Search results for: code division multiple access
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9236

Search results for: code division multiple access

8606 Fault Ride Through Management in Renewable Power Park

Authors: Mohd Zamri Che Wanik

Abstract:

This paper presents the management of the Fault Ride Through event within a Solar Farm during a grid fault. The modeling and simulation of a photovoltaic (PV) with battery energy storage connected to the power network will be described. The modeling approach and the study analysis performed are described. The model and operation scenarios are simulated using a digital simulator for different scenarios. The dynamic response of the system when subjected to sudden self-clearance temporary fault is presented. The capability of the PV system and battery storage riding through the power system fault and, at the same time, supporting the local grid by injecting fault current is demonstrated. For each case, the different control methods to achieve the objective of supporting the grid according to grid code requirements are presented and explained. The inverter modeling approach is presented and described.

Keywords: faut ride through, solar farm, grid code, power network

Procedia PDF Downloads 41
8605 Meta Root ID Passwordless Authentication Using ZKP Bitcoin Protocol

Authors: Saransh Sharma, Atharv Dekhne

Abstract:

Passwords stored on central services and hashed are prone to cyberattacks and hacks. Hence, given all these nuisances, there’s a need to eliminate character-based authentication protocols, which would ultimately benefit all developers as well as end-users.To replace this conventional but antiquated protocol with a secure alternative would be Passwordless Authentication. The meta root.id system creates a public and private key, of which the user is only able to access the private key. Further, after signing the key, the user sends the information over the API to the server, which checks its validity with the public key and grants access accordingly.

Keywords: passwordless, OAuth, bitcoin, ZKP, SIN, BIP

Procedia PDF Downloads 82
8604 Market Access for Foreign Investment in Host States: Municipal Law and International Law

Authors: Qiang Ren

Abstract:

A growing number of states are improving domestic law to better protect and promote foreign investment by changing/upgrading the existing law. However, inconsistency occurs because the new law is different from the ‘old’ law. For example, China has issued an unprecedented Foreign Investment Law and several regulations allowing comprehensive market access for foreign investment in most energy sectors since 2020. However, some laws, rules, regulations, etc. enacted previously remain valid, and the provisions regulating foreign investment do not grant full market access to foreign investment as such. The inconsistency above makes it necessary to investigatehow the international investment treaty law and dispute settlement practice respond to the ‘inconsistency and conflict’ in municipal law andwhat remedy foreign investors can seek under international law if the investment is denied due to inconsistency. Ultimately, it aims to examine how international tribunals should balance the gradually developing legal system of host states and the protection of foreign investors and investments if the host states cannot provide consistency during such a transition period of law development. The research seeks to answer these questions by making a comparative analysis of domestic law on market access to foreign investment, international investment treaties, and dispute arbitral practice. The objective is to examine how international investment treaty law and international investment dispute settlement practice evaluate the conflicts in the municipal law of host states in the admission of foreign investment. It also explores the possibility of harmonisation among them.

Keywords: municipal law, protect and promote foreign investment, international law, host states

Procedia PDF Downloads 82
8603 Nurse Practitioner Led Pediatric Primary Care Clinic in a Tertiary Care Setting: Improving Access and Health Outcomes

Authors: Minna K. Miller, Chantel. E. Canessa, Suzanna V. McRae, Susan Shumay, Alissa Collingridge

Abstract:

Primary care provides the first point of contact and access to health care services. For the pediatric population, the goal is to help healthy children stay healthy and to help those that are sick get better. Primary care facilitates regular well baby/child visits; health promotion and disease prevention; investigation, diagnosis and management of acute and chronic illnesses; health education; both consultation and collaboration with, and referral to other health care professionals. There is a protective association between regular well-child visit care and preventable hospitalization. Further, low adherence to well-child care and poor continuity of care are independently associated with increased risk of hospitalization. With a declining number of family physicians caring for children, and only a portion of pediatricians providing primary care services, it is becoming increasingly difficult for children and their families to access primary care. Nurse practitioners are in a unique position to improve access to primary care and improve health outcomes for children. Limited literature is available on the nurse practitioner role in primary care pediatrics. The purpose of this paper is to describe the development, implementation and evaluation of a Nurse Practitioner-led pediatric primary care clinic in a tertiary care setting. Utilizing the participatory, evidence-based, patient-focused process for advanced practice nursing (PEPPA framework), this paper highlights the results of the initial needs assessment/gap analysis, the new service delivery model, populations served, and outcome measures.

Keywords: access, health outcomes, nurse practitioner, pediatric primary care, PEPPA framework

Procedia PDF Downloads 476
8602 An Analysis of L1 Effects on the Learning of EFL: A Case Study of Undergraduate EFL Learners at Universities in Pakistan

Authors: Nadir Ali Mugheri, Shaukat Ali Lohar

Abstract:

In a multilingual society like Pakistan, code switching is commonly observed in different contexts. Mostly people use L1 (Native Languages) and L2 for common communications and L3 (i.e. English, Urdu, Sindhi) in formal contexts and for academic writings. Such a frequent code switching does affect EFL learners' acquisition of grammar and lexis of the target language which in the long run result in different types of errors in their writings. The current study is to investigate and identify common elements of L1 and L2 (spoken by students of the Universities in Pakistan) which create hindrances for EFL learners. Case study method was used for this research. Formal writings of 400 EFL learners (as participants from various Universities of the country) were observed. Among 400 participants, 200 were female and 200 were male EFL learners having different academic backgrounds. Errors found were categorized into different types according to grammatical items, the difference in meanings, structure of sentences and identifiers of tenses of L1 or L2 in comparison with those of the target language. The findings showed that EFL learners in Pakistani varsities have serious problems in their writings and they committed serious errors related to the grammar and meanings of the target language. After analysis of the committed errors, the results were found in the affirmation of the hypothesis that L1 or L2 does affect EFL learners. The research suggests in the end to adopt natural ways in pedagogy like task-based learning or communicative methods using contextualized material so as to avoid impediments of L1 or L2 in acquisition the target language.

Keywords: multilingualism, L2 acquisition, code switching, language acquisition, communicative language teaching

Procedia PDF Downloads 280
8601 The Strengths and Limitations of the Statistical Modeling of Complex Social Phenomenon: Focusing on SEM, Path Analysis, or Multiple Regression Models

Authors: Jihye Jeon

Abstract:

This paper analyzes the conceptual framework of three statistical methods, multiple regression, path analysis, and structural equation models. When establishing research model of the statistical modeling of complex social phenomenon, it is important to know the strengths and limitations of three statistical models. This study explored the character, strength, and limitation of each modeling and suggested some strategies for accurate explaining or predicting the causal relationships among variables. Especially, on the studying of depression or mental health, the common mistakes of research modeling were discussed.

Keywords: multiple regression, path analysis, structural equation models, statistical modeling, social and psychological phenomenon

Procedia PDF Downloads 629
8600 Software Evolution Based Activity Diagrams

Authors: Zine-Eddine Bouras, Abdelouaheb Talai

Abstract:

During the last two decades, the software evolution community has intensively tackled the software merging issue whose main objective is to merge in a consistent way different versions of software in order to obtain a new version. Well-established approaches, mainly based on the dependence analysis techniques, have been used to bring suitable solutions. These approaches concern the source code or software architectures. However, these solutions are more expensive due to the complexity and size. In this paper, we overcome this problem by operating at a high level of abstraction. The objective of this paper is to investigate the software merging at the level of UML activity diagrams, which is a new interesting issue. Its purpose is to merge activity diagrams instead of source code. The proposed approach, based on dependence analysis techniques, is illustrated through an appropriate case study.

Keywords: activity diagram, activity diagram slicing, dependency analysis, software merging

Procedia PDF Downloads 315
8599 Pattern in Splitting Sequence in Okike’s Merged Irregular Transposition Cipher for Encrypting Cyberspace Messages

Authors: Okike Benjamin, E. J. D. Garba

Abstract:

The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. The researchers in this work propose a new encryption technique to be known as Merged Irregular Transposition Cipher. In this proposed encryption technique, a message to be encrypted will first of all be split into multiple parts depending on the length of the message. After the split, different keywords are chosen to encrypt different parts of the message. After encrypting all parts of the message, the positions of the encrypted message could be swapped to other position thereby making it very difficult to decrypt by any unauthorized user.

Keywords: information security, message splitting, pattern, sequence

Procedia PDF Downloads 273
8598 Design, Development by Functional Analysis in UML and Static Test of a Multimedia Voice and Video Communication Platform on IP for a Use Adapted to the Context of Local Businesses in Lubumbashi

Authors: Blaise Fyama, Elie Museng, Grace Mukoma

Abstract:

In this article we present a java implementation of video telephony using the SIP protocol (Session Initiation Protocol). After a functional analysis of the SIP protocol, we relied on the work of Italian researchers of University of Parma-Italy to acquire adequate libraries for the development of our own communication tool. In order to optimize the code and improve the prototype, we used, in an incremental approach, test techniques based on a static analysis based on the evaluation of the complexity of the software with the application of metrics and the number cyclomatic of Mccabe. The objective is to promote the emergence of local start-ups producing IP video in a well understood local context. We have arrived at the creation of a video telephony tool whose code is optimized.

Keywords: static analysis, coding complexity metric mccabe, Sip, uml

Procedia PDF Downloads 107
8597 Mobility-Aware Relay Selection in Two Hop Unmanned Aerial Vehicles Network

Authors: Tayyaba Hussain, Sobia Jangsher, Saqib Ali, Saqib Ejaz

Abstract:

Unmanned Aerial vehicles (UAV’s) have gained great popularity due to their remoteness, ease of deployment and high maneuverability in different applications like real-time surveillance, image capturing, weather atmospheric studies, disaster site monitoring and mapping. These applications can involve a real-time communication with the ground station. However, altitude and mobility possess a few challenges for the communication. UAV’s at high altitude usually require more transmit power. One possible solution can be with the use of multi hops (UAV’s acting as relays) and exploiting the mobility pattern of the UAV’s. In this paper, we studied a relay (UAV’s acting as relays) selection for a reliable transmission to a destination UAV. We exploit the mobility information of the UAV’s to propose a Mobility-Aware Relay Selection (MARS) algorithm with the objective of giving improved data rates. The results are compared with Non Mobility-Aware relay selection scheme and optimal values. Numerical results show that our proposed MARS algorithm gives 6% better achievable data rates for the mobile UAV’s as compared with Non MobilityAware relay selection scheme. On average a decrease of 20.2% in data rate is achieved with MARS as compared with SDP solver in Yalmip.

Keywords: mobility aware, relay selection, time division multiple acess, unmanned aerial vehicle

Procedia PDF Downloads 226
8596 An Analysis of Pick Travel Distances for Non-Traditional Unit Load Warehouses with Multiple P/D Points

Authors: Subir S. Rao

Abstract:

Existing warehouse configurations use non-traditional aisle designs with a central P/D point in their models, which is mathematically simple but less practical. Many warehouses use multiple P/D points to avoid congestion for pickers, and different warehouses have different flow policies and infrastructure for using the P/D points. Many warehouses use multiple P/D points with non-traditional aisle designs in their analytical models. Standard warehouse models introduce one-sided multiple P/D points in a flying-V warehouse and minimize pick distance for a one-way travel between an active P/D point and a pick location with P/D points, assuming uniform flow rates. A simulation of the mathematical model generally uses four fixed configurations of P/D points which are on two different sides of the warehouse. It can be easily proved that if the source and destination P/D points are both chosen randomly, in a uniform way, then minimizing the one-way travel is the same as minimizing the two-way travel. Another warehouse configuration analytically models the warehouse for multiple one-sided P/D points while keeping the angle of the cross-aisles and picking aisles as a decision variable. The minimization of the one-way pick travel distance from the P/D point to the pick location by finding the optimal position/angle of the cross-aisle and picking aisle for warehouses having different numbers of multiple P/D points with variable flow rates is also one of the objectives. Most models of warehouses with multiple P/D points are one-way travel models and we extend these analytical models to minimize the two-way pick travel distance wherein the destination P/D is chosen optimally for the return route, which is not similar to minimizing the one-way travel. In most warehouse models, the return P/D is chosen randomly, but in our research, the return route P/D point is chosen optimally. Such warehouses are common in practice, where the flow rates at the P/D points are flexible and depend totally on the position of the picks. A good warehouse management system is efficient in consolidating orders over multiple P/D points in warehouses where the P/D is flexible in function. In the latter arrangement, pickers and shrink-wrap processes are not assigned to particular P/D points, which ultimately makes the P/D points more flexible and easy to use interchangeably for picking and deposits. The number of P/D points considered in this research uniformly increases from a single-central one to a maximum of each aisle symmetrically having a P/D point below it.

Keywords: non-traditional warehouse, V cross-aisle, multiple P/D point, pick travel distance

Procedia PDF Downloads 27
8595 Seismic Performance of Concrete Moment Resisting Frames in Western Canada

Authors: Ali Naghshineh, Ashutosh Bagchi

Abstract:

Performance-based seismic design concepts are increasingly being adopted in various jurisdictions. While the National Building Code of Canada (NBCC) is not fully performance-based, it provides some features of a performance-based code, such as displacement control and objective-based solutions. Performance evaluation is an important part of a performance-based design. In this paper, the seismic performance of a set of code-designed 4, 8 and 12 story moment resisting concrete frames located in Victoria, BC, in the western part of Canada at different hazard levels namely, SLE (Service Level Event), DLE (Design Level Event) and MCE (Maximum Considered Event) has been studied. The seismic performance of these buildings has been evaluated based on FEMA 356 and ATC 72 procedures, and the nonlinear time history analysis. Pushover analysis has been used to investigate the different performance levels of these buildings and adjust their design based on the corresponding target displacements. Since pushover analysis ignores the higher mode effects, nonlinear dynamic time history using a set of ground motion records has been performed. Different types of ground motion records, such as crustal and subduction earthquake records have been used for the dynamic analysis to determine their effects. Results obtained from push over analysis on inter-story drift, displacement, shear and overturning moment are compared to those from the dynamic analysis.

Keywords: seismic performance., performance-based design, concrete moment resisting frame, crustal earthquakes, subduction earthquakes

Procedia PDF Downloads 254
8594 Right to Information in Egypt and the Prospects of Renegotiating a New Social Order

Authors: Farida Ibrahim

Abstract:

Right to information is the public's right to know through having access to public information held by state bodies. Recognized as a cornerstone in transparent, participatory and open democracies, the right to information is increasingly perceived today as an emerging human right on the international level. While this right is conceptualized in a range of different contexts, the paper focuses on its conceptualization as a force for socio-economic change for disadvantaged groups. The paper's goal is study the instrumental capacity of this right in empowering the public to access state-held information pertinent to their socio-economic rights. In this regard, the paper views the right to information as an inclusionary tool that is capable of spurring inclusion for individuals excluded from the ambits of both: public participation and social justice. For exploring this, the paper examines the advocacy role played by civil society groups in furthering this instrumental capacity. In particular, the paper presents a focused account on the Egyptian case. While Egypt has recently adopted its constitutional provision on access to information, doubts arise on Egyptian citizens' genuine ability to access information held by state bodies. The politico-economic environment, long term culture of bureaucratic secrecy, and legal framework do not provide promising outcomes on access to public information. Within the particular context of the Egyptian case, this paper questions the extent to which civil society in Egypt is capable of instrumentally employing the political opportunity offered by the constitutional entitlement to information access for pressuring public authorities to disclose information. Through four lawsuits brought by civil society groups in Egypt, the paper argues that the right to information has instrumentally provided civil society actors with new domains of mobilization for furthering the realization of social and economic rights, and ultimately, for renegotiating a new social order lining the relationship between the Egyptian state and its citizens marginalized by socio-economic imbalances.

Keywords: civil society, Egypt, right to information, socio-economic rights

Procedia PDF Downloads 267
8593 A Voice Signal Encryption Scheme Based on Chaotic Theory

Authors: Hailang Yang

Abstract:

To ensure the confidentiality and integrity of speech signals in communication transmission, this paper proposes a voice signal encryption scheme based on chaotic theory. Firstly, the scheme utilizes chaotic mapping to generate a key stream and then employs the key stream to perform bitwise exclusive OR (XOR) operations for encrypting the speech signal. Additionally, the scheme utilizes a chaotic hash function to generate a Message Authentication Code (MAC), which is appended to the encrypted data to verify the integrity of the data. Subsequently, we analyze the security performance and encryption efficiency of the scheme, comparing and optimizing it against existing solutions. Finally, experimental results demonstrate that the proposed scheme can resist common attacks, achieving high-quality encryption and speed.

Keywords: chaotic theory, XOR encryption, chaotic hash function, Message Authentication Code (MAC)

Procedia PDF Downloads 37
8592 Probabilistic Safety Assessment of Koeberg Spent Fuel Pool

Authors: Sibongiseni Thabethe, Ian Korir

Abstract:

The effective management of spent fuel pool (SFP) safety has been raised as one of the emerging issues to further enhance nuclear installation safety after the Fukushima accident on March 11, 2011. Before then, SFP safety-related issues have been mainly focused on (a) controlling the configuration of the fuel assemblies in the pool with no loss of pool coolants and (b) ensuring adequate pool storage space to prevent fuel criticality owing to chain reactions of the fission products and the ability for neutron absorption to keep the fuel cool. A probabilistic safety (PSA) assessment was performed using the systems analysis program for hands-on integrated reliability evaluations (SAPHIRE) computer code. Event and fault tree analysis was done to develop a PSA model for the Koeberg SFP. We present preliminary PSA results of events that lead to boiling and cause fuel uncovering, resulting in possible fuel damage in the Koeberg SFP.

Keywords: computer code, fuel assemblies, probabilistic risk assessment, spent fuel pool

Procedia PDF Downloads 159
8591 Green Public Procurement in Open Access and Traditional Journals: A Comparative Bibliometric Analysis

Authors: Alonso-Cañadas J., Galán-Valdivieso F., Saraite-Sariene L., García-Tabuyo M., Alonso-Morales N.

Abstract:

Green Public Procurement (GPP) has recently gained attention in the academic and policy arenas since climate change has shown the need to be addressed by both private companies and public entities. Such growing interest motivates this article, aiming to explore the most influential journals, publishers, categories, and topics, as well as the recent trends and future research lines in GPP. Based on the Web of Science database, 578 articles from 2004 to February 2022 devoted to GPP are analyzed using Bibliometrix, an R-tool to perform bibliometric analysis, and Google’s Big Query and Data Studio. This article introduces a variety of findings. First, the most influential journals by far are “Journal of Cleaner Production” and “Sustainability,” differing in that the latter is open access while the former publishes via traditional subscription. This result also occurs regarding the main publishers (Elsevier and MDPI). These features lead us to split the sample into open-access journals and traditional journals to deepen into the similarities and differences between them, confirming that traditional journals exhibit a higher degree of influence in the literature than their open-access counterparts in terms of the number of documents, number of citations and impact (according to the H index). Second, this research also highlights the recent emergence of green-related terms (sustainable, environment) and, parallelly, the increase in categorizing GPP papers in “green” WoS categories, particularly since 2019. Finally, a number of related topics are emerging and will lead the research, such as food security, infrastructures, and implementation barriers of GPP.

Keywords: bibliometric analysis, green public procurement, open access, traditional journals

Procedia PDF Downloads 87
8590 The Confiscation of Ill-Gotten Gains in Pollution: The Taiwan Experience and the Interaction between Economic Analysis of Law and Environmental Economics Perspectives

Authors: Chiang-Lead Woo

Abstract:

In reply to serious environmental problems, the Taiwan government quickly adjusted some articles to suit the needs of environmental protection recently, such as the amendment to article 190-1 of the Taiwan Criminal Code. The transfer of legislation comes as an improvement which canceled the limitation of ‘endangering public safety’. At the same time, the article 190-1 goes from accumulative concrete offense to abstract crime of danger. Thus, the public looks forward to whether environmental crime following the imposition of fines or penalties works efficiently in anti-pollution by the deterrent effects. However, according to the addition to article 38-2 of the Taiwan Criminal Code, the confiscation system seems controversial legislation to restrain ill-gotten gains. Most prior studies focused on comparisons with the Administrative Penalty Law and the Criminal Code in environmental issue in Taiwan; recently, more and more studies emphasize calculations on ill-gotten gains. Hence, this paper try to examine the deterrent effect in environmental crime by economic analysis of law and environmental economics perspective. This analysis shows that only if there is an extremely high probability (equal to 100 percent) of an environmental crime case being prosecuted criminally by Taiwan Environmental Protection Agency, the deterrent effects will work. Therefore, this paper suggests deliberating the confiscation system from supplementing the System of Environmental and Economic Accounting, reasonable deterrent fines, input management, real-time system for detection of pollution, and whistleblower system, environmental education, and modernization of law.

Keywords: confiscation, ecosystem services, environmental crime, ill-gotten gains, the deterrent effect, the system of environmental and economic accounting

Procedia PDF Downloads 156
8589 Effects of Breed and Number of Embryos Transferred on the Efficacy of MOET in Sheep

Authors: Ayman A. Swelum, Abdullah N. Al-Owaimer, Mohamed A. Abouheif

Abstract:

This study aimed to evaluate the effects of sheep breed and the number of embryos transferred on the success of multiple ovulation and embryo transfer (MOET). Sixteen Najdi and Naeimi ewes were used as donors. Multiple ovulation was achieved using equine chorionic gonadotropin (eCG). Thirty-five recipient ewes were divided into four groups: Najdi or Naeimi ewes that received either one or two embryos. After lambing, the gestation length, litter size, and sex of the lambs were recorded. The rates of pregnancy, lambing, and embryo survival were lower in the recipient Najdi than Naeimi ewes when two embryos were transferred. In contrast, the Naeimi ewes that received one embryo had a significantly lower embryo transfer success. In conclusion, the response of ewes to multiple ovulation stimulation using eCG was significantly high in Naeimi ewes (9.8±1.17). Moreover, transferring one embryo resulted in a significantly high pregnancy rate in the Najdi sheep (60%).

Keywords: embryo transfer, multiple ovulation, Najdi, Naeimi, sheep

Procedia PDF Downloads 713
8588 Optimized Approach for Secure Data Sharing in Distributed Database

Authors: Ahmed Mateen, Zhu Qingsheng, Ahmad Bilal

Abstract:

In the current age of technology, information is the most precious asset of a company. Today, companies have a large amount of data. As the data become larger, access to data for some particular information is becoming slower day by day. Faster data processing to shape it in the form of information is the biggest issue. The major problems in distributed databases are the efficiency of data distribution and response time of data distribution. The security of data distribution is also a big issue. For these problems, we proposed a strategy that can maximize the efficiency of data distribution and also increase its response time. This technique gives better results for secure data distribution from multiple heterogeneous sources. The newly proposed technique facilitates the companies for secure data sharing efficiently and quickly.

Keywords: ER-schema, electronic record, P2P framework, API, query formulation

Procedia PDF Downloads 320
8587 Basins of Attraction for Quartic-Order Methods

Authors: Young Hee Geum

Abstract:

We compare optimal quartic order method for the multiple zeros of nonlinear equations illustrating the basins of attraction. To construct basins of attraction effectively, we take a 600×600 uniform grid points at the origin of the complex plane and paint the initial values on the basins of attraction with different colors according to the iteration number required for convergence.

Keywords: basins of attraction, convergence, multiple-root, nonlinear equation

Procedia PDF Downloads 244
8586 Study of a Photovoltaic System Using MPPT Buck-Boost Converter

Authors: A. Bouchakour, L. Zaghba, M. Brahami, A. Borni

Abstract:

The work presented in this paper present the design and the simulation of a centrifugal pump coupled to a photovoltaic (PV) generator via a MPPT controller. The PV system operating is just done in sunny period by using water storage instead of electric energy storage. The process concerns the modelling, identification and simulation of a photovoltaic pumping system, the centrifugal pump is driven by an asynchronous three-phase voltage inverter sine triangle PWM motor through. Two configurations were simulated. For the first, it is about the alimentation of the motor pump group from electrical power supply. For the second, the pump unit is connected directly to the photovoltaic panels by integration of a MPPT control. A code of simulation of the solar pumping system was initiated under the Matlab-Simulink environment. Very convivial and flexible graphic interfaces allow an easy use of the code and knowledge of the effects of change of the sunning and temperature on the pumping system.

Keywords: photovoltaic generator, chopper, electrical motor, centrifugal pump

Procedia PDF Downloads 364
8585 A Systematic Approach for Analyzing Multiple Cyber-Physical Attacks on the Smart Grid

Authors: Yatin Wadhawan, Clifford Neuman, Anas Al Majali

Abstract:

In this paper, we evaluate the resilience of the smart grid system in the presence of multiple cyber-physical attacks on its distinct functional components. We discuss attack-defense scenarios and their effect on smart grid resilience. Through contingency simulations in the Network and PowerWorld Simulator, we analyze multiple cyber-physical attacks that propagate from the cyber domain to power systems and discuss how such attacks destabilize the underlying power grid. The analysis of such simulations helps system administrators develop more resilient systems and improves the response of the system in the presence of cyber-physical attacks.

Keywords: smart grid, gas pipeline, cyber- physical attack, security, resilience

Procedia PDF Downloads 296
8584 The Internet of Things Ecosystem: Survey of the Current Landscape, Identity Relationship Management, Multifactor Authentication Mechanisms, and Underlying Protocols

Authors: Nazli W. Hardy

Abstract:

A critical component in the Internet of Things (IoT) ecosystem is the need for secure and appropriate transmission, processing, and storage of the data. Our current forms of authentication, and identity and access management do not suffice because they are not designed to service cohesive, integrated, interconnected devices, and service applications. The seemingly endless opportunities of IoT are in fact circumscribed on multiple levels by concerns such as trust, privacy, security, loss of control, and related issues. This paper considers multi-factor authentication (MFA) mechanisms and cohesive identity relationship management (IRM) standards. It also surveys messaging protocols that are appropriate for the IoT ecosystem.

Keywords: identity relation management, multifactor authentication, protocols, survey of internet of things ecosystem

Procedia PDF Downloads 338
8583 Pilot-Assisted Direct-Current Biased Optical Orthogonal Frequency Division Multiplexing Visible Light Communication System

Authors: Ayad A. Abdulkafi, Shahir F. Nawaf, Mohammed K. Hussein, Ibrahim K. Sileh, Fouad A. Abdulkafi

Abstract:

Visible light communication (VLC) is a new approach of optical wireless communication proposed to support the congested radio frequency (RF) spectrum. VLC systems are combined with orthogonal frequency division multiplexing (OFDM) to achieve high rate transmission and high spectral efficiency. In this paper, we investigate the Pilot-Assisted Channel Estimation for DC biased Optical OFDM (PACE-DCO-OFDM) systems to reduce the effects of the distortion on the transmitted signal. Least-square (LS) and linear minimum mean-squared error (LMMSE) estimators are implemented in MATLAB/Simulink to enhance the bit-error-rate (BER) of PACE-DCO-OFDM. Results show that DCO-OFDM system based on PACE scheme has achieved better BER performance compared to conventional system without pilot assisted channel estimation. Simulation results show that the proposed PACE-DCO-OFDM based on LMMSE algorithm can more accurately estimate the channel and achieves better BER performance when compared to the LS based PACE-DCO-OFDM and the traditional system without PACE. For the same signal to noise ratio (SNR) of 25 dB, the achieved BER is about 5×10-4 for LMMSE-PACE and 4.2×10-3 with LS-PACE while it is about 2×10-1 for system without PACE scheme.

Keywords: channel estimation, OFDM, pilot-assist, VLC

Procedia PDF Downloads 170
8582 A Comparative Analysis of Self-help Housing and Government Mass Housing Scheme in Addressing the Challenge of Housing Access in Mararaba Area of Karu Local Government Area, Nasarawa State, Nigeria

Authors: John Abubakar

Abstract:

Access to decent housing is a global challenge. An estimated one billion people currently live in slum settlements globally. About 80 percent of these slum dwellers are in Asia and Africa. Nigeria accounts for a significant percentage of African slum dwellers because of its size. Addressing the challenge of slum settlement in Nigeria can have far reaching positive implications in Africa. A major slum settlement in Nigeria is Mararaba slum in Karu local government of Nasarawa state. The importance of this slum settlement hinges on its proximity to Abuja, Nigeria’s capital city. This study is an attempt at identifying the impact of self-help housing and government mass housing scheme in addressing the problem of housing access in Mararaba area of Karu local government, Nasarawa state. The research method used is the content analysis of existing literature. After the review of existing literature, the paper argues that self-help house is more impactful in addressing housing access in Mararaba area of Karu local government. Therefore, self-help housing should be recognized and incorporated into the housing policy of Nasarawa state. Both self-help housing and government mass housing programs are reviewed comparatively, and their strengths and weaknesses analyses.

Keywords: slum settlement, informal settlement, progressive improvement, holistic planning

Procedia PDF Downloads 63
8581 Anatomical Characteristics of Superior Gluteal Artery

Authors: Nawaf Al-Kharashi, Waseem Al-Talalwah, Shorok Al Dorazi, Roger Soames

Abstract:

Superior gluteal artery is one of the largest branches of posterior division of the internal iliac artery. It passes between the lumbosacral and first sacral root to escape from the pelvic cavity through the grater sciatic foramen just above the piriformis. The current study includes 41 cadaver investigates the origin and branch of the superior gluteal artery and clarify the clinical significance. In present study, the superior gluteal artery arises from the posterior division of the internal iliac artery directly in 82.5% whereas it arises indirectly as from the sciatic artery in 15.9%. However, it is congenital absence in 1.6% which is compensated by sciatic artery. The sciatic nerve gains vascular supply from superior gluteal artery in two ways either during its course or giving lateral sacral artery in 27% and lumbar branches in 1.6%. It also supplies the adductors group and iliacus via giving obturator artery in 14.3% and in 1.6% respectively. The superior gluteal artery usually passes between lumbosacral trunk and first sacral root in 82.5% whereas it does not passes the sciatic roots as it arises behind them in 15.9%. With a variability of the superior gluteal artery origin, there is a variability of sciatic nerve roots supply. Further, the superior gluteal artery arising from sciatic artery behind the sciatic roots carries a high risk of intra-pelvic bleeding in case of posterior pelvic fracture. Prolonged ligation of the superior gluteal artery which gives lateral sacral artery may result in sciatic neuropathy. Therefore, surgeons have to be aware of the superior gluteal artery variation in origin, course and branches to reduce the iatrogenic faults.

Keywords: internal pudendal artery, inferior gluteal artery, superior gluteal artery, internal iliac artery. sciatic neuropathy, sciatic nerve

Procedia PDF Downloads 340
8580 A Quantitative Case Study Analysis of Store Format Contributors to U.S. County Obesity Prevalence in Virginia

Authors: Bailey Houghtaling, Sarah Misyak

Abstract:

Food access; the availability, affordability, convenience, and desirability of food and beverage products within communities, is influential on consumers’ purchasing and consumption decisions. These variables may contribute to lower dietary quality scores and a higher obesity prevalence documented among rural and disadvantaged populations in the United States (U.S.). Current research assessing linkages between food access and obesity outcomes has primarily focused on distance to a traditional grocery/supermarket store as a measure of optimality. However, low-income consumers especially, including U.S. Department of Agriculture’s Supplemental Nutrition Assistance Program (SNAP) participants, seem to utilize non-traditional food store formats with greater frequency for household dietary needs. Non-traditional formats have been associated with less nutritious food and beverage options and consumer purchases that are high in saturated fats, added sugars, and sodium. Authors’ formative research indicated differences by U.S. region and rurality in the distribution of traditional and non-traditional SNAP-authorized food store formats. Therefore, using Virginia as a case study, the purpose of this research was to determine if a relationship between store format, rurality, and obesity exists. This research applied SNAP-authorized food store data (food access points for SNAP as well as non-SNAP consumers) and obesity prevalence data by Virginia county using publicly available databases: (1) SNAP Retailer Locator, and; (2) U.S. County Health Rankings. The alpha level was set a priori at 0.05. All Virginia SNAP-authorized stores (n=6,461) were coded by format – grocery, drug, mass merchandiser, club, convenience, dollar, supercenter, specialty, farmers market, independent grocer, and non-food store. Simple linear regression was applied primarily to assess the relationship between store format and obesity. Thereafter, multiple variables were added to the regression to account for potential moderating relationships (e.g., county income, rurality). Convenience, dollar, non-food or restaurant, mass merchandiser, farmers market, and independent grocer formats were significantly, positively related to obesity prevalence. Upon controlling for urban-rural status and income, results indicated the following formats to be significantly related to county obesity prevalence with a small, positive effect: convenience (p=0.010), accounting for 0.3% of the variance in obesity prevalence; dollar (p=0.005; 0.5% of the variance), and; non-food (p=0.030; 1.3% of the variance) formats. These results align with current literature on consumer behavior at non-traditional formats. For example, consumers’ food and beverage purchases at convenience and dollar stores are documented to be high in saturated fats, added sugars, and sodium. Further, non-food stores (i.e., quick-serve restaurants) often contribute to a large portion of U.S. consumers’ dietary intake and thus poor dietary quality scores. Current food access research investigates grocery/supermarket access and obesity outcomes. These results suggest more research is needed that focuses on non-traditional food store formats. Nutrition interventions within convenience, dollar, and non-food stores, for example, that aim to enhance not only healthy food access but the affordability, convenience, and desirability of nutritious food and beverage options may impact obesity rates in Virginia. More research is warranted utilizing the presented investigative framework in other U.S. and global regions to explore the role and the potential of non-traditional food store formats to prevent and reduce obesity.

Keywords: food access, food store format, non-traditional food stores, obesity prevalence

Procedia PDF Downloads 126
8579 Comparing the Sequence and Effectiveness of Teaching the Four Basic Operations and Mathematics in Primary Schools

Authors: Abubakar Sadiq Mensah, Hassan Usman

Abstract:

The study compared the effectiveness of Audition, Multiplication, subtraction and Division (AMSD) and Addition, subtraction, Multiplication and Division (ASMD), sequence of teaching these four basic operations in mathematics to primary one pupil’s in Katsina Local Government, Katsina State. The study determined the sequence that was more effective and mostly adopted by teachers of the operations. One hundred (100) teachers and sixty pupils (60) from primary one were used for the study. The pupils were divided into two equal groups. The researcher taught these operations to each group separately for four weeks (4 weeks). Group one was taught using the ASMD sequence, while group two was taught using ASMD sequence. In order to generate the needed data for the study, questionnaires and tests were administered on the samples. Data collected were analyzed and major findings were arrived at: (i) Two primary mathematics text books were used in all the primary schools in the area; (ii) Each of the textbooks contained the ASMD sequence; (iii) 73% of the teachers sampled adopted the ASMD sequence of teaching these operations; and (iv) Group one of the pupils (taught using AMSD sequence) performed significantly better than their counter parts in group two (taught using AMSD sequence). On the basis of this, the researcher concluded that the AMSD sequence was more effective in teaching the operations than the ASMD sequence. Consequently, the researcher concluded that primary schools teachers, authors of primary mathematics textbooks, and curriculum planner should adopt the AMSD sequence of teaching these operations.

Keywords: matematic, high school, four basic operations, effectiveness of teaching

Procedia PDF Downloads 241
8578 Authentication of Physical Objects with Dot-Based 2D Code

Authors: Michał Glet, Kamil Kaczyński

Abstract:

Counterfeit goods and documents are a global problem, which needs more and more sophisticated methods of resolving it. Existing techniques using watermarking or embedding symbols on objects are not suitable for all use cases. To address those special needs, we created complete system allowing authentication of paper documents and physical objects with flat surface. Objects are marked using orientation independent and resistant to camera noise 2D graphic codes, named DotAuth. Based on the identifier stored in 2D code, the system is able to perform basic authentication and allows to conduct more sophisticated analysis methods, e.g., relying on augmented reality and physical properties of the object. In this paper, we present the complete architecture, algorithms and applications of the proposed system. Results of the features comparison of the proposed solution and other products are presented as well, pointing to the existence of many advantages that increase usability and efficiency in the means of protecting physical objects.

Keywords: anti-forgery, authentication, paper documents, security

Procedia PDF Downloads 120
8577 Detection of Change Points in Earthquakes Data: A Bayesian Approach

Authors: F. A. Al-Awadhi, D. Al-Hulail

Abstract:

In this study, we applied the Bayesian hierarchical model to detect single and multiple change points for daily earthquake body wave magnitude. The change point analysis is used in both backward (off-line) and forward (on-line) statistical research. In this study, it is used with the backward approach. Different types of change parameters are considered (mean, variance or both). The posterior model and the conditional distributions for single and multiple change points are derived and implemented using BUGS software. The model is applicable for any set of data. The sensitivity of the model is tested using different prior and likelihood functions. Using Mb data, we concluded that during January 2002 and December 2003, three changes occurred in the mean magnitude of Mb in Kuwait and its vicinity.

Keywords: multiple change points, Markov Chain Monte Carlo, earthquake magnitude, hierarchical Bayesian mode

Procedia PDF Downloads 447