Search results for: malicious smart contracts
976 Employee Inventor Compensation: A New Quest for Comparative Law
Authors: Andrea Borroni
Abstract:
The evolution of technology, the global scale of economy, and the new short-term employment contracts make a very peculiar set of disposition of raising interest for the legal interpreter: the employee inventor compensation. Around the globe, this issue is differently regulated according to the legal systems; therefore, it is extremely fragmented. Of course, employers with transnational businesses should face this issue from a comparative perspective. Different legal regimes are available worldwide awarding, as a consequence, diverse compensation to the inventor and according to their own methodology. Given these premises, the recourse to comparative law methodology (legal formants, diachronic and synchronic methodology, common core approach) is the best equipped to face all these different national approaches in order to achieve a tidy systematic. This research, so, elaborates a map of the specific criteria to grant the compensation for the inventor and to show the criteria to calculate them. This finding has been the first step to find out a common core of the discipline given by the common features present in the different legal systems.Keywords: comparative law, employee invention, intellectual property, legal transplant
Procedia PDF Downloads 333975 Specialized Translation Teaching Strategies: A Corpus-Based Approach
Authors: Yingying Ding
Abstract:
This study presents a methodology of specialized translation with the objective of helping teachers to improve the strategies in teaching translation. In order to allow students to acquire skills to translate specialized texts, they need to become familiar with the semantic and syntactic features of source texts and target texts. The aim of our study is to use a corpus-based approach in the teaching of specialized translation between Chinese and Italian. This study proposes to construct a specialized Chinese - Italian comparable corpus that consists of 50 economic contracts from the domain of food. With the help of AntConc, we propose to compile a comparable corpus in for translation teaching purposes. This paper attempts to provide insight into how teachers could benefit from comparable corpus in the teaching of specialized translation from Italian into Chinese and through some examples of passive sentences how students could learn to apply different strategies for translating appropriately the voice.Keywords: contrastive studies, specialised translation, corpus-based approach, teaching
Procedia PDF Downloads 371974 Rumour Containment Using Monitor Placement and Truth Propagation
Authors: Amrah Maryam
Abstract:
The emergence of online social networks (OSNs) has transformed the way we pursue and share information. On the one hand, OSNs provide great ease for the spreading of positive information while, on the other hand, they may also become a channel for the spreading of malicious rumors and misinformation throughout the social network. Thus, to assure the trustworthiness of OSNs to its users, it is of vital importance to detect the misinformation propagation in the network by placing network monitors. In this paper, we aim to place monitors near the suspected nodes with the intent to limit the diffusion of misinformation in the social network, and then we also detect the most significant nodes in the network for propagating true information in order to minimize the effect of already diffused misinformation. Thus, we initiate two heuristic monitor placement using articulation points and truth propagation using eigenvector centrality. Furthermore, to provide real-time workings of the system, we integrate both the monitor placement and truth propagation entities as well. To signify the effectiveness of the approaches, we have carried out the experiment and evaluation of Stanford datasets of online social networks.Keywords: online social networks, monitor placement, independent cascade model, spread of misinformation
Procedia PDF Downloads 161973 Predicting the Compressive Strength of Geopolymer Concrete Using Machine Learning Algorithms: Impact of Chemical Composition and Curing Conditions
Authors: Aya Belal, Ahmed Maher Eltair, Maggie Ahmed Mashaly
Abstract:
Geopolymer concrete is gaining recognition as a sustainable alternative to conventional Portland Cement concrete due to its environmentally friendly nature, which is a key goal for Smart City initiatives. It has demonstrated its potential as a reliable material for the design of structural elements. However, the production of Geopolymer concrete is hindered by batch-to-batch variations, which presents a significant challenge to the widespread adoption of Geopolymer concrete. To date, Machine learning has had a profound impact on various fields by enabling models to learn from large datasets and predict outputs accurately. This paper proposes an integration between the current drift to Artificial Intelligence and the composition of Geopolymer mixtures to predict their mechanical properties. This study employs Python software to develop machine learning model in specific Decision Trees. The research uses the percentage oxides and the chemical composition of the Alkali Solution along with the curing conditions as the input independent parameters, irrespective of the waste products used in the mixture yielding the compressive strength of the mix as the output parameter. The results showed 90 % agreement of the predicted values to the actual values having the ratio of the Sodium Silicate to the Sodium Hydroxide solution being the dominant parameter in the mixture.Keywords: decision trees, geopolymer concrete, machine learning, smart cities, sustainability
Procedia PDF Downloads 88972 Smart Online Library Catalog System with Query Expansion for the University of the Cordilleras
Authors: Vincent Ballola, Raymund Dilan, Thelma Palaoag
Abstract:
The Smart Online Library Catalog System with Query Expansion seeks to address the low usage of the library because of the emergence of the Internet. Library users are not accustomed to catalog systems that need a query to have the exact words without any mistakes for decent results to appear. The graphical user interface of the current system has a rather skewed learning curve for users to adapt with. With a simple graphical user interface inspired by Google, users can search quickly just by inputting their query and hitting the search button. Because of the query expansion techniques incorporated into the new system such as stemming, thesaurus search, and weighted search, users can have more efficient results from their query. The system will be adding the root words of the user's query to the query itself which will then be cross-referenced to a thesaurus database to search for any synonyms that will be added to the query. The results will then be arranged by the number of times the word has been searched. Online queries will also be added to the results for additional references. Users showed notable increases in efficiency and usability due to the familiar interface and query expansion techniques incorporated in the system. The simple yet familiar design led to a better user experience. Users also said that they would be more inclined in using the library because of the new system. The incorporation of query expansion techniques gives a notable increase of results to users that in turn gives them a wider range of resources found in the library. Used books mean more knowledge imparted to the users.Keywords: query expansion, catalog system, stemming, weighted search, usability, thesaurus search
Procedia PDF Downloads 388971 Control Configuration System as a Key Element in Distributed Control System
Authors: Goodarz Sabetian, Sajjad Moshfe
Abstract:
Control system for hi-tech industries could be realized generally and deeply by a special document. Vast heavy industries such as power plants with a large number of I/O signals are controlled by a distributed control system (DCS). This system comprises of so many parts from field level to high control level, and junior instrument engineers may be confused by this enormous information. The key document which can solve this problem is “control configuration system diagram” for each type of DCS. This is a road map that covers all of activities respect to control system in each industrial plant and inevitable to be studied by whom corresponded. It plays an important role from designing control system start point until the end; deliver the system to operate. This should be inserted in bid documents, contracts, purchasing specification and used in different periods of project EPC (engineering, procurement, and construction). Separate parts of DCS are categorized here in order of importance and a brief description and some practical plan is offered. This article could be useful for all instrument and control engineers who worked is EPC projects.Keywords: control, configuration, DCS, power plant, bus
Procedia PDF Downloads 491970 Determinants of the Users Intention of Social-Local-Mobile Applications
Authors: Chia-Chen Chen, Mu-Yen Chen
Abstract:
In recent years, with the vigorous growth of hardware and software technologies of smart mobile devices coupling with the rapid increase of social network influence, mobile commerce also presents the commercial operation mode of the future mainstream. For the time being, SoLoMo has become one of the very popular commercial models, its full name and meaning mainly refer to that users can obtain three key service types through smart mobile devices (Mobile) and omnipresent network services, and then link to the social (Social) web site platform to obtain the information exchange, again collocating with position and situational awareness technology to get the service suitable for the location (Local), through anytime, anywhere and any personal use of different mobile devices to provide the service concept of seamless integration style, and more deriving infinite opportunities of the future. The study tries to explore the use intention of users with SoLoMo mobile application formula, proposing research model to integrate TAM, ISSM, IDT and network externality, and with questionnaires to collect data and analyze results to verify the hypothesis, results show that perceived ease-of-use (PEOU), perceived usefulness (PU), and network externality have significant impact on the use intention with SoLoMo mobile application formula, and the information quality, relative advantages and observability have impacts on the perceived usefulness, and further affecting the use intention.Keywords: SoLoMo (social, local, and mobile), technology acceptance model, innovation diffusion theory, network externality
Procedia PDF Downloads 528969 Hydrodynamic and Sediment Transport Analysis of Computational Fluid Dynamics Designed Flow Regulating Liner (Smart Ditch)
Authors: Saman Mostafazadeh-Fard, Zohrab Samani, Kenneth Suazo
Abstract:
Agricultural ditch liners are used to prevent soil erosion and reduce seepage losses. This paper introduced an approach to validate a computational fluid dynamics (CFD) platform FLOW-3D code and its use to design a flow-regulating corrugated agricultural ditch liner system (Smart Ditch (SM)). Hydrodynamic and sediment transport analyses were performed on the proposed liner flow using the CFD platform FLOW-3D code. The code's hydrodynamic and scour and sediment transport models were calibrated and validated using lab data with an accuracy of 94 % and 95%, respectively. The code was then used to measure hydrodynamic parameters of sublayer turbulent intensity, kinetic energy, dissipation, and packed sediment mass normalized with respect to sublayer flow velocity. Sublayer turbulent intensity, kinetic energy, and dissipation in the SM flow were significantly higher than CR flow. An alternative corrugated liner was also designed, and sediment transport was measured and compared to SM and CR flows. Normalized packed sediment mass with respect to average sublayer flow velocity was 27.8 % lower in alternative flow compared to SM flow. CFD platform FLOW-3D code could effectively be used to design corrugated ditch liner systems and perform hydrodynamic and sediment transport analysis under various corrugation designs.Keywords: CFD, hydrodynamic, sediment transport, ditch, liner design
Procedia PDF Downloads 122968 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control
Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod
Abstract:
The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.Keywords: XML database, trust-based access control, severity-aware, trust values, log file
Procedia PDF Downloads 300967 Numerical Methods versus Bjerksund and Stensland Approximations for American Options Pricing
Authors: Marasovic Branka, Aljinovic Zdravka, Poklepovic Tea
Abstract:
Numerical methods like binomial and trinomial trees and finite difference methods can be used to price a wide range of options contracts for which there are no known analytical solutions. American options are the most famous of that kind of options. Besides numerical methods, American options can be valued with the approximation formulas, like Bjerksund-Stensland formulas from 1993 and 2002. When the value of American option is approximated by Bjerksund-Stensland formulas, the computer time spent to carry out that calculation is very short. The computer time spent using numerical methods can vary from less than one second to several minutes or even hours. However to be able to conduct a comparative analysis of numerical methods and Bjerksund-Stensland formulas, we will limit computer calculation time of numerical method to less than one second. Therefore, we ask the question: Which method will be most accurate at nearly the same computer calculation time?Keywords: Bjerksund and Stensland approximations, computational analysis, finance, options pricing, numerical methods
Procedia PDF Downloads 456966 Integrated Human Resources and Work Environment Management System
Authors: Loreta Kaklauskiene, Arturas Kaklauskas
Abstract:
The Integrated Human Resources and Work Environment Management (HOWE) System optimises employee productivity, improves the work environment, and, at the same time, meets the employer’s strategic goals. The HOWE system has been designed to ensure an organisation can successfully compete in the global market, thanks to the high performance of its employees. The HOWE system focuses on raising workforce productivity and improving work conditions to boost employee performance and motivation. The methods used in our research are linear correlation, INVAR multiple criteria analysis, digital twin, and affective computing. The HOWE system is based on two patents issued in Lithuania (LT 6866, LT 6841) and one European Patent application (No: EP 4 020 134 A1). Our research analyses ways to make human resource management more efficient and boost labour productivity by improving and adapting a personalised work environment. The efficiency of human capital and labour productivity can be increased by applying personalised workplace improvement systems that can optimise lighting colours and intensity, scents, data, information, knowledge, activities, media, games, videos, music, air pollution, humidity, temperature, vibrations, and other workplace aspects. HOWE generates and maintains a personalised workspace for an employee, taking into account the person’s affective, physiological and emotional (APSE) states. The purpose of this project was to create a HOWE for the customisation of quality control in smart workspaces taking into account the user’s APSE states in an integrated manner as a single unit. This customised management of quality control covers the levels of lighting and colour intensities, scents, media, information, activities, learning materials, games, music, videos, temperature, energy efficiency, the carbon footprint of a workspace, humidity, air pollution, vibrations and other aspects of smart spaces. The system is based on Digital Twins technology, seen as a logical extension of BIM.Keywords: human resource management, health economics, work environment, organizational behaviour and employee productivity, prosperity in work, smart system
Procedia PDF Downloads 75965 Incorporating Multiple Supervised Learning Algorithms for Effective Intrusion Detection
Authors: Umar Albalawi, Sang C. Suh, Jinoh Kim
Abstract:
As internet continues to expand its usage with an enormous number of applications, cyber-threats have significantly increased accordingly. Thus, accurate detection of malicious traffic in a timely manner is a critical concern in today’s Internet for security. One approach for intrusion detection is to use Machine Learning (ML) techniques. Several methods based on ML algorithms have been introduced over the past years, but they are largely limited in terms of detection accuracy and/or time and space complexity to run. In this work, we present a novel method for intrusion detection that incorporates a set of supervised learning algorithms. The proposed technique provides high accuracy and outperforms existing techniques that simply utilizes a single learning method. In addition, our technique relies on partial flow information (rather than full information) for detection, and thus, it is light-weight and desirable for online operations with the property of early identification. With the mid-Atlantic CCDC intrusion dataset publicly available, we show that our proposed technique yields a high degree of detection rate over 99% with a very low false alarm rate (0.4%).Keywords: intrusion detection, supervised learning, traffic classification, computer networks
Procedia PDF Downloads 349964 Wireless Transmission of Big Data Using Novel Secure Algorithm
Authors: K. Thiagarajan, K. Saranya, A. Veeraiah, B. Sudha
Abstract:
This paper presents a novel algorithm for secure, reliable and flexible transmission of big data in two hop wireless networks using cooperative jamming scheme. Two hop wireless networks consist of source, relay and destination nodes. Big data has to transmit from source to relay and from relay to destination by deploying security in physical layer. Cooperative jamming scheme determines transmission of big data in more secure manner by protecting it from eavesdroppers and malicious nodes of unknown location. The novel algorithm that ensures secure and energy balance transmission of big data, includes selection of data transmitting region, segmenting the selected region, determining probability ratio for each node (capture node, non-capture and eavesdropper node) in every segment, evaluating the probability using binary based evaluation. If it is secure transmission resume with the two- hop transmission of big data, otherwise prevent the attackers by cooperative jamming scheme and transmit the data in two-hop transmission.Keywords: big data, two-hop transmission, physical layer wireless security, cooperative jamming, energy balance
Procedia PDF Downloads 490963 Causes of Cost Overrun in Building Construction Projects: Case Study from Al Madinah, Saudi Arabia
Authors: Z. Hamed, K. Sa'deya, E. Abdelrasheed, I. Mahamid
Abstract:
The construction industry is one of the main sectors that play basic role in the urban and rural development of a society. It provides important ingredients for the development of an economy. However, many construction projects experience extensive cost overrun. This study was conducted to identify the causes of cost overrun in building construction contracts in Al Madinah, Saudi Arabia and test the importance of these causes from contractors' perspective. To achieve the study objectives, a questionnaire survey was conducted to identify and rank cost overrun causes from the perspective of contractors. The findings found that the top five cost overrun causes are: lack of experience in the line of work, lack of labor productivity, delay in payments, rework and material waste. It is hoped that the findings will guide efforts to improve the performance of construction industry in Saudi Arabia and other developing countries.Keywords: building, contractor, cost increase, cost overrun
Procedia PDF Downloads 156962 A Sui Generis Technique to Detect Pathogens in Post-Partum Breast Milk Using Image Processing Techniques
Authors: Yogesh Karunakar, Praveen Kandaswamy
Abstract:
Mother’s milk provides the most superior source of nutrition to a child. There is no other substitute to the mother’s milk. Postpartum secretions like breast milk can be analyzed on the go for testing the presence of any harmful pathogen before a mother can feed the child or donate the milk for the milk bank. Since breast feeding is one of the main causes for transmission of diseases to the newborn, it is mandatory to test the secretions. In this paper, we describe the detection of pathogens like E-coli, Human Immunodeficiency Virus (HIV), Hepatitis B (HBV), Hepatitis C (HCV), Cytomegalovirus (CMV), Zika and Ebola virus through an innovative method, in which we are developing a unique chip for testing the mother’s milk sample. The chip will contain an antibody specific to the target pathogen that will show a color change if there are enough pathogens present in the fluid that will be considered dangerous. A smart-phone camera will then be acquiring the image of the strip and using various image processing techniques we will detect the color development due to antigen antibody interaction within 5 minutes, thereby not adding to any delay, before the newborn is fed or prior to the collection of the milk for the milk bank. If the target pathogen comes positive through this method, then the health care provider can provide adequate treatment to bring down the number of pathogens. This will reduce the postpartum related mortality and morbidity which arises due to feeding infectious breast milk to own child.Keywords: postpartum, fluids, camera, HIV, HCV, CMV, Zika, Ebola, smart-phones, breast milk, pathogens, image processing techniques
Procedia PDF Downloads 222961 The Impact of Shariah Non-Compliance Risk on Islamic Financial Institutions
Authors: Ibtissam Mharzi Alaoui, Camélia Sehaqui
Abstract:
The success of a bank depends upon its effective risk management. With the growing complexity and diversity of financial products and services, as well as the accelerating pace of globalization over the past decade, risk management is becoming increasingly difficult. thus, all measurement and monitoring functions must be much more vigorous, relevant and adequate. The Shariah non-compliance risk is specific aspect of Islamic finance which ipso facto, deserves particular attention. It affects the validity of all Islamic financial contracts and it turns out to be likely to result in considerable losses on the overall Islamic financial institutions (IFIs). The purpose of this paper is to review the theoretical literature on Shariah non-compliance risk in order to give a clearer understanding of its sources, causes and consequences. Our intention through this work is to bring added value to the Islamic finance industry all over the world. The findings provide a useful reference work for the Islamic banks in structuring (or restructuring) of their own system of shariah risk management and internal control.Keywords: Shariah non-compliance, risk management, financial products, Islamic finance.
Procedia PDF Downloads 88960 Supply Chain Management in the Oil Industry: Challenges and Opportunities
Authors: Mehmood Faisal
Abstract:
In this globalization era, the supply chain management has acquired strategic importance in diverse business environments. In the current highly competitive business environment, the success of any business considerably depends on the efficiency of the supply chain. The importance of petroleum industry cannot be avoided in the global market; however, supply chain management in the petroleum industry is facing various challenges, particularly in the logistics area. These logistical challenges have a main influence on the cost of crude oil; therefore, the opportunities to save cost in logistics still do exist. The large oil producing companies are undertaking future contracts through 'swaps or options' practice that saves their millions of dollars. The objective of this paper is to throw light on the supply chain challenges and opportunities in the oil industry and on swap practices which are widely employed by large oil producing companies around the world, such as Chevron Corporation, Saudi Arabian Oil Company, BP and Exxon Mobil.Keywords: logistics, oil industry, swap practice, supply chain management
Procedia PDF Downloads 155959 Contracting Strategies to Foster Industrial Symbiosis Implementation
Authors: Robin Molinier
Abstract:
Industrial symbiosis (I.S) deals with the exchange of waste materials, fatal energy and utilities as resources for production. While it brings environmental benefits from resource conservation its economic profitability is one of the main barriers to its implementation. I.S involves several actors with their own objectives and resources so that each actor must be satisfied by ex-ante arrangements to commit toward investments and transactions. Regarding I.S Transaction cost economics helps to identify hybrid forms of governance for transactions governance due to I.S projects specificities induced by the need for customization (asset specificity, non-homogeneity). Thus we propose a framework to analyze the best contractual practices tailored to address I.S specific risks that we identified as threefold (load profiles and quality mismatch, value fluctuations). Schemes from cooperative game theory and contracting management are integrated to analyze value flows between actors. Contractual guidelines are then proposed to address the identified risks and to split the value for a set of I.S archetypes drawn from actual experiences.Keywords: contracts, economics, industrial symbiosis, risks
Procedia PDF Downloads 209958 Data Protection, Data Privacy, Research Ethics in Policy Process Towards Effective Urban Planning Practice for Smart Cities
Authors: Eugenio Ferrer Santiago
Abstract:
The growing complexities of the modern world on high-end gadgets, software applications, scams, identity theft, and Artificial Intelligence (AI) make the “uninformed” the weak and vulnerable to be victims of cybercrimes. Artificial Intelligence is not a new thing in our daily lives; the principles of database management, logical programming, and garbage in and garbage out are all connected to AI. The Philippines had in place legal safeguards against the abuse of cyberspace, but self-regulation of key industry players and self-protection by individuals are primordial to attain the success of these initiatives. Data protection, Data Privacy, and Research Ethics must work hand in hand during the policy process in the course of urban planning practice in different environments. This paper focuses on the interconnection of data protection, data privacy, and research ethics in coming up with clear-cut policies against perpetrators in the urban planning professional practice relevant in sustainable communities and smart cities. This paper shall use expository methodology under qualitative research using secondary data from related literature, interviews/blogs, and the World Wide Web resources. The claims and recommendations of this paper will help policymakers and implementers in the policy cycle. This paper shall contribute to the body of knowledge as a simple treatise and communication channel to the reading community and future researchers to validate the claims and start an intellectual discourse for better knowledge generation for the good of all in the near future.Keywords: data privacy, data protection, urban planning, research ethics
Procedia PDF Downloads 59957 Productivity, Labour Flexibility, and Migrant Workers in Hotels: An Establishment and Departmental Level Analysis
Authors: Natina Yaduma, Allan Williams, Sangwon Park, Andrew Lockwood
Abstract:
This paper analyses flexible working, and the employment of migrants, as determinants of productivity in hotels. Controlling for the institutional environment, by focussing on a single firm, it analyses data on actual hours worked and outputs, on a weekly basis, over an 8 year period. The unusually disaggregated data allows the paper to examine not only inter-establishment, but also intra-establishment (departmental) variations in productivity, and to compare financial versus physical measures. The findings emphasise the complexity of productivity findings, sometimes contrasting evidence for establishments versus departments, and the positive but scale and measure-specific contributions of both the employment of migrants and flexible working, especially the utilisation of zero hours contracts.Keywords: labour productivity, physical productivity, financial productivity, numerical flexibility, functional flexibility, migrant employment, cero-contract employment
Procedia PDF Downloads 362956 Consent, Agency and Abuse: Intimate Partner Violence in the Indian Context: A Primary Study Based on Working Women from Lower Income Groups in Smart Cities across North India
Authors: Shirin Abbas, Sandeep Kumar Dubey
Abstract:
Intimate partner violence (IPV) is one of the most common forms of gender-based violence (GBV) and is classified as discrimination on the basis of gender. Article 2 of the non-binding UN Declaration on the Elimination of Violence against Women (DEVAW). This was adopted in 1993 as the first international pronouncement regarding violence against women, including physical, sexual, and psychological violence in the family (i.e., domestic violence, marital rape, battery, statutory rape, rape by male members of the family, etc.) While crime against women continues unabated, the Indian government has strongly refuted the 2018 study by the Thomson Reuters Foundation categorizing India as a risky country for women due to the high risk of sexual violence and being forced into slave labour, according to a poll of global experts. This paper has explored consent, agency, and abuse through the lens of intimate partner violence among women from lower income groups in smart cities in the state of Uttar Pradesh, India. Using focused mapping, the paper has explored the situation on IPV internationally and studied the status of working women from lower income groups to ascertain if their lot was any different where IPV was concerned to study. The findings of the study also vindicate global reports which rate India as a country unsafe for women, even within marriage.Keywords: consent and agency, domestic violence, gender based violence GBV, intimate partner violence IPV
Procedia PDF Downloads 74955 Automated Distribution System Management: Substation Remote Diagnostic and Operation Solution for Obafemi Awolowo University
Authors: Aderonke Oluseun Akinwumi, Olusola A. Komolaf
Abstract:
This paper gives information about the wide array of challenges facing both the electric utilities and consumers in the distribution system in developing countries, using Obafemi Awolowo University, Ile-Ife Nigeria as a case study. It also proffers cost-effective solution through remote monitoring, diagnostic and operation of distribution networks without compromising the system reliability. As utilities move from manned and unintelligent networks to completely unmanned smart grids, switching activities at substations and feeders will be managed and controlled remotely by dedicated systems hence this design. The Substation Remote Diagnostic and Operation Solution (sRDOs) would remotely monitor the load on Medium Voltage (MV) and Low Voltage (LV) feeders as well as distribution transformers and allow the utility disconnect non-paying customers with absolutely no extra resource deployment and without interrupting supply to paying customers. The aftermath of the implementation of this design improved the lifetime of key distribution infrastructure by automatically isolating feeders during overload conditions and more importantly erring consumers. This increased the ratio of revenue generated on electricity bills to total network load.Keywords: electric utility, consumers, remote monitoring, diagnostic, system reliability, manned and unintelligent networks, unmanned smart grids, switching activities, medium voltage, low voltage, distribution transformer
Procedia PDF Downloads 130954 Sustainable Cities: Harnessing the Power of Urban Renewable Energy
Authors: Mehrzad Soltani, Pegah Rezaei
Abstract:
In the endeavor to construct cities that are not only thriving but also environmentally responsible, effective urban planning and architectural design assume paramount significance. The focal point of this pursuit is the harnessing of urban renewable energy. By embracing sustainable practices such as the integration of solar panels into the urban landscape and the establishment of smart grids, cities are poised to confront head-on the dual challenge of surging energy demands and pressing environmental concerns. Urban renewable energy solutions offer a multifaceted approach to these issues. Firstly, they usher in a clean and sustainable source of energy, reducing the cities' ecological footprint while ensuring a continuous power supply. This transition to eco-friendly energy is also intrinsically linked to enhanced spatial utilization, thereby streamlining the efficiency of urban areas. Moreover, it spurs the adoption of sustainable transportation alternatives, diminishing the reliance on fossil fuels and mitigating air pollution. However, the significance of integrating renewable energy solutions transcends the realm of urban sustainability. It embodies a holistic approach towards creating cities that harmoniously coexist with the natural environment while catering to the needs and aspirations of their inhabitants. In essence, prioritizing sustainability in urban planning and architectural design has evolved from a choice to a necessity, one that not only safeguards the cities' well-being but also fosters a better quality of life for their residents. Thus, it is imperative that we acknowledge the transformative potential of these innovations as we pave the way towards the cities of the future.Keywords: sustainability, smart grids, solar panel, urban planning, environmental concerns
Procedia PDF Downloads 95953 Productivity of Grain Sorghum-Cowpea Intercropping System: Climate-Smart Approach
Authors: Mogale T. E., Ayisi K. K., Munjonji L., Kifle Y. G.
Abstract:
Grain sorghum and cowpea are important staple crops in many areas of South Africa, particularly the Limpopo Province. The two crops are produced under a wide range of unsustainable conventional methods, which reduces productivity in the long run. Climate-smart traditional methods such as intercropping can be adopted to ensure sustainable production of these important two crops in the province. A no-tillage field experiment was laid out in a randomised complete block design (RCBD) with four replications over two seasons in two distinct agro-ecological zones, Syferkuil and Ofcolacoin, the province to assess the productivity of sorghum-cowpea intercropped under two cowpea densities.LCi Ultra compact photosynthesis machine was used to collect photosynthetic rate data biweekly between 11h00 and 13h00 until physiological maturity. Biomass and grain yield of the component crops in binary and sole cultures were determined at harvest maturity from middle rows of 2.7 m2 area. The biomass was oven dried in the laboratory at 65oC till constant weight. To obtain grain yield, harvested sorghum heads and cowpea pods were threshed, cleaned, and weighed. Harvest index (HI) and land equivalent ratio (LER) of the two crops were calculated to assess intercrop productivity relative to sole cultures. Data was analysed using the statistical analysis software system (SAS) 9.4 version, followed by mean separation using the least significant difference method. The photosyntheticrate of sorghum-cowpea intercrop was influenced by cowpea density and sorghum cultivar. Photosynthetic rate under low density was higher compared to high density, but this was dependent on the growing conditions. Dry biomass accumulation, grain yield, and harvest index differed among the sorghum cultivars and cowpea in both binary and sole cultures at the two test locations during the 2018/19 and 2020/21 growing seasons. Cowpea grain and dry biomass yields werein excess of 60% under high density compared to low density in both binary and sole cultures. The results revealed that grain yield accumulation of sorghum cultivars was influenced by the density of the companion cowpea crop as well as the production season. For instant, at Syferkuil, Enforcer and Ns5511 accumulated high yield under low density, whereas, at Ofcolaco, the higher yield was recorded under high density. Generally, under low cowpea density, cultivar Enforcer produced relatively higher grain yield whereas, under higher density, Titan yield was superior. The partial and total LER varied with growing season and the treatments studied. The total LERs exceeded 1.0 at the two locations across seasons, ranging from 1.3 to 1.8. From the results, it can be concluded that resources were used more efficiently in sorghum-cowpea intercrop at both Syferkuil and Ofcolaco. Furthermore, intercropping system improved photosynthetic rate, grain yield, and dry matter accumulation of sorghum and cowpea depending on growing conditions and density of cowpea. Hence, the sorghum-cowpea intercropping system can be adopted as a climate-smart practice for sustainable production in the Limpopo province.Keywords: cowpea, climate-smart, grain sorghum, intercropping
Procedia PDF Downloads 221952 A Literature Review on Emotion Recognition Using Wireless Body Area Network
Authors: Christodoulou Christos, Politis Anastasios
Abstract:
The utilization of Wireless Body Area Network (WBAN) is experiencing a notable surge in popularity as a result of its widespread implementation in the field of smart health. WBANs utilize small sensors implanted within the human body to monitor and record physiological indicators. These sensors transmit the collected data to hospitals and healthcare facilities through designated access points. Bio-sensors exhibit a diverse array of shapes and sizes, and their deployment can be tailored to the condition of the individual. Multiple sensors may be strategically placed within, on, or around the human body to effectively observe, record, and transmit essential physiological indicators. These measurements serve as a basis for subsequent analysis, evaluation, and therapeutic interventions. In conjunction with physical health concerns, numerous smartwatches are engineered to employ artificial intelligence techniques for the purpose of detecting mental health conditions such as depression and anxiety. The utilization of smartwatches serves as a secure and cost-effective solution for monitoring mental health. Physiological signals are widely regarded as a highly dependable method for the recognition of emotions due to the inherent inability of individuals to deliberately influence them over extended periods of time. The techniques that WBANs employ to recognize emotions are thoroughly examined in this article.Keywords: emotion recognition, wireless body area network, WBAN, ERC, wearable devices, psychological signals, emotion, smart-watch, prediction
Procedia PDF Downloads 50951 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques
Authors: John Onyima, Ikechukwu Ezepue
Abstract:
Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection
Procedia PDF Downloads 305950 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity
Authors: Jean Rosemond Dora, Karol Nemoga
Abstract:
In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model
Procedia PDF Downloads 172949 Resilient Security System with Toll Free Call Services: Case Study of Adama City
Authors: Shanko Chura Aredo, Hailu Jeldie Wodajo, Muktar Jeylan, Kedir Ilka, Abdulnasir Husein
Abstract:
Toll-free numbers are calling numbers that have unique three or four digit numbers and that don’t require payment from phone lines in order to be called. With the help of these numbers, callers can connect with nearby organizations and/or people without incurring far-reaching fees. Calls to assistance centers are especially popular from toll-free phones. In the past, toll-free services have offered prospective clients and other parties a simple and cost-free means of getting in touch with enterprises. Nevertheless, unless they have an ”unlimited calling” plan, wireless subscribers will be billed for the airtime minutes used during a toll-free call. In Adama, the second largest city in Ethiopia, a call center has been installed as part of smart security system and serving since January 2023 for collection of complaints from different community levels. The call center is situated at the mayor office and has 11 active workers, 4 of these working the night time and the remaining during day time. The information reported in the form of complaints from individuals and groups are illegal constructions, illegal trade, income concealment or hiding, giving and receiving bribe, informing new faces of suspected enemies and exposing individual or group conflicts. This technology has been found to bring a significant outcome in minimizing illegal acts, public safety threats and service delivery problems.Keywords: smart, safety, crime, call center, security
Procedia PDF Downloads 55948 Technical and Economic Analysis of Smart Micro-Grid Renewable Energy Systems: An Applicable Case Study
Authors: M. A. Fouad, M. A. Badr, Z. S. Abd El-Rehim, Taher Halawa, Mahmoud Bayoumi, M. M. Ibrahim
Abstract:
Renewable energy-based micro-grids are presently attracting significant consideration. The smart grid system is presently considered a reliable solution for the expected deficiency in the power required from future power systems. The purpose of this study is to determine the optimal components sizes of a micro-grid, investigating technical and economic performance with the environmental impacts. The micro grid load is divided into two small factories with electricity, both on-grid and off-grid modes are considered. The micro-grid includes photovoltaic cells, back-up diesel generator wind turbines, and battery bank. The estimated load pattern is 76 kW peak. The system is modeled and simulated by MATLAB/Simulink tool to identify the technical issues based on renewable power generation units. To evaluate system economy, two criteria are used: the net present cost and the cost of generated electricity. The most feasible system components for the selected application are obtained, based on required parameters, using HOMER simulation package. The results showed that a Wind/Photovoltaic (W/PV) on-grid system is more economical than a Wind/Photovoltaic/Diesel/Battery (W/PV/D/B) off-grid system as the cost of generated electricity (COE) is 0.266 $/kWh and 0.316 $/kWh, respectively. Considering the cost of carbon dioxide emissions, the off-grid will be competitive to the on-grid system as COE is found to be (0.256 $/kWh, 0.266 $/kWh), for on and off grid systems.Keywords: renewable energy sources, micro-grid system, modeling and simulation, on/off grid system, environmental impacts
Procedia PDF Downloads 270947 Heterogeneity, Asymmetry and Extreme Risk Perception; Dynamic Evolution Detection From Implied Risk Neutral Density
Authors: Abderrahmen Aloulou, Younes Boujelbene
Abstract:
The current paper displays a new method of extracting information content from options prices by eliminating biases caused by daily variation of contract maturity. Based on Kernel regression tool, this non-parametric technique serves to obtain a spectrum of interpolated options with constant maturity horizons from negotiated optional contracts on the S&P TSX 60 index. This method makes it plausible to compare daily risk neutral densities from which extracting time continuous indicators allows the detection traders attitudes’ evolution, such as, belief homogeneity, asymmetry and extreme Risk Perception. Our findings indicate that the applied method contribute to develop effective trading strategies and to adjust monetary policies through controlling trader’s reactions to economic and monetary news.Keywords: risk neutral densities, kernel, constant maturity horizons, homogeneity, asymmetry and extreme risk perception
Procedia PDF Downloads 485