Search results for: secure data aggregation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 25894

Search results for: secure data aggregation

25204 Assessing Renewal Needs of Urban Water Infrastructure Systems: Case Study of Linköping in Sweden

Authors: Eman Hegazy, Stefan Anderberg, Joakim Krook

Abstract:

Urban water infrastructure systems are central to functioning cities. For securing a continuous and efficient supply of the systems services, continuous investment, maintenance, and renewal are needed. Neglecting maintenance and renewal can lead to recurrent breakdown problems as systems age, which makes it more and more difficult to secure efficient long-term supply. Globally, many cities struggle with aging water infrastructure, often due to competing funding priorities. Investment in maintenance and renewal is not prioritized. The problem primarily stems from the challenge of reaping the benefits of investments promptly. The long-term benefits gained from investing in the renewal of water infrastructure may be achievable in the long run, resulting in the oversight of such investments. This leads to a build-up of "renewal debt" for future generations to inherit. Addressing this issue is difficult due to various contributing factors and the complex nature of the systems. The study aims to contribute to an increased understanding of the long-term management challenges of urban water infrastructure, the development of improved maintenance and renewal strategies through the examination of water infrastructure management, and the assessment of the adequacy of the maintenance and renewal in a case study, the city of Linköping, Sweden. Employing a multi-methods approach, this study utilized both qualitative and quantitative methods, including interviews, workshops, and data analysis. The findings of the study provided insights into the current status of the water and sewerage networks in Linkoping, highlighting the risks to ensuring reliable and sustainable water supply and discussing strategies for improving maintenance and renewal.

Keywords: case study, infrastructure management, renewal needs, Sweden, urban water infrastructure

Procedia PDF Downloads 70
25203 Identifying Critical Success Factors for Data Quality Management through a Delphi Study

Authors: Maria Paula Santos, Ana Lucas

Abstract:

Organizations support their operations and decision making on the data they have at their disposal, so the quality of these data is remarkably important and Data Quality (DQ) is currently a relevant issue, the literature being unanimous in pointing out that poor DQ can result in large costs for organizations. The literature review identified and described 24 Critical Success Factors (CSF) for Data Quality Management (DQM) that were presented to a panel of experts, who ordered them according to their degree of importance, using the Delphi method with the Q-sort technique, based on an online questionnaire. The study shows that the five most important CSF for DQM are: definition of appropriate policies and standards, control of inputs, definition of a strategic plan for DQ, organizational culture focused on quality of the data and obtaining top management commitment and support.

Keywords: critical success factors, data quality, data quality management, Delphi, Q-Sort

Procedia PDF Downloads 218
25202 A Framework for Automated Nuclear Waste Classification

Authors: Seonaid Hume, Gordon Dobie, Graeme West

Abstract:

