Search results for: computer security incident response team
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11235

Search results for: computer security incident response team

10575 Creative Culture to Innovative Culture: Transformal Operation

Authors: Peer M. Sathikh

Abstract:

Creativity and innovation have become an important phenomenon today, whose potential is being realized through the success of Apple, Google/Android, Nike, Virgin, Dyson and other multinationals that are a household name today. Creativity and Innovation are, many times, used interchangeably, causing confusion as to what each represents and are capable of. Attempts to understand creativity and innovation clearly point to the difference, and at the same time, inter-dependency of one on the other. The assumption that having more creative personnel in a team will translate into innovation sooner or later seems generally counterproductive. What helps define the role of creativity and innovation in an organization and how can one build an innovative team? This paper points to the importance of understanding creative culture and innovation culture in order to bring about the desired innovation outcome and proposes a means to transform one to another as ideas move from mere ideas to useful innovation.

Keywords: creativity, innovation, creative culture, innovation culture, transformal operators

Procedia PDF Downloads 393
10574 Innovative Technology to Sustain Food Security in Qatar

Authors: Sana Abusin

Abstract:

Food security in Qatar is a research priority of Qatar University (2021-2025) and all national strategies, including the Qatar National Vision 2030 and food security strategy (2018-2023). Achieving food security requires three actions: 1) transforming surplus food to those who are insecure; 2) reducing food loss and waste by recycling food into valuable resources such as compost (“green fertilizer”) that can be used in growing food; and, finally, 3) establishing strong enforcement agencies to protect consumers from outdated food and promote healthy food. Currently, these objectives are approached separately and not in a sustainable fashion. Food security in Qatar is a research priority of Qatar University (2021-2025) and all national strategies, including the Qatar National Vision 2030 and food security strategy (2018-2023). The study aims to develop an innovative mobile application that supports a sustainable solution to food insecurity and food waste in Qatar. The application will provide a common solution for many different users. For producers, it will facilitate easy disposal of excess food. For charities, it will notify them about surplus food ready for redistribution. The application will also benefit the second layer of end-users in the form of food recycling companies, who will receive information about available food waste that is unable to be consumed. We will use self-exoplanetary diagrams and digital pictures to show all the steps to the final stage. The aim is to motivate the young generation toward innovation and creation, and to encourage public-private collaboration in this sector.

Keywords: food security, innovative technology, sustainability, food waste, Qatar

Procedia PDF Downloads 110
10573 On-The-Fly Cross Sections Generation in Neutron Transport with Wide Energy Region

Authors: Rui Chen, Shu-min Zhou, Xiong-jie Zhang, Ren-bo Wang, Fan Huang, Bin Tang

Abstract:

During the temperature changes in reactor core, the nuclide cross section in reactor can vary with temperature, which eventually causes the changes of reactivity. To simulate the interaction between incident neutron and various materials at different temperatures on the nose, it is necessary to generate all the relevant reaction temperature-dependent cross section. Traditionally, the real time cross section generation method is used to avoid storing huge data but contains severe problems of low efficiency and adaptability for narrow energy region. Focused on the research on multi-temperature cross sections generation in real time during in neutron transport, this paper investigated the on-the-fly cross section generation method for resolved resonance region, thermal region and unresolved resonance region, and proposed the real time multi-temperature cross sections generation method based on double-exponential formula for resolved resonance region, as well as the Neville interpolation for thermal and unresolved resonance region. To prove the correctness and validity of multi-temperature cross sections generation based on wide energy region of incident neutron, the proposed method was applied in critical safety benchmark tests, which showed the capability for application in reactor multi-physical coupling simulation.

Keywords: cross section, neutron transport, numerical simulation, on-the-fly

Procedia PDF Downloads 186
10572 Ranking Theory-The Paradigm Shift in Statistical Approach to the Issue of Ranking in a Sports League

Authors: E. Gouya Bozorg

Abstract:

The issue of ranking of sports teams, in particular soccer teams is of primary importance in the professional sports. However, it is still based on classical statistics and models outside of area of mathematics. Rigorous mathematics and then statistics despite the expectation held of them have not been able to effectively engage in the issue of ranking. It is something that requires serious pathology. The purpose of this study is to change the approach to get closer to mathematics proper for using in the ranking. We recommend using theoretical mathematics as a good option because it can hermeneutically obtain the theoretical concepts and criteria needful for the ranking from everyday language of a League. We have proposed a framework that puts the issue of ranking into a new space that we have applied in soccer as a case study. This is an experimental and theoretical study on the issue of ranking in a professional soccer league based on theoretical mathematics, followed by theoretical statistics. First, we showed the theoretical definition of constant number Є = 1.33 or ‘golden number’ of a soccer league. Then, we have defined the ‘efficiency of a team’ by this number and formula of μ = (Pts / (k.Є)) – 1, in which Pts is a point obtained by a team in k number of games played. Moreover, K.Є index has been used to show the theoretical median line in the league table and to compare top teams and bottom teams. Theoretical coefficient of σ= 1 / (1+ (Ptx / Ptxn)) has also been defined that in every match between the teams x, xn, with respect to the ability of a team and the points of both of them Ptx, Ptxn, and it gives a performance point resulting in a special ranking for the League. And it has been useful particularly in evaluating the performance of weaker teams. The current theory has been examined for the statistical data of 4 major European Leagues during the period of 1998-2014. Results of this study showed that the issue of ranking is dependent on appropriate theoretical indicators of a League. These indicators allowed us to find different forms of ranking of teams in a league including the ‘special table’ of a league. Furthermore, on this basis the issue of a record of team has been revised and amended. In addition, the theory of ranking can be used to compare and classify the different leagues and tournaments. Experimental results obtained from archival statistics of major professional leagues in the world in the past two decades have confirmed the theory. This topic introduces a new theory for ranking of a soccer league. Moreover, this theory can be used to compare different leagues and tournaments.

Keywords: efficiency of a team, ranking, special table, theoretical mathematic

Procedia PDF Downloads 410
10571 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks

Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner

Abstract:

Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.

Keywords: USB, device, cyber security, attack, detection

Procedia PDF Downloads 384
10570 Second Order Statistics of Dynamic Response of Structures Using Gamma Distributed Damping Parameters

Authors: Badreddine Chemali, Boualem Tiliouine

Abstract:

This article presents the main results of a numerical investigation on the uncertainty of dynamic response of structures with statistically correlated random damping Gamma distributed. A computational method based on a Linear Statistical Model (LSM) is implemented to predict second order statistics for the response of a typical industrial building structure. The significance of random damping with correlated parameters and its implications on the sensitivity of structural peak response in the neighborhood of a resonant frequency are discussed in light of considerable ranges of damping uncertainties and correlation coefficients. The results are compared to those generated using Monte Carlo simulation techniques. The numerical results obtained show the importance of damping uncertainty and statistical correlation of damping coefficients when obtaining accurate probabilistic estimates of dynamic response of structures. Furthermore, the effectiveness of the LSM model to efficiently predict uncertainty propagation for structural dynamic problems with correlated damping parameters is demonstrated.

Keywords: correlated random damping, linear statistical model, Monte Carlo simulation, uncertainty of dynamic response

Procedia PDF Downloads 273
10569 Response of Concrete Panels Subjected to Compression-Tension State of Stresses

Authors: Mohammed F. Almograbi

Abstract:

For reinforced concrete panels the risk of failure due to compression -tension state of stresses, results from pure shear or torsion, can be a major problem. The present calculation methods for such stresses from multiple influences are without taking into account the softening of cracked concrete remains conservative. The non-linear finite element method has become an important and increasingly used tool for the analysis and assessment of the structures by including cracking softening and tension-stiffening. The aim of this paper is to test a computer program refined recently and to simulate the compression response of cracked concrete element and to compare with the available experimental results.

Keywords: reinforced concrete panels, compression-tension, shear, torsion, compression softening, tension stiffening, non-linear finite element analysis

Procedia PDF Downloads 329
10568 Building a Framework for Digital Emergency Response System for Aged, Long Term Care and Chronic Disease Patients in Asia Pacific Region

Authors: Nadeem Yousuf Khan

Abstract:

This paper proposes the formation of a digital emergency response system (dERS) in the aged, long-term care, and chronic disease setups in the post-COVID healthcare ecosystem, focusing on the Asia Pacific market where the aging population is increasing significantly. It focuses on the use of digital technologies such as wearables, a global positioning system (GPS), and mobile applications to build an integrated care system for old folks with co-morbidities and other chronic diseases. The paper presents a conceptual framework of a connected digital health ecosystem that not only provides proactive care to registered patients but also prevents the damages due to sudden conditions such as strokes by alerting and treating the patients in a digitally connected and coordinated manner. A detailed review of existing digital health technologies such as wearables, GPS, and mobile apps was conducted in context with the new post-COVID healthcare paradigm, along with a detailed literature review on the digital health policies and usability. A good amount of research papers is available in the application of digital health, but very few of them discuss the formation of a new framework for a connected digital ecosystem for the aged care population, which is increasing around the globe. A connected digital emergency response system has been proposed by the author whereby all registered patients (chronic disease and aged/long term care) will be connected to the proposed digital emergency response system (dERS). In the proposed ecosystem, patients will be provided with a tracking wrist band and a mobile app through which the control room will be monitoring the mobility and vitals such as atrial fibrillation (AF), blood sugar, blood pressure, and other vital signs. In addition to that, an alert in case if the patient falls down will add value to this system. In case of any variation in the vitals, an alert is sent to the dERS 24/7, and dERS clinical staff immediately trigger that alert which goes to the connected hospital and the adulatory service providers, and the patient is escorted to the nearest connected tertiary care hospital. By the time, the patient reaches the hospital, dERS team is ready to take appropriate clinical action to save the life of the patient. Strokes or myocardial infarction patients can be prevented from disaster if they are accessible to engagement healthcare. This dERS will play an effective role in saving the lives of aged patients or patients with chronic co-morbidities.

Keywords: aged care, atrial fibrillation, digital health, digital emergency response system, digital technology

Procedia PDF Downloads 110
10567 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022

Authors: Mojtaba Fayaz, Richard Hallal

Abstract:

This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.

Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks

Procedia PDF Downloads 109
10566 Integrated Model for Enhancing Data Security Performance in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud Ccomputing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 468
10565 Project Based Learning in Language Lab: An Analysis in ESP Learning Context

Authors: S. Priya

Abstract:

A project based learning assignment in English for Specific Purposes (ESP) context based on Communicative English as prescribed in the university syllabus for engineering students and its learning outcome from ESP context is the focus of analysis through this paper. The task based on Project Based Learning (PBL) was conducted in the digital language lab which had audio visual aids to support the team presentation. The total strength of 48 students of Mechanical Branch were divided into 6 groups, each consisting of 8 students. The group members were selected on random numbering basis. They were given a group task to represent a power point presentation on a topic related to their core branch. They had to discuss the issue and choose their topic and represent in a given format. It provided the individual role of each member in the presentation. A brief overview of the project and the outcome of its technical aspects were also had to be included. Each group had to highlight the contributions of that innovative technology through their presentation. The power point should be provided in a CD format. The variations in the choice of subjects, their usage of digital technologies, co-ordination for competition, learning experience of first time stage presentation, challenges of team cohesiveness were some criteria observed as their learning experience. For many other students undergoing the stages of planning, preparation and practice as steps for presentation had been the learning outcomes as given through their feedback form. The evaluation pattern is distributed for individual contribution and group effectiveness which promotes quality of presentation. The evaluated skills are communication skills, group cohesiveness, and audience response, quality of technicality and usage of technical terms. This paper thus analyses how project based learning improves the communication, life skills and technical skills in English for Specific learning context through PBL.

Keywords: language lab, ESP context, communicative skills, life skills

Procedia PDF Downloads 233
10564 Exploring the Correlation between Human Security, Human Rights and Justice in Addressing and Remedying Contemporary Challenges in Africa

Authors: Sikhumbuzo Zondi, Serges A. Kamga

Abstract:

Human security and human rights are mutually reinforcing concepts given that human security addresses questions related to human conditions such as the safety of individuals and the protection of individual rights and civil liberties. It does this by suggesting that the proper referent for security should be the individual and not the nation-state, due to the individual’s vulnerability to threats such as malnutrition and poverty, conflicts, exploitation and marginalization, despotism and climate change. Due to the primacy of the individual, human security comfortably expand to the notion of social justice, given that for far too-long, many individuals around the world have been denied of their basic human rights through racial discrimination, unfair labour and segregation policies and as a result encountered widespread social, environmental and economic injustices which are evident in the current structural division of the world between the developed north and the underdeveloped or developing south. In light of this view, ensuring freedom from want and freedom from fear, for all individuals is arguably the sound route to addressing and remedying the global ills of our time and a way to promoting human rights for all. The promotion of human security provides an important part of human/societal progress because inclusive security facilitates development and human rights protection, while insecurity reduces people’s growth and investment prospects and prolongs historical injustices. Therefore, this paper seeks to show that human security and human rights complements one another and that this correlation provides the necessary mechanisms for addressing and remedying the historical injustices that still affect most of the world’s population. It will look at linkages between human security and the individual right to equality and freedom from discrimination, right to life, liberty, and personal security; development; own property; adequate living standard; education; desirable work and to join trade unions; participate in government and in free elections; social security and equality before the law. The paper considers these human rights and liberties as vital for securing the core values of human life while at the same addressing socio-economic injustices that still persist in the contemporary world. The paper will be a desktop study using qualitative research methods on two case studies in Africa namely Cameroun and South Africa.

Keywords: justice, human security, human rights, injustices

Procedia PDF Downloads 161
10563 A Development of Practice Guidelines for Surgical Safety Management to Reduce Undesirable Incidents from Surgical Services in the Operating Room of Songkhla Hospital, Thailand

Authors: Thitima Plejai

Abstract:

The practice in the operating room has been continually performed according to standards of services; however, undesirable incidents from surgical services are found such as surgical complications in the operating room. This participation action research aimed to develop practice guidelines for surgical safety management to reduce undesirable incidents from surgical services in the operating room of Songkhla Hospital. The target population was all 84 members of the multidisciplinary team who were involved in surgical services in the operating room consisting of 28 surgeons from five branches of surgery, 27 anesthetists and nurse anesthetists, and 29 surgical nurses. The data were collected through in-depth interviews, and non-participatory observations. The research instrument was tested by three experts, and the steps of the development consisted of four cycles, each consisting of assessment, planning, practice, practice reflection, and improvement until every step is practicable. The data were validated through triangulation research method, analyzed through content analysis and statistical analysis with number and percentage. The results of the development of practice guidelines surgical safety management to reduce undesirable incidents from surgical services could be concluded as follows. 1) The multidisciplinary team in surgery participated in the needs assessment for development of practice guidelines for surgical patient safety, and agreed on adapting the WHO Surgical Safety Checklists for use. 2) The WHO Surgical Safety Checklists was implemented, and meetings were held for the multidisciplinary team in surgery and the organizational risk committee to improve the practice guidelines to make them more practicable. 3) The multidisciplinary team consisting of surgeons from five branches of surgery, anesthetists, nurse anesthetists, surgical nurses, and the organizational risk committee announced policy on safety for surgical patients; the organizational risk committee designated the Surgical Safety Checklist as an instrument for surgical patient safety. The results of the safety management found that the surgical team members who could follow 100 percent of the guidelines were: professional nurses who checked patient identity and information before taking the patient to the operating room and kept complete records of data on the patients; surgical nurses who checked readiness of the patient before surgery; nurse anesthetists who assessed readiness before administering anesthetic drugs, and confirmed correctness of the patient; and circulating perioperative nurses who gave confirmation to the surgical team after completion of the surgery. The rates of undesirable incidents (surgical complications rates) before and after the implementation of the surgical safety management were 1.60 percent and 0.66 percent, respectively. The satisfaction of the surgery-related teams towards the use of the guidelines was 89 percent. The practice guidelines for surgical safety management to reduce undesirable incidents were taken as guidelines for surgical safety that the multidisciplinary team involved in the surgical process implemented correctly and in the same direction and clearly reduced undesirable incidents in surgical patients.

Keywords: practice guidelines, surgical safety management, reduce undesirable incidents, operating Room

Procedia PDF Downloads 289
10562 Real-Time Classification of Hemodynamic Response by Functional Near-Infrared Spectroscopy Using an Adaptive Estimation of General Linear Model Coefficients

Authors: Sahar Jahani, Meryem Ayse Yucel, David Boas, Seyed Kamaledin Setarehdan

Abstract:

Near-infrared spectroscopy allows monitoring of oxy- and deoxy-hemoglobin concentration changes associated with hemodynamic response function (HRF). HRF is usually affected by natural physiological hemodynamic (systemic interferences) which occur in all body tissues including brain tissue. This makes HRF extraction a very challenging task. In this study, we used Kalman filter based on a general linear model (GLM) of brain activity to define the proportion of systemic interference in the brain hemodynamic. The performance of the proposed algorithm is evaluated in terms of the peak to peak error (Ep), mean square error (MSE), and Pearson’s correlation coefficient (R2) criteria between the estimated and the simulated hemodynamic responses. This technique also has the ability of real time estimation of single trial functional activations as it was applied to classify finger tapping versus resting state. The average real-time classification accuracy of 74% over 11 subjects demonstrates the feasibility of developing an effective functional near infrared spectroscopy for brain computer interface purposes (fNIRS-BCI).

Keywords: hemodynamic response function, functional near-infrared spectroscopy, adaptive filter, Kalman filter

Procedia PDF Downloads 145
10561 Developing Methodology of Constructing the Unified Action Plan for External and Internal Risks in University

Authors: Keiko Tamura, Munenari Inoguchi, Michiyo Tsuji

Abstract:

When disasters occur, in order to raise the speed of each decision making and response, it is common that delegation of authority is carried out. This tendency is particularly evident when the department or branch of the organization are separated by the physical distance from the main body; however, there are some issues to think about. If the department or branch is too dependent on the head office in the usual condition, they might feel lost in the disaster response operation when they are face to the situation. Avoiding this problem, an organization should decide how to delegate the authority and also who accept the responsibility for what before the disaster. This paper will discuss about the method which presents an approach for executing the delegation of authority process, implementing authorities, management by objectives, and preparedness plans and agreement. The paper will introduce the examples of efforts for the three research centers of Niigata University, Japan to arrange organizations capable of taking necessary actions for disaster response. Each center has a quality all its own. One is the center for carrying out the research in order to conserve the crested ibis (or Toki birds in Japanese), the endangered species. The another is the marine biological laboratory. The third one is very unique because of the old growth forests maintained as the experimental field. Those research centers are in the Sado Island, located off the coast of Niigata Prefecture, is Japan's second largest island after Okinawa and is known for possessing a rich history and culture. It takes 65 minutes jetfoil (high-speed ferry) ride to get to Sado Island from the mainland. The three centers are expected to be easily isolated at the time of a disaster. A sense of urgency encourages 3 centers in the process of organizational restructuring for enhancing resilience. The research team from the risk management headquarters offer those procedures; Step 1: Offer the hazard scenario based on the scientific evidence, Step 2: Design a risk management organization for disaster response function, Step 3: Conduct the participatory approach to make consensus about the overarching objectives, Step 4: Construct the unified operational action plan for 3 centers, Step 5: Simulate how to respond in each phase based on the understanding the various phases of the timeline of a disaster. Step 6: Document results to measure performance and facilitate corrective action. This paper shows the result of verifying the output and effects.

Keywords: delegation of authority, disaster response, risk management, unified command

Procedia PDF Downloads 119
10560 The Effect of Experimentally Induced Stress on Facial Recognition Ability of Security Personnel’s

Authors: Zunjarrao Kadam, Vikas Minchekar

Abstract:

The facial recognition is an important task in criminal investigation procedure. The security guards-constantly watching the persons-can help to identify the suspected accused. The forensic psychologists are tackled such cases in the criminal justice system. The security personnel may loss their ability to correctly identify the persons due to constant stress while performing the duty. The present study aimed at to identify the effect of experimentally induced stress on facial recognition ability of security personnel’s. For this study 50, security guards from Sangli, Miraj & Jaysingpur city of the Maharashtra States of India were recruited in the experimental study. The randomized two group design was employed to carry out the research. In the initial condition twenty identity card size photographs were shown to both groups. Afterward, artificial stress was induced in the experimental group through the difficultpuzzle-solvingtask in a limited period. In the second condition, both groups were presented earlier photographs with another additional thirty new photographs. The subjects were asked to recognize the photographs which are shown earliest. The analyzed data revealed that control group has ahighest mean score of facial recognition than experimental group. The results were discussed in the present research.

Keywords: experimentally induced stress, facial recognition, cognition, security personnel

Procedia PDF Downloads 247
10559 The Nexus between Downstream Supply Chain Losses and Food Security in Nigeria: Empirical Evidence from the Yam Industry

Authors: Alban Igwe, Ijeoma Kalu, Alloy Ezirim

Abstract:

Food insecurity is a global problem, and the search for food security has assumed a central stage in the global development agenda as the United Nations currently placed zero hunger as a goal number in its sustainable development goals. Nigeria currently ranks 107th out of 113 countries in the global food security index (GFSI), a metric that defines a country's ability to furnish its citizens with food and nutrients for healthy living. Paradoxically, Nigeria is a global leader in food production, ranking 1st in yam (over 70% of global output), beans (over 41% of global output), cassava (20% of global output) and shea nuts, where it commands 53% of global output. Furthermore, it ranks 2nd in millet, sweet potatoes, and cashew nuts. It is Africa's largest producer of rice. So, it is apparent that Nigeria's food insecurity woes must relate to a factor other than food production. We investigated the nexus between food security and downstream supply chain losses in the yam industry with secondary data from the Food and Agricultural Organization (FAOSTAT) and the National Bureau of Statics for the decade 2012-2021. In analyzing the data, multiple regression techniques were used, and findings reveal that downstream losses have a strong positive correlation with food security (r = .763*) and a 58.3% variation in food security is explainable by post-downstream supply chain food losses. The study discovered that yam supply chain losses within the period under review averaged 50.6%, suggestive of the fact that downstream supply chain losses are the drainpipe and the major source of food insecurity in Nigeria. Therefore, the study concluded that there is a significant relationship between downstream supply chain losses and food insecurity and recommended the establishment of food supply chain structures and policies to enhance food security in Nigeria.

Keywords: food security, downstream supply chain losses, yam, nigeria, supply chain

Procedia PDF Downloads 83
10558 Studies on H2S Gas Sensing Performance of Al2O3-Doped ZnO Thick Films at Ppb Level

Authors: M. K. Deore

Abstract:

The thick films of undoped and Al2O3 doped- ZnO were prepared by screen printing technique. AR grade (99.9 % pure) Zinc Oxide powder were mixed mechanochemically in acetone medium with Aluminium Chloride (AlCl2) material in various weight percentages such as 0.5, 1, 3 and 5 wt % to obtain Al2O3 - ZnO composite. The prepared materials were sintered at 1000oC for 12h in air ambience and ball milled to ensure sufficiently fine particle size. The electrical, structural and morphological properties of the films were investigated. The X-ray diffraction analysis of pure and doped ZnO shows the polycrystalline nature. The surface morphology of the films was studied by SEM. The final composition of each film was determined by EDAX analysis. The gas response of undoped and Al2O3- doped ZnO films were studied for different gases such as CO, H2, NH3, and H2S at operating temperature ranging from 50 oC to 450 o C. The pure film shows the response to H2S gas (500ppm) at 300oC while the film doped with 3 wt.% Al2O3 gives the good response to H2S gas(ppb) at 350oC. The selectivity, response and recovery time of the sensor were measured and presented.

Keywords: thick films, ZnO-Al2O3, H2S gas, sensitivity, selectivity, response and recovery time

Procedia PDF Downloads 414
10557 Risk Based on Computer Auditing and Measures of ‎Prevention

Authors: Mohammad Hadi Khorashadi Zadeh, Amin Karkon, Seyd Mohammad Reza Mashhoori

Abstract:

The technology of computer audit played a major role in the progress and prospects of a proper application to improve the quality and efficiency of audit work. But due to the technical complexity and the specific risks of computer audit, it should be shown effective in audit and preventive action. Mainly through research in this paper, we propose the causes of audit risk in a computer environment and the risk of further proposals for measures to control, to some extent reduce the risk of computer audit and improve the audit quality.

Keywords: computer auditing, risk, measures to prevent, information management

Procedia PDF Downloads 511
10556 Electro-Mechanical Response and Engineering Properties of Piezocomposite with Imperfect Interface

Authors: Rattanan Tippayaphalapholgul, Yasothorn Sapsathiarn

Abstract:

Composites of piezoelectric materials are widely use in practical applications such as nondestructive testing devices, smart adaptive structures and medical devices. A thorough understanding of coupled electro-elastic response and properties of piezocomposite are crucial for the development and design of piezoelectric composite materials used in advanced applications. The micromechanics analysis is employed in this paper to determine the response and engineering properties of the piezocomposite. A mechanical imperfect interface bonding between piezoelectric inclusion and polymer matrix is taken into consideration in the analysis. The micromechanics analysis is based on the Boundary Element Method (BEM) together with the periodic micro-field micromechanics theory. A selected set of numerical results is presented to investigate the influence of volume ratio and interface bonding condition on effective piezocomposite material coefficients and portray basic features of coupled electroelastic response within the domain of piezocomposite unit cell.

Keywords: effective engineering properties, electroelastic response, imperfect interface, piezocomposite

Procedia PDF Downloads 225
10555 Analyzing Current Transformers Saturation Characteristics for Different Connected Burden Using LabVIEW Data Acquisition Tool

Authors: D. Subedi, S. Pradhan

Abstract:

Current transformers are an integral part of power system because it provides a proportional safe amount of current for protection and measurement applications. However when the power system experiences an abnormal situation leading to huge current flow, then this huge current is proportionally injected to the protection and metering circuit. Since the protection and metering equipment’s are designed to withstand only certain amount of current with respect to time, these high currents pose a risk to man and equipment. Therefore during such instances, the CT saturation characteristics have a huge influence on the safety of both man and equipment and also on the reliability of the protection and metering system. This paper shows the effect of burden on the Accuracy Limiting factor/ Instrument security factor of current transformers and also the change in saturation characteristics of the CT’s. The response of the CT to varying levels of overcurrent at different connected burden will be captured using the data acquisition software LabVIEW. Analysis is done on the real time data gathered using LabVIEW. Variation of current transformer saturation characteristics with changes in burden will be discussed.

Keywords: accuracy limiting factor, burden, current transformer, instrument security factor, saturation characteristics

Procedia PDF Downloads 408
10554 Comparison Between Tension Band Wiring Using K-Wires and Cannulated Screws in Transverse Patella Fracture Fixation

Authors: Daniel Francis, Mo Yassin

Abstract:

Transverse patella fractures are routinely fixed using tension band wiring (TBW) using Kirschner wires and a wire in the shape of a figure of 8. The idea of the study was to compare the outcomes of the traditional technique against the more recently used cannulated screws and fiber tape in the shape of a figure of 8. We performed a retrospective cohort study of all the surgically fixed patella fractures from the year 2019 to 2022. The patients were divided into two groups TBW group and cannulated screws group. The primary outcome measure was the failure of fixation and the need for the removal of metalwork. Twenty-six patellar fractures were studied. TBW was used in 14 (53.8%), and cannulated screws were used for fixation in 12 (46.2%). There was one incident of metalwork failure in the TBW and one incident in the cannulated screws group. Five (35.7%) of patients in the TBW needed symptomatic metal work removed and One (8.3%) in the cannulated screw group. In both groups, the rate of fixation failure was low. Symptomatic implants, the most common complication observed, were higher in the TBW group in our practice. Although the small numbers in both groups, the hope of this study is to shine the light on the use of cannulated screws for patella fractures as it would reduce the need for a second operation and reduce the load on the already stretched services as well as improving the patient experience by not requiring further surgery. Although this is not a brand-new technique, it is not commonly used as there have not yet been any studies that demonstrate the lower rates of second surgery needed.

Keywords: patella, tension band wiring, randomised, new technique

Procedia PDF Downloads 66
10553 Secure Watermarking not at the Cost of Low Robustness

Authors: Jian Cao

Abstract:

This paper describes a novel watermarking technique which we call the random direction embedding (RDE) watermarking. Unlike traditional watermarking techniques, the watermark energy after the RDE embedding does not focus on a fixed direction, leading to the security against the traditional unauthorized watermark removal attack. In addition, the experimental results show that when compared with the existing secure watermarking, namely natural watermarking (NW), the RDE watermarking gains significant improvement in terms of robustness. In fact, the security of the RDE watermarking is not at the cost of low robustness, and it can even achieve more robust than the traditional spread spectrum watermarking, which has been shown to be very insecure.

Keywords: robustness, spread spectrum watermarking, watermarking security, random direction embedding (RDE)

Procedia PDF Downloads 376
10552 Evaluation of Computer Usage and Related Health Hazards

Authors: B. O. Adegoke, B. O. Ola, D. T. Ademiluyi

Abstract:

This paper examines the use of computer and its related health hazard among computer users in South-Western zone of Nigeria. Two hundred and eighteen (218) computer users constituted the population used to evaluate association between posture, extensive computer use and related health hazard. The instruments for the study are a questionnaire on demographics, lifestyle, body features and work ability index while mean rating, standard deviation and t test were used for data analysis. Identified health related hazard include damages to the eyesight, bad posture, arthritis, musculoskeletal disorders, headache, stress and so on. The results showed that factors such as work demand, posture, closeness to computer screen and excessive working hours on computers constitute health hazards in both old and young computer users of various gender. It is therefore recommended that total number of hours spent with computer should be monitored and controlled.

Keywords: computer-related health hazard, musculoskeletal disorders, computer usage, work ability index

Procedia PDF Downloads 479
10551 A Digital Representation of a Microstructure and Determining Its Mechanical Behavior

Authors: Burak Bal

Abstract:

Mechanical characterization tests might come with a remarkable cost of time and money for both companies and academics. The inquiry to transform laboratory experiments to the computational media is getting a trend; accordingly, the literature supplies many analytical ways to explain the mechanics of deformation. In our work, we focused on the crystal plasticity finite element modeling (CPFEM) analysis on various materials in various crystal structures to predict the stress-strain curve without tensile tests. For FEM analysis, which we used in this study was ABAQUS, a standard user-defined material subroutine (UMAT) was prepared. The geometry of a specimen was created via DREAM 3D software with the inputs of Euler angles taken by Electron Back-Scattered Diffraction (EBSD) technique as orientation, or misorientation angles. The synthetic crystal created with DREAM 3D is also meshed in a way the grains inside the crystal meshed separately, and the computer can realize interaction of inter, and intra grain structures. The mechanical deformation parameters obtained from the literature put into the Fortran based UMAT code to describe how material will response to the load applied from specific direction. The mechanical response of a synthetic crystal created with DREAM 3D agrees well with the material response in the literature.

Keywords: crystal plasticity finite element modeling, ABAQUS, Dream.3D, microstructure

Procedia PDF Downloads 145
10550 ‘Doctor Knows Best’: Reconsidering Paternalism in the NICU

Authors: Rebecca Greenberg, Nipa Chauhan, Rashad Rehman

Abstract:

Paternalism, in its traditional form, seems largely incompatible with Western medicine. In contrast, Family-Centred Care, a partial response to historically authoritative paternalism, carries its own challenges, particularly when operationalized as family-directed care. Specifically, in neonatology, decision-making is left entirely to Substitute Decision Makers (most commonly parents). Most models of shared decision-making employ both the parents’ and medical team’s perspectives but do not recognize the inherent asymmetry of information and experience – asking parents to act like physicians to evaluate technical data and encourage physicians to refrain from strong medical opinions and proposals. They also do not fully appreciate the difficulties in adjudicating which perspective to prioritize and, moreover, how to mitigate disagreement. Introducing a mild form of paternalism can harness the unique skillset both parents and clinicians bring to shared decision-making and ultimately work towards decision-making in the best interest of the child. The notion expressed here is that within the model of shared decision-making, mild paternalism is prioritized inasmuch as optimal care is prioritized. This mild form of paternalism is known as Beneficent Paternalism and justifies our encouragement for physicians to root down in their own medical expertise to propose treatment plans informed by medical expertise, standards of care, and the parents’ values. This does not mean that we forget that paternalism was historically justified on ‘beneficent’ grounds; however, our recommendation is that a re-integration of mild paternalism is appropriate within our current Western healthcare climate. Through illustrative examples from the NICU, this paper explores the appropriateness and merits of Beneficent Paternalism and ultimately its use in promoting family-centered care, patient’s best interests and reducing moral distress. A distinctive feature of the NICU is the fact that communication regarding a patient’s treatment is exclusively done with substitute decision-makers and not the patient, i.e., the neonate themselves. This leaves the burden of responsibility entirely on substitute decision-makers and the clinical team; the patient in the NICU does not have any prior wishes, values, or beliefs that can guide decision-making on their behalf. Therefore, the wishes, values, and beliefs of the parent become the map upon which clinical proposals are made, giving extra weight to the family’s decision-making responsibility. This leads to why Family Directed Care is common in the NICU, where shared decision-making is mandatory. However, the zone of parental discretion is not as all-encompassing as it is currently considered; there are appropriate times when the clinical team should strongly root down in medical expertise and perhaps take the lead in guiding family decision-making: this is just what it means to adopt Beneficent Paternalism.

Keywords: care, ethics, expertise, NICU, paternalism

Procedia PDF Downloads 133
10549 Methylprednisolone Injection Did Not Inhibit Anti-Hbs Response Following Hepatitis B Vaccination in Mice

Authors: P. O. Ughachukwu, P. O. Okonkwo, P. C. Unekwe, J. O. Ogamba

Abstract:

Background: The prevalence of hepatitis B viral infection is high worldwide with liver cirrhosis and hepatocellular carcinoma as important complications. Cases of poor antibody response to hepatitis B vaccination abound. Immunosuppression, especially from glucocorticoids, is often cited as a cause of poor antibody response and there are documented evidences of irrational administration of glucocorticoids to children and adults. The study was, therefore, designed to find out if administration of glucocorticoids affects immune response to vaccination against hepatitis B in mice. Methods: Mice of both sexes were randomly divided into 2 groups. Daily intramuscular methylprednisolone injections, (15 mg kg-1), were given to the test group while sterile deionized water (0.1ml) was given to control mice for 30 days. On day 6 all mice were given 2 μg (0.1ml) hepatitis B vaccine and a booster dose on day 27. On day 34, blood samples were collected and analyzed for anti-HBs titres using enzyme-linked immunosorbent assay (ELISA). Statistical analysis was done using Graph Pad Prism 5.0 and the results taken as statistically significant at p value < 0.05. Results: There were positive serum anti-HBs responses in all mice groups but the differences in titres were not statistically significant. Conclusions: At the dosages and length of exposure used in this study, methylprednisolone injection did not significantly inhibit anti-HBs response in mice following immunization against hepatitis B virus. By extrapolation, methylprednisolone, when used in the usual clinical doses and duration of therapy, is not likely to inhibit immune response to hepatitis B vaccinations in man.

Keywords: anti-HBs, hepatitis B vaccine, immune response, methylprednisolone, mice

Procedia PDF Downloads 318
10548 Idea Expropriation, Incentives, and Governance within Organizations

Authors: Gulseren Mutlu, Gurupdesh Pandher

Abstract:

This paper studies the strategic interplay between innovation, incentives, expropriation threat and disputes arising from expropriation from an intra-organization perspective. We present a simple principal-agent model with hidden actions and hidden information in which two employees can choose how much (innovative) effort to exert, whether to expropriate the innovation of the other employee and whether to dispute if innovation is expropriated. The organization maximizes its expected payoff by choosing the optimal reward scheme for both employees as well as whether to encourage or discourage disputes. We analyze two mechanisms under which innovative ideas are not expropriated. First, we show that under a non-contestable mechanism (in which the organization discourages disputes among employees), the organization has to offer a “rent” to the potential expropriator. However, under a contestable mechanism (in which the organization encourages disputes), there is no need for such rent. If the cost of resolving the dispute is negligible, the organization’s expected payoff is higher under a contestable mechanism. Second, we develop a comparable team mechanism in which innovation takes place as a result of the joint efforts of employees and innovation payments are made based on the team outcome. We show that if the innovation value is low and employees have similar productivity, then the organization is better off under a contestable mechanism. On the other hand, if the innovation value is high, the organization is better off under a team mechanism. Our results have important practical implications for the design of innovation reward system for employees, hiring policy and governance for different companies.

Keywords: innovation, incentives, expropriation threat, dispute resolution

Procedia PDF Downloads 606
10547 Post-Earthquake Damage Detection Using System Identification with a Pair of Seismic Recordings

Authors: Lotfi O. Gargab, Ruichong R. Zhang

Abstract:

A wave-based framework is presented for modeling seismic motion in multistory buildings and using measured response for system identification which can be utilized to extract important information regarding structure integrity. With one pair of building response at two locations, a generalized model response is formulated based on wave propagation features and expressed as frequency and time response functions denoted, respectively, as GFRF and GIRF. In particular, GIRF is fundamental in tracking arrival times of impulsive wave motion initiated at response level which is dependent on local model properties. Matching model and measured-structure responses can help in identifying model parameters and infer building properties. To show the effectiveness of this approach, the Millikan Library in Pasadena, California is identified with recordings of the Yorba Linda earthquake of September 3, 2002.

Keywords: system identification, continuous-discrete mass modeling, damage detection, post-earthquake

Procedia PDF Downloads 366
10546 Antecedents to Leaders’ Empowering Behavior: A Study of Team Leaders and Their Subordinates

Authors: Manjari Srivastsva, Ruta Vyas

Abstract:

The research in the area of self leadership advocates employee/team empowerment. It is well understood that empowered employees would contribute more and better to their organizational outcomes. This research is a part of an ongoing larger research in the area of empowering leadership behavior. The present research aims to understand some of the antecedents to empowering behavior of leaders such that the organizations can focus on the right elements and invest in the appropriate areas during their leadership development activities. The research is exploratory field study. Sampling is purposive, employing triadic design i.e. a manager and two of his/her subordinates are selected for data collection. The total no. of respondents is 240, with 80 managers and 160 of their direct reports. Initially focus group interview was done and based on the inputs from focus group, quantitative data was collected personally by the researchers using questionnaire. The sample is drawn from seven professionally run organization including those of Indian origin as well as multi-national companies. This study proposes to explore the constituents of empowering behavior both from leaders’ and their subordinates’ perspective and also see the relationship between some of the personal variables of leaders as an antecedent to empowering behavior. Similarly, the study aims to explore the subordinates’ perspectives as an antecedent to empowering behavior. The relationship between antecedent variables and empowering behavior is tested for moderation employing organization culture. Exploratory and confirmatory factor analysis was done to establish the validity of the questionnaires. Further hierarchical regression analysis results revealed that organization based self-esteem and global self-esteem impact leaders’ empowering behavior and this relationship is further moderated by organization culture. Team members’ perspective showed higher importance for task characteristics and members' readiness from the point of view of empowerment. The relation between task characteristics and members’ readiness was not moderated by culture. The finding from this research may be utilized by professionals to guide organizations desiring rapid and sustainable growth, to develop leaders who empower their teams such that they act as leaders themselves and become stimulants for the growth of organizations.

Keywords: empowering behavior, team leaders, subordinates, self-esteem, organization culture, task characteristics, team members readiness

Procedia PDF Downloads 412