Search results for: securing graves
141 Smart Speed Bump
Authors: Mohammad Rahmani Rezaiyeh, Mojtaba Rahmani Rezaiyeh, Mehrdad Rahmani Rezaiyeh
Abstract:
Smart speed bump is a new invention and I am invented it. Smart speed bump is a system that can change the position of speed bumps either active or passive in necessary situations. The basic system of smart speed bumps is based on a robotic system which includes mechanic, electronic and artificial intelligence. The smart speed bump is capable of smart decision making and can change its position by anticipating the peak of terrific hours. It can be noted to the advantages of this system such as preventing the waste of petrol while crossing speed bumps, traffic management, accelerating, flowing and securing traffic, reducing accidents and judicial records.Keywords: invention, smart, robotic system, speed bump, traffic, management
Procedia PDF Downloads 417140 The Effect of Supply Chain Integration on Information Sharing
Authors: Khlif Hamadi
Abstract:
Supply chain integration has become a potentially valuable way of securing shared information and improving supply chain performance since competition is no longer between organizations but among supply chains. This research conceptualizes and develops three dimensions of supply chain integration (integration with customers, integration with suppliers, and the interorganizational integration) and tests the relationships between supply chain integration, information sharing, and supply chain performance. Furthermore, the four types of information sharing namely; information sharing with customers, information sharing with suppliers, inter-functional information sharing, and intra-organizational information sharing; and the four constructs of Supply Chain Performance represents expenses of costs, asset utilization, supply chain reliability, and supply chain flexibility and responsiveness. The theoretical and practical implications of the study, as well as directions for future research, are discussed.Keywords: supply chain integration, supply chain management, information sharing, supply chain performance
Procedia PDF Downloads 260139 A Strategic Approach for Promoting Renewable Energy Technologies in Developing Countries
Authors: Hanee Ryu
Abstract:
The supporting policies for renewable energy have been designed to deploy renewable energy technology targeting domestic market. The government encourages market creation through obligations such as FIT or RPS on an energy supplier. With these policy measures, the securing vast market needs to induce technology development. Furthermore, it is crucial that ensuring developing market can make the environment nurture the renewable energy industry. Overseas expansion to countries being in demand is essential under immature domestic market. Extending its business abroad can make the domestic company get the knowledge through learning-by-doing. Besides, operation in the countries to be rich in renewable resources such as weather conditions helps to develop proven track record required for verifying technologies. This paper figures out the factor to hamper the global market entry and build up the strategies to overcome difficulties. Survey conducted renewable energy company having overseas experiences at least once. Based on the survey we check the obstacle against exporting home goods and services. As a result, securing funds is salient fact to proceed to business. It is difficult that only private bank or investment agencies participate in the project under uncertainty which renewable energy development project bears inherently. These uncertainties need public fund such as ODA to encourage private sectors to start a business. Furthermore, international organizations such as IRENA or multilateral development banks as WBG play a role to guarantee the investment including risk insurance against uncertainty. It can also manage excavation business cooperating with developing countries and supplement inadequate government funding involved. With survey results strategies to obtain the order, the international organization places are categorized according to the type of getting a contract. This paper suggests 3 types approaching to the international organization project (going through international competitive bidding, using ODA and project financing) and specifies the role of government to support the domestic firms with running out of funds. Under renewable energy industry environment where hard to being created as a spontaneous market, government policy approach needs to motivate the actors to get into the business. It is one of the good strategies that countries with the low demand of renewable energies participate in the project international agencies order in the developing countries having abundant resources. This provides crucial guidance for the formulation of renewable energy development policy and planning with consideration of business opportunities and funding.Keywords: exporting strategies, multilateral development banks, promoting in developing countries, renewable energy technologies
Procedia PDF Downloads 518138 How to Applicate Knowledge Management in Security Environment within the Scope of Optimum Balance Model
Authors: Hakan Erol, Altan Elibol, Ömer Eryılmaz, Mehmet Şimşek
Abstract:
Organizations aim to manage information in a most possible effective way for sustainment and development. In doing so, they apply various procedures and methods. The very same situation is valid for each service of Armed Forces. During long-lasting endeavors such as shaping and maintaining security environment, supporting and securing peace, knowledge management is a crucial asset. Optimum Balance Model aims to promote the system from a decisive point to a higher decisive point. In this context, this paper analyses the application of optimum balance model to knowledge management in Armed Forces and tries to find answer to the question how Optimum Balance Model is integrated in knowledge management.Keywords: optimum balance model, knowledge management, security environment, supporting peace
Procedia PDF Downloads 397137 Developed Text-Independent Speaker Verification System
Authors: Mohammed Arif, Abdessalam Kifouche
Abstract:
Speech is a very convenient way of communication between people and machines. It conveys information about the identity of the talker. Since speaker recognition technology is increasingly securing our everyday lives, the objective of this paper is to develop two automatic text-independent speaker verification systems (TI SV) using low-level spectral features and machine learning methods. (i) The first system is based on a support vector machine (SVM), which was widely used in voice signal processing with the aim of speaker recognition involving verifying the identity of the speaker based on its voice characteristics, and (ii) the second is based on Gaussian Mixture Model (GMM) and Universal Background Model (UBM) to combine different functions from different resources to implement the SVM based.Keywords: speaker verification, text-independent, support vector machine, Gaussian mixture model, cepstral analysis
Procedia PDF Downloads 58136 Volarization of Sugarcane Bagasse: The Effect of Alkali Concentration, Soaking Time and Temperature on Fibre Yield
Authors: Tamrat Tesfaye, Tilahun Seyoum, K. Shabaridharan
Abstract:
The objective of this paper was to determine the effect of NaOH concentration, soaking time, soaking temperature and their interaction on percentage yield of fibre extract using Response Surface Methodology (RSM). A Box-Behnken design was employed to optimize the extraction process of cellulosic fibre from sugar cane by-product bagasse using low alkaline extraction technique. The quadratic model with the optimal technological conditions resulted in a maximum fibre yield of 56.80% at 0.55N NaOH concentration, 4 h steeping time and 60ᵒC soaking temperature. Among the independent variables concentration was found to be the most significant (P < 0.005) variable and the interaction effect of concentration and soaking time leads to securing the optimized processes.Keywords: sugarcane bagasse, low alkaline, Box-Behnken, fibre
Procedia PDF Downloads 246135 Analysis on Cyber Threat Actors Targeting Automated Border Security Systems
Authors: Mirko Sailio
Abstract:
Border crossing automatization reduces required human resources in handling people crossing borders. As technology replaces and augments the work done by border officers, new cyber threats arise to threaten border security. This research analyses the current cyber threat actors and their capabilities. The analysis is conducted by gathering the threat actor data from a wide range of public sources. A model for a general border automatization system is presented, and its most significant cyber-security attributes are then compared to threat actor activity and capabilities in order to predict priorities in securing such systems. Organized crime and nation-state actors present the clearest threat to border cyber-security, and additional focus is given to their motivations and activities.Keywords: border automation, cyber-security, threat actors, border cyber-security
Procedia PDF Downloads 203134 Survey on Securing the Optimized Link State Routing (OLSR) Protocol in Mobile Ad-hoc Network
Authors: Kimaya Subhash Gaikwad, S. B. Waykar
Abstract:
The mobile ad-hoc network (MANET) is collection of various types of nodes. In MANET various protocols are used for communication. In OLSR protocol, a node is selected as multipoint relay (MPR) node which broadcast the messages. As the MANET is open kind of network any malicious node can easily enter into the network and affect the performance of the network. The performance of network mainly depends on the components which are taking part into the communication. If the proper nodes are not selected for the communication then the probability of network being attacked is more. Therefore, it is important to select the more reliable and secure components in the network. MANET does not have any filtering so that only selected nodes can be used for communication. The openness of the MANET makes it easier to attack the communication. The most of the attack are on the Quality of service (QoS) of the network. This paper gives the overview of the various attacks that are possible on OLSR protocol and some solutions. The papers focus mainly on the OLSR protocol.Keywords: communication, MANET, OLSR, QoS
Procedia PDF Downloads 450133 Securing Land Rights for Food Security in Africa: An Appraisal of Links Between Smallholders’ Land Rights and the Right to Adequate Food in Ethiopia
Authors: Husen Ahmed Tura
Abstract:
There are strong links between secure land rights and food security in Africa. However, as land is owned by governments, land users do not have adequate legislative protection. This article explores normative and implementation gaps in relation to small-scale farmers’ land rights under the Ethiopia’s law. It finds that the law facilitates eviction of small-scale farmers and indigenous peoples from their land without adequate alternative means of livelihood. It argues that as access to land and other natural resources is strongly linked to the right to adequate food, Ethiopia should reform its land laws in the light of its legal obligations under international human rights law to respect, protect and fulfill the right to adequate food and ensure freedom from hunger.Keywords: smallholder, secure land rights , food security, right to food, land grabbing, forced evictions
Procedia PDF Downloads 308132 Singularization: A Technique for Protecting Neural Networks
Authors: Robert Poenaru, Mihail Pleşa
Abstract:
In this work, a solution that addresses the protection of pre-trained neural networks is developed: Singularization. This method involves applying permutations to the weight matrices of a pre-trained model, introducing a form of structured noise that obscures the original model’s architecture. These permutations make it difficult for an attacker to reconstruct the original model, even if the permuted weights are obtained. Experimental benchmarks indicate that the application of singularization has a profound impact on model performance, often degrading it to the point where retraining from scratch becomes necessary to recover functionality, which is particularly effective for securing intellectual property in neural networks. Moreover, unlike other approaches, singularization is lightweight and computationally efficient, which makes it well suited for resource-constrained environments. Our experiments also demonstrate that this technique performs efficiently in various image classification tasks, highlighting its broad applicability and practicality in real-world scenarios.Keywords: machine learning, ANE, CNN, security
Procedia PDF Downloads 14131 Preserving Egypt's Cultural Heritage Amidst Urban Development: A Case Study of the Historic Cairo Cemetery
Authors: Ali Mahfouz
Abstract:
Egypt's cultural heritage and artistic riches find themselves at a complex intersection of preservation and urban development, where they face intricate challenges exacerbated by climate change, pollution, urbanization, and construction activities. In this research, it delves into the multifaceted dynamics involved in conserving Egypt's heritage within urban contexts, spotlighting the historic Cairo cemetery as a poignant and timely case study. The historic Cairo cemetery serves as a repository of priceless cultural assets, housing the final resting places of public figures, artists, historians, politicians, and other luminaries. These graves are adorned with magnificent artworks and rare tombstones, collectively representing an irreplaceable slice of Egypt's history and culture. Yet, the looming threat of demolition to make way for new infrastructure projects underscores the delicate equilibrium that preservation efforts must maintain in the face of urban development pressures. This paper illuminates the collaborative efforts of historians, intellectuals, and civil society organizations who are determined to forestall the destruction of this invaluable cultural heritage. Their initiatives, driven by a shared commitment to documenting and safeguarding the cemetery's treasures, underscore the urgent imperative of protecting Egypt's cultural legacy. Through this case study, It gain insights into how Egypt navigates the challenges of preserving its rich heritage amidst urban expansion and a changing climate, emphasizing the broader importance of heritage conservation in an evolving world.Keywords: Egypt’s cultural heritage, urban development, historic Cairo cemetery, tombstone artworks, demolition threat, heritage conservation, civil society initiatives
Procedia PDF Downloads 80130 Balancing Rule of Law, Human Rights and Governance
Authors: Torkan Jabbariraad
Abstract:
This study explores the role of private regulation as a mode of governance that engages non-state actors in establishing and implementing rules or standards for public goods or services. It examines the various forms, functions, and effects of private regulation on the rule of law and human rights and considers the role and duties of public authorities in monitoring and supporting private regulation. It contends that private regulation should be regarded as a beneficial supplement to public regulation rather than a substitute or rival and that public authorities should find a balance between acknowledging the independence and variety of private actors and securing their accountability and legitimacy. It also recommends that applying the principles and values of good governance to private regulation can improve its quality and efficiency. The study relies on various sources and viewpoints from the literature on governance theory, public law, and human rights and suggests further research and discussion on the topic of private regulation and its consequences for society.Keywords: private regulation, public authority, governance theory, rule of law, human rights
Procedia PDF Downloads 40129 Threat Analysis: A Technical Review on Risk Assessment and Management of National Testing Service (NTS)
Authors: Beenish Urooj, Ubaid Ullah, Sidra Riasat
Abstract:
National Testing Service-Pakistan (NTS) is an agency in Pakistan that conducts student success appraisal examinations. In this research paper, we must present a security model for the NTS organization. The security model will depict certain security countermeasures for a better defense against certain types of breaches and system malware. We will provide a security roadmap, which will help the company to execute its further goals to maintain security standards and policies. We also covered multiple aspects in securing the environment of the organization. We introduced the processes, architecture, data classification, auditing approaches, survey responses, data handling, and also training and awareness of risk for the company. The primary contribution is the Risk Survey, based on the maturity model meant to assess and examine employee training and knowledge of risks in the company's activities.Keywords: NTS, risk assessment, threat factors, security, services
Procedia PDF Downloads 70128 An Analytical Study on the Vibration Reduction Method of Railway Station Using TPU
Authors: Jinho Hur, Minjung Shin, Heekyu Kim
Abstract:
In many places, new railway constructions in the city are being used to build a viaduct station to take advantage of the space below the line, for difficulty of securing railway site and disconnections of areas. The space under the viaduct has limited to use by noise and vibration. In order to use it for various purposes, reducing noise and vibration is required. The vibration reduction method for new structures is recently developed enough to use as accommodation, but the reduction method for existing structures is still far-off. In this study, it suggests vibration reduction method by filling vibration reduction material to column members which is path of structure-bone-noise from trains run. Because most of railroad stations are reinforced concrete structures. It compares vibration reduction of station applied the method and original station by FEM analysis. As a result, reduction of vibration acceleration level in bandwidth 15~30Hz can be reduced. Therefore, using this method for viaduct railroad station, vibration of station is expected to be reduced.Keywords: structure borne noise, TPU, viaduct rail station, vibration reduction method
Procedia PDF Downloads 542127 Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape
Authors: Sandesh Achar
Abstract:
Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, including identity and access management, data at rest and in transit, egress and ingress traffic control, vulnerability and threat management, and auditing. This paper explores each of these aspects of cloud security in detail and provides recommendations for best practices for multi-cloud service providers. It also discusses the challenges inherent in securing a multi-cloud environment and offers solutions for overcoming these challenges. By the end of this paper, readers should have a good understanding of the various security concerns associated with multi-cloud environments in the context of today’s modern cyber threats and how to address them.Keywords: multi-cloud service, system organization control, data loss prevention, identity and access management
Procedia PDF Downloads 98126 Trends in Arabic Drama Series (Musalsalat) Production
Authors: Paradigm Shift
Abstract:
In an overwhelmingly import oriented content bazaar of Arabian TV industry, Musalsalat stand unique in their indigenousness and mass popularity, being rivalled only by movies and football. The Arabic term ‘Musalsalat’ stands for drama series with episodes of 30-45 minutes duration; the format being close to Latin American Telenovela concept-clear cut stories with definitive endings that permit narrative closures. Traditionally Musalsalat were either situational comedies or religiously inspired. Present-day productions have started addressing historical, creative and socially progressive issues targeting the young and well-travelled audiences. Though these soaps get prime ratings throughout the year, it is during Ramadan, that they become a raving success in securing viewership. That Musalsalat have become paramount Ramadan programming is evident by their dominance on the grid and attracting heavy ad-spend. The number of Musalsalats produced specifically for Ramadan reached over 100 last year with Ramadan TV advertising amounting to USD1, 947bn constituting 21% of the total regional TV Adspend of USD 9,189bn.Keywords: Musalsalat, drama, pan Arab, television
Procedia PDF Downloads 282125 A Smart Visitors’ Notification System with Automatic Secure Door Lock Using Mobile Communication Technology
Authors: Rabail Shafique Satti, Sidra Ejaz, Madiha Arshad, Marwa Khalid, Sadia Majeed
Abstract:
The paper presents the development of an automated security system to automate the entry of visitors, providing more flexibility of managing their record and securing homes or workplaces. Face recognition is part of this system to authenticate the visitors. A cost effective and SMS based door security module has been developed and integrated with the GSM network and made part of this system to allow communication between system and owner. This system functions in real time as when the visitor’s arrived it will detect and recognizes his face and on the result of face recognition process it will open the door for authorized visitors or notifies and allows the owner’s to take further action in case of unauthorized visitor. The proposed system is developed and it is successfully ensuring security, managing records and operating gate without physical interaction of owner.Keywords: SMS, e-mail, GSM modem, authenticate, face recognition, authorized
Procedia PDF Downloads 788124 Investigating the Factors Affecting on One Time Passwords Technology Acceptance: A Case Study in Banking Environment
Authors: Sajad Shokohuyar, Mahsa Zomorrodi Anbaji, Saghar Pouyan Shad
Abstract:
According to fast technology growth, modern banking tries to decrease going to banks’ branches and increase customers’ consent. One of the problems which banks face is securing customer’s password. The banks’ solution is one time password creation system. In this research by adapting from acceptance of technology model theory, assesses factors that are effective on banking in Iran especially in using one time password machine by one of the private banks of Iran customers. The statistical population is all of this bank’s customers who use electronic banking service and one time password technology and the questionnaires were distributed among members of statistical population in 5 selected groups of north, south, center, east and west of Tehran. Findings show that confidential preservation, education, ease of utilization and advertising and informing has positive relations and distinct hardware and age has negative relations.Keywords: security, electronic banking, one time password, information technology
Procedia PDF Downloads 453123 Protection towards Investor: Enforcement of the Authorities of Indonesian Financial Services Authority (OJK) during Capital Market Integration
Authors: Muhammad Ilham Agus Salim, Muhammad Ikbal
Abstract:
The ASEAN Economic Community (AEC) was set up in 2003 with the objectives of creating a single market and production base, enhancing equitable economic development as well as facilitating the integration into the global economy. The AEC involves liberalization and facilitation of trade in goods, skilled labour, services, and investment, as well as protection and promotion of investment. The thesis outlines the AEC Blueprint actions in scope of globalization of investment and capital market. Free flows of investment and freer flows of capital market urge countries in South East Asia to coordinate and to collaborate in securing the interest of public, and this leads to the importance of financial services authorities in ASEAN to prepare the mechanism of guarding the flows of investment. There is no exception, especially for Indonesian Financial Services Authority (OJK) as one of the authorized body in capital market supervision, to enforce its authorities as supervisory body.Keywords: AEC blueprint, OJK, capital market, integration
Procedia PDF Downloads 312122 BigCrypt: A Probable Approach of Big Data Encryption to Protect Personal and Business Privacy
Authors: Abdullah Al Mamun, Talal Alkharobi
Abstract:
As data size is growing up, people are became more familiar to store big amount of secret information into cloud storage. Companies are always required to need transfer massive business files from one end to another. We are going to lose privacy if we transmit it as it is and continuing same scenario repeatedly without securing the communication mechanism means proper encryption. Although asymmetric key encryption solves the main problem of symmetric key encryption but it can only encrypt limited size of data which is inapplicable for large data encryption. In this paper we propose a probable approach of pretty good privacy for encrypt big data using both symmetric and asymmetric keys. Our goal is to achieve encrypt huge collection information and transmit it through a secure communication channel for committing the business and personal privacy. To justify our method an experimental dataset from three different platform is provided. We would like to show that our approach is working for massive size of various data efficiently and reliably.Keywords: big data, cloud computing, cryptography, hadoop, public key
Procedia PDF Downloads 320121 Thermal Securing of Electrical Contacts inside Oil Power Transformers
Authors: Ioan Rusu
Abstract:
In the operation of power transformers of 110 kV/MV from substations, these are traveled by fault current resulting from MV line damage. Defect electrical contacts are heated when they are travelled from fault currents. In the case of high temperatures when 135 °C is reached, the electrical insulating oil in the vicinity of the electrical faults comes into contact with these contacts releases gases, and activates the electrical protection. To avoid auto-flammability of electro-insulating oil, we designed a security system thermal of electrical contact defects by pouring fire-resistant polyurethane foam, mastic or mortar fire inside a cardboard electro-insulating cylinder. From practical experience, in the exploitation of power transformers of 110 kV/MT in oil electro-insulating were recorded some passing disconnecting commanded by the gas protection at internal defects. In normal operation and in the optimal load, nominal currents do not require thermal secure contacts inside electrical transformers, contacts are made at the fabrication according to the projects or to repair by solder. In the case of external short circuits close to the substation, the contacts inside electrical transformers, even if they are well made in sizes of Rcontact = 10‑6 Ω, are subjected to short-circuit currents of the order of 10 kA-20 kA which lead to the dissipation of some significant second-order electric powers, 100 W-400 W, on contact. At some internal or external factors which action on electrical contacts, including electrodynamic efforts at short-circuits, these factors could be degraded over time to values in the range of 10-4 Ω to 10-5 Ω and if the action time of protection is great, on the order of seconds, power dissipation on electrical contacts achieve high values of 1,0 kW to 40,0 kW. This power leads to strong local heating, hundreds of degrees Celsius and can initiate self-ignition and burning oil in the vicinity of electro-insulating contacts with action the gas relay. Degradation of electrical contacts inside power transformers may not be limited for the duration of their operation. In order to avoid oil burn with gas release near electrical contacts, at short-circuit currents 10 kA-20 kA, we have outlined the following solutions: covering electrical contacts in fireproof materials that would avoid direct burn oil at short circuit and transmission of heat from electrical contact along the conductors with heat dissipation gradually over time, in a large volume of cooling. Flame retardant materials are: polyurethane foam, mastic, cement (concrete). In the normal condition of operation of transformer, insulating of conductors coils is with paper and insulating oil. Ignition points of its two components respectively are approximated: 135 °C heat for oil and 200 0C for paper. In the case of a faulty electrical contact, about 10-3 Ω, at short-circuit; the temperature can reach for a short time, a value of 300 °C-400 °C, which ignite the paper and also the oil. By burning oil, there are local gases that disconnect the power transformer. Securing thermal electrical contacts inside the transformer, in cardboard tube with polyurethane foams, mastik or cement, ensures avoiding gas release and also gas protection working.Keywords: power transformer, oil insulatation, electric contacts, Bucholtz relay
Procedia PDF Downloads 158120 Nonparametric Copula Approximations
Authors: Serge Provost, Yishan Zang
Abstract:
Copulas are currently utilized in finance, reliability theory, machine learning, signal processing, geodesy, hydrology and biostatistics, among several other fields of scientific investigation. It follows from Sklar's theorem that the joint distribution function of a multidimensional random vector can be expressed in terms of its associated copula and marginals. Since marginal distributions can easily be determined by making use of a variety of techniques, we address the problem of securing the distribution of the copula. This will be done by using several approaches. For example, we will obtain bivariate least-squares approximations of the empirical copulas, modify the kernel density estimation technique and propose a criterion for selecting appropriate bandwidths, differentiate linearized empirical copulas, secure Bernstein polynomial approximations of suitable degrees, and apply a corollary to Sklar's result. Illustrative examples involving actual observations will be presented. The proposed methodologies will as well be applied to a sample generated from a known copula distribution in order to validate their effectiveness.Keywords: copulas, Bernstein polynomial approximation, least-squares polynomial approximation, kernel density estimation, density approximation
Procedia PDF Downloads 73119 Risk Tolerance and Individual Worthiness Based on Simultaneous Analysis of the Cognitive Performance and Emotional Response to a Multivariate Situational Risk Assessment
Authors: Frederic Jumelle, Kelvin So, Didan Deng
Abstract:
A method and system for neuropsychological performance test, comprising a mobile terminal, used to interact with a cloud server which stores user information and is logged into by the user through the terminal device; the user information is directly accessed through the terminal device and is processed by artificial neural network, and the user information comprises user facial emotions information, performance test answers information and user chronometrics. This assessment is used to evaluate the cognitive performance and emotional response of the subject to a series of dichotomous questions describing various situations of daily life and challenging the users' knowledge, values, ethics, and principles. In industrial applications, the timing of this assessment will depend on the users' need to obtain a service from a provider, such as opening a bank account, getting a mortgage or an insurance policy, authenticating clearance at work, or securing online payments.Keywords: artificial intelligence, neurofinance, neuropsychology, risk management
Procedia PDF Downloads 138118 An Industrial Scada System Remote Control Using Mobile Phones
Authors: Ahmidah Elgali
Abstract:
SCADA is the abbreviation for "Administrative Control And Data Acquisition." SCADA frameworks are generally utilized in industry for administrative control and information securing of modern cycles. Regular SCADA frameworks use PC, journal, slim client, and PDA as a client. In this paper, a Java-empowered cell phone has been utilized as a client in an example SCADA application to show and regulate the place of an example model crane. The paper presents a genuine execution of the online controlling of the model crane through a cell phone. The remote correspondence between the cell phone and the SCADA server is performed through a base station by means of general parcel radio assistance GPRS and remote application convention WAP. This application can be used in industrial sites in areas that are likely to be exposed to a security emergency (like terrorist attacks) which causes the sudden exit of the operators; however, no time to perform the shutdown procedures for the plant. Hence this application allows shutting down units and equipment remotely by mobile and so avoids damage and losses.Keywords: control, industrial, mobile, network, remote, SCADA
Procedia PDF Downloads 77117 Select-Low and Select-High Methods for the Wheeled Robot Dynamic States Control
Authors: Bogusław Schreyer
Abstract:
The paper enquires on the two methods of the wheeled robot braking torque control. Those two methods are applied when the adhesion coefficient under left side wheels is different from the adhesion coefficient under the right side wheels. In case of the select-low (SL) method the braking torque on both wheels is controlled by the signals originating from the wheels on the side of the lower adhesion. In the select-high (SH) method the torque is controlled by the signals originating from the wheels on the side of the higher adhesion. The SL method is securing stable and secure robot behaviors during the braking process. However, the efficiency of this method is relatively low. The SH method is more efficient in terms of time and braking distance but in some situations may cause wheels blocking. It is important to monitor the velocity of all wheels and then take a decision about the braking torque distribution accordingly. In case of the SH method the braking torque slope may require significant decrease in order to avoid wheel blocking.Keywords: select-high, select-low, torque distribution, wheeled robots
Procedia PDF Downloads 119116 Securing Health Monitoring in Internet of Things with Blockchain-Based Proxy Re-Encryption
Authors: Jerlin George, R. Chitra
Abstract:
The devices with sensors that can monitor your temperature, heart rate, and other vital signs and link to the internet, known as the Internet of Things (IoT), have completely transformed the way we control health. Providing real-time health data, these sensors improve diagnostics and treatment outcomes. Security and privacy matters when IoT comes into play in healthcare. Cyberattacks on centralized database systems are also a problem. To solve these challenges, the study uses blockchain technology coupled with proxy re-encryption to secure health data. ThingSpeak IoT cloud analyzes the collected data and turns them into blockchain transactions which are safely kept on the DriveHQ cloud. Transparency and data integrity are ensured by blockchain, and secure data sharing among authorized users is made possible by proxy re-encryption. This results in a health monitoring system that preserves the accuracy and confidentiality of data while reducing the safety risks of IoT-driven healthcare applications.Keywords: internet of things, healthcare, sensors, electronic health records, blockchain, proxy re-encryption, data privacy, data security
Procedia PDF Downloads 15115 A Hybrid Model for Secure Protocol Independent Multicast Sparse Mode and Dense Mode Protocols in a Group Network
Authors: M. S. Jimah, A. C. Achuenu, M. Momodu
Abstract:
Group communications over public infrastructure are prone to a lot of security issues. Existing network protocols like Protocol Independent Multicast Sparse Mode (PIM SM) and Protocol Independent Multicast Dense Mode (PIM DM) do not have inbuilt security features. Therefore, any user or node can easily access the group communication as long as the user can send join message to the source nodes, the source node then adds the user to the network group. In this research, a hybrid method of salting and hashing to encrypt information in the source and stub node was designed, and when stub nodes need to connect, they must have the appropriate key to join the group network. Object oriented analysis design (OOAD) was the methodology used, and the result shows that no extra controlled bandwidth overhead cost was added by encrypting and the hybrid model was more securing than the existing PIM SM, PIM DM and Zhang secure PIM SM.Keywords: group communications, multicast, PIM SM, PIM DM, encryption
Procedia PDF Downloads 162114 Securing Internet of Things Devices in Healthcare industry: An Investigation into Efficient and Effective Authorization Procedures
Authors: Maruf Farhan, Abdul Salih, Sikandar Ali Tahir
Abstract:
Protecting patient information's confidentiality is paramount considering the widespread use of Internet of Things (IoT) gadgets in medical settings. This study's subjects are decentralized identifiers (DIDs) and verifiable credentials (VCs) in conjunction with an OAuth-based authorization framework, as they are the key to protecting IoT healthcare devices. DIDs enable autonomous authentication and trust formation between IoT devices and other entities. To authorize users and enforce access controls based on verified claims, VCs offer a secure and adaptable solution. Through the proposed method, medical facilities can improve the privacy and security of their IoT devices while streamlining access control administration. A Smart pill dispenser in a hospital setting is used to illustrate the advantages of this method. The findings demonstrate the value of DIDs, VCs, and OAuth-based delegation in protecting the IoT devices. Improved processes for authorizing and controlling access to IoT devices are possible thanks to the research findings, which also help ensure patient confidentiality in the healthcare sector.Keywords: Iot, DID, authorization, verifiable credentials
Procedia PDF Downloads 76113 Type–2 Fuzzy Programming for Optimizing the Heat Rate of an Industrial Gas Turbine via Absorption Chiller Technology
Authors: T. Ganesan, M. S. Aris, I. Elamvazuthi, Momen Kamal Tageldeen
Abstract:
Terms set in power purchase agreements (PPA) challenge power utility companies in balancing between the returns (from maximizing power production) and securing long term supply contracts at capped production. The production limitation set in the PPA has driven efforts to maximize profits through efficient and economic power production. In this paper, a combined industrial-scale gas turbine (GT) - absorption chiller (AC) system is considered to cool the GT air intake for reducing the plant’s heat rate (HR). This GT-AC system is optimized while considering power output limitations imposed by the PPA. In addition, the proposed formulation accounts for uncertainties in the ambient temperature using Type-2 fuzzy programming. Using the enhanced chaotic differential evolution (CEDE), the Pareto frontier was constructed and the optimization results are analyzed in detail.Keywords: absorption chillers (AC), turbine inlet air cooling (TIC), power purchase agreement (PPA), multiobjective optimization, type-2 fuzzy programming, chaotic differential evolution (CDDE)
Procedia PDF Downloads 310112 Departures from Anatolian Seljuk Building Complex with Iwan/Eyvan: The Tradition of Iwan Tombs
Authors: Mehmet Uysal, Yavuz Arat, Uğur Tuztaşı
Abstract:
As man constructed the spaces that he lived in he also designed spaces where their dead will stay according to their belief systems. These spaces are sometimes monumentalized by the means of a stone on the top of a mountain, sometimes signed by totems and sometimes became structures to protect graves and symbolize the person or make him unforgettable. Various grave monuments have been constructed from the earliest primitive societies to developed societies. Every belief system built structures for itself; Pyramids for pharaohs, grave monuments for kings and emperors, temples and tombs for important men of religion. These spaces are also architectural works like a school or a dwelling and have importance in history of architecture. After Turks embraced Islamism, examples of very beautiful tombs are built in Middle Asia during the Seljuk Period. By the time Seljuks came to Anatolia they built important tombs having peerless architectural characteristics firstly around Ahlat. After Anatolia Seljuks made Konya the capital city and Konya became administrative, cultural and scientific center, very important tombs were built in Konya. Different from the local tomb architecture, the architecture of tombs with half-open “eyvan/Iwan” is significant. Although iwan buildings is vastly used in Anatolian civil architecture and monumental buildings its best exmaples are observed in 13th century Medrese buildings. The iwan tomb tradition which was observed during the time period when this building typology was shaped and departed from the resident tradition in the form of iwan tombs are rarely represented. However, similar tombs were build in resemblance to this tradition. This study provides information on samples of iwan tombs (Gömeç Hatun Tomb, Emir Yavaştagel Tomb, and Beşparmak Tomb) and evaluates the departures from iwan building complexes in view of architectural language. This paper also gives information about iwan tombs among tombs having importance in Islamic Architectural Heritage.Keywords: Seljuk Building Complex, Eyvan/Iwan, Anatolia, Islamic Architectural Heritage, tomb
Procedia PDF Downloads 404