Detecting and localizing radioactive sources is a necessity for safe and secure decommissioning of nuclear facilities. An important aspect for the management of the sort-and-segregation process is establishing the spatial distributions and quantities of the waste radionuclides, their type, corresponding activity, and ultimately classification for disposal. The data received from surveys directly informs decommissioning plans, on-site incident management strategies, the approach needed for a new cell, as well as protecting the workforce and the public. Manual classification of nuclear waste from a nuclear cell is time-consuming, expensive, and requires significant expertise to make the classification judgment call. Also, in-cell decommissioning is still in its relative infancy, and few techniques are well-developed. As with any repetitive and routine tasks, there is the opportunity to improve the task of classifying nuclear waste using autonomous systems. Hence, this paper proposes a new framework for the automatic classification of nuclear waste. This framework consists of five main stages; 3D spatial mapping and object detection, object classification, radiological mapping, source localisation based on gathered evidence and finally, waste classification. The first stage of the framework, 3D visual mapping, involves object detection from point cloud data. A review of related applications in other industries is provided, and recommendations for approaches for waste classification are made. Object detection focusses initially on cylindrical objects since pipework is significant in nuclear cells and indeed any industrial site. The approach can be extended to other commonly occurring primitives such as spheres and cubes. This is in preparation of stage two, characterizing the point cloud data and estimating the dimensions, material, degradation, and mass of the objects detected in order to feature match them to an inventory of possible items found in that nuclear cell. Many items in nuclear cells are one-offs, have limited or poor drawings available, or have been modified since installation, and have complex interiors, which often and inadvertently pose difficulties when accessing certain zones and identifying waste remotely. Hence, this may require expert input to feature match objects. The third stage, radiological mapping, is similar in order to facilitate the characterization of the nuclear cell in terms of radiation fields, including the type of radiation, activity, and location within the nuclear cell. The fourth stage of the framework takes the visual map for stage 1, the object characterization from stage 2, and radiation map from stage 3 and fuses them together, providing a more detailed scene of the nuclear cell by identifying the location of radioactive materials in three dimensions. The last stage involves combining the evidence from the fused data sets to reveal the classification of the waste in Bq/kg, thus enabling better decision making and monitoring for in-cell decommissioning. The presentation of the framework is supported by representative case study data drawn from an application in decommissioning from a UK nuclear facility. This framework utilises recent advancements of the detection and mapping capabilities of complex radiation fields in three dimensions to make the process of classifying nuclear waste faster, more reliable, cost-effective and safer.

Keywords: nuclear decommissioning, radiation detection, object detection, waste classification

Procedia PDF Downloads 201
25201 A Novel Image Steganography Method Based on Mandelbrot Fractal

Authors: Adnan H. M. Al-Helali, Hamza A. Ali

Abstract:

The growth of censorship and pervasive monitoring on the Internet, Steganography arises as a new means of achieving secret communication. Steganography is the art and science of embedding information within electronic media used by common applications and systems. Generally, hiding information of multimedia within images will change some of their properties that may introduce few degradation or unusual characteristics. This paper presents a new image steganography approach for hiding information of multimedia (images, text, and audio) using generated Mandelbrot Fractal image as a cover. The proposed technique has been extensively tested with different images. The results show that the method is a very secure means of hiding and retrieving steganographic information. Experimental results demonstrate that an effective improvement in the values of the Peak Signal to Noise Ratio (PSNR), Mean Square Error (MSE), Normalized Cross Correlation (NCC), and Image Fidelity (IF) over the pervious techniques.

Keywords: fractal image, information hiding, Mandelbrot set fractal, steganography

Procedia PDF Downloads 620
25200 Efficient Position Based Operation Code Authentication

Authors: Hashim Ali, Sheheryar Khan

Abstract:

Security for applications is always been a keen issue of concern. In general, security is to allow access of grant to legal user or to deny non-authorized access to the system. Shoulder surfing is an observation technique to hack an account or to enter into a system. When a malicious observer is capturing or recording the fingers of a user while he is entering sensitive inputs (PIN, Passwords etc.) and may be able to observe user’s password credential. It is very rigorous for a novice user to prevent himself from shoulder surfing or unaided observer in a public place while accessing his account. In order to secure the user account, there are five factors of authentication; they are: “(i) something you have, (ii) something you are, (iii) something you know, (iv) somebody you know, (v) something you process”. A technique has been developed of fifth-factor authentication “something you process” to provide novel approach to the user. In this paper, we have applied position based operational code authentication in such a way to more easy and user friendly to the user.

Keywords: shoulder surfing, malicious observer, sensitive inputs, authentication

Procedia PDF Downloads 273
25199 Internet of Health Things as a Win-Win Solution for Mitigating the Paradigm Shift inside Senior Patient-Physician Shared Health Management

Authors: Marilena Ianculescu, Adriana Alexandru

Abstract:

Internet of Health Things (IoHT) has already proved to be a persuasive means to support a proper assessment of the living conditions by collecting a huge variety of data. For a customized health management of a senior patient, IoHT provides the capacity to build a dynamic solution for sustaining the shift inside the patient-physician relationship by allowing a real-time and continuous remote monitoring of the health status, well-being, safety and activities of the senior, especially in a non-clinical environment. Thus, is created a win-win solution in which both the patient and the physician enhance their involvement and shared decision-making, with significant outcomes. Health monitoring systems in smart environments are becoming a viable alternative to traditional healthcare solutions. The ongoing “Non-invasive monitoring and health assessment of the elderly in a smart environment (RO-SmartAgeing)” project aims to demonstrate that the existence of complete and accurate information is critical for assessing the health condition of the seniors, improving wellbeing and quality of life in relation to health. The researches performed inside the project aim to highlight how the management of IoHT devices connected to the RO-SmartAgeing platform in a secure way by using a role-based access control system, can allow the physicians to provide health services at a high level of efficiency and accessibility, which were previously only available in hospitals. The project aims to identify deficient aspects in the provision of health services tailored to a senior patient’s specificity and to offer a more comprehensive perspective of proactive and preventive medical acts.

Keywords: health management, internet of health things, remote monitoring, senior patient

Procedia PDF Downloads 102
25198 Secure Authentication Scheme Based on Numerical Series Cryptography for Internet of Things

Authors: Maha Aladdin, Khaled Nagaty, Abeer Hamdy

Abstract:

The rapid advancement cellular networks and wireless networks have laid a solid basis for the Internet of Things. IoT has evolved into a unique standard that allows diverse physical devices to collaborate with one another. A service provider gives a variety of services that may be accessed via smart apps anywhere, at any time, and from any location over the Internet. Because of the public environment of mobile communication and the Internet, these services are highly vulnerable to a several malicious attacks, such as unauthorized disclosure by hostile attackers. As a result, the best option for overcoming these vulnerabilities is a strong authentication method. In this paper, a lightweight authentication scheme that is based on numerical series cryptography is proposed for the IoT environments. It allows mutual authentication between IoT devices Parametric study and formal proofs are utilized to illustrate that the pro-posed approach is resistant to a variety of security threats.

Keywords: internet of things, authentication, cryptography, security protocol

Procedia PDF Downloads 123
25197 The Effect of Proper Drainage on the Cost of Building and Repairing Roads

Authors: Seyed Abbas Tabatabaei, Saeid Amini, Hamid Reza Ghafouri

Abstract:

One of the most important factors in flexible pavement failure is the lack of proper drainage along the roads. Water on the Paving Systems is one of the main parameters of pavement failure. Though, if water is discharged without delay and prior to discharge in order to prevent damaging the pavement the lifetime of the pavement will be considerably increased. In this study, duration of water stay and materials properties in pavement systems and the effects of aggregate gradation, and hydraulic conductivity of the drainage rate and Effects of subsurface drainage systems, drainage and reduction in the lifetime of the pavement have been studied. The study conducted in accordance with the terms offered can be concluded as under. The more hydraulic conductivity the less drainage time and the use of sub-surface drainage system causes two to three times of the pavement lifetime. In this research it has been tried by study and calculate the drained and undrained pavements lifetime by considering the effectiveness of water and drainage coefficient on flexible materials modulus and by using KENLAYER software to compare the present value cost of these pavements has been paid for a 20 year lifetime design. In this study, 14 pavement sections have been considered, of which 7 sections have been drained and 7 other not. Results show that drained pavements have more initial costs but the failure severity is so little in them and have longer lifetime for a 20 year lifetime design, the drained pavements seem so economic.

