Search results for: metering infrastructure
1452 SAFECARE: Integrated Cyber-Physical Security Solution for Healthcare Critical Infrastructure
Authors: Francesco Lubrano, Fabrizio Bertone, Federico Stirano
Abstract:
Modern societies strongly depend on Critical Infrastructures (CI). Hospitals, power supplies, water supplies, telecommunications are just few examples of CIs that provide vital functions to societies. CIs like hospitals are very complex environments, characterized by a huge number of cyber and physical systems that are becoming increasingly integrated. Ensuring a high level of security within such critical infrastructure requires a deep knowledge of vulnerabilities, threats, and potential attacks that may occur, as well as defence and prevention or mitigation strategies. The possibility to remotely monitor and control almost everything is pushing the adoption of network-connected devices. This implicitly introduces new threats and potential vulnerabilities, posing a risk, especially to those devices connected to the Internet. Modern medical devices used in hospitals are not an exception and are more and more being connected to enhance their functionalities and easing the management. Moreover, hospitals are environments with high flows of people, that are difficult to monitor and can somehow easily have access to the same places used by the staff, potentially creating damages. It is therefore clear that physical and cyber threats should be considered, analysed, and treated together as cyber-physical threats. This means that an integrated approach is required. SAFECARE, an integrated cyber-physical security solution, tries to respond to the presented issues within healthcare infrastructures. The challenge is to bring together the most advanced technologies from the physical and cyber security spheres, to achieve a global optimum for systemic security and for the management of combined cyber and physical threats and incidents and their interconnections. Moreover, potential impacts and cascading effects are evaluated through impact propagation models that rely on modular ontologies and a rule-based engine. Indeed, SAFECARE architecture foresees i) a macroblock related to cyber security field, where innovative tools are deployed to monitor network traffic, systems and medical devices; ii) a physical security macroblock, where video management systems are coupled with access control management, building management systems and innovative AI algorithms to detect behavior anomalies; iii) an integration system that collects all the incoming incidents, simulating their potential cascading effects, providing alerts and updated information regarding assets availability.Keywords: cyber security, defence strategies, impact propagation, integrated security, physical security
Procedia PDF Downloads 1661451 Optimizing Production Yield Through Process Parameter Tuning Using Deep Learning Models: A Case Study in Precision Manufacturing
Authors: Tolulope Aremu
Abstract:
This paper is based on the idea of using deep learning methodology for optimizing production yield by tuning a few key process parameters in a manufacturing environment. The study was explicitly on how to maximize production yield and minimize operational costs by utilizing advanced neural network models, specifically Long Short-Term Memory and Convolutional Neural Networks. These models were implemented using Python-based frameworks—TensorFlow and Keras. The targets of the research are the precision molding processes in which temperature ranges between 150°C and 220°C, the pressure ranges between 5 and 15 bar, and the material flow rate ranges between 10 and 50 kg/h, which are critical parameters that have a great effect on yield. A dataset of 1 million production cycles has been considered for five continuous years, where detailed logs are present showing the exact setting of parameters and yield output. The LSTM model would model time-dependent trends in production data, while CNN analyzed the spatial correlations between parameters. Models are designed in a supervised learning manner. For the model's loss, an MSE loss function is used, optimized through the Adam optimizer. After running a total of 100 training epochs, 95% accuracy was achieved by the models recommending optimal parameter configurations. Results indicated that with the use of RSM and DOE traditional methods, there was an increase in production yield of 12%. Besides, the error margin was reduced by 8%, hence consistent quality products from the deep learning models. The monetary value was annually around $2.5 million, the cost saved from material waste, energy consumption, and equipment wear resulting from the implementation of optimized process parameters. This system was deployed in an industrial production environment with the help of a hybrid cloud system: Microsoft Azure, for data storage, and the training and deployment of their models were performed on Google Cloud AI. The functionality of real-time monitoring of the process and automatic tuning of parameters depends on cloud infrastructure. To put it into perspective, deep learning models, especially those employing LSTM and CNN, optimize the production yield by fine-tuning process parameters. Future research will consider reinforcement learning with a view to achieving further enhancement of system autonomy and scalability across various manufacturing sectors.Keywords: production yield optimization, deep learning, tuning of process parameters, LSTM, CNN, precision manufacturing, TensorFlow, Keras, cloud infrastructure, cost saving
Procedia PDF Downloads 341450 Analysis of Determinants of Growth of Small and Medium Enterprises in Kwara State, Nigeria
Authors: Hussaini Tunde Subairu
Abstract:
Small and Medium Enterprises (SMEs) sectors serve as catalyst for employment generation, national growth, poverty reduction and economic development in developing and developed countries. However, in Nigeria despite copious and plethora of government policies and stimulus schemes directed at SMEs, the sector is still characterized by high rate of failure and discontinuities. This study therefore investigated owners/managers profile, firms characteristics and external factors as possible determinants of SMEs growth from selected SMEs in Kwara State. Primary data were sourced from 200 SMEs respondents registered with the National Association of Small and Medium Enterprises (NASMES) in Kwara State Central Senatorial District. Multiple Regressions Analysis (MRA) was used to analyze the relationship between dependent and independent variables, and pair wise correlation was employed to examine the relationship among independent variables. The Analysis of Variable (ANOVA) was employed to indicate the overall significant of the model The findings revealed that Analysis of variance (ANOVA) put the value of F-statistics at 420.45 and p-value at 0.000 was significant. The values of R2 and Adjusted R2 of 0.9643 and 0.9620 respectively suggested that 96 percent of variations in employment growth were explained by the explanatory variables. The level of technical and managerial education has t- value of 24.14 and p-value of 0.001, length of managers/owners experience in similar trade with t- value of 21.37 and p-value of 0.001, age of managers/owners with t- value of 42.98 and p-value of 0.001, firm age with t- value of 25.91 and p-value of 0.001, numbers of firms in a cluster with t- value of 7.20 and p-value of 0.001, access to formal finance with t-value of 5.56 and p-value of 0.001, firm technology innovation with t- value of 25.32 and p-value of 0.01, institutional support with t- value of 18.89 and p-value of 0.01, globalization with t- value of 9.78 and p-value of 0.01, and infrastructure with t-value of 10.75 and p-value of 0.01. The result also indicated that initial size has t-value of -1.71 and p-value of 0.090 which is consistent with Gibrat’s Law. The study concluded that owners/managers profile, firm specific characteristics and external factors substantially influenced employment growths of SMEs in the study area. Therefore, policy implication should enhance human capital development of SMEs owners/managers, and strengthen fiscal policy thrust through imposition on tariff regime to minimize effect of globalization. Governments at all level must support SMEs growth radically and enhance institutional support for SMEs growth and radically and significantly upgrading key infrastructure as rail/roads, rail, telecommunications, water and power.Keywords: external factors, firm specific characteristics, owners / manager profile, small and medium enterprises
Procedia PDF Downloads 2461449 A Holistic Approach to Institutional Cyber Security
Authors: Mehmet Kargaci
Abstract:
It is more important to access information than to get the correct information and to transform it to the knowledge in a proper way. Every person, organizations or governments who have the knowledge now become the target. Cyber security involves the range of measures to be taken from individual to the national level. The National institutions refer to academic, military and major public and private institutions, which are very important for the national security. Thus they need further cyber security measures. It appears that the traditional cyber security measures in the national level are alone not sufficient, while the individual measures remain in a restricted level. It is evaluated that the most appropriate method for preventing the cyber vulnerabilities rather than existing measures are to develop institutional measures. This study examines the cyber security measures to be taken, especially in the national institutions.Keywords: cyber defence, information, critical infrastructure, security
Procedia PDF Downloads 5391448 Health Transformation Program and Effects on Health Expenditures
Authors: Zeynep Karacor, Rahime Hulya Ozturk
Abstract:
In recent years, the rise of population density and the problem of aging population took attention to the health expenditures. In Turkey, some regulations and infrastructure changes in health sector have occurred. These changes are called Health Transformation Program. The productivity of health services, patient satisfaction, quality of services are tried to be improved with this program. Some radical changes are applied in Turkish economy in this context. The aim of this paper is to present the effects of Health Transformation Program on health expenditures. In the first part of the paper, some information’s about health system and applications in Turkey are discussed. In the second part, the aims of Health Transformation Program are explained. And in the third part the effects of Health Transformation Program on health expenditures are examined.Keywords: health transformation program, Turkey, health services, health expenditures
Procedia PDF Downloads 3961447 Using Vulnerability to Reduce False Positive Rate in Intrusion Detection Systems
Authors: Nadjah Chergui, Narhimene Boustia
Abstract:
Intrusion Detection Systems are an essential tool for network security infrastructure. However, IDSs have a serious problem which is the generating of massive number of alerts, most of them are false positive ones which can hide true alerts and make the analyst confused to analyze the right alerts for report the true attacks. The purpose behind this paper is to present a formalism model to perform correlation engine by the reduction of false positive alerts basing on vulnerability contextual information. For that, we propose a formalism model based on non-monotonic JClassicδє description logic augmented with a default (δ) and an exception (є) operator that allows a dynamic inference according to contextual information.Keywords: context, default, exception, vulnerability
Procedia PDF Downloads 2591446 Check Factors Contributing to the Increase or Decrease in Labor Productivity in Employees Applied Science Center Municipal Andimeshk
Authors: Hossein Boromandfar, Ahmad Ghalavandi
Abstract:
This paper examines the importance of human resources as a strategic resource and the factors that lead to increased Labor productivity in Applied Science Center Andimeshk pay. First, the concepts and definitions of productivity and factors affecting it, and then determine the center Recommendations for improving the productivity of the university at a high level its improvement. What leads to increased productivity of labor is worth. The most competent human resources infrastructure is set, because by moving towards the development and promotion. The use of qualified employees in the university with a focus on specific objectives can be effective on its promotion.Keywords: productivity, manage, human resources, center for applied science
Procedia PDF Downloads 4181445 The Application of Hellomac Rockfall Alert System in Rockfall Barriers: An Explainer
Authors: Kinjal Parmar, Matteo Lelli
Abstract:
The usage of IoT technology as a rockfall alert system is relatively new. This paper explains the potential of such an alert system called HelloMac from Maccaferri which provides transportation infrastructure asset owners the way to effectively utilize their resources in the detection of boulder impacts on rockfall barriers. This would ensure a faster assessment of the impacted barrier and subsequently facilitates the implementation of remedial works in an effective and timely manner. In addition, the HelloMac can also be integrated with another warning system to alert vehicle users of the unseen dangers ahead. HelloMac is developed to work also in remote areas, where cell coverage is not available. User gets notified when a rockfall even occurs via mobile app, SMS and email. Using such alarming systems effectively, we can reduce the risk of rockfall hazard.Keywords: rockfall, barrier, HelloMac, rockfall alert system
Procedia PDF Downloads 521444 A Study on the Quantitative Evaluation Method of Asphalt Pavement Condition through the Visual Investigation
Authors: Sungho Kim, Jaechoul Shin, Yujin Baek
Abstract:
In recent years, due to the environmental impacts and time factor, etc., various type of pavement deterioration is increasing rapidly such as crack, pothole, rutting and roughness degradation. The Ministry of Land, Infrastructure and Transport maintains regular pavement condition of the highway and the national highway using the pavement condition survey equipment and structural survey equipment in Korea. Local governments that maintain local roads, farm roads, etc. are difficult to maintain the pavement condition using the pavement condition survey equipment depending on economic conditions, skills shortages and local conditions such as narrow roads. This study presents a quantitative evaluation method of the pavement condition through the visual inspection to overcome these problems of roads managed by local governments. It is difficult to evaluate rutting and roughness with the naked eye. However, the condition of cracks can be evaluated with the naked eye. Linear cracks (m), area cracks (m²) and potholes (number, m²) were investigated with the naked eye every 100 meters for survey the cracks. In this paper, crack ratio was calculated using the results of the condition of cracks and pavement condition was evaluated by calculated crack ratio. The pavement condition survey equipment also investigated the pavement condition in the same section in order to evaluate the reliability of pavement condition evaluation by the calculated crack ratio. The pavement condition was evaluated through the SPI (Seoul Pavement Index) and calculated crack ratio using results of field survey. The results of a comparison between 'the SPI considering only crack ratio' and 'the SPI considering rutting and roughness either' using the equipment survey data showed a margin of error below 5% when the SPI is less than 5. The SPI 5 is considered the base point to determine whether to maintain the pavement condition. It showed that the pavement condition can be evaluated using only the crack ratio. According to the analysis results of the crack ratio between the visual inspection and the equipment survey, it has an average error of 1.86%(minimum 0.03%, maximum 9.58%). Economically, the visual inspection costs only 10% of the equipment survey and will also help the economy by creating new jobs. This paper advises that local governments maintain the pavement condition through the visual investigations. However, more research is needed to improve reliability. Acknowledgment: The author would like to thank the MOLIT (Ministry of Land, Infrastructure, and Transport). This work was carried out through the project funded by the MOLIT. The project name is 'development of 20mm grade for road surface detecting roadway condition and rapid detection automation system for removal of pothole'.Keywords: asphalt pavement maintenance, crack ratio, evaluation of asphalt pavement condition, SPI (Seoul Pavement Index), visual investigation
Procedia PDF Downloads 1671443 Mountain Architectural Design Under the Concept of Pedestrian-oriented Cities: Taking Bai Xiang Ju as an Example
Authors: Xiaohan Wang
Abstract:
In the rapid urbanization process, urban design concepts are shifting towards people-oriented approaches. Emphasizing the pedestrian experience promotes urban livability and sustainable development. In mountainous cities, the inconvenience of transportation caused by complex terrain makes pedestrian-friendly architectural design one of the entry points for problem-solving. This paper mainly takes the high-rise residential area of Bai Xiang Ju in Chongqing as an example to explore the architectural design strategies of mountainous cities under the concept of pedestrian-oriented urban design, providing valuable references and insights for similar urban architectural designs.Keywords: pedestrian city, Bai Xiang Ju, mountain architecture, pedestrian infrastructure, pedestrian-oriented design
Procedia PDF Downloads 41442 Performance Evaluation of DSR and OLSR Routing Protocols in MANET Using Varying Pause Time
Authors: Yassine Meraihi, Dalila Acheli, Rabah Meraihi
Abstract:
MANET for Mobile Ad hoc NETwork is a collection of wireless mobile nodes that communicates with each other without using any existing infrastructure, access point or centralized administration, due to the higher mobility and limited radio transmission range, routing is an important issue in ad hoc network, so in order to ensure reliable and efficient route between to communicating nodes quickly, an appropriate routing protocol is needed. In this paper, we present the performance analysis of two mobile ad hoc network routing protocols namely DSR and OLSR using NS2.34, the performance is determined on the basis of packet delivery ratio, throughput, average jitter and end to end delay with varying pause time.Keywords: DSR, OLSR, quality of service, routing protocols, MANET
Procedia PDF Downloads 5521441 The Development of Encrypted Near Field Communication Data Exchange Format Transmission in an NFC Passive Tag for Checking the Genuine Product
Authors: Tanawat Hongthai, Dusit Thanapatay
Abstract:
This paper presents the development of encrypted near field communication (NFC) data exchange format transmission in an NFC passive tag for the feasibility of implementing a genuine product authentication. We propose a research encryption and checking the genuine product into four major categories; concept, infrastructure, development and applications. This result shows the passive NFC-forum Type 2 tag can be configured to be compatible with the NFC data exchange format (NDEF), which can be automatically partially data updated when there is NFC field.Keywords: near field communication, NFC data exchange format, checking the genuine product, encrypted NFC
Procedia PDF Downloads 2811440 ISIS and Its Impact on Geographical Change in Iraq’s Population
Authors: Pshtiwan Shafiq Ahmed
Abstract:
The invasion of Iraq was a turning point in Iraq, destroying the economic infrastructure of several important strategic and historic cities, including Mosul, Anbar and Diyala, which will take decades to rebuild It left 18,805 people dead and 37,000 injured, destroying hundreds of villages and cities, displacing 2.3 million people, and increasing the number of orphans The increase in the number of windows and the destruction of society and the structure of the population so that the number of children, women and the elderly has increased. Religious clashes have increased and religious cleansing has begun, trying to eradicate Christianity, Yazidis and Kakais from the whole of Iraq, causing the largest number of Christians, Yazidis and Kakais to leave Iraq and many of them went missing.Keywords: ISIS, population change, geographical change, Iraq
Procedia PDF Downloads 921439 Security Analysis of SIMSec Protocol
Authors: Kerem Ok, Cem Cevikbas, Vedat Coskun, Mohammed Alsadi, Busra Ozdenizci
Abstract:
Un-keyed SIM cards do not contain the required security infrastructure to provide end-to-end encryption with Service Providers. Hence, new, emerging, or smart services those require end-to-end encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform end-to-end data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol.Keywords: End-to-end encryption, key exchange, SIM card, smart card
Procedia PDF Downloads 2861438 Investigating the Problems in Landscape Design Education in Selcuk University Agriculture Faculty Landscape Architecture Department (Konya-Turkey)
Authors: Banu Ozturk Kurtaslan, Ruhugul Ozge Ocak
Abstract:
In this study, educational problems related to landscape design education which is an important study area of landscape architecture discipline. It is important to research about the problems in S.U. Agriculture Faculty Landscape Architecture Department which is a new department, started its B.Sc. education in 2011; and developing some suggestions on this issue in terms of future of the department. In the context of the study a questionnaire has been developed to conduct to the B.Sc. students. The questions has been prepared under the topics of education program, instructor, student, physical infrastructure and other problems.Keywords: landscape design, landscape design education, problems, Selcuk University Landscape Architecture Department
Procedia PDF Downloads 5031437 Multi-Criteria Nautical Ports Capacity and Services Planning
Authors: N. Perko, N. Kavran, M. Bukljas, I. Berbic
Abstract:
This paper is a result of implemented research on proposed introduced methodology for nautical ports capacity planning by introducing a multi-criteria approach of defined criteria and impacts at the Adriatic Sea. The purpose was analysing the determinants -characteristics of infrastructure and services of nautical ports capacity allocated, especially nowadays due to COVID-19 pandemic, as crucial for the successful operation of nautical ports. Giving the importance of the defined priorities for short-term and long-term planning is essential not only in terms of the development of nautical tourism but also in terms of developing the maritime system, but unfortunately, this is not always carried out. Evaluation of the use of resources should follow from a detailed analysis of all aspects of resources bearing in mind that nautical tourism used resources in a sustainable manner and generate effects in the tourism and maritime sectors. Consequently, the identified multiplier effect of nautical tourism, which should be defined and quantified in detail, should be one of the major competitive products on the Croatian Adriatic and the Mediterranean. Research of nautical tourism is necessary to quantify the effects and required planning system development. In the future, the greatest threat to the long-term sustainable development of nautical tourism can be its further uncontrolled or unlimited and undirected development, especially under pressure markedly higher demand than supply for new moorings in the Mediterranean. Results of this implemented research are applicable to nautical ports management and decision-makers of maritime transport system development. This paper will present implemented research and obtained result-developed methodology for nautical port capacity planning -port capacity planning multi-criteria decision-making. A proposed methodological approach of multi-criteria capacity planning includes four criteria (spatial - transport, cost - infrastructure, ecological and organizational criteria, and additional services). The importance of the criteria and sub-criteria is evaluated and carried out as the basis for sensitivity analysis of the importance of the criteria and sub-criteria. Based on the analysis of the identified and quantified importance of certain criteria and sub-criteria, as well as sensitivity analysis and analysis of changes of the quantified importance, scientific and applicable results will be presented. These obtained results have practical applicability by management of nautical ports in the planning of increasing capacity and further development and for the adaptation of existing nautical ports. Obtained research is applicable and replicable in other seas, and results are especially important and useful in this COVID-19 pandemic challenging maritime development framework.Keywords: Adriatic Sea, capacity, infrastructures, maritime system, methodology, nautical ports, nautical tourism, service
Procedia PDF Downloads 1901436 Effect of Cloud Computing on Enterprises
Authors: Amir Rashid
Abstract:
Today is the world of innovations where everyone is looking for a change. Organizations are now looking toward virtualization in order to minimize their computing cost. Cloud Computing has also introduced itself by the means of reducing computing cost. It offers different approach to make computing better by improving utilization and reducing infrastructure and administrative costs. Cloud Computing is basically the amalgamation of Utility Computing and SaaS (Software as a Service). Cloud Computing is quite new to organizations as it is still at its deploying stage. Due to this reason, organizations are not confident whether to adopt it or not. This thesis investigates the problem for organization concerning the security and cost issues. Benefits and drawbacks are being highlighted which organizations can have or suffer in order to adopt Cloud Computing. In Conclusion, Cloud Computing is a better option available for small and medium organizations with a comparison to large companies both in terms of data security and cost.Keywords: cloud computing, security, cost, elasticity, PaaS, IaaS, SaaS
Procedia PDF Downloads 3421435 Big Data Strategy for Telco: Network Transformation
Abstract:
Big data has the potential to improve the quality of services; enable infrastructure that businesses depend on to adapt continually and efficiently; improve the performance of employees; help organizations better understand customers; and reduce liability risks. Analytics and marketing models of fixed and mobile operators are falling short in combating churn and declining revenue per user. Big Data presents new method to reverse the way and improve profitability. The benefits of Big Data and next-generation network, however, are more exorbitant than improved customer relationship management. Next generation of networks are in a prime position to monetize rich supplies of customer information—while being mindful of legal and privacy issues. As data assets are transformed into new revenue streams will become integral to high performance.Keywords: big data, next generation networks, network transformation, strategy
Procedia PDF Downloads 3611434 Misleading Node Detection and Response Mechanism in Mobile Ad-Hoc Network
Authors: Earleen Jane Fuentes, Regeene Melarese Lim, Franklin Benjamin Tapia, Alexis Pantola
Abstract:
Mobile Ad-hoc Network (MANET) is an infrastructure-less network of mobile devices, also known as nodes. These nodes heavily rely on each other’s resources such as memory, computing power, and energy. Thus, some nodes may become selective in forwarding packets so as to conserve their resources. These nodes are called misleading nodes. Several reputation-based techniques (e.g. CORE, CONFIDANT, LARS, SORI, OCEAN) and acknowledgment-based techniques (e.g. TWOACK, S-TWOACK, EAACK) have been proposed to detect such nodes. These techniques do not appropriately punish misleading nodes. Hence, this paper addresses the limitations of these techniques using a system called MINDRA.Keywords: acknowledgment-based techniques, mobile ad-hoc network, selfish nodes, reputation-based techniques
Procedia PDF Downloads 3861433 A Review of the Fundamental Principles of the National Transport Policy and Developmental Implementation Programmes
Authors: Charles Asenime, Asaju Joel, Fagbenro Abiola, Adetoyese Oguntimehin, Agosu Rebecca
Abstract:
This paper examines the fundamental principles of the National Transport Policy (NTP) and determined its role in the execution of transport projects, and the establishment of ministries, departments, and agencies. Data used for the paper are from secondary sources of commissioned reports, studies, internet sources, and government releases. Results of the analysis show that the draft NTP has been used to establish transport schemes, master plans, and transport infrastructure. The paper concludes that though, the national transport Policy is still in a draft form, its production, however, has shaped the transport system in Nigeria and has shown how transport has improved the economy through the efficient utilisation of resources, improved mobility, and lifestyle.Keywords: principles, draft, system, resources
Procedia PDF Downloads 1441432 An Efficiency Measurement of E-Government Performance for United Nation Ranking Index
Authors: Yassine Jadi, Lin Jie
Abstract:
In order to serve the society in an electronic manner, many developing countries have launched tremendous e-government projects. The strategies of development and implementation e-government system have reached different levels, and to ensure consistency of development, the governments need to evaluate e-government performance. The United nation has design e-government development ranking index (EGDI) that rely on three indexes, Online service index (OSI), Telecommunication Infrastructure index (TII), and human capital index( HCI) which are not reflecting the interaction between a government and their citizens. Based on data envelopment analyses (DEA) technique, we are using E-participating index (EPI) as an output of government effort to evaluate the performance of e-government system. Therefore, the ranking index can be achieved in efficiency manner.Keywords: e-government, DEA, efficiency measurement, EGDI
Procedia PDF Downloads 3761431 Reforms in China's Vaccine Administration: Vulnerabilities, Legislative Progresses and the Systemic View of Vaccine Administration Law
Authors: Lin Tang, Xiaoxia Guo, Lingling Zhang
Abstract:
Recent vaccine scandals overshadowed China’s accomplishment of public health, triggering discussions on the causes of vaccine incidents. Through legal interpretation of selected vaccine incidents and analysis of systemic vulnerabilities in vaccine circulation and lot release, a panoramic review of legislative progresses in the vaccine administration sheds the light on this debate. In essence, it is the combination of the lagging legal system and the absence of information technology infrastructure in the process of vaccine administration reform that has led to the recurrence of vaccine incidents. These findings have significant implications for further improvement of vaccine administration and China’s participation in global healthcare.Keywords: legislation, lot release, public health, reform, vaccine administration, vaccine circulation
Procedia PDF Downloads 1541430 Cross-Cultural Psychiatry: An Analysis of Mental Health Care Accessibility and Societal Attitudes in South Asia and the USA
Authors: Irfan Khan, Chiemeka David Ekene Arize, Hilly Swami
Abstract:
Mental health care access and stigma present global challenges, with disparities significantly influenced by economic, cultural, and societal factors. This paper focuses on the mental health care systems of South Asia and the United States, comparing how cultural norms, infrastructure, and policy affect mental health care accessibility and effectiveness in both regions. In South Asia, mental health care is hindered by a combination of underfunding, a critical shortage of professionals, and deeply ingrained cultural stigmas that deter help-seeking. Traditional beliefs often link mental disorders to supernatural causes, and women face additional barriers due to gender disparities. Despite recent policy reforms, implementation remains a challenge, particularly in rural areas. In contrast, the U.S. has a more developed healthcare infrastructure but continues to grapple with stigma, particularly within professional settings like law enforcement. Interventions such as the use of community health workers (CHWs) and collaborative care models have improved access, especially among underserved populations. However, the U.S. still faces disparities in care for minority groups, where cultural competence and stigma reduction are critical for improving outcomes. The paper’s comparative analysis identifies transferable strategies from the U.S. that could be adapted to South Asia’s context, such as integrating mental health care into primary care and using digital interventions to bridge the treatment gap in rural areas. Additionally, South Asia's community-centered approaches offer insights that could enhance the cultural adaptability of interventions in the U.S., particularly for ethnic minorities and immigrant populations. Through a systematic review, this paper examines intervention strategies, stigma, policy support, and the cultural and social determinants of mental health in both regions. The findings emphasize the need for culturally tailored mental health interventions and policy reforms that promote access and reduce stigma. Recommendations include enhancing public awareness, integrating mental health services into primary care, expanding community-based programs, and leveraging digital health interventions. This research contributes to the global discourse on mental health by highlighting culturally sensitive approaches that can be adapted to improve mental health care access and outcomes in both South Asia and the United States.Keywords: mental health stigma South Asia, mental health care accessibility South Asia, cultural influences mental health South Asia, mental health interventions USA, cross-cultural mental health care
Procedia PDF Downloads 321429 Integrated Geophysical Surveys for Sinkhole and Subsidence Vulnerability Assessment, in the West Rand Area of Johannesburg
Authors: Ramoshweu Melvin Sethobya, Emmanuel Chirenje, Mihlali Hobo, Simon Sebothoma
Abstract:
The recent surge in residential infrastructure development around the metropolitan areas of South Africa has necessitated conditions for thorough geotechnical assessments to be conducted prior to site developments to ensure human and infrastructure safety. This paper appraises the success in the application of multi-method geophysical techniques for the delineation of sinkhole vulnerability in a residential landscape. Geophysical techniques ERT, MASW, VES, Magnetics and gravity surveys were conducted to assist in mapping sinkhole vulnerability, using an existing sinkhole as a constraint at Venterspost town, West of Johannesburg city. A combination of different geophysical techniques and results integration from those proved to be useful in the delineation of the lithologic succession around sinkhole locality, and determining the geotechnical characteristics of each layer for its contribution to the development of sinkholes, subsidence and cavities at the vicinity of the site. Study results have also assisted in the determination of the possible depth extension of the currently existing sinkhole and the location of sites where other similar karstic features and sinkholes could form. Results of the ERT, VES and MASW surveys have uncovered dolomitic bedrock at varying depths around the sites, which exhibits high resistivity values in the range 2500-8000ohm.m and corresponding high velocities in the range 1000-2400 m/s. The dolomite layer was found to be overlain by a weathered chert-poor dolomite layer, which has resistivities between the range 250-2400ohm.m, and velocities ranging from 500-600m/s, from which the large sinkhole has been found to collapse/ cave in. A compiled 2.5D high resolution Shear Wave Velocity (Vs) map of the study area was created using 2D profiles of MASW data, offering insights into the prevailing lithological setup conducive for formation various types of karstic features around the site. 3D magnetic models of the site highlighted the regions of possible subsurface interconnections between the currently existing large sinkhole and the other subsidence feature at the site. A number of depth slices were used to detail the conditions near the sinkhole as depth increases. Gravity surveys results mapped the possible formational pathways for development of new karstic features around the site. Combination and correlation of different geophysical techniques proved useful in delineation of the site geotechnical characteristics and mapping the possible depth extend of the currently existing sinkhole.Keywords: resistivity, magnetics, sinkhole, gravity, karst, delineation, VES
Procedia PDF Downloads 811428 Investigation of Optical Requirements for Power System Assets Monitoring with Unmanned Aerial Vehicles
Authors: Ioana Pisica, Dimitrios Gkritzapis
Abstract:
The significance of UAS in scientific applications has been amply demonstrated in recent years. The combinations of portability and quasi-static positioning by means of flying in close loop path make them versatile and efficient in the inspection of power systems infrastructure. In this paper, we critically assess several platforms and sensor capabilities to identify their pros and cons in relation to the power systems assets to be monitored. In this respect, it is paramount the flights to be conducted by using UAS which bear certain suitable features, such as responsive and easy control, video capturing in real time, autonomous routing of pre-planned flight programming with differentiating payloads. The outcome of this research is a set of optimal requirements for power system assets monitoring with UAS.Keywords: platforms, power system, sensors, UAVs
Procedia PDF Downloads 2871427 Towards a Common Architecture for Cloud Computing Interoperability
Authors: Sana Kouchi, Hassina Nacer, Kadda Beghdad-bey
Abstract:
Cloud computing is growing very fast in the market and has become one of the most controversial discussed developments in recent years. Cloud computing providers become very numerous in these areas and each of them prefers its own cloud computing infrastructure, due to the incompatibility of standards and cloud access formats, which prevents them from accepting to support cloud computing applications in a standardized manner, this heterogeneity creates the problem of interoperability between clouds, and considering that cloud customers are probably in search of an interoperable cloud computing, where they will have total control over their applications and simply migrate their services as needed, without additional development investment. A cloud federation strategy should be considered. In this article, we propose a common architecture for the cloud that is based on existing architectures and also the use of best practices from ICT frameworks, such as IBM, ITIL, NIST, etc., to address the interoperability of architectures issues in a multi-cloud system.Keywords: cloud computing, reference architecture, interoperability, standard
Procedia PDF Downloads 1741426 A Study on Big Data Analytics, Applications and Challenges
Authors: Chhavi Rana
Abstract:
The aim of the paper is to highlight the existing development in the field of big data analytics. Applications like bioinformatics, smart infrastructure projects, Healthcare, and business intelligence contain voluminous and incremental data, which is hard to organise and analyse and can be dealt with using the framework and model in this field of study. An organization's decision-making strategy can be enhanced using big data analytics and applying different machine learning techniques and statistical tools on such complex data sets that will consequently make better things for society. This paper reviews the current state of the art in this field of study as well as different application domains of big data analytics. It also elaborates on various frameworks in the process of Analysis using different machine-learning techniques. Finally, the paper concludes by stating different challenges and issues raised in existing research.Keywords: big data, big data analytics, machine learning, review
Procedia PDF Downloads 851425 A Study on Big Data Analytics, Applications, and Challenges
Authors: Chhavi Rana
Abstract:
The aim of the paper is to highlight the existing development in the field of big data analytics. Applications like bioinformatics, smart infrastructure projects, healthcare, and business intelligence contain voluminous and incremental data which is hard to organise and analyse and can be dealt with using the framework and model in this field of study. An organisation decision-making strategy can be enhanced by using big data analytics and applying different machine learning techniques and statistical tools to such complex data sets that will consequently make better things for society. This paper reviews the current state of the art in this field of study as well as different application domains of big data analytics. It also elaborates various frameworks in the process of analysis using different machine learning techniques. Finally, the paper concludes by stating different challenges and issues raised in existing research.Keywords: big data, big data analytics, machine learning, review
Procedia PDF Downloads 951424 Prediction of CO2 Concentration in the Korea Train Express (KTX) Cabins
Authors: Yong-Il Lee, Do-Yeon Hwang, Won-Seog Jeong, Duckshin Park
Abstract:
Recently, because of the high-speed trains forced ventilation, it is important to control the ventilation. The ventilation is for controlling various contaminants, temperature, and humidity. The high-speed train route is straight to a destination having a high speed. And there are many mountainous areas in Korea. So, tunnel rate is higher then other country. KTX HVAC block off the outdoor air, when entering tunnel. So the high tunnel rate is an effect of ventilation in the KTX cabin. It is important to reduction rate in CO2 concentration prediction. To meet the air quality of the public transport vehicles recommend standards, the KTX cabin of CO2 concentration should be managed. In this study, the concentration change was predicted by CO2 prediction simulation in route to be opened.Keywords: CO2 prediction, KTX, ventilation, infrastructure and transportation engineering
Procedia PDF Downloads 5471423 Performance Analysis and Energy Consumption of Routing Protocol in Manet Using Grid Topology
Authors: Vivek Kumar Singh, Tripti Singh
Abstract:
An ad hoc wireless network consists of mobile networks which creates an underlying architecture for communication without the help of traditional fixed-position routers. Ad-hoc On-demand Distance Vector (AODV) is a routing protocol used for Mobile Ad hoc Network (MANET). Nevertheless, the architecture must maintain communication routes although the hosts are mobile and they have limited transmission range. There are different protocols for handling the routing in the mobile environment. Routing protocols used in fixed infrastructure networks cannot be efficiently used for mobile ad-hoc networks, so that MANET requires different protocols. This paper presents the performance analysis of the routing protocols used various parameter-patterns with Two-ray model.Keywords: AODV, packet transmission rate, pause time, ZRP, QualNet 6.1
Procedia PDF Downloads 831