Search results for: privacy preservation scheme
1775 AI-Enabled Smart Contracts for Reliable Traceability in the Industry 4.0
Authors: Harris Niavis, Dimitra Politaki
Abstract:
The manufacturing industry was collecting vast amounts of data for monitoring product quality thanks to the advances in the ICT sector and dedicated IoT infrastructure is deployed to track and trace the production line. However, industries have not yet managed to unleash the full potential of these data due to defective data collection methods and untrusted data storage and sharing. Blockchain is gaining increasing ground as a key technology enabler for Industry 4.0 and the smart manufacturing domain, as it enables the secure storage and exchange of data between stakeholders. On the other hand, AI techniques are more and more used to detect anomalies in batch and time-series data that enable the identification of unusual behaviors. The proposed scheme is based on smart contracts to enable automation and transparency in the data exchange, coupled with anomaly detection algorithms to enable reliable data ingestion in the system. Before sensor measurements are fed to the blockchain component and the smart contracts, the anomaly detection mechanism uniquely combines artificial intelligence models to effectively detect unusual values such as outliers and extreme deviations in data coming from them. Specifically, Autoregressive integrated moving average, Long short-term memory (LSTM) and Dense-based autoencoders, as well as Generative adversarial networks (GAN) models, are used to detect both point and collective anomalies. Towards the goal of preserving the privacy of industries' information, the smart contracts employ techniques to ensure that only anonymized pointers to the actual data are stored on the ledger while sensitive information remains off-chain. In the same spirit, blockchain technology guarantees the security of the data storage through strong cryptography as well as the integrity of the data through the decentralization of the network and the execution of the smart contracts by the majority of the blockchain network actors. The blockchain component of the Data Traceability Software is based on the Hyperledger Fabric framework, which lays the ground for the deployment of smart contracts and APIs to expose the functionality to the end-users. The results of this work demonstrate that such a system can increase the quality of the end-products and the trustworthiness of the monitoring process in the smart manufacturing domain. The proposed AI-enabled data traceability software can be employed by industries to accurately trace and verify records about quality through the entire production chain and take advantage of the multitude of monitoring records in their databases.Keywords: blockchain, data quality, industry4.0, product quality
Procedia PDF Downloads 1891774 Load-Enabled Deployment and Sensing Range Optimization for Lifetime Enhancement of WSNs
Authors: Krishan P. Sharma, T. P. Sharma
Abstract:
Wireless sensor nodes are resource constrained battery powered devices usually deployed in hostile and ill-disposed areas to cooperatively monitor physical or environmental conditions. Due to their limited power supply, the major challenge for researchers is to utilize their battery power for enhancing the lifetime of whole network. Communication and sensing are two major sources of energy consumption in sensor networks. In this paper, we propose a deployment strategy for enhancing the average lifetime of a sensor network by effectively utilizing communication and sensing energy to provide full coverage. The proposed scheme is based on the fact that due to heavy relaying load, sensor nodes near to the sink drain energy at much faster rate than other nodes in the network and consequently die much earlier. To cover this imbalance, proposed scheme finds optimal communication and sensing ranges according to effective load at each node and uses a non-uniform deployment strategy where there is a comparatively high density of nodes near to the sink. Probable relaying load factor at particular node is calculated and accordingly optimal communication distance and sensing range for each sensor node is adjusted. Thus, sensor nodes are placed at locations that optimize energy during network operation. Formal mathematical analysis for calculating optimized locations is reported in present work.Keywords: load factor, network lifetime, non-uniform deployment, sensing range
Procedia PDF Downloads 3831773 Strategic Management for Corporate Social Responsibility in Colombian Industries: A Typology of CSR
Authors: Iris Maria Velez Osorio
Abstract:
There has been in the last decade a concern about the environment, particularly about clean and enough water for human consumption but, some enterprises had some trouble to understand the limited resources in the environment. This research tries to understand how some industries are better oriented to the preservation of the environment through investment for strategic management of scarce resources and try in the best way possible, the contaminants. It was made an industry classification since four different group of theories for Corporate Social Responsibility agree with variables of: investment in environmental care, water protection, and residues treatment finding different levels of commitment with CSR.Keywords: corporate social responsibility, environment, strategic management, water
Procedia PDF Downloads 3761772 Planning Quality and Maintenance Activities in a Closed-Loop Serial Multi-Stage Manufacturing System under Constant Degradation
Authors: Amauri Josafat Gomez Aguilar, Jean Pierre Kenné
Abstract:
This research presents the development of a self-sustainable manufacturing system from a circular economy perspective, structured by a multi-stage serial production system consisting of a series of machines under deterioration in charge of producing a single product and a reverse remanufacturing system constituted by the same productive systems of the first scheme and different tooling, fed by-products collected at the end of their life cycle, and non-conforming elements of the first productive scheme. Since the advanced production manufacturing system is unable to satisfy the customer's quality expectations completely, we propose the development of a mixed integer linear mathematical model focused on the optimal search and assignment of quality stations and preventive maintenance operation to the machines over a time horizon, intending to segregate the correct number of non-conforming parts for reuse in the remanufacturing system and thereby minimizing production, quality, maintenance, and customer non-conformance penalties. Numerical experiments are performed to analyze the solutions found by the model under different scenarios. The results showed that the correct implementation of a closed manufacturing system and allocation of quality inspection and preventive maintenance operations generate better levels of customer satisfaction and an efficient manufacturing system.Keywords: closed loop, mixed integer linear programming, preventive maintenance, quality inspection
Procedia PDF Downloads 861771 Atmospheres, Ghosts and Shells to Reform our Memorial Cultures
Authors: Tomas Macsotay
Abstract:
If monument removal and monument effacement may call to mind a Nietzschean proposal for vitalist disregard of conventional morality, it remains the case that it is often only by a willingness to go “beyond good and evil” in inherited monument politics that truthful, be it unexpected aspects of our co-existence with monuments can finally start to rise into fuller consciousness. A series of urgent questions press themselves in the panorama created by the affirmative idea that we can, as a community, make crucial decisions with regard to monumental preservation or discontinuation. Memorials are not the core concern for decolonial and racial dignity movements like Black Lives Matter (BLM), which have repeatedly shown they regard these actions as a welcome, albeit complementary, part of a reckoning with a past of racial violence and injustice, slavery, and colonial subaltern existence. As such, the iconoclastic issue of “rights and prohibitions of images” only tangentially touches on a cultural movement that seems rather question dominant ideas of history, pertinence, and the long life of the class, gender, and racial conflict through ossified memorial cultures. In the recent monument insurrection, we face a rare case of a new negotiation of rights of existence for this particular tract of material culture. This engenders a debate on how and why we accord rights to objects in public dominion ― indeed, how such rights impinge upon the rights of subjects who inhabit the public sphere. Incidentally, the possibility of taking away from monuments such imagined or adjoined rights has made it possible to tease open a sphere of emotionality that could not be expressed in patrimonial thinking: the reality of atmospheres as settings, often dependent on pseudo-objects and half-conscious situations, that situate individuals involuntarily in a pathic aesthetics. In this way, the unique moment we now witness ― full of the possibility of going “beyond good and evil” of monument preservation ― starts to look more like a moment of involuntary awaking: an awakening to the encrypted gaze of the monument and the enigma that the same monument or memorial site can carry day-to-day habits of life for some bystanders, while racialized and disenfranchised communities experience discomfort and erosion of subjective life in the same sites.Keywords: monument, memorial, atmosphere, racial justice, decolonialism
Procedia PDF Downloads 801770 Formal Development of Electronic Identity Card System Using Event-B
Authors: Tomokazu Nagata, Jawid Ahmad Baktash
Abstract:
The goal of this paper is to explore the use of formal methods for Electronic Identity Card System. Nowadays, one of the core research directions in a constantly growing distributed environment is the improvement of the communication process. The responsibility for proper verification becomes crucial. Formal methods can play an essential role in the development and testing of systems. The thesis presents two different methodologies for assessing correctness. Our first approach employs abstract interpretation techniques for creating a trace based model for Electronic Identity Card System. The model was used for building a semi decidable procedure for verifying the system model. We also developed the code for the eID System and can cover three parts login to system sending of Acknowledgment from user side, receiving of all information from server side and log out from system. The new concepts of impasse and spawned sessions that we introduced led our research to original statements about the intruder’s knowledge and eID system coding with respect to secrecy. Furthermore, we demonstrated that there is a bound on the number of sessions needed for the analysis of System.Electronic identity (eID) cards promise to supply a universal, nation-wide mechanism for user authentication. Most European countries have started to deploy eID for government and private sector applications. Are government-issued electronic ID cards the proper way to authenticate users of online services? We use the eID project as a showcase to discuss eID from an application perspective. The new eID card has interesting design features, it is contact-less, it aims to protect people’s privacy to the extent possible, and it supports cryptographically strong mutual authentication between users and services. Privacy features include support for pseudonymous authentication and per service controlled access to individual data items. The article discusses key concepts, the eID infrastructure, observed and expected problems, and open questions. The core technology seems ready for prime time and government projects deploy it to the masses. But application issues may hamper eID adoption for online applications.Keywords: eID, event-B, Pro-B, formal method, message passing
Procedia PDF Downloads 2371769 Hybridization of Mathematical Transforms for Robust Video Watermarking Technique
Authors: Harpal Singh, Sakshi Batra
Abstract:
The widespread and easy accesses to multimedia contents and possibility to make numerous copies without loss of significant fidelity have roused the requirement of digital rights management. Thus this problem can be effectively solved by Digital watermarking technology. This is a concept of embedding some sort of data or special pattern (watermark) in the multimedia content; this information will later prove ownership in case of a dispute, trace the marked document’s dissemination, identify a misappropriating person or simply inform user about the rights-holder. The primary motive of digital watermarking is to embed the data imperceptibly and robustly in the host information. Extensive counts of watermarking techniques have been developed to embed copyright marks or data in digital images, video, audio and other multimedia objects. With the development of digital video-based innovations, copyright dilemma for the multimedia industry increases. Video watermarking had been proposed in recent years to serve the issue of illicit copying and allocation of videos. It is the process of embedding copyright information in video bit streams. Practically video watermarking schemes have to address some serious challenges as compared to image watermarking schemes like real-time requirements in the video broadcasting, large volume of inherently redundant data between frames, the unbalance between the motion and motionless regions etc. and they are particularly vulnerable to attacks, for example, frame swapping, statistical analysis, rotation, noise, median and crop attacks. In this paper, an effective, robust and imperceptible video watermarking algorithm is proposed based on hybridization of powerful mathematical transforms; Fractional Fourier Transform (FrFT), Discrete Wavelet transforms (DWT) and Singular Value Decomposition (SVD) using redundant wavelet. This scheme utilizes various transforms for embedding watermarks on different layers by using Hybrid systems. For this purpose, the video frames are portioned into layers (RGB) and the watermark is being embedded in two forms in the video frames using SVD portioning of the watermark, and DWT sub-band decomposition of host video, to facilitate copyright safeguard as well as reliability. The FrFT orders are used as the encryption key that allows the watermarking method to be more robust against various attacks. The fidelity of the scheme is enhanced by introducing key generation and wavelet based key embedding watermarking scheme. Thus, for watermark embedding and extraction, same key is required. Therefore the key must be shared between the owner and the verifier via some safe network. This paper demonstrates the performance by considering different qualitative metrics namely Peak Signal to Noise ratio, Structure similarity index and correlation values and also apply some attacks to prove the robustness. The Experimental results are presented to demonstrate that the proposed scheme can withstand a variety of video processing attacks as well as imperceptibility.Keywords: discrete wavelet transform, robustness, video watermarking, watermark
Procedia PDF Downloads 2241768 Kinetic Study of C₃N₄/CuWO₄: Photocatalyst towards Solar Light Inactivation of Mixed Populated Bacteria
Authors: Rimzhim Gupta, Bhanupriya Boruah, Jayant M. Modak, Giridhar Madras
Abstract:
Microbial contamination is one of the major concerns in the field of water treatment. AOP (advanced oxidation processes) is well-established method to resolve the issue of removal of contaminants in water. A Z-scheme composite g-C₃N₄/CuWO₄ was synthesized by sol-gel method for the photocatalytic inactivation of a mixed population of Gram-positive bacteria (S. aureus) and Gram-negative bacteria (E. coli). The photoinactivation was observed for different types of bacteria in the same medium together and individually in the absence of the nutrients. The lattice structures and phase purities were determined by X-ray diffraction. For morphological and topographical features, scanning electron microscopy and transmission electron microscopy analyses were carried out. The band edges of the semiconductor (valence band and conduction band) were determined by ultraviolet photoelectron microscopy. The lifetime of the charge carriers and band gap of the semiconductors were determined by time resolved florescence spectroscopy and diffused reflectance spectroscopy, respectively. The effect of weight ratio of C₃N₄ and CuWO₄ was observed by performing photocatalytic experiments. To investigate the exact mechanism and major responsible radicals for photocatalysis, scavenger studies were performed. The rate constants and order of the inactivation reactions were obtained by power law kinetics. For E. coli and S. aureus, the order of reaction and rate constants are 1.15, 0.9 and 1.39 ± 0.03 (CFU/mL)⁻⁰.¹⁵ h⁻¹, 47.95 ± 1.2 (CFU/mL)⁰.¹ h⁻¹, respectively.Keywords: z-scheme, E. coli, S. aureus, sol-gel
Procedia PDF Downloads 1481767 Increasing the Efficiency of the Biomass Gasification Technology with Using the Organic Rankin Cycle
Authors: Jaroslav Frantík, Jan Najser
Abstract:
This article deals with increasing the energy efficiency of a plant in terms of optimizing the process. The European Union is striving to achieve the climate-energy package in the area increasing of energy efficiency. The goal of energy efficiency is to reduce primary energy consumption by 20% within the EU until 2020. The objective of saving energy consumption in the Czech Republic was set at 47.84 PJ (13.29 TWh). For reducing electricity consumption, it is possible to choose: a) mandatory increasing of energy efficiency, b) alternative scheme, c) combination of both actions. The Czech Republic has chosen for reducing electricity consumption using-alternative scheme. The presentation is focused on the proposal of a technological unit dealing with the gasification process of processing of biomass with an increase of power in the output. The synthesis gas after gasification of biomass is used as fuel in a cogeneration process of reciprocating internal combustion engine with the classic production of heat and electricity. Subsequently, there is an explanation of the ORC system dealing with the conversion of waste heat to electricity with the using closed cycle of the steam process with organic medium. The arising electricity is distributed to the power grid as a further energy source, or it is used for needs of the partial coverage of the technological unit. Furthermore, there is a presented schematic description of the technology with the identification of energy flows starting from the biomass treatment by drying, through its conversion to gaseous fuel, producing of electricity and utilize of thermal energy with minimizing losses. It has been found that using of ORC system increased the efficiency of the produced electricity by 7.5%.Keywords: biomass, efficiency, gasification, ORC system
Procedia PDF Downloads 2171766 A Lightweight Blockchain: Enhancing Internet of Things Driven Smart Buildings Scalability and Access Control Using Intelligent Direct Acyclic Graph Architecture and Smart Contracts
Authors: Syed Irfan Raza Naqvi, Zheng Jiangbin, Ahmad Moshin, Pervez Akhter
Abstract:
Currently, the IoT system depends on a centralized client-servant architecture that causes various scalability and privacy vulnerabilities. Distributed ledger technology (DLT) introduces a set of opportunities for the IoT, which leads to practical ideas for existing components at all levels of existing architectures. Blockchain Technology (BCT) appears to be one approach to solving several IoT problems, like Bitcoin (BTC) and Ethereum, which offer multiple possibilities. Besides, IoTs are resource-constrained devices with insufficient capacity and computational overhead to process blockchain consensus mechanisms; the traditional BCT existing challenge for IoTs is poor scalability, energy efficiency, and transaction fees. IOTA is a distributed ledger based on Direct Acyclic Graph (DAG) that ensures M2M micro-transactions are free of charge. IOTA has the potential to address existing IoT-related difficulties such as infrastructure scalability, privacy and access control mechanisms. We proposed an architecture, SLDBI: A Scalable, lightweight DAG-based Blockchain Design for Intelligent IoT Systems, which adapts the DAG base Tangle and implements a lightweight message data model to address the IoT limitations. It enables the smooth integration of new IoT devices into a variety of apps. SLDBI enables comprehensive access control, energy efficiency, and scalability in IoT ecosystems by utilizing the Masked Authentication Message (MAM) protocol and the IOTA Smart Contract Protocol (ISCP). Furthermore, we suggest proof-of-work (PoW) computation on the full node in an energy-efficient way. Experiments have been carried out to show the capability of a tangle to achieve better scalability while maintaining energy efficiency. The findings show user access control management at granularity levels and ensure scale up to massive networks with thousands of IoT nodes, such as Smart Connected Buildings (SCBDs).Keywords: blockchain, IOT, direct acyclic graphy, scalability, access control, architecture, smart contract, smart connected buildings
Procedia PDF Downloads 1221765 Investigation of Dry-Blanching and Freezing Methods of Fruits
Authors: Epameinondas Xanthakis, Erik Kaunisto, Alain Le-Bail, Lilia Ahrné
Abstract:
Fruits and vegetables are characterized as perishable food matrices due to their short shelf life as several deterioration mechanisms are being involved. Prior to the common preservation methods like freezing or canning, fruits and vegetables are being blanched in order to inactivate deteriorative enzymes. Both conventional blanching pretreatments and conventional freezing methods hide drawbacks behind their beneficial impacts on the preservation of those matrices. Conventional blanching methods may require longer processing times, leaching of minerals and nutrients due to the contact with the warm water which in turn leads to effluent production with large BOD. An important issue of freezing technologies is the size of the formed ice crystals which is also critical for the final quality of the frozen food as it can cause irreversible damage to the cellular structure and subsequently to degrade the texture and the colour of the product. Herein, the developed microwave blanching methodology and the results regarding quality aspects and enzyme inactivation will be presented. Moreover, heat transfer phenomena, mass balance, temperature distribution, and enzyme inactivation (such as Pectin Methyl Esterase and Ascorbic Acid Oxidase) of our microwave blanching approach will be evaluated based on measurements and computer modelling. The present work is part of the COLDμWAVE project which aims to the development of an innovative environmentally sustainable process for blanching and freezing of fruits and vegetables with improved textural and nutritional quality. In this context, COLDµWAVE will develop tailored equipment for MW blanching of vegetables that has very high energy efficiency and no water consumption. Furthermore, the next steps of this project regarding the development of innovative pathways in MW assisted freezing to improve the quality of frozen vegetables, by exploring in depth previous results acquired by the authors, will be presented. The application of MW assisted freezing process on fruits and vegetables it is expected to lead to improved quality characteristics compared to the conventional freezing. Acknowledgments: COLDμWAVE has received funding from the European Union’s Horizon 2020 research and innovation programme under the Marie Sklodowska-Curie grand agreement No 660067.Keywords: blanching, freezing, fruits, microwave blanching, microwave
Procedia PDF Downloads 2671764 Evaluating Global ‘Thing’ Security of Consumer Products
Authors: Achutha Raman
Abstract:
Today's brave new world features a bonanza of digitally interconnected products, or ‘things,’ that improve convenience, possibilities, and in some cases efficiency for consumers. Nonetheless, even as the market accelerates, this Internet of ‘things’ is subject to substantial leakage of consumer personal data. First defining the fluid concept of ‘things,’ this paper subsequently uses case studies taken from the EU, Asia, and the US, to highlight large gaps and comprehensively evaluate the state of security for consumer ‘things.’ Ultimately, this paper offers several ways of improving the present status quo, and especially focuses on an evaluative approach that augments the standard mechanism of Firmware Over the Air Updates, and ought to be easily implementable.Keywords: cybersecurity, FOTA, Internet of Things, transnational privacy
Procedia PDF Downloads 2181763 Pilot-Assisted Direct-Current Biased Optical Orthogonal Frequency Division Multiplexing Visible Light Communication System
Authors: Ayad A. Abdulkafi, Shahir F. Nawaf, Mohammed K. Hussein, Ibrahim K. Sileh, Fouad A. Abdulkafi
Abstract:
Visible light communication (VLC) is a new approach of optical wireless communication proposed to support the congested radio frequency (RF) spectrum. VLC systems are combined with orthogonal frequency division multiplexing (OFDM) to achieve high rate transmission and high spectral efficiency. In this paper, we investigate the Pilot-Assisted Channel Estimation for DC biased Optical OFDM (PACE-DCO-OFDM) systems to reduce the effects of the distortion on the transmitted signal. Least-square (LS) and linear minimum mean-squared error (LMMSE) estimators are implemented in MATLAB/Simulink to enhance the bit-error-rate (BER) of PACE-DCO-OFDM. Results show that DCO-OFDM system based on PACE scheme has achieved better BER performance compared to conventional system without pilot assisted channel estimation. Simulation results show that the proposed PACE-DCO-OFDM based on LMMSE algorithm can more accurately estimate the channel and achieves better BER performance when compared to the LS based PACE-DCO-OFDM and the traditional system without PACE. For the same signal to noise ratio (SNR) of 25 dB, the achieved BER is about 5×10-4 for LMMSE-PACE and 4.2×10-3 with LS-PACE while it is about 2×10-1 for system without PACE scheme.Keywords: channel estimation, OFDM, pilot-assist, VLC
Procedia PDF Downloads 1801762 FPGA Implementation of the BB84 Protocol
Authors: Jaouadi Ikram, Machhout Mohsen
Abstract:
The development of a quantum key distribution (QKD) system on a field-programmable gate array (FPGA) platform is the subject of this paper. A quantum cryptographic protocol is designed based on the properties of quantum information and the characteristics of FPGAs. The proposed protocol performs key extraction, reconciliation, error correction, and privacy amplification tasks to generate a perfectly secret final key. We modeled the presence of the spy in our system with a strategy to reveal some of the exchanged information without being noticed. Using an FPGA card with a 100 MHz clock frequency, we have demonstrated the evolution of the error rate as well as the amounts of mutual information (between the two interlocutors and that of the spy) passing from one step to another in the key generation process.Keywords: QKD, BB84, protocol, cryptography, FPGA, key, security, communication
Procedia PDF Downloads 1831761 A Constrained Model Predictive Control Scheme for Simultaneous Control of Temperature and Hygrometry in Greenhouses
Authors: Ayoub Moufid, Najib Bennis, Soumia El Hani
Abstract:
The objective of greenhouse climate control is to improve the culture development and to minimize the production costs. A greenhouse is an open system to external environment and the challenge is to regulate the internal climate despite the strong meteorological disturbances. The internal state of greenhouse considered in this work is defined by too relevant and coupled variables, namely inside temperature and hygrometry. These two variables are chosen to describe the internal state of greenhouses due to their importance in the development of plants and their sensitivity to external climatic conditions, sources of weather disturbances. A multivariable model is proposed and validated by considering a greenhouse as black-box system and the least square method is applied to parameters identification basing on collected experimental measures. To regulate the internal climate, we propose a Model Predictive Control (MPC) scheme. This one considers the measured meteorological disturbances and the physical and operational constraints on the control and state variables. A successful feasibility study of the proposed controller is presented, and simulation results show good performances despite the high interaction between internal and external variables and the strong external meteorological disturbances. The inside temperature and hygrometry are tracking nearly the desired trajectories. A comparison study with an On/Off control applied to the same greenhouse confirms the efficiency of the MPC approach to inside climate control.Keywords: climate control, constraints, identification, greenhouse, model predictive control, optimization
Procedia PDF Downloads 2061760 Monitoring and Improving Performance of Soil Aquifer Treatment System and Infiltration Basins of North Gaza Emergency Sewage Treatment Plant as Case Study
Authors: Sadi Ali, Yaser Kishawi
Abstract:
As part of Palestine, Gaza Strip (365 km2 and 1.8 million habitants) is considered a semi-arid zone relies solely on the Coastal Aquifer. The coastal aquifer is only source of water with only 5-10% suitable for human use. This barely covers the domestic and agricultural needs of Gaza Strip. Palestinian Water Authority Strategy is to find non-conventional water resource from treated wastewater to irrigate 1500 hectares and serves over 100,000 inhabitants. A new WWTP project is to replace the old-overloaded Biet Lahia WWTP. The project consists of three parts; phase A (pressure line & 9 infiltration basins - IBs), phase B (a new WWTP) and phase C (Recovery and Reuse Scheme – RRS – to capture the spreading plume). Currently, phase A is functioning since Apr 2009. Since Apr 2009, a monitoring plan is conducted to monitor the infiltration rate (I.R.) of the 9 basins. Nearly 23 million m3 of partially treated wastewater were infiltrated up to Jun 2014. It is important to maintain an acceptable rate to allow the basins to handle the coming quantities (currently 10,000 m3 are pumped an infiltrated daily). The methodology applied was to review and analysis the collected data including the I.R.s, the WW quality and the drying-wetting schedule of the basins. One of the main findings is the relation between the Total Suspended Solids (TSS) at BLWWTP and the I.R. at the basins. Since April 2009, the basins scored an average I.R. of about 2.5 m/day. Since then the records showed a decreasing pattern of the average rate until it reached the lower value of 0.42 m/day in Jun 2013. This was accompanied with an increase of TSS (mg/L) concentration at the source reaching above 200 mg/L. The reducing of TSS concentration directly improved the I.R. (by cleaning the WW source ponds at Biet Lahia WWTP site). This was reflected in an improvement in I.R. in last 6 months from 0.42 m/day to 0.66 m/day then to nearly 1.0 m/day as the average of the last 3 months of 2013. The wetting-drying scheme of the basins was observed (3 days wetting and 7 days drying) besides the rainfall rates. Despite the difficulty to apply this scheme accurately a control of flow to each basin was applied to improve the I.R. The drying-wetting system affected the I.R. of individual basins, thus affected the overall system rate which was recorded and assessed. Also the ploughing activities at the infiltration basins as well were recommended at certain times to retain a certain infiltration level. This breaks the confined clogging layer which prevents the infiltration. It is recommended to maintain proper quality of WW infiltrated to ensure an acceptable performance of IBs. The continual maintenance of settling ponds at BLWWTP, continual ploughing of basins and applying soil treatment techniques at the IBs will improve the I.R.s. When the new WWTP functions a high standard effluent quality (TSS 20mg, BOD 20 mg/l, and TN 15 mg/l) will be infiltrated, thus will enhance I.R.s of IBs due to lower organic load.Keywords: soil aquifer treatment, recovery and reuse scheme, infiltration basins, North Gaza
Procedia PDF Downloads 2471759 Mining Big Data in Telecommunications Industry: Challenges, Techniques, and Revenue Opportunity
Authors: Hoda A. Abdel Hafez
Abstract:
Mining big data represents a big challenge nowadays. Many types of research are concerned with mining massive amounts of data and big data streams. Mining big data faces a lot of challenges including scalability, speed, heterogeneity, accuracy, provenance and privacy. In telecommunication industry, mining big data is like a mining for gold; it represents a big opportunity and maximizing the revenue streams in this industry. This paper discusses the characteristics of big data (volume, variety, velocity and veracity), data mining techniques and tools for handling very large data sets, mining big data in telecommunication and the benefits and opportunities gained from them.Keywords: mining big data, big data, machine learning, telecommunication
Procedia PDF Downloads 4101758 Thermal Analysis of a Composite of Coco Fiber and Látex
Authors: Elmo Thiago Lins Cöuras Ford, Valentina Alessandra Carvalho do Vale
Abstract:
Given the unquestionable need of environmental preservation, the natural fibers have been seen as a salutary alternative for production of composites in substitution to the synthetic fibers, vitreous and metallic. In this work, the behavior of a composite was analyzed done with fiber of the peel of the coconut as reinforcement and latex as head office, when submitted the source of heat. The temperature profiles were verified in the internal surfaces and it expresses of the composite as well as the temperature gradient in the same. It was also analyzed the behavior of this composite when submitted to a cold source. As consequence, in function of the answers of the system, conclusions were reached.Keywords: natural fiber, composite, temperature, latex, gradient
Procedia PDF Downloads 8171757 Nurses as Being Participants of Sexual Health of Women
Authors: Malika Turganova, Aigul Abduldayeva
Abstract:
Modern conditions require nursing innovations at the primary ambulatory stage in the health system of Kazakhstan. There is a growing need for nurses involved in before-doctor attendance for preventive interview with a female population about reproductive health. We conducted questionnaire survey of the population of Astana in 2015. Questionnaires were drawn up according to the criteria of sexual health of World Health Organization. 3593 respondents out of 8000 questionnaires agreed to answer the questions anonymously, mM=±2,1. The average age of women comprised 37,4±11,2, Ме=31,7 years of age. Analysis of awareness about marriage hygiene revealed that 72,7% of respondents did not receive information about marriage hygiene and 89,1% respondents consider it more advisable before marriage. 45,9% of respondents specified the internet as a source of information on marriage hygiene issues, 24,5% of respondents pointed out friends, and 21,5% specified doctor. Comparing female age groups under and after 40 years old we see that proportion of cases when parents provide information about marriage hygiene issues comprises 4.3% (χ2 =9.8, p<0.05). The most important factor of preservation of women reproductive health is handling a problem of unwanted pregnancy. The responsibility lies equally in men and women. Data analysis of contraceptive methods by ranking showed three most frequently used methods: contraception sheath – 29.3%, then coitus interruptus – 18.7% and hormonal preparations – 16.9%. The most important factor of women's reproductive health preservation is a solving of the problem of unwanted pregnancy, and in this respect, the responsibility lies equally in men and women. Analyzing obtained data on contraceptive methods by ranking three of the most frequently used methods are condoms – 29,3%, then coitus interruptus – 18,7% and hormonal preparations – 16,9%. Additional oral survey of the population showed a low level of informational support of female population by family physicians, health care professionals of educational organizations (schools, universities, and colleges) about hormonal contraceptive. Females of both age groups used to think that hormonal contraceptives cause collateral damage such as blastoma, cancer, increased body weight, varix dilatation of lower limbs. Satisfaction with the frequency of sexual relations of the respondents comprised 57,6%. At that, women under 40 years of age are the most satisfied women among age groups (χ2 =5,8, p<0,05).Keywords: nurse, public health service of Kazakhstan, reproductive and sexual health, trust of population
Procedia PDF Downloads 2731756 Raman Spectral Fingerprints of Healthy and Cancerous Human Colorectal Tissues
Authors: Maria Karnachoriti, Ellas Spyratou, Dimitrios Lykidis, Maria Lambropoulou, Yiannis S. Raptis, Ioannis Seimenis, Efstathios P. Efstathopoulos, Athanassios G. Kontos
Abstract:
Colorectal cancer is the third most common cancer diagnosed in Europe, according to the latest incidence data provided by the World Health Organization (WHO), and early diagnosis has proved to be the key in reducing cancer-related mortality. In cases where surgical interventions are required for cancer treatment, the accurate discrimination between healthy and cancerous tissues is critical for the postoperative care of the patient. The current study focuses on the ex vivo handling of surgically excised colorectal specimens and the acquisition of their spectral fingerprints using Raman spectroscopy. Acquired data were analyzed in an effort to discriminate, in microscopic scale, between healthy and malignant margins. Raman spectroscopy is a spectroscopic technique with high detection sensitivity and spatial resolution of few micrometers. The spectral fingerprint which is produced during laser-tissue interaction is unique and characterizes the biostructure and its inflammatory or cancer state. Numerous published studies have demonstrated the potential of the technique as a tool for the discrimination between healthy and malignant tissues/cells either ex vivo or in vivo. However, the handling of the excised human specimens and the Raman measurement conditions remain challenging, unavoidably affecting measurement reliability and repeatability, as well as the technique’s overall accuracy and sensitivity. Therefore, tissue handling has to be optimized and standardized to ensure preservation of cell integrity and hydration level. Various strategies have been implemented in the past, including the use of balanced salt solutions, small humidifiers or pump-reservoir-pipette systems. In the current study, human colorectal specimens of 10X5 mm were collected from 5 patients up to now who underwent open surgery for colorectal cancer. A novel, non-toxic zinc-based fixative (Z7) was used for tissue preservation. Z7 demonstrates excellent protein preservation and protection against tissue autolysis. Micro-Raman spectra were recorded with a Renishaw Invia spectrometer from successive random 2 micrometers spots upon excitation at 785 nm to decrease fluorescent background and secure avoidance of tissue photodegradation. A temperature-controlled approach was adopted to stabilize the tissue at 2 °C, thus minimizing dehydration effects and consequent focus drift during measurement. A broad spectral range, 500-3200 cm-1,was covered with five consecutive full scans that lasted for 20 minutes in total. The average spectra were used for least square fitting analysis of the Raman modes.Subtle Raman differences were observed between normal and cancerous colorectal tissues mainly in the intensities of the 1556 cm-1 and 1628 cm-1 Raman modes which correspond to v(C=C) vibrations in porphyrins, as well as in the range of 2800-3000 cm-1 due to CH2 stretching of lipids and CH3 stretching of proteins. Raman spectra evaluation was supported by histological findings from twin specimens. This study demonstrates that Raman spectroscopy may constitute a promising tool for real-time verification of clear margins in colorectal cancer open surgery.Keywords: colorectal cancer, Raman spectroscopy, malignant margins, spectral fingerprints
Procedia PDF Downloads 911755 Micro-Channel Flows Simulation Based on Nonlinear Coupled Constitutive Model
Authors: Qijiao He
Abstract:
MicroElectrical-Mechanical System (MEMS) is one of the most rapidly developing frontier research field both in theory study and applied technology. Micro-channel is a very important link component of MEMS. With the research and development of MEMS, the size of the micro-devices and the micro-channels becomes further smaller. Compared with the macroscale flow, the flow characteristics of gas in the micro-channel have changed, and the rarefaction effect appears obviously. However, for the rarefied gas and microscale flow, Navier-Stokes-Fourier (NSF) equations are no longer appropriate due to the breakup of the continuum hypothesis. A Nonlinear Coupled Constitutive Model (NCCM) has been derived from the Boltzmann equation to describe the characteristics of both continuum and rarefied gas flows. We apply the present scheme to simulate continuum and rarefied gas flows in a micro-channel structure. And for comparison, we apply other widely used methods which based on particle simulation or direct solution of distribution function, such as Direct simulation of Monte Carlo (DSMC), Unified Gas-Kinetic Scheme (UGKS) and Lattice Boltzmann Method (LBM), to simulate the flows. The results show that the present solution is in better agreement with the experimental data and the DSMC, UGKS and LBM results than the NSF results in rarefied cases but is in good agreement with the NSF results in continuum cases. And some characteristics of both continuum and rarefied gas flows are observed and analyzed.Keywords: continuum and rarefied gas flows, discontinuous Galerkin method, generalized hydrodynamic equations, numerical simulation
Procedia PDF Downloads 1721754 Antibacterial Nanofibrous Film Encapsulated with 4-terpineol/β-cyclodextrin Inclusion Complexes: Relative Humidity-Triggered Release and Shrimp Preservation Application
Authors: Chuanxiang Cheng, Tiantian Min, Jin Yue
Abstract:
Antimicrobial active packaging enables extensive biological effects to improve food safety. However, the efficacy of antimicrobial packaging hinges on factors including the diffusion rate of the active agent toward the food surface, the initial content in the antimicrobial agent, and the targeted food shelf life. Among the possibilities of antimicrobial packaging design, an interesting approach involves the incorporation of volatile antimicrobial agents into the packaging material. In this case, the necessity for direct contact between the active packaging material and the food surface is mitigated, as the antimicrobial agent exerts its action through the packaging headspace atmosphere towards the food surface. However, it still remains difficult to achieve controlled and precise release of bioactive compounds to the specific target location with required quantity in food packaging applications. Remarkably, the development of stimuli-responsive materials for electrospinning has introduced the possibility of achieving controlled release of active agents under specific conditions, thereby yielding enduring biological effects. Relative humidity (RH) for the storage of food categories such as meat and aquatic products typically exceeds 90%. Consequently, high RH can be used as an abiotic trigger for the release of active agents to prevent microbial growth. Hence, a novel RH - responsive polyvinyl alcohol/chitosan (PVA/CS) composite nanofibrous film incorporated with 4-terpineol/β-cyclodextrin inclusion complexes (4-TA@β-CD ICs) was engineered by electrospinning that can be deposited as a functional packaging materials. The characterization results showed the thermal stability of the films was enhanced after the incorporation due to the hydrogen bonds between ICs and polymers. Remarkably, the 4 wt% 4-TA@β-CD ICs/PVA/CS film exhibited enhanced crystallinity, moderate hydrophilic (Water contact angle of 81.53°), light barrier property (Transparency of 1.96%) and water resistance (Water vapor permeability of 3.17 g mm/m2 h kPa). Moreover, this film also showed optimized mechanical performance with a Young’s modulus of 11.33 MPa, a tensile strength of 19.99 MPa and an elongation at break of 4.44 %. Notably, the antioxidant and antibacterial properties of this packaging material were significantly improved. The film demonstrated the half-inhibitory concentrations (IC50) values of 87.74% and 85.11% for scavenging 2,2-diphenyl-1-picrylhydrazyl (DPPH) and 2, 2′-azinobis (3-ethylbenzothiazoline-6-sulfonic) (ABTS) free radicals, respectively, in addition to an inhibition efficiency of 65% against Shewanella putrefaciens, the characteristic bacteria in aquatic products. Most importantly, the film achieved controlled release of 4-TA under high 98% RH by inducing the plasticization of polymers caused by water molecules, swelling of polymer chains, and destruction of hydrogen bonds within the cyclodextrin inclusion complex. Consequently, low relative humidity is suitable for the preservation of nanofibrous film, while high humidity conditions typical in fresh food packaging environments effectively stimulated the release of active compounds in the film. This film with a long-term antimicrobial effect successfully extended the shelf life of Litopenaeus vannamei shrimp to 7 days at 4 °C. This attractive design could pave the way for the development of new food packaging materials.Keywords: controlled release, electrospinning, nanofibrous film, relative humidity–responsive, shrimp preservation
Procedia PDF Downloads 711753 Interface Problems in Construction Projects
Authors: Puti F. Marzuki, Adrianto Oktavianus, Almerinda Regina
Abstract:
Interface problems among interacting parties in Indonesian construction projects have most often led to low productivity and completion delay. In the midst of this country’s needs to accelerate construction of public infrastructure providing connectivity among regions and supporting economic growth as well as better living quality, project delays have to be seriously addressed. This paper identifies potential causes factors of interface problems experienced by construction projects in Indonesia. Data are collected through a survey involving the main actors of six important public infrastructure construction projects including railway, LRT, sports stadiums, apartment, and education building construction projects. Five of these projects adopt the design-build project delivery method and one applies the design-bid-build scheme. Interface problems’ potential causes are categorized into contract, management, technical experience, coordination, financial, and environmental factors. Research results reveal that, especially in railway and LRT projects, potential causes of interface problems are mainly technical and managerial in nature. These relate to complex construction execution in highly congested areas. Meanwhile, coordination cause factors are mainly found in the education building construction project with loan from a foreign donor. All of the six projects have to resolve interface problems caused by incomplete or low-quality contract documents. This research also shows that the design-bid-build delivery method involving more parties in construction projects tends to induce more interface problem cause factors than the design-build scheme.Keywords: cause factors, construction delays, project delivery method, contract documents
Procedia PDF Downloads 2551752 Sharing Personal Information for Connection: The Effect of Social Exclusion on Consumer Self-Disclosure to Brands
Authors: Jiyoung Lee, Andrew D. Gershoff, Jerry Jisang Han
Abstract:
Most extant research on consumer privacy concerns and their willingness to share personal data has focused on contextual factors (e.g., types of information collected, type of compensation) that lead to consumers’ personal information disclosure. Unfortunately, the literature lacks a clear understanding of how consumers’ incidental psychological needs may influence consumers’ decisions to share their personal information with companies or brands. In this research, we investigate how social exclusion, which is an increasing societal problem, especially since the onset of the COVID-19 pandemic, leads to increased information disclosure intentions for consumers. Specifically, we propose and find that when consumers become socially excluded, their desire for social connection increases, and this desire leads to a greater willingness to disclose their personal information with firms. The motivation to form and maintain interpersonal relationships is one of the most fundamental human needs, and many researchers have found that deprivation of belongingness has negative consequences. Given the negative effects of social exclusion and the universal need to affiliate with others, people respond to exclusion with a motivation for social reconnection, resulting in various cognitive and behavioral consequences, such as paying greater attention to social cues and conforming to others. Here, we propose personal information disclosure as another form of behavior that can satisfy such social connection needs. As self-disclosure can serve as a strategic tool in creating and developing social relationships, those who have been socially excluded and thus have greater social connection desires may be more willing to engage in self-disclosure behavior to satisfy such needs. We conducted four experiments to test how feelings of social exclusion can influence the extent to which consumers share their personal information with brands. Various manipulations and measures were used to demonstrate the robustness of our effects. Through the four studies, we confirmed that (1) consumers who have been socially excluded show greater willingness to share their personal information with brands and that (2) such an effect is driven by the excluded individuals’ desire for social connection. Our findings shed light on how the desire for social connection arising from exclusion influences consumers’ decisions to disclose their personal information to brands. We contribute to the consumer disclosure literature by uncovering a psychological need that influences consumers’ disclosure behavior. We also extend the social exclusion literature by demonstrating that exclusion influences not only consumers’ choice of products but also their decision to disclose personal information to brands.Keywords: consumer-brand relationship, consumer information disclosure, consumer privacy, social exclusion
Procedia PDF Downloads 1231751 Gandhi and the Judicial Discourse on Moral Rights
Authors: Sunayana Basu Mallik, Shishira Prakash
Abstract:
The inclusion of Rights of Author (Moral and Personal Rights) resonate the century long battle of rights of authors, composers, performers across developed and developing countries (whether following civil law or common law systems). But, the juxtaposition of author’s special, moral, personal rights within the legislative framework of Copyright statutes (Indian Copyright Act, 1957, applicable statutes) underscores the foundational role of the right which goes to the root of the constitutional structure of India and philosophies of political and literary leaders like Mahatma Gandhi and Gurudeb Rabindranath Tagore. In the pre-independence era when the concept of moral rights was unknown to both England and India’s statutory laws, the strategic deployment method of Gandhi, his ideologies and thoughts scripted the concept of moral rights for authors/composers. The preservation of Rabindric Style (Characteristic Tagore’s vocal renditions) by Vishwabharati University (successor in interest for Tagore’s literary and musical compositions) prior to the Copyright Amendment of 1999 recognizing Author’s Special Rights in line with 6bis of Berne Convention invigorates the fact that the right existed intrinsically prior to the legislative amendment. The paper would in addition to the academic probe carry out an empirical enquiry of the institution’s (Navjivan Trust and Vishwa Bharati University’s) reasoning on the same. The judicial discourse and transforming constitutional ideals between 1950s till date in India alludes Moral Rights to be an essential legal right which have been reasoned by Indian Courts based on the underlying philosophies in culture, customs, religion wherein composers and literary figures have played key roles in enlightening and encouraging the members of society through their literary, musical and artistic work during pre-independence renaissance of India. The discourses have been influenced by the philosophies reflected in the preamble of the Indian constitution, ‘socialist, secular, democratic republic’ and laws of other civil law countries. Lastly, the paper would analyze the adjudication process and witness involvement in ascertaining violations of moral rights and further summarize the indigenous and country specific economic thoughts that often chisel decisions on moral rights of authors, composers, performers which sometimes intersect with author’s right of privacy and against defamation. The exclusivity contracts or other arrangements between authors, composers and publishing companies not only have an erosive effect on each thread of moral rights but irreparably dents factors that promote creativity. The paper would also be review these arrangements in view of the principles of unjust enrichment, unfair trade practices, anti-competitive behavior and breach of Section 27 (Restrain of Trade) of Indian Contract Act, 1857. The paper will thus lay down the three pillars on which author’s rights in India should namely rest, (a) political and judicial discourse evolving principles supporting moral rights of authors; (b) amendment and insertion of Section 57 of the Copyright Act, 1957; (c) overall constitutional framework supporting author’s rights.Keywords: copyright, moral rights, performer’s rights, personal rights
Procedia PDF Downloads 1941750 An Intelligent Scheme Switching for MIMO Systems Using Fuzzy Logic Technique
Authors: Robert O. Abolade, Olumide O. Ajayi, Zacheaus K. Adeyemo, Solomon A. Adeniran
Abstract:
Link adaptation is an important strategy for achieving robust wireless multimedia communications based on quality of service (QoS) demand. Scheme switching in multiple-input multiple-output (MIMO) systems is an aspect of link adaptation, and it involves selecting among different MIMO transmission schemes or modes so as to adapt to the varying radio channel conditions for the purpose of achieving QoS delivery. However, finding the most appropriate switching method in MIMO links is still a challenge as existing methods are either computationally complex or not always accurate. This paper presents an intelligent switching method for the MIMO system consisting of two schemes - transmit diversity (TD) and spatial multiplexing (SM) - using fuzzy logic technique. In this method, two channel quality indicators (CQI) namely average received signal-to-noise ratio (RSNR) and received signal strength indicator (RSSI) are measured and are passed as inputs to the fuzzy logic system which then gives a decision – an inference. The switching decision of the fuzzy logic system is fed back to the transmitter to switch between the TD and SM schemes. Simulation results show that the proposed fuzzy logic – based switching technique outperforms conventional static switching technique in terms of bit error rate and spectral efficiency.Keywords: channel quality indicator, fuzzy logic, link adaptation, MIMO, spatial multiplexing, transmit diversity
Procedia PDF Downloads 1521749 Effectiveness of a Physical Activity Loyalty Scheme to Maintain Behaviour Change: A Cluster Randomised Controlled Trial
Authors: Aisling Gough, Ruth F. Hunter, Jianjun Tang, Sarah F. Brennan, Oliver Smith, Mark A. Tully, Chris Patterson, Alberto Longo, George Hutchinson, Lindsay Prior, David French, Jean Adams, Emma McIntosh, Frank Kee
Abstract:
Background: As a large proportion of the UK workforce is employed in sedentary occupations, worksite interventions have the potential to contribute significantly to the health of the population. The UK Government is currently encouraging the use of financial incentives to promote healthier lifestyles but there is a dearth of evidence regarding the effectiveness and sustainability of incentive schemes to promote physical activity in the workplace. Methods: A large cluster RCT is currently underway, incorporating nested behavioural economic field experiments and process evaluation, to evaluate the effectiveness of a Physical Activity Loyalty Scheme. Office-based employees were recruited from large public sector organisations in Lisburn and Belfast (Northern Ireland) and randomised to an Intervention or Control group. Participants in the Intervention Group were encouraged to take part in 150 minutes of physical activity per week through provision of financial incentives (retailer vouchers) to those who met physical activity targets throughout the course of the 6 month intervention. Minutes of physical activity were monitored when participants passed by sensors (holding a keyfob) placed along main walking routes, parks and public transport stops nearby their workplace. Participants in the Control Group will complete the same outcome assessments (waiting-list control). The primary outcome is steps per day measured via pedometers (7 days). Secondary outcomes include health and wellbeing (Short Form-8, EuroQol-5D-5L, Warwick Edinburgh Mental Well Being Scale), and work absenteeism and presenteeism. Data will be collected at baseline, 6, 12 and 18 months. Information on PAL card & website usage, voucher downloads and redemption of vouchers will also be collected as part of a comprehensive process evaluation. Results: In total, 853 participants have been recruited from 9 workplaces in Lisburn, 12 buildings within the Stormont Estate, Queen’s University Belfast and Belfast City Hospital. Participants have been randomised to intervention and control groups. Baseline and 6-month data for the Physical Activity Loyalty Scheme has been collected. Findings regarding the effectiveness of the intervention from the 6-month follow-up data will be presented. Discussion: This study will address the gap in knowledge regarding the effectiveness and cost-effectiveness of a workplace-based financial incentive scheme to promote a healthier lifestyle. As the UK workforce is increasingly sedentary, workplace-based physical activity interventions have significant potential in terms of encouraging employees to partake in physical activity during the working day which could lead to substantial improvements in physical activity levels overall. Implications: If a workplace based physical activity intervention such as this proves to be both effective and cost-effective, there is great potential to contribute significantly to the health and wellbeing of the workforce in the future. Workplace-based physical activity interventions have the potential to improve the physical and mental health of employees which may in turn lead to economic benefits for the employer, such as reduction in rates of absenteeism and increased productivity.Keywords: behaviour change, cluster randomised controlled trial, loyalty scheme, physical activity
Procedia PDF Downloads 3251748 Gradient-Based Reliability Optimization of Integrated Energy Systems Under Extreme Weather Conditions: A Case Study in Ningbo, China
Abstract:
Recent extreme weather events, such as the 2021 European floods and North American heatwaves, have exposed the vulnerability of energy systems to both extreme demand scenarios and potential physical damage. Current integrated energy system designs often overlook performance under these challenging conditions. This research, focusing on a regional integrated energy system in Ningbo, China, proposes a distinct design method to optimize system reliability during extreme events. A multi-scenario model was developed, encompassing various extreme load conditions and potential system damages caused by severe weather. Based on this model, a comprehensive reliability improvement scheme was designed, incorporating a gradient approach to address different levels of disaster severity through the integration of advanced technologies like distributed energy storage. The scheme's effectiveness was validated through Monte Carlo simulations. Results demonstrate significant enhancements in energy supply reliability and peak load reduction capability under extreme scenarios. The findings provide several insights for improving energy system adaptability in the face of climate-induced challenges, offering valuable references for building reliable energy infrastructure capable of withstanding both extreme demands and physical threats across a spectrum of disaster intensities.Keywords: extreme weather events, integrated energy systems, reliability improvement, climate change adaptation
Procedia PDF Downloads 251747 RFID and Intelligence: A Smart Authentication Method for Blind People
Authors: V. Vishu, R. Manimegalai
Abstract:
A combination of Intelligence and Radio frequency identification to bring an enhanced authentication method for the improvement of visually challenged people. The main goal is to provide an improved authentication by combining Advanced Encryption Standard algorithm and Intelligence. Here the encryption key will be generated as a combination of intelligent information from sensors and tag values. The main challenges are security, privacy and cost. Besides, the method was created to evaluate the amount of interaction between sensors and significant influence on the level of visually challenged people’s mental and physical states. The proposal is to apply various ideas on independent living or to assist them for a good life.Keywords: AES, encryption, intelligence, smart key
Procedia PDF Downloads 2411746 Child Marriage and the Law in Nigeria
Authors: Kolawole-Amao, Grace Titilayo
Abstract:
Children are the most vulnerable members of the society. The child is a foundation of the society and he/she assures its continuity. Thus, the survival, continuity and the standard of development of human society depends upon the protection, preservation, nurture and development of the child. In other words, the rights of a child must be protected and guaranteed for the assurance of a healthy society. The law is an instrument of social change in any society as well as a potent weapon to combat crime, achieve justice for the people and protect their rights. In Nigeria, child marriage still occurs, though its prevalence varies from one region to another. This paper shall Centre on child rights under the law in Nigeria, child marriage and its impact on the child, obstacles in eliminating child marriages and measures that have been adopted as well as the role of the law and its effect in deterring child marriage in Nigeria.Keywords: child rights, child marriage, law, Nigeria
Procedia PDF Downloads 495