Keywords: drainage, base and sub-base, elasticity modulus, aggregation

Procedia PDF Downloads 370
25196 Advancing Healthcare Access and Efficiency: Objectives of Telecare and Telehealth

Authors: Munachiso A. Muoneke

Abstract:

Telecare and telehealth are transformative innovations that expand healthcare access, improve service efficiency and enhance patient outcomes. This study explores the core objectives of telecare and telehealth, focusing on their role in overcoming geographical and logistical barriers to healthcare delivery. By leveraging digital platforms, remote monitoring tools and virtual consultations, these technologies address the pressing challenges of modern healthcare systems, including provider shortages and escalating costs. The research begins with an overview of telecare and telehealth objectives, highlighting their potential to bridge care gaps in underserved regions. It examines key methodologies, such as the integration of wearable devices, video conferencing and secure patient data platforms, to enhance real-time patient monitoring and personalized care. The study employs case studies and statistical analyses to compare patient outcomes in traditional care versus telehealth enables models. Preliminary findings demonstrate that telecare and telehealth significantly reduce hospital readmissions, improve chronic disease management and foster proactive health engagement. These outcomes emphasize the importance of aligning telehealth initiatives with healthcare policies and infrastructural investments. To conclude, the study lays emphasis on telecare and telehealth as indispensable tools for achieving universal health coverage. By fostering collaboration among healthcare providers, policy makers and technology developers, these innovations hold the potential to create a more accessible, efficient and patient-centered healthcare ecosystem.

Keywords: healthcare access and efficiency, remote monitoring, virtual consultations, telecare and telehealth innovations

Procedia PDF Downloads 6
25195 Data Mining in Medicine Domain Using Decision Trees and Vector Support Machine

Authors: Djamila Benhaddouche, Abdelkader Benyettou

Abstract:

In this paper, we used data mining to extract biomedical knowledge. In general, complex biomedical data collected in studies of populations are treated by statistical methods, although they are robust, they are not sufficient in themselves to harness the potential wealth of data. For that you used in step two learning algorithms: the Decision Trees and Support Vector Machine (SVM). These supervised classification methods are used to make the diagnosis of thyroid disease. In this context, we propose to promote the study and use of symbolic data mining techniques.

Keywords: biomedical data, learning, classifier, algorithms decision tree, knowledge extraction

Procedia PDF Downloads 560
25194 Analysis of Different Classification Techniques Using WEKA for Diabetic Disease

Authors: Usama Ahmed

Abstract:

Data mining is the process of analyze data which are used to predict helpful information. It is the field of research which solve various type of problem. In data mining, classification is an important technique to classify different kind of data. Diabetes is most common disease. This paper implements different classification technique using Waikato Environment for Knowledge Analysis (WEKA) on diabetes dataset and find which algorithm is suitable for working. The best classification algorithm based on diabetic data is Naïve Bayes. The accuracy of Naïve Bayes is 76.31% and take 0.06 seconds to build the model.

Keywords: data mining, classification, diabetes, WEKA

Procedia PDF Downloads 147
25193 Make Populism Great Again: Identity Crisis in Western World with a Narrative Analysis of Donald Trump's Presidential Campaign Announcement Speech

Authors: Soumi Banerjee

Abstract:

In this research paper we will go deep into understanding Benedict Anderson’s definition of the nation as an imagined community and we will analyze why and how national identities were created through long and complex processes, and how there can exist strong emotional bonds between people within an imagined community, given the fact that these people have never known each other personally, but will still feel some form of imagined unity. Such identity construction on the part of an individual or within societies are always in some sense in a state of flux as imagined communities are ever changing, which provides us with the ontological foundation for reaching on this paper. This sort of identity crisis among individuals living in the Western world, who are in search for psychological comfort and security, illustrates a possible need for spatially dislocated, ontologically insecure and vulnerable individuals to have a secure identity. To create such an identity there has to be something to build upon, which could be achieved through what may be termed as ‘homesteading’. This could in short, and in my interpretation of Kinnvall and Nesbitt’s concept, be described as a search for security that involves a search for ‘home’, where home acts as a secure place, which one can build an identity around. The next half of the paper will then look into how populism and identity have played an increasingly important role in the political elections in the so-called western democracies of the world, using the U.S. as an example. Notions of ‘us and them’, the people and the elites will be looked into and analyzed through a social constructivist theoretical lens. Here we will analyze how such narratives about identity and the nation state affects people, their personality development and identity in different ways by studying the U.S. President Donald Trump’s speeches and analyze if and how he used different identity creating narratives for gaining political and popular support. The reason to choose narrative analysis as a method in this research paper is to use the narratives as a device to understand how the perceived notions of 'us and them' can initiate huge identity crisis with a community or a nation-state. This is a relevant subject as results and developments such as rising populist rightwing movements are being felt in a number of European states, with the so-called Brexit vote in the U.K. and the election of Donald Trump as president are two of the prime examples. This paper will then attempt to argue that these mechanisms are strengthened and gaining significance in situations when humans in an economic, social or ontologically vulnerable position, imagined or otherwise, in a general and broad meaning perceive themselves to be under pressure, and a sense of insecurity is rising. These insecurities and sense of being under threat have been on the rise in many of the Western states that are otherwise usually perceived to be some of the safest, democratically stable and prosperous states in the world, which makes it of interest to study what has changed, and help provide some part of the explanation as to how creating a ‘them’ in the discourse of national identity can cause massive security crisis.

Keywords: identity crisis, migration, ontological security(in), nation-states

Procedia PDF Downloads 256
25192 Using Surface Entropy Reduction to Improve the Crystallization Properties of a Recombinant Antibody Fragment RNA Crystallization Chaperone

Authors: Christina Roman, Deepak Koirala, Joseph A. Piccirilli

Abstract:

Phage displaying synthetic Fab libraries have been used to obtain Fabs that bind to specific RNA targets with high affinity and specificity. These Fabs have been demonstrated to facilitate RNA crystallization. However, the antibody framework used in the construction of these phage display libraries contains numerous bulky, flexible, and charged residues, which facilitate solubility and hinder aggregation. These residues can interfere with crystallization due to the entropic cost associated with burying them within crystal contacts. To systematically reduce the surface entropy of the Fabs and improve their crystallization properties, a protein engineering strategy termed surface entropy reduction (SER) is being applied to the Fab framework. In this approach, high entropy residues are mutated to smaller ones such as alanine or serine. Focusing initially on Fab BL3-6, which binds an RNA AAACA pentaloop with 20nM affinity, the SER P server (http://services.mbi.ucla.edu/SER/) was used and analysis was performed on existing RNA-Fab BL3-6 co-crystal structures. From this analysis twelve surface entropy reduced mutants were designed. These SER mutants were expressed and are now being measured for their crystallization and diffraction performance with various RNA targets. So far, one mutant has generated 3.02 angstrom diffraction with the yjdF riboswitch RNA. Ultimately, the most productive mutations will be combined into a new Fab framework to be used in a optimized phage displayed Fab library.

Keywords: antibody fragment, crystallography, RNA, surface entropy reduction

Procedia PDF Downloads 197
25191 Activation of Mitophagy and Autophagy in Familial Forms of Parkinson's Disease, as a Potential Strategy for Cell Protection

Authors: Nafisa Komilova, Plamena Angelova, Andrey Abramov, Ulugbek Mirkhodjaev

Abstract:

Parkinson’s disease (PD) is a progressive neurodegenerative disorder which is induced by the loss of dopaminergic neurons in the midbrain. The mechanism of neurodegeneration is associated with the aggregation of misfolded proteins, oxidative stress, and mitochondrial disfunction. Considering this, the process of removal of unwanted organelles or proteins by autophagy is vitally important in neurons, and activation of these processes could be protective in PD. Short-time acidification of cytosol can activate mitophagy and autophagy, and here we used sodium pyruvate and sodium lactate in human fibroblasts with PD mutations (Pink1, Pink1/Park2, α-syn triplication, A53T) to induce changes in intracellular pH. We have found that both lactate and pyruvate in millimolar concentrations can induce short-time acidification of cytosol in these cells. It induced activation of mitophagy and autophagy in control and PD fibroblasts and protected against cell death. Importantly, the application of lactate to acute brain slices of control and Pink1 knockout mice also induced a reduction of pH in neurons and astrocytes that increase the level of mitophagy. Thus, acidification of cytosol by compounds which play important role in cell metabolism also can activate mitophagy and autophagy and protect cells in the familial form of PD.

Keywords: Parkinson's disease, mutations, mitophagy, autophagy

Procedia PDF Downloads 197
25190 Comprehensive Study of Data Science

Authors: Asifa Amara, Prachi Singh, Kanishka, Debargho Pathak, Akshat Kumar, Jayakumar Eravelly

Abstract:

Today's generation is totally dependent on technology that uses data as its fuel. The present study is all about innovations and developments in data science and gives an idea about how efficiently to use the data provided. This study will help to understand the core concepts of data science. The concept of artificial intelligence was introduced by Alan Turing in which the main principle was to create an artificial system that can run independently of human-given programs and can function with the help of analyzing data to understand the requirements of the users. Data science comprises business understanding, analyzing data, ethical concerns, understanding programming languages, various fields and sources of data, skills, etc. The usage of data science has evolved over the years. In this review article, we have covered a part of data science, i.e., machine learning. Machine learning uses data science for its work. Machines learn through their experience, which helps them to do any work more efficiently. This article includes a comparative study image between human understanding and machine understanding, advantages, applications, and real-time examples of machine learning. Data science is an important game changer in the life of human beings. Since the advent of data science, we have found its benefits and how it leads to a better understanding of people, and how it cherishes individual needs. It has improved business strategies, services provided by them, forecasting, the ability to attend sustainable developments, etc. This study also focuses on a better understanding of data science which will help us to create a better world.

Keywords: data science, machine learning, data analytics, artificial intelligence

Procedia PDF Downloads 84
25189 Inhibitory Impacts of Fulvic Acid-Coated Iron Oxide Nano Particles on the Amyloid Fibril Aggregations

Authors: Dalia Jomehpour, Sara Sheikhlary, Esmaeil Heydari, Mohammad Hossien Majles Ara

Abstract:

In this study, we report fulvic acid-coated iron oxide nanoparticles of 10.7 ± 2.7 nm size, which serve to inhibit amyloid fibrillation formation. Although the effect of fulvic acid on tau fibrils was investigated, to our best knowledge, its inhibitory impacts on amyloid aggregation formation have been assessed neither in-vitro nor in-vivo. On the other hand, iron oxide nanoparticles exhibit anti-amyloid activity on their own. This study investigates the inhibitory effect of fulvic acid coated iron oxide nanoparticles on amyloid aggregations formed from the commonly used in-vitro model, lysozyme from chicken egg white. FESEM, XRD, and FTIR characterization confirmed that fulvic acid was coated onto the surface of the nanoparticles. The inhibitory effects of the fulvic acid coated iron oxide nanoparticles were verified by Thioflavin T assay, circular dichroism (CD), and FESEM analysis. Furthermore, the toxicity of the nanoparticles on the neuroblastoma SH-SY5Y human cell line was assessed through an MTT assay. Our results indicate that fulvic acid coated iron oxide nanoparticles can efficiently inhibit the formation of amyloid aggregations while exhibiting negligible in-vitro toxicity; thus, they can be used as anti-amyloid agents in the development of the potential drug for neurodegenerative diseases.

Keywords: Alzheimer’s disease, fulvic acid coated iron oxide nanoparticles, fulvic acid, amyloid inhibitor, polyphenols

Procedia PDF Downloads 113
25188 Woody Plant Encroachment Effects on the Physical Properties of Vertic Soils in Bela-Bela, Limpopo Province

Authors: Rebone E. Mashapa, Phesheya E. Dlamini, Sandile S. Mthimkhulu

Abstract:

Woody plant encroachment, a land cover transformation that reduces grassland productivity may influence soil physical properties. The objective of the study was to determine the effect of woody plant encroachment on physical properties of vertic soils in a savanna grassland. In this study, we quantified and compared soil bulk density, aggregate stability and porosity in the top and subsoil of an open and woody encroached savanna grassland. The results revealed that soil bulk density increases, while porosity and mean weight diameter decreases with depth in both open and woody encroached grassland soil. Compared to open grassland, soil bulk density was 11% and 10% greater in the topsoil and subsoil, while porosity was 6% and 9% lower in the topsoil and subsoil of woody encroached grassland. Mean weight diameter, an indicator of soil aggregation increased by 38% only in the subsoil of encroached grasslands due to increasing clay content with depth. These results suggest that woody plant encroachment leads to compaction of vertic soils, which in turn reduces pore size distribution.

Keywords: soil depth, soil physical properties, vertic soils, woody plant encroachment

Procedia PDF Downloads 147
25187 Performance Evaluation of One and Two Dimensional Prime Codes for Optical Code Division Multiple Access Systems

Authors: Gurjit Kaur, Neena Gupta

Abstract:

In this paper, we have analyzed and compared the performance of various coding schemes. The basic ID prime sequence codes are unique in only dimension, i.e. time slots, whereas 2D coding techniques are not unique by their time slots but with their wavelengths also. In this research, we have evaluated and compared the performance of 1D and 2D coding techniques constructed using prime sequence coding pattern for Optical Code Division Multiple Access (OCDMA) system on a single platform. Analysis shows that 2D prime code supports lesser number of active users than 1D codes, but they are having large code family and are the most secure codes compared to other codes. The performance of all these codes is analyzed on basis of number of active users supported at a Bit Error Rate (BER) of 10-9.

Keywords: CDMA, OCDMA, BER, OOC, PC, EPC, MPC, 2-D PC/PC, λc, λa

Procedia PDF Downloads 337
25186 Management and Agreement Protocol in Computer Security

Authors: Abdulameer K. Hussain

Abstract:

When dealing with a cryptographic system we note that there are many activities performed by parties of this cryptographic system and the most prominent of these activities is the process of agreement between the parties involved in the cryptographic system on how to deal and perform the cryptographic system tasks to be more secure, more confident and reliable. The most common agreement among parties is a key agreement and other types of agreements. Despite the fact that there is an attempt from some quarters to find other effective agreement methods but these methods are limited to the traditional agreements. This paper presents different parameters to perform more effectively the task of the agreement, including the key alternative, the agreement on the encryption method used and the agreement to prevent the denial of the services. To manage and achieve these goals, this method proposes the existence of an control and monitoring entity to manage these agreements by collecting different statistical information of the opinions of the authorized parties in the cryptographic system. These statistics help this entity to take the proper decision about the agreement factors. This entity is called Agreement Manager (AM).

Keywords: agreement parameters, key agreement, key exchange, security management

Procedia PDF Downloads 423
25185 Application of Artificial Neural Network Technique for Diagnosing Asthma

Authors: Azadeh Bashiri

Abstract:

Introduction: Lack of proper diagnosis and inadequate treatment of asthma leads to physical and financial complications. This study aimed to use data mining techniques and creating a neural network intelligent system for diagnosis of asthma. Methods: The study population is the patients who had visited one of the Lung Clinics in Tehran. Data were analyzed using the SPSS statistical tool and the chi-square Pearson's coefficient was the basis of decision making for data ranking. The considered neural network is trained using back propagation learning technique. Results: According to the analysis performed by means of SPSS to select the top factors, 13 effective factors were selected, in different performances, data was mixed in various forms, so the different models were made for training the data and testing networks and in all different modes, the network was able to predict correctly 100% of all cases. Conclusion: Using data mining methods before the design structure of system, aimed to reduce the data dimension and the optimum choice of the data, will lead to a more accurate system. Therefore, considering the data mining approaches due to the nature of medical data is necessary.

Keywords: asthma, data mining, Artificial Neural Network, intelligent system

Procedia PDF Downloads 275
25184 Interpreting Privacy Harms from a Non-Economic Perspective

Authors: Christopher Muhawe, