Search results for: location privacy
2057 Utilizing Federated Learning for Accurate Prediction of COVID-19 from CT Scan Images
Authors: Jinil Patel, Sarthak Patel, Sarthak Thakkar, Deepti Saraswat
Abstract:
Recently, the COVID-19 outbreak has spread across the world, leading the World Health Organization to classify it as a global pandemic. To save the patient’s life, the COVID-19 symptoms have to be identified. But using an AI (Artificial Intelligence) model to identify COVID-19 symptoms within the allotted time was challenging. The RT-PCR test was found to be inadequate in determining the COVID status of a patient. To determine if the patient has COVID-19 or not, a Computed Tomography Scan (CT scan) of patient is a better alternative. It will be challenging to compile and store all the data from various hospitals on the server, though. Federated learning, therefore, aids in resolving this problem. Certain deep learning models help to classify Covid-19. This paper will have detailed work of certain deep learning models like VGG19, ResNet50, MobileNEtv2, and Deep Learning Aggregation (DLA) along with maintaining privacy with encryption.Keywords: federated learning, COVID-19, CT-scan, homomorphic encryption, ResNet50, VGG-19, MobileNetv2, DLA
Procedia PDF Downloads 732056 Passive Vibration Isolation Analysis and Optimization for Mechanical Systems
Authors: Ozan Yavuz Baytemir, Ender Cigeroglu, Gokhan Osman Ozgen
Abstract:
Vibration is an important issue in the design of various components of aerospace, marine and vehicular applications. In order not to lose the components’ function and operational performance, vibration isolation design involving the optimum isolator properties selection and isolator positioning processes appear to be a critical study. Knowing the growing need for the vibration isolation system design, this paper aims to present two types of software capable of implementing modal analysis, response analysis for both random and harmonic types of excitations, static deflection analysis, Monte Carlo simulations in addition to study of parameter and location optimization for different types of isolation problem scenarios. Investigating the literature, there is no such study developing a software-based tool that is capable of implementing all those analysis, simulation and optimization studies in one platform simultaneously. In this paper, the theoretical system model is generated for a 6-DOF rigid body. The vibration isolation system of any mechanical structure is able to be optimized using hybrid method involving both global search and gradient-based methods. Defining the optimization design variables, different types of optimization scenarios are listed in detail. Being aware of the need for a user friendly vibration isolation problem solver, two types of graphical user interfaces (GUIs) are prepared and verified using a commercial finite element analysis program, Ansys Workbench 14.0. Using the analysis and optimization capabilities of those GUIs, a real application used in an air-platform is also presented as a case study at the end of the paper.Keywords: hybrid optimization, Monte Carlo simulation, multi-degree-of-freedom system, parameter optimization, location optimization, passive vibration isolation analysis
Procedia PDF Downloads 5652055 Review Paper on an Algorithm Enhancing Privacy and Security in Online Meeting Platforms Using a Secured Encryption
Authors: Tonderai Muchenje, Mkhatshwa Phethile
Abstract:
Humans living in this current situation know that communication with one another is necessary for themselves. There are many ways to communicate with each other; during unexpected natural disasters and outbreak of epidemics and pandemics, the need for online meeting platforms are considered most important. Apparently, the development in the telecommunication sector also played an important role. Therefore, the epidemic of the Covid-19 Pandemic and the new normal situation resulted in the overwhelming production of online meeting platforms to prevent the situation. This software is commonly used in business communications in the beginning. Rapidly the COVID-19 pandemic changed the situation. At present-day, these virtual meeting applications are not only used to have informal meetings with friends and relatives but also to be used to have formal meetings in the business and education (universities) sector. In this article, an attempt has been made to list out the useful secured ways for using online meeting platforms.Keywords: virtual background, zoom, secure online algorithm, RingCentral, Pexip Pexip, TeamViewer, microsoft teams
Procedia PDF Downloads 1152054 Critical Review of Web Content Mining Extraction Mechanisms
Authors: Rabia Bashir, Sajjad Akbar
Abstract:
There is an inevitable demand of web mining due to rapid increase of huge information on the Internet, but the striking variety of web structures has made required content retrieval a difficult task. To counter this issue, Web Content Mining (WCM) emerges as a potential candidate which extracts and integrates suitable resources of data to users. In past few years, research has been done on several extraction techniques for WCM i.e. agent-based, template-based, assumption-based, statistic-based, wrapper-based and machine learning. However, it is still unclear that either these approaches are efficiently tackling the significant challenges of WCM or not. To answer this question, this paper identifies these challenges such as language independency, structure flexibility, performance, automation, dynamicity, redundancy handling, intelligence, relevant content retrieval, and privacy. Further, mapping of these challenges is done with existing extraction mechanisms which helps to adopt the most suitable WCM approach, given some conditions and characteristics at hand.Keywords: content mining challenges, web content mining, web content extraction approaches, web information retrieval
Procedia PDF Downloads 5482053 Geographic Information System Application for Predicting Tourism Development in Gunungkidul Regency, Indonesia
Authors: Nindyo Cahyo Kresnanto, Muhamad Willdan, Wika Harisa Putri
Abstract:
Gunungkidul is one of the emerging tourism industry areas in Yogyakarta Province, Indonesia. This article describes how GIS can predict the development of tourism potential in Gunungkidul. The tourism sector in Gunungkidul Regency contributes 3.34% of the total gross regional domestic product and is the economic sector with the highest growth with a percentage of 18.37% in the post-Covid-19 period. This contribution makes researchers consider that several tourist sites need to be explored more to increase regional economic development gradually. This research starts by collecting spatial data from tourist locations tourists want to visit in Gunungkidul Regency based on survey data from 571 respondents. Then the data is visualized with ArcGIS software. This research shows an overview of tourist destinations interested in travellers depicted from the lowest to the highest from the data visualization. Based on the data visualization results, specific tourist locations potentially developed to influence the surrounding economy positively. The visualization of the data displayed is also in the form of a desire line map that shows tourist travel patterns from the origin of the tourist to the destination of the tourist location of interest. From the desire line, the prediction of the path of tourist sites with a high frequency of transportation activity can figure out. Predictions regarding specific tourist location routes that high transportation activities can burden can consider which routes will be chosen. The route also needs to be improved in terms of capacity and quality. The goal is to provide a sense of security and comfort for tourists who drive and positively impact the tourist sites traversed by the route.Keywords: tourism development, GIS and survey, transportation, potential desire line
Procedia PDF Downloads 662052 Efficient Internal Generator Based on Random Selection of an Elliptic Curve
Authors: Mustapha Benssalah, Mustapha Djeddou, Karim Drouiche
Abstract:
The random number generation (RNG) presents a significant importance for the security and the privacy of numerous applications, such as RFID technology and smart cards. Since, the quality of the generated bit sequences is paramount that a weak internal generator for example, can directly cause the entire application to be insecure, and thus it makes no sense to employ strong algorithms for the application. In this paper, we propose a new pseudo random number generator (PRNG), suitable for cryptosystems ECC-based, constructed by randomly selecting points from several elliptic curves randomly selected. The main contribution of this work is the increasing of the generator internal states by extending the set of its output realizations to several curves auto-selected. The quality and the statistical characteristics of the proposed PRNG are validated using the Chi-square goodness of fit test and the empirical Special Publication 800-22 statistical test suite issued by NIST.Keywords: PRNG, security, cryptosystem, ECC
Procedia PDF Downloads 4442051 Effect of Land Use on Soil Organic Carbon Stock and Aggregate Dynamics of Degraded Ultisol in Nsukka, Southeastern Nigeria
Authors: Chukwuebuka Vincent Azuka, Chidimma Peace Odoh
Abstract:
Changes in agricultural practices and land use influence the storage and release of soil organic carbon and soil structural dynamics. To investigate this in Nsukka, southeastern Nigeria, soil samples were collected at 0-10 cm, 10-20 cm and 20-30 cm from three locations; Ovoko (OV), Obukpa (OB) and University of Nigeria, Nsukka (UNN) and three land use types; cultivated land (CL), forest land (FL) and grassland (GL)). Data were subjected to analysis of variance (ANOVA) using SPSS. Also, correlations between organic carbon stock, structural stability indices and other soil properties were established. The result showed that Ksat was significantly (p < 0.05) influenced by location with mean values of 68 cmhr⁻¹,121.63 cmhr⁻¹, 8.42 cmhr⁻¹ in OV, OB and UNN respectively. The MWD and aggregate stability (AS) were significantly (p < 0.05) influenced by land use and depth. The mean values of MWD are 0.85 (CL), 1.35 (FL) and 1.45 (GL), and 1.66 at 0-10 cm, 1.08 at 10-20 cm and 0.88 mm at 20-30 cm. The mean values of AS are; 27.66% (CL), 46.39% (FL) and 49.81% (GL), and 53.96% at 0-10cm, 40.22% at 10-20cm and 29.57% at 20-30cm. Clay flocculation (CFI) and dispersion indices (CDI) differed significantly (p < 0.05) among the land use. Soil pH differed significantly (p < 0.05) across the land use and locations with mean values ranging from 3.90-6.14. Soil organic carbon (SOC) significantly (p < 0.05) differed across locations and depths. SOC decreases as depth increases depth with mean values of 15.6 gkg⁻¹, 10.1 gkg⁻¹, and 8.6 gkg⁻¹ at 0-10 cm, 10-20 cm, and 20-30 cm respectively. SOC in the three land use was 8.8 g kg-1, 15.2 gkg⁻¹ and 10.4 gkg⁻¹ at CL, FL, and GL respectively. The highest aggregate-associated carbon was recorded in 0.5 mm across the land use and depth except in cultivated land and at 20-30 cm which recorded their highest SOC at 1mm. SOC stock, total nitrogen (TN) and CEC were significantly (p < 0.05) different across the locations with highest values of 23.43 t/ha, 0.07g/kg and 14.27 Cmol/kg respectively recorded in UNN. SOC stock was significantly (p < 0.05) influenced by depth as follows; 0-10>10-20>20-30 cm. TN was low with mean values ranging from 0.03-0.07 across the locations, land use and depths. The mean values of CEC ranged from 9.96-14.27 Cmol kg⁻¹ across the locations and land use. SOC stock showed correlation with silt, coarse sand, N and CEC (r = 0.40*, -0.39*, -0.65** and 0.64** respectively. AS showed correlation with BD, Ksat, pH in water and KCl, and SOC (r = -0.42*, 0.54**, -0.44*, -0.45* and 0.49** respectively. Thus, land use and location play a significant role in sustainable management of soil resources.Keywords: agricultural practices, structural dynamics, sequestration, soil resources, management
Procedia PDF Downloads 1452050 Secure Intelligent Information Management by Using a Framework of Virtual Phones-On Cloud Computation
Authors: Mohammad Hadi Khorashadi Zadeh
Abstract:
Many new applications and internet services have been emerged since the innovation of mobile networks and devices. However, these applications have problems of security, management, and performance in business environments. Cloud systems provide information transfer, management facilities, and security for virtual environments. Therefore, an innovative internet service and a business model are proposed in the present study for creating a secure and consolidated environment for managing the mobile information of organizations based on cloud virtual phones (CVP) infrastructures. Using this method, users can run Android and web applications in the cloud which enhance performance by connecting to other CVP users and increases privacy. It is possible to combine the CVP with distributed protocols and central control which mimics the behavior of human societies. This mix helps in dealing with sensitive data in mobile devices and facilitates data management with less application overhead.Keywords: BYOD, mobile cloud computing, mobile security, information management
Procedia PDF Downloads 3172049 Roundabout Implementation Analyses Based on Traffic Microsimulation Model
Authors: Sanja Šurdonja, Aleksandra Deluka-Tibljaš, Mirna Klobučar, Irena Ištoka Otković
Abstract:
Roundabouts are a common choice in the case of reconstruction of an intersection, whether it is to improve the capacity of the intersection or traffic safety, especially in urban conditions. The regulation for the design of roundabouts is often related to driving culture, the tradition of using this type of intersection, etc. Individual values in the regulation are usually recommended in a wide range (this is the case in Croatian regulation), and the final design of a roundabout largely depends on the designer's experience and his/her choice of design elements. Therefore, before-after analyses are a good way to monitor the performance of roundabouts and possibly improve the recommendations of the regulation. This paper presents a comprehensive before-after analysis of a roundabout on the country road network near Rijeka, Croatia. The analysis is based on a thorough collection of traffic data (operating speeds and traffic load) and design elements data, both before and after the reconstruction into a roundabout. At the chosen location, the roundabout solution aimed to improve capacity and traffic safety. Therefore, the paper analyzed the collected data to see if the roundabout achieved the expected effect. A traffic microsimulation model (VISSIM) of the roundabout was created based on the real collected data, and the influence of the increase of traffic load and different traffic structures, as well as of the selected design elements on the capacity of the roundabout, were analyzed. Also, through the analysis of operating speeds and potential conflicts by application of the Surrogate Safety Assessment Model (SSAM), the traffic safety effect of the roundabout was analyzed. The results of this research show the practical value of before-after analysis as an indicator of roundabout effectiveness at a specific location. The application of a microsimulation model provides a practical method for analyzing intersection functionality from a capacity and safety perspective in present and changed traffic and design conditions.Keywords: before-after analysis, operating speed, capacity, design.
Procedia PDF Downloads 222048 Prevalence of Over-Schooling Preschoolers as Perceived by Teachers in Kwara Central, Nigeria
Authors: Rachael Ojima Agarry, Raheemat Opeyemi Omosidi
Abstract:
Over-schooling children is an abuse of the fundamental provisions of the National Policy on Education in Nigeria. The practice overburdens or places unwarranted academic demands on children, particularly preschoolers. This study was carried out to ascertain the prevalence of over-schooling preschoolers as perceived by teachers in the Kwara Central Senatorial District. One research question and two null hypotheses were formulated to guide the study. A descriptive survey design was employed. The population of the study consists of all preschool teachers in both private and public schools in Kwara Central. A validated instrument tagged “Questionnaire on Prevalence of Over-schooling of Preschoolers (QPOP)” with a reliability index of 0.76 was used for data collection. The questionnaire consists of sections A and B. Section A solicited the respondents’ demographic information, and Section B sought the prevalence of over-schooling as perceived by teachers. Data collected were analyzed using descriptive statistics of frequency and percentage. Mean and standard deviation were used to analyze the demographic information and the research question. The two research hypotheses were analyzed using a t-test and Analysis of Variance (ANCOVA) at a 0.05 level of significance. The results revealed that there is a high level of prevalence of over-schooling of preschoolers in Kwara Central. Also, there is a significant difference in teachers' perception of the prevalence of over-schooling preschoolers based on school type and school location. It was concluded that both private and public schools in Kwara Central practice over-schooling of preschoolers at a high level. Hence, it was recommended that the government, through the State and/or Federal Ministry of Education, should enact and enforce a law that would ensure children in this category spend only the stipulated time in school as well as strict adherence to the recommended curriculum contents by proprietors and teachers.Keywords: over-schooling, preschoolers, school type, school location
Procedia PDF Downloads 552047 Cloud Monitoring and Performance Optimization Ensuring High Availability and Security
Authors: Inayat Ur Rehman, Georgia Sakellari
Abstract:
Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.Keywords: cloud computing, cloud monitoring, performance optimization, high availability
Procedia PDF Downloads 652046 Review of Cyber Security in Oil and Gas Industry with Cloud Computing Perspective: Taxonomy, Issues and Future Direction
Authors: Irfan Mohiuddin, Ahmad Al Mogren
Abstract:
In recent years, cloud computing has earned substantial attention in the Oil and Gas Industry and provides services in all the phases of the industry lifecycle. Oil and gas supply infrastructure, in particular, is more vulnerable to accidental, natural and intentional threats because of its widespread distribution. Numerous surveys have been conducted on cloud security and privacy. However, to the best of our knowledge, hardly any survey is carried out that reviews cyber security in all phases with a cloud computing perspective. Moreover, a distinctive classification is performed for all the cloud-based cyber security measures based on the cloud component in use. The classification approach will enable researchers to identify the required technique used to enhance the security in specific cloud components. Also, the limitation of each component will allow the researchers to design optimal algorithms. Lastly, future directions are given to point out the imminent challenges that can pave the way for researchers to further enhance the resilience to cyber security threats in the oil and gas industry.Keywords: cyber security, cloud computing, safety and security, oil and gas industry, security threats, oil and gas pipelines
Procedia PDF Downloads 1432045 A Post-Occupancy Evaluation of the Impact of Indoor Environmental Quality on Health and Well-Being in Office Buildings
Authors: Suyeon Bae, Abimbola Asojo, Denise Guerin, Caren Martin
Abstract:
Post-occupancy evaluations (POEs) have been recognized for documenting occupant well-being and responses to indoor environmental quality (IEQ) factors such as thermal, lighting, and acoustic conditions. Sustainable Post-Occupancy evaluation survey (SPOES) developed by an interdisciplinary team at a Midwest University provides an evidence-based quantitative analysis of occupants’ satisfaction in office, classroom, and residential spaces to help direct attention to successful areas and areas that need improvement in buildings. SPOES is a self-administered and Internet-based questionnaire completed by building occupants. In this study, employees in three different office buildings rated their satisfaction on a Likert-type scale about 12 IEQ criteria including thermal condition, indoor air quality, acoustic quality, daylighting, electric lighting, privacy, view conditions, furnishings, appearance, cleaning and maintenance, vibration and movement, and technology. Employees rated their level of satisfaction on a Likert-type scale from 1 (very dissatisfied) to 7 (very satisfied). They also rate the influence of their physical environment on their perception of their work performance and the impact of their primary workspaces on their health on a scale from 1 (hinders) to 7 (enhances). Building A is a three-story building that includes private and group offices, classrooms, and conference rooms and amounted to 55,000 square-feet for primary workplace (N=75). Building B, a six-story building, consisted of private offices, shared enclosed office, workstations, and open desk areas for employees and amounted to 14,193 square-feet (N=75). Building C is a three-story 56,000 square-feet building that included classrooms, therapy rooms, an outdoor playground, gym, restrooms, and training rooms for clinicians (N=76). The results indicated that 10 IEQs for Building A except acoustic quality and privacy showed statistically significant correlations on the impact of the primary workspace on health. In Building B, 11 IEQs except technology showed statistically significant correlations on the impact of the primary workspace on health. Building C had statistically significant correlations between all 12 IEQ and the employees’ perception of the impact of their primary workspace on their health in two-tailed correlations (P ≤ 0.05). Out of 33 statistically significant correlations, 25 correlations (76%) showed at least moderate relationship (r ≥ 0.35). For the three buildings, daylighting, furnishings, and indoor air quality IEQs ranked highest on the impact on health. IEQs about vibration and movement, view condition, and electric lighting ranked second, followed by IEQs about cleaning and maintenance and appearance. These results imply that 12 IEQs developed in SPOES are highly related to employees’ perception of how their primary workplaces impact their health. The IEQs in this study offer an opportunity for improving occupants’ well-being and the built environment.Keywords: post-occupancy evaluation, built environment, sustainability, well-being, indoor air quality
Procedia PDF Downloads 2892044 Improving Fingerprinting-Based Localization System Using Generative AI
Authors: Getaneh Berie Tarekegn
Abstract:
A precise localization system is crucial for many artificial intelligence Internet of Things (AI-IoT) applications in the era of smart cities. Their applications include traffic monitoring, emergency alarming, environmental monitoring, location-based advertising, intelligent transportation, and smart health care. The most common method for providing continuous positioning services in outdoor environments is by using a global navigation satellite system (GNSS). Due to nonline-of-sight, multipath, and weather conditions, GNSS systems do not perform well in dense urban, urban, and suburban areas.This paper proposes a generative AI-based positioning scheme for large-scale wireless settings using fingerprinting techniques. In this article, we presented a semi-supervised deep convolutional generative adversarial network (S-DCGAN)-based radio map construction method for real-time device localization. It also employed a reliable signal fingerprint feature extraction method with t-distributed stochastic neighbor embedding (t-SNE), which extracts dominant features while eliminating noise from hybrid WLAN and long-term evolution (LTE) fingerprints. The proposed scheme reduced the workload of site surveying required to build the fingerprint database by up to 78.5% and significantly improved positioning accuracy. The results show that the average positioning error of GAILoc is less than 0.39 m, and more than 90% of the errors are less than 0.82 m. According to numerical results, SRCLoc improves positioning performance and reduces radio map construction costs significantly compared to traditional methods.Keywords: location-aware services, feature extraction technique, generative adversarial network, long short-term memory, support vector machine
Procedia PDF Downloads 592043 Urban Retrofitting Application Based on Social-Media to Model the Malioboro Smart Central Business Design through Statistical Regression Approach
Authors: Muhammad Hardyan Prastyanto, Aisah Azhari Marwangi, Yulinda Rizky Pratiwi
Abstract:
Globalization has become a driving force for the current technological developments. The presence of the Virtual Space provides opportunities for people to self-actualization through access to a wider world, quickly and easily. Cities that are part of the existence of life, witness the history of civilization over time, also has been the major object to upgrading on technological sector. A smart city is one where the government and citizenry are using the best available means, including ICT, to achieve their shared goals. This often includes economic development, environmental sustainability, and improved quality of life for citizens. Thus theory is the basis for research of this study. This study aimed to know the implementation of the Urban Retrofitting at Malioboro area based on Information and Communication Technologies. The method of this study is by reviewing the effectiveness of the E-commerce uses as a major system to identification the Malioboro Smart Central Business District. By using a significance level of 5 %, it can be concluded that addresses have a significant influence on the ratings obtained, namely regarding the location of the hotel establishment. But despite the use of the website does not have a significant influence on the rating of the hotel, using the website still has influence significantly on the rating, because the p -value (Sig.) of the variable website is not so much different from the significance level determined by the researcher. In the interpretation, if a hotel is located on the Pasar Kembang streets and not to use the website, so the hotel is likely to have a rating of the constant value which is 3.183. However, if a hotel located on the Sosrowijayan streets, so the hotel rating will be increased by 0,302. Then if a hotel has been using a website, so the hotel rating will increase by 0,264. It is possible to conclude the effectiveness of ICT’s (Website) uses and location to identification the urban retrofitting through increasing of building rating in Malioboro Central Business District.Keywords: urban retrofitting, e-commerce, information and communication technology, statistic regression, SCBD, Malioboro
Procedia PDF Downloads 2992042 A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow
Authors: Ming Lun Wang, Yan Wang, Ning Ruo Sun
Abstract:
With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable key-policy attribute-based encryption without key escrow (WOKE-AKP-ABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks.Keywords: cloud storage security, sharing storage, attributes, Hash algorithm
Procedia PDF Downloads 3902041 FLEX: A Backdoor Detection and Elimination Method in Federated Scenario
Authors: Shuqi Zhang
Abstract:
Federated learning allows users to participate in collaborative model training without sending data to third-party servers, reducing the risk of user data privacy leakage, and is widely used in smart finance and smart healthcare. However, the distributed architecture design of federation learning itself and the existence of secure aggregation protocols make it inherently vulnerable to backdoor attacks. To solve this problem, the federated learning backdoor defense framework FLEX based on group aggregation, cluster analysis, and neuron pruning is proposed, and inter-compatibility with secure aggregation protocols is achieved. The good performance of FLEX is verified by building a horizontal federated learning framework on the CIFAR-10 dataset for experiments, which achieves 98% success rate of backdoor detection and reduces the success rate of backdoor tasks to 0% ~ 10%.Keywords: federated learning, secure aggregation, backdoor attack, cluster analysis, neuron pruning
Procedia PDF Downloads 952040 Data Poisoning Attacks on Federated Learning and Preventive Measures
Authors: Beulah Rani Inbanathan
Abstract:
In the present era, it is vivid from the numerous outcomes that data privacy is being compromised in various ways. Machine learning is one technology that uses the centralized server, and then data is given as input which is being analyzed by the algorithms present on this mentioned server, and hence outputs are predicted. However, each time the data must be sent by the user as the algorithm will analyze the input data in order to predict the output, which is prone to threats. The solution to overcome this issue is federated learning, where the models alone get updated while the data resides on the local machine and does not get exchanged with the other local models. Nevertheless, even on these local models, there are chances of data poisoning, and it is crystal clear from various experiments done by many people. This paper delves into many ways where data poisoning occurs and the many methods through which it is prevalent that data poisoning still exists. It includes the poisoning attacks on IoT devices, Edge devices, Autoregressive model, and also, on Industrial IoT systems and also, few points on how these could be evadible in order to protect our data which is personal, or sensitive, or harmful when exposed.Keywords: data poisoning, federated learning, Internet of Things, edge computing
Procedia PDF Downloads 872039 Perception of Consumer Behavior on Mobile Banking Offered by the National and Multinational Banks in UAE with Special Reference to Emirates NBD and Citibank
Authors: Aarohi Surya
Abstract:
The number of mobile banking users continues to climb across the world due to its increasing popularity, and UAE is no exception. This type of banking is part of the core strategy of most of the financial institutions that allows its customers to conduct a range of financial transactions through mobile apps to cash in the high demand from the bankers. This study aims at evaluating service quality of online banking in Dubai, one of the swiftly growing cities of Middle East. The paper mainly compares online banking services of Multinational bank and National Bank with special reference to Citibank and Emirates NBD. A structured questionnaire survey is conducted among various target groups. The research has been focused on mainly 4 significant areas of online banking, i.e. Privacy, Responsiveness, Reliability, and Efficiency of customer data. Information was analyzed statistically on SPSS to investigate the service quality of e-banking.Keywords: customer satisfaction, service quality, responsiveness, online banking
Procedia PDF Downloads 2702038 A Blockchain-Based Privacy-Preserving Physical Delivery System
Authors: Shahin Zanbaghi, Saeed Samet
Abstract:
The internet has transformed the way we shop. Previously, most of our purchases came in the form of shopping trips to a nearby store. Now, it’s as easy as clicking a mouse. But with great convenience comes great responsibility. We have to be constantly vigilant about our personal information. In this work, our proposed approach is to encrypt the information printed on the physical packages, which include personal information in plain text, using a symmetric encryption algorithm; then, we store that encrypted information into a Blockchain network rather than storing them in companies or corporations centralized databases. We present, implement and assess a blockchain-based system using Ethereum smart contracts. We present detailed algorithms that explain the details of our smart contract. We present the security, cost, and performance analysis of the proposed method. Our work indicates that the proposed solution is economically attainable and provides data integrity, security, transparency, and data traceability.Keywords: blockchain, Ethereum, smart contract, commit-reveal scheme
Procedia PDF Downloads 1492037 The Prevalence of Organized Retail Crime in Riyadh, Saudi Arabia
Authors: Saleh Dabil
Abstract:
This study investigates the level of existence of organized retail crime in supermarkets of Riyadh, Saudi Arabia. The store managers, security managers and general employees were asked about the types of retail crimes occur in the stores. Three independent variables were related to the report of organized retail theft. The independent variables are: (1) the supermarket profile (volume, location, standard and type of the store), (2) the social physical environment of the store (maintenance, cleanness and overall organizational cooperation), (3) the security techniques and loss prevention electronics techniques used. The theoretical framework of this study based on the social disorganization theory. This study concluded that the organized retail theft, in specific, organized theft is moderately apparent in Riyadh stores. The general result showed that the environment of the stores has an effect on the prevalence of organized retail theft with relation to the gender of thieves, age groups, working shift, type of stolen items as well as the number of thieves in one case. Among other reasons, some factors of the organized theft are: economic pressure of customers based on the location of the store. The dealing of theft also was investigated to have a clear picture of stores dealing with organized retail theft. The result showed that mostly, thieves sent without any action and sometimes given written warning. Very few cases dealt with by police. There are other factors in the study can be looked up in the text. This study suggests solving the problem of organized theft; first is ‘the well distributing of the duties and responsibilities between the employees especially for security purposes’. Second is ‘installation of strong security system’ and ‘making well-designed store layout’. Third is ‘giving training for general employees’ and ‘to give periodically security skills training of employees’. There are other suggestions in the study can be looked up in the text.Keywords: organized crime, retail, theft, loss prevention, store environment
Procedia PDF Downloads 1962036 Collocation Assessment between GEO and GSO Satellites
Authors: A. E. Emam, M. Abd Elghany
Abstract:
The change in orbit evolution between collocated satellites (X, Y) inside +/-0.09 ° E/W and +/- 0.07 ° N/S cluster, after one of these satellites is placed in an inclined orbit (satellite X) and the effect of this change in the collocation safety inside the cluster window has been studied and evaluated. Several collocation scenarios had been studied in order to adjust the location of both satellites inside their cluster to maximize the separation between them and safe the mission.Keywords: satellite, GEO, collocation, risk assessment
Procedia PDF Downloads 3962035 The Location-Routing Problem with Pickup Facilities and Heterogeneous Demand: Formulation and Heuristics Approach
Authors: Mao Zhaofang, Xu Yida, Fang Kan, Fu Enyuan, Zhao Zhao
Abstract:
Nowadays, last-mile distribution plays an increasingly important role in the whole industrial chain delivery link and accounts for a large proportion of the whole distribution process cost. Promoting the upgrading of logistics networks and improving the layout of final distribution points has become one of the trends in the development of modern logistics. Due to the discrete and heterogeneous needs and spatial distribution of customer demand, which will lead to a higher delivery failure rate and lower vehicle utilization, last-mile delivery has become a time-consuming and uncertain process. As a result, courier companies have introduced a range of innovative parcel storage facilities, including pick-up points and lockers. The introduction of pick-up points and lockers has not only improved the users’ experience but has also helped logistics and courier companies achieve large-scale economy. Against the backdrop of the COVID-19 of the previous period, contactless delivery has become a new hotspot, which has also created new opportunities for the development of collection services. Therefore, a key issue for logistics companies is how to design/redesign their last-mile distribution network systems to create integrated logistics and distribution networks that consider pick-up points and lockers. This paper focuses on the introduction of self-pickup facilities in new logistics and distribution scenarios and the heterogeneous demands of customers. In this paper, we consider two types of demand, including ordinary products and refrigerated products, as well as corresponding transportation vehicles. We consider the constraints associated with self-pickup points and lockers and then address the location-routing problem with self-pickup facilities and heterogeneous demands (LRP-PFHD). To solve this challenging problem, we propose a mixed integer linear programming (MILP) model that aims to minimize the total cost, which includes the facility opening cost, the variable transport cost, and the fixed transport cost. Due to the NP-hardness of the problem, we propose a hybrid adaptive large-neighbourhood search algorithm to solve LRP-PFHD. We evaluate the effectiveness and efficiency of the proposed algorithm by using instances generated based on benchmark instances. The results demonstrate that the hybrid adaptive large neighbourhood search algorithm is more efficient than MILP solvers such as Gurobi for LRP-PFHD, especially for large-scale instances. In addition, we made a comprehensive analysis of some important parameters (e.g., facility opening cost and transportation cost) to explore their impacts on the results and suggested helpful managerial insights for courier companies.Keywords: city logistics, last-mile delivery, location-routing, adaptive large neighborhood search
Procedia PDF Downloads 782034 Non-melanoma Nasal Skin Cancer: Literature Review
Authors: Geovanna dos Santos Romeiro, Polintia Rayza Brito da Silva, Luis Henrique Moura, Izadora Moreira Do Amaral, Marília Vitória Pinto Milhomem
Abstract:
Introduction: The nose is one of the most likely sites for the appearance of malignancy on the face. This can be associated with its unique position of exposure to environmental damage, lack of photoprotection and because it is an area susceptible to greater sun exposure. It is already known that the most common type of nasal tumor is basal cell carcinoma. Squamous cell carcinoma is less common but considerably more aggressive, with a tendency to grow rapidly and metastasize. Nasal skin cancer can have a good prognosis, regardless of the type of treatment chosen, i.e., surgery, radiotherapy or electrodissection. However, tumors that are not diagnosed and treated quickly can be harmful and have a greater chance of metastasizing. When curative surgery is performed, therapies and reconstructive surgical procedures are usually required. Objective: The objective is to review the literature on nasal skin tumors and their types and specific locations. Forty-four articles published in Pubmed related to the location of skin cancer in the specific nasal areas region were analyzed. Twelve were excluded for being prior to the year 2000, three with inconclusive results, and one with unbiased conclusions. Results and Conclusion: Regarding the prevalence of types of nasal tumors, basal cell carcinoma comprises the majority, occurring predominantly in the ala, tip and root; squamous cell carcinoma, on the other hand, is more common in the lateral borders and columella. Even so, 2 articles report that the prevalence of metastasis has a higher incidence in squamous cell carcinomas. All of this points to the importance of early location, including regions that are often overlooked in the examination if the patient is wearing glasses. This topic needs further investigation for a greater correlation between anatomy and clinical-surgical implications.Keywords: skin cancer, melanoma, non-melanoma, surgery
Procedia PDF Downloads 522033 Hyperelastic Constitutive Modelling of the Male Pelvic System to Understand the Prostate Motion, Deformation and Neoplasms Location with the Influence of MRI-TRUS Fusion Biopsy
Authors: Muhammad Qasim, Dolors Puigjaner, Josep Maria López, Joan Herrero, Carme Olivé, Gerard Fortuny
Abstract:
Computational modeling of the human pelvis using the finite element (FE) method has become extremely important to understand the mechanics of prostate motion and deformation when transrectal ultrasound (TRUS) guided biopsy is performed. The number of reliable and validated hyperelastic constitutive FE models of the male pelvis region is limited, and given models did not precisely describe the anatomical behavior of pelvis organs, mainly of the prostate and its neoplasms location. The motion and deformation of the prostate during TRUS-guided biopsy makes it difficult to know the location of potential lesions in advance. When using this procedure, practitioners can only provide roughly estimations for the lesions locations. Consequently, multiple biopsy samples are required to target one single lesion. In this study, the whole pelvis model (comprised of the rectum, bladder, pelvic muscles, prostate transitional zone (TZ), and peripheral zone (PZ)) is used for the simulation results. An isotropic hyperelastic approach (Signorini model) was used for all the soft tissues except the vesical muscles. The vesical muscles are assumed to have a linear elastic behavior due to the lack of experimental data to determine the constants involved in hyperelastic models. The tissues and organ geometry is taken from the existing literature for 3D meshes. Then the biomechanical parameters were obtained under different testing techniques described in the literature. The acquired parametric values for uniaxial stress/strain data are used in the Signorini model to see the anatomical behavior of the pelvis model. The five mesh nodes in terms of small prostate lesions are selected prior to biopsy and each lesion’s final position is targeted when TRUS probe force of 30 N is applied at the inside rectum wall. Code_Aster open-source software is used for numerical simulations. Moreover, the overall effects of pelvis organ deformation were demonstrated when TRUS–guided biopsy is induced. The deformation of the prostate and neoplasms displacement showed that the appropriate material properties to organs altered the resulting lesion's migration parametrically. As a result, the distance traveled by these lesions ranged between 3.77 and 9.42 mm. The lesion displacement and organ deformation are compared and analyzed with our previous study in which we used linear elastic properties for all pelvic organs. Furthermore, the visual comparison of axial and sagittal slices are also compared, which is taken for Magnetic Resource Imaging (MRI) and TRUS images with our preliminary study.Keywords: code-aster, magnetic resonance imaging, neoplasms, transrectal ultrasound, TRUS-guided biopsy
Procedia PDF Downloads 872032 The Nature and Impact of Trojan Horses in Cybersecurity
Authors: Mehrab Faraghti
Abstract:
Trojan horses, a form of malware masquerading as legitimate software, pose significant cybersecurity threats. These malicious programs exploit user trust, infiltrate systems, and can lead to data breaches, financial loss, and compromised privacy. This paper explores the mechanisms through which Trojan horses operate, including delivery methods such as phishing and software vulnerabilities. It categorizes various types of Trojan horses and their specific impacts on individuals and organizations. Additionally, the research highlights the evolution of Trojan threats and the importance of user awareness and proactive security measures. By analyzing case studies of notable Trojan attacks, this study identifies common vulnerabilities that can be exploited and offers insights into effective countermeasures, including behavioral analysis, anomaly detection, and robust incident response strategies. The findings emphasize the need for comprehensive cybersecurity education and the implementation of advanced security protocols to mitigate the risks associated with Trojan horses.Keywords: Trojan horses, cybersecurity, malware, data breach
Procedia PDF Downloads 92031 Bridge Healthcare Access Gap with Artifical Intelligence
Authors: Moshmi Sangavarapu
Abstract:
The US healthcare industry has undergone tremendous digital transformation in recent years, but critical care access to lower-income ethnicities is still in its nascency. This population has historically showcased substantial hesitation to seek any medical assistance. While the lack of sufficient financial resources plays a critical role, the existing cultural and knowledge barriers also contribute significantly to widening the access gap. It is imperative to break these barriers to ensure timely access to therapeutic procedures that can save important lives! Based on ongoing research, healthcare access barriers can be best addressed by tapping the untapped potential of caregiver communities first. They play a critical role in patients’ diagnoses, building healthcare knowledge and instilling confidence in required therapeutic procedures. Recent technological advancements have opened many avenues by developing smart ways of reaching the large caregiver community. A digitized go-to-market strategy featuring connected media coupled with smart IoT devices and geo-location targeting can be collectively leveraged to reach this key audience group. AI/ML algorithms can be thoroughly trained to identify relevant data signals from users' location and browsing behavior and determine useful marketing touchpoints. The web behavior can be further assimilated with natural language processing to identify contextually relevant interest topics and decipher potential caregivers on digital avenues to serve that brand message. In conclusion, grasping the true health access journey of any lower-income ethnic group is important to design beneficial touchpoints that can alleviate patients’ concerns and allow them to break their own access barriers and opt for timely and quality healthcare.Keywords: healthcare access, market access, diversity barriers, patient journey
Procedia PDF Downloads 542030 The Effects of Placement and Cross-Section Shape of Shear Walls in Multi-Story RC Buildings with Plan Irregularity on Their Seismic Behavior by Using Nonlinear Time History Analyses
Authors: Mohammad Aminnia, Mahmood Hosseini
Abstract:
Environmental and functional conditions sometimes necessitate the architectural plan of the building to be asymmetric, and this result in an asymmetric structure. In such cases, finding an optimal pattern for locating the components of the lateral load bearing system, including shear walls, in the building’s plan is desired. In case of shear walls, in addition to the location, the shape of the wall cross-section is also an effective factor. Various types of shear wall and their proper layout might come effective in better stiffness distribution and more appropriate seismic response of the building. Several studies have been conducted in the context of analysis and design of shear walls; however, few studies have been performed on making decisions for the location and form of shear walls in multi-story buildings, especially those with irregular plan. In this study, an attempt has been made to obtain the most reliable seismic behavior of multi-story reinforced concrete vertically chamfered buildings by using more appropriate shear walls form and arrangement in 7-, 10-, 12-, and 15-story buildings. The considered forms and arrangements include common rectangular walls and L-, T-, U- and Z-shaped plan, located as the core or in the outer frames of the building structure. Comparison of seismic behaviors of the buildings, including maximum roof displacement, and particularly the formation of plastic hinges and their distribution in the buildings’ structures, have been done based on the results of a series of nonlinear time history analyses by using a set of selected earthquake records. Results show that shear walls with U-shaped cross-section, placed as the building central core, and also walls with Z-shaped cross-section, placed at the corners give the building more reliable seismic behavior.Keywords: vertically chamfered buildings, non-linear time history analyses, l-, t-, u- and z-shaped plan walls
Procedia PDF Downloads 2572029 '3D City Model' through Quantum Geographic Information System: A Case Study of Gujarat International Finance Tec-City, Gujarat, India
Authors: Rahul Jain, Pradhir Parmar, Dhruvesh Patel
Abstract:
Planning and drawing are the important aspects of civil engineering. For testing theories about spatial location and interaction between land uses and related activities the computer based solution of urban models are used. The planner’s primary interest is in creation of 3D models of building and to obtain the terrain surface so that he can do urban morphological mappings, virtual reality, disaster management, fly through generation, visualization etc. 3D city models have a variety of applications in urban studies. Gujarat International Finance Tec-City (GIFT) is an ongoing construction site between Ahmedabad and Gandhinagar, Gujarat, India. It will be built on 3590000 m2 having a geographical coordinates of North Latitude 23°9’5’’N to 23°10’55’’ and East Longitude 72°42’2’’E to 72°42’16’’E. Therefore to develop 3D city models of GIFT city, the base map of the city is collected from GIFT office. Differential Geographical Positioning System (DGPS) is used to collect the Ground Control Points (GCP) from the field. The GCP points are used for the registration of base map in QGIS. The registered map is projected in WGS 84/UTM zone 43N grid and digitized with the help of various shapefile tools in QGIS. The approximate height of the buildings that are going to build is collected from the GIFT office and placed on the attribute table of each layer created using shapefile tools. The Shuttle Radar Topography Mission (SRTM) 1 Arc-Second Global (30 m X 30 m) grid data is used to generate the terrain of GIFT city. The Google Satellite Map is used to place on the background to get the exact location of the GIFT city. Various plugins and tools in QGIS are used to convert the raster layer of the base map of GIFT city into 3D model. The fly through tool is used for capturing and viewing the entire area in 3D of the city. This paper discusses all techniques and their usefulness in 3D city model creation from the GCP, base map, SRTM and QGIS.Keywords: 3D model, DGPS, GIFT City, QGIS, SRTM
Procedia PDF Downloads 2462028 Consumer Experience of 3D Body Scanning Technology and Acceptance of Related E-Commerce Market Applications in Saudi Arabia
Authors: Moudi Almousa
Abstract:
This research paper explores Saudi Arabian female consumers’ experiences using 3D body scanning technology and their level of acceptance of possible market applications of this technology to adopt for apparel online shopping. Data was collected for 82 women after being scanned then viewed a short video explaining three possible scenarios of 3D body scanning applications, which include size prediction, customization, and virtual try-on, before completing the survey questionnaire. Although respondents have strong positive responses towards the scanning experience, the majority were concerned about their privacy during the scanning process. The results indicated that size prediction and virtual try on had greater market application potential and a higher chance of crossing the gap based on consumer interest. The results of the study also indicated a strong positive correlation between respondents’ concern with inability to try on apparel products in online environments and their willingness to use the 3D possible market applications.Keywords: 3D body scanning, market applications, online, apparel fit
Procedia PDF Downloads 145