ (68 mg l-1), Cl- (157 mg l-1), NaCl- (258 mg l-1), M alk (220 mg l-1). Thus, the diagnosis reveals the presence of a high pollution caused by the leachates of the household waste discharge and by the effluents of the sewage waste water plant (SWWP). The phenomenon of the water hardness could, also, be generated by the processes of erosion, leaching and soil infiltration in the region (phosphate layers, intercalated layers of marl and limestone), phenomenons also caused by the acidity due to this surrounding pollution. The source S1 is the nearest surrounding site of the discharge and the most affected by the phenomenon of pollution, especially, it is near to a superficial water source S’1 polluted by the effluents coming from the sewage waste water plant of the city. In the light of these data, we can deduce that the consumption of this water from S1 does not conform the standards of drinking waters, and could affect the human health.

Keywords: physico-chemical parameters, ground water wells, infiltration, leaching, pollution, leachate discharge effluent SWWP, human health.

Procedia PDF Downloads 397
6555 An Attack on the Lucas Based El-Gamal Cryptosystem in the Elliptic Curve Group Over Finite Field Using Greater Common Divisor

Authors: Lee Feng Koo, Tze Jin Wong, Pang Hung Yiu, Nik Mohd Asri Nik Long

Abstract:

Greater common divisor (GCD) attack is an attack that relies on the polynomial structure of the cryptosystem. This attack required two plaintexts differ from a fixed number and encrypted under same modulus. This paper reports a security reaction of Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field under GCD attack. Lucas Based El-Gamal Cryptosystem in the Elliptic Curve group over finite field was exposed mathematically to the GCD attack using GCD and Dickson polynomial. The result shows that the cryptanalyst is able to get the plaintext without decryption by using GCD attack. Thus, the study concluded that it is highly perilous when two plaintexts have a slight difference from a fixed number in the same Elliptic curve group over finite field.

Keywords: decryption, encryption, elliptic curve, greater common divisor

Procedia PDF Downloads 238
6554 Exergy Analysis of Poultry Litter-to-Energy Production by the Advanced Combustion System

Authors: Samuel Oludayo Alamu, Seong Lee

Abstract:

The need for generating energy from biomass in an efficient way as well as maximizing the yield of total energy from the thermal conversion process has been a major concern for researchers. A holistic approach which involves the combination of First law of thermodynamics (FLT) and the second law of thermodynamics (SLT) is required for conducting an effective assessment of an energy plant since FLT analysis alone fails to identify the quality of the dissipated energy and how much work potential is available. The overall purpose of this study is to investigate the exergy analysis of direct combustion of poultry waste being converted to energy with a handful of environmental assessment of the conversion processes in order to maximize thermal efficiency. The exergy analysis around the shell and tube heat exchanger (STHE) was investigated primarily by varying the operating parameters for different tube shapes and flow direction, and an exergy model was obtained from estimations of the higher heating value and standard entropy of poultry waste from the elemental compositions. The STHE was designed and fabricated by Lee Research Group at Morgan State University. The analysis conducted on theSTHE using the flue gas temperature entering and exiting show that only about one-third of the energy input to the STHE was available to do work with an overall efficiency of 13.8%, while a huge amount was lost to the surrounding. By recirculating the flue gas, the exergy efficiency of the combustion system can be maximized with a greater reduction in the amount of exergy loss.

Keywords: exergy analysis, shell and tube heat exchanger, thermodynamics, combustion system, thermal efficiency

Procedia PDF Downloads 96
6553 Reliability of Using Standard Penetration Test (SPT) in Evaluation of Soil Properties

Authors: Hossein Alimohammadi, Mohsen Amirmojahedi, Mehrdad Rowhani

Abstract:

Soil properties are used by geotechnical engineers to evaluate and analyze site conditions for designing purposes. Although basic soil classification tests are easy to perform and provide useful information to determine the properties of soils, it may take time to get the result and add some costs to the projects. Standard Penetration Test (SPT) provides an opportunity to evaluate soil parameters without performing laboratory tests. In addition to its simplicity and cheapness, the results become available immediately. This research provides a guideline on the application of the SPT test method, reliability of adapting the SPT test results in evaluating soil physical and mechanical properties such as Atterberg limits, shear strength, and compressive strength compressibility parameters. A total of 70 boreholes were investigated in this study by taking soil samples between depths of 1.2 to 15.25 meters. The project site was located in Morrow County, Ohio. A regression-based formula was proposed based on Tobit regression with a stepwise variable selection analysis conducted between SPT and other typical soil properties obtained from soil tests. The results of the research illustrated that the shear strength and physical properties of the soil affect the SPT number. The proposed correlation can help engineers to use SPT test results in their design with higher accuracy.

Keywords: standard penetration test, soil properties, soil classification, regression method

Procedia PDF Downloads 174
6552 A Cloud-Based Mobile Auditing Tools for Muslim-Friendly Hospitality Services

Authors: Mohd Iskandar Illyas Tan, Zuhra Junaida Mohamad Husny, Farawahida Mohd Yusof

Abstract:

The potentials of Muslim-friendly hospitality services bring huge opportunities to operators (hoteliers, tourist guides, and travel agents), especially among the Muslim countries. In order to provide guidelines that facilitate the operations among these operators, standards and manuals have been developing by the authorities. Among the challenges is the applicability and complexity of the standard to be adopted in the real world. Mobile digital technology can be implemented to overcome those challenges. A prototype has been developed to help operators and authorities to assess their readiness in complying with MS2610:2015. This study analyzes the of mobile digital technology characteristics that are suitable for the user in conducting sharia’ compliant hospitality audit. A focus group study was conducted in the state of Penang, Malaysia that involves operators (hoteliers, tourist guide, and travel agents) as well as agencies (Islamic Tourism Center, Penang Islamic Affairs Department, Malaysian Standard) that involved directly in the implementation of the certification. Both groups were given the 3 weeks to test and provide feedback on the usability of the mobile applications in order to conduct an audit on their readiness towards the Muslim-friendly hospitality services standard developed by the Malaysian Standard. The feedbacks were analyzed and the overall results show that three criteria (ease of use, completeness and fast to complete) show the highest responses among both groups for the mobile application. This study provides the evidence that the mobile application development has huge potentials to be implemented by the Muslim-friendly hospitality services operator and agencies.

Keywords: hospitality, innovation, audit, compliance, mobile application

Procedia PDF Downloads 122
6551 Radical Scavenging Activity of Protein Extracts from Pulse and Oleaginous Seeds

Authors: Silvia Gastaldello, Maria Grillo, Luca Tassoni, Claudio Maran, Stefano Balbo

Abstract:

Antioxidants are nowadays attractive not only for the countless benefits to the human and animal health, but also for the perspective of use as food preservative instead of synthetic chemical molecules. In this study, the radical scavenging activity of six protein extracts from pulse and oleaginous seeds was evaluated. The selected matrices are Pisum sativum (yellow pea from two different origins), Carthamus tinctorius (safflower), Helianthus annuus (sunflower), Lupinus luteus cv Mister (lupin) and Glycine max (soybean), since they are economically interesting for both human and animal nutrition. The seeds were grinded and proteins extracted from 20mg powder with a specific vegetal-extraction kit. Proteins have been quantified through Bradford protocol and scavenging activity was revealed using DPPH assay, based on radical DPPH (2,2-diphenyl-1-picrylhydrazyl) absorbance decrease in the presence of antioxidants molecules. Different concentrations of the protein extract (1, 5, 10, 50, 100, 500 µg/ml) were mixed with DPPH solution (DPPH 0,004% in ethanol 70% v/v). Ascorbic acid was used as a scavenging activity standard reference, at the same six concentrations of protein extracts, while DPPH solution was used as control. Samples and standard were prepared in triplicate and incubated for 30 minutes in dark at room temperature, the absorbance was read at 517nm (ABS30). Average and standard deviation of absorbance values were calculated for each concentration of samples and standard. Statistical analysis using t-students and p-value were performed to assess the statistical significance of the scavenging activity difference between the samples (or standard) and control (ABSctrl). The percentage of antioxidant activity has been calculated using the formula [(ABSctrl-ABS30)/ABSctrl]*100. The obtained results demonstrate that all matrices showed antioxidant activity. Ascorbic acid, used as standard, exhibits a 96% scavenging activity at the concentration of 500 µg/ml. At the same conditions, sunflower, safflower and yellow peas revealed the highest antioxidant performance among the matrices analyzed, with an activity of 74%, 68% and 70% respectively (p < 0.005). Although lupin and soybean exhibit a lower antioxidant activity compared to the other matrices, they showed a percentage of 46 and 36 respectively. All these data suggest the possibility to use undervalued edible matrices as antioxidants source. However, further studies are necessary to investigate a possible synergic effect of several matrices as well as the impact of industrial processes for a large-scale approach.

Keywords: antioxidants, DPPH assay, natural matrices, vegetal proteins

Procedia PDF Downloads 415
6550 Estimation of the Pore Electrical Conductivity Using Dielectric Sensors

Authors: Fethi Bouksila, Magnus Persson, Ronny Berndtsson, Akissa Bahri

Abstract:

Under salinity conditions, we evaluate the performance of Hilhost (2000) model to predict pore electrical conductivity ECp from dielectric permittivity and bulk electrical conductivity (ECa) using Time and Frequency Domain Reflectometry sensors (TDR, FDR). Using FDR_WET sensor, RMSE of ECp was 4.15 dS m-1. By replacing the standard soil parameter (K0) in Hilhost model by K0-ECa relationship, the RMSE of ECp decreased to 0.68 dS m-1. WET sensor could give similar accuracy to estimate ECp than TDR if calibrated values of K0 were used instead of standard values in Hilhost model.

Keywords: hilhost model, soil salinity, time domain reflectometry, frequency domain reflectometry, dielectric methods

Procedia PDF Downloads 124
6549 Parallel Querying of Distributed Ontologies with Shared Vocabulary

Authors: Sharjeel Aslam, Vassil Vassilev, Karim Ouazzane

Abstract:

Ontologies and various semantic repositories became a convenient approach for implementing model-driven architectures of distributed systems on the Web. SPARQL is the standard query language for querying such. However, although SPARQL is well-established standard for querying semantic repositories in RDF and OWL format and there are commonly used APIs which supports it, like Jena for Java, its parallel option is not incorporated in them. This article presents a complete framework consisting of an object algebra for parallel RDF and an index-based implementation of the parallel query engine capable of dealing with the distributed RDF ontologies which share common vocabulary. It has been implemented in Java, and for validation of the algorithms has been applied to the problem of organizing virtual exhibitions on the Web.

Keywords: distributed ontologies, parallel querying, semantic indexing, shared vocabulary, SPARQL

Procedia PDF Downloads 191
6548 The Effect of Modified Posterior Shoulder Stretching Exercises on Posterior Shoulder Tightness, Shoulder Pain, and Dysfunction in Patients with Subacromial Impingement

Authors: Ozge Tahran, Sevgi Sevi Yesilyaprak

Abstract:

Objective: The aim of the study was to investigate the effect of the Wilk’s modified two different stretching exercises on posterior shoulder tightness, pain, and dysfunction in patients with subacromial impingement syndrome (SIS). Method: This study was carried out on 67 patients who have more than 15° difference in shoulder internal rotation range of motion between two sides and had been diagnosed as SIS. Before treatment, all patients were randomly assigned into three groups. Standard physiotherapy programme was applied to the Group 3 (n=23), standard physiotherapy program with Wilk’s modified cross-body stretching exercises were applied to Group 1 (n=22), and standard physiotherapy program with Wilk’s modified sleeper stretching exercises were applied to Group 2 (n= 23). All the patients received 20 sessions of physiotherapy during 4 weeks, 5 days in a week by a physiotherapist. The patients continued their exercises at home at the weekends. Pain severity, shoulder rotation range of motion, posterior shoulder tightness, upper extremity functionality with Constant and Murley Score (CMS) and disability level with The Disabilities of the Arm, Shoulder and Hand Score (QuickDASH) were evaluated before and after physiotherapy programme. Results: Before treatment, demographic and anthropometric characteristics were similar in groups and there was no statistical difference (p > 0.05). It was determined that pain severity decreased, shoulder rotation range of motion, posterior shoulder tightness, upper extremity functionality, and disability were improved after physiotherapy in both groups (p < 0.05). Group 1 and 2 had better results in terms of reduction of pain severity during activity, increase in shoulder rotation range of motion, posterior shoulder mobility and upper extremity functionality and improvement in upper extremity disability, compared to Group 3 (p < 0.05). Conclusion: Modified posterior shoulder stretching exercises in addition to standard physiotherapy programme is more effective for reduction of pain during activity, to improve shoulder rotation range of motion, posterior shoulder mobility, and upper extremity functionality in patients with SIS compared to standard physiotherapy programme alone.

Keywords: modified posterior shoulder stretching exercises, posterior shoulder tightness, shoulder complex, subacromial impingement syndrome

Procedia PDF Downloads 165
6547 A Framework for Improving Trade Contractors’ Productivity Tracking Methods

Authors: Sophia Hayes, Kenny L. Liang, Sahil Sharma, Austin Shema, Mahmoud Bader, Mohamed Elbarkouky

Abstract:

Despite being one of the most significant economic contributors of the country, Canada’s construction industry is lagging behind other sectors when it comes to labor productivity improvements. The construction industry is very collaborative as a general contractor, will hire trade contractors to perform most of a project’s work; meaning low productivity from one contractor can have a domino effect on the shared success of a project. To address this issue and encourage trade contractors to improve their productivity tracking methods, an investigative study was done on the productivity views and tracking methods of various trade contractors. Additionally, an in-depth review was done on four standard tracking methods used in the construction industry: cost codes, benchmarking, the job productivity measurement (JPM) standard, and WorkFace Planning (WFP). The four tracking methods were used as a baseline in comparing the trade contractors’ responses, determining gaps within their current tracking methods, and for making improvement recommendations. 15 interviews were conducted with different trades to analyze how contractors value productivity. The results of these analyses indicated that there seem to be gaps within the construction industry when it comes to an understanding of the purpose and value in productivity tracking. The trade contractors also shared their current productivity tracking systems; which were then compared to the four standard tracking methods used in the construction industry. Gaps were identified in their various tracking methods and using a framework; recommendations were made based on the type of trade on how to improve how they track productivity.

Keywords: labor productivity, productivity tracking methods, trade contractors, construction

Procedia PDF Downloads 181
6546 Development of a Data Security Model Using Steganography

Authors: Terungwa Simon Yange, Agana Moses A.

Abstract:

This paper studied steganography and designed a simplistic approach to a steganographic tool for hiding information in image files with the view of addressing the security challenges with data by hiding data from unauthorized users to improve its security. The Structured Systems Analysis and Design Method (SSADM) was used in this work. The system was developed using Java Development Kit (JDK) 1.7.0_10 and MySQL Server as its backend. The system was tested with some hypothetical health records which proved the possibility of protecting data from unauthorized users by making it secret so that its existence cannot be easily recognized by fraudulent users. It further strengthens the confidentiality of patient records kept by medical practitioners in the health setting. In conclusion, this work was able to produce a user friendly steganography software that is very fast to install and easy to operate to ensure privacy and secrecy of sensitive data. It also produced an exact copy of the original image and the one carrying the secret message when compared with each.

Keywords: steganography, cryptography, encryption, decryption, secrecy

Procedia PDF Downloads 253
6545 The Use of a Rabbit Model to Evaluate the Influence of Age on Excision Wound Healing

Authors: S. Bilal, S. A. Bhat, I. Hussain, J. D. Parrah, S. P. Ahmad, M. R. Mir

Abstract:

Background: The wound healing involves a highly coordinated cascade of cellular and immunological response over a period including coagulation, inflammation, granulation tissue formation, epithelialization, collagen synthesis and tissue remodeling. Wounds in aged heal more slowly than those in younger, mainly because of comorbidities that occur as one age. The present study is about the influence of age on wound healing. 1x1cm^2 (100 mm) wounds were created on the back of the animal. The animals were divided into two groups; one group had animals in the age group of 3-9 months while another group had animals in the age group of 15-21 months. Materials and Methods: 24 clinically healthy rabbits in the age group of 3-21 months were used as experimental animals and divided into two groups viz A and B. All experimental parameters, i.e., Excision wound model, Measurement of wound area, Protein extraction and estimation, Protein extraction and estimation and DNA extraction and estimation were done by standard methods. Results: The parameters studied were wound contraction, hydroxyproline, glucosamine, protein, and DNA. A significant increase (p<0.005) in the hydroxyproline, glucosamine, protein and DNA and a significant decrease in wound area (p<0.005) was observed in the age group of 3-9 months when compared to animals of an age group of 15-21 months. Wound contraction together with hydroxyproline, glucosamine, protein and DNA estimations suggest that advanced age results in retarded wound healing. Conclusion: The decrease wound contraction and accumulation of hydroxyproline, glucosamine, protein and DNA in group B animals may be associated with the reduction or delay in growth factors because of the advancing age.

Keywords: age, wound healing, excision wound, hydroxyproline, glucosamine

Procedia PDF Downloads 646
6544 Facial Recognition and Landmark Detection in Fitness Assessment and Performance Improvement

Authors: Brittany Richardson, Ying Wang

Abstract:

For physical therapy, exercise prescription, athlete training, and regular fitness training, it is crucial to perform health assessments or fitness assessments periodically. An accurate assessment is propitious for tracking recovery progress, preventing potential injury and making long-range training plans. Assessments include necessary measurements, height, weight, blood pressure, heart rate, body fat, etc. and advanced evaluation, muscle group strength, stability-mobility, and movement evaluation, etc. In the current standard assessment procedures, the accuracy of assessments, especially advanced evaluations, largely depends on the experience of physicians, coaches, and personal trainers. And it is challenging to track clients’ progress in the current assessment. Unlike the tradition assessment, in this paper, we present a deep learning based face recognition algorithm for accurate, comprehensive and trackable assessment. Based on the result from our assessment, physicians, coaches, and personal trainers are able to adjust the training targets and methods. The system categorizes the difficulty levels of the current activity for the client or user, furthermore make more comprehensive assessments based on tracking muscle group over time using a designed landmark detection method. The system also includes the function of grading and correcting the form of the clients during exercise. Experienced coaches and personal trainer can tell the clients' limit based on their facial expression and muscle group movements, even during the first several sessions. Similar to this, using a convolution neural network, the system is trained with people’s facial expression to differentiate challenge levels for clients. It uses landmark detection for subtle changes in muscle groups movements. It measures the proximal mobility of the hips and thoracic spine, the proximal stability of the scapulothoracic region and distal mobility of the glenohumeral joint, as well as distal mobility, and its effect on the kinetic chain. This system integrates data from other fitness assistant devices, including but not limited to Apple Watch, Fitbit, etc. for a improved training and testing performance. The system itself doesn’t require history data for an individual client, but the history data of a client can be used to create a more effective exercise plan. In order to validate the performance of the proposed work, an experimental design is presented. The results show that the proposed work contributes towards improving the quality of exercise plan, execution, progress tracking, and performance.

Keywords: exercise prescription, facial recognition, landmark detection, fitness assessments

Procedia PDF Downloads 123
6543 COVID-19: A Thread to the Security System of Foreign Investment

Authors: Mehdi Ghaemi

Abstract:

In principle, foreign investment security is enshrined in International Investment Agreements (IIAs) and Bilateral Investment Treaties (BITs) in the form of protection standards such as the Full Protection and Security Standard (FPS). Accordingly, the host countries undertake to provide the necessary security for the economic activities of foreign investment. With the outbreak of coronavirus, the international community called COVID-19 a threat to international peace security, as well as to the public interest and national security of nations; and to deal with, they proposed several solutions, generally including quarantine, creating social distances, and restricting businesses. This article first studies the security of foreign investment in international investment law. In the following, it analyzes the consequences of the COVID-19 pandemic for foreign investment security so that if there is a threat to that security, solutions could be offered to reduce it.

Keywords: foreign investment, FPS standard, host country, public health, COVID-19

Procedia PDF Downloads 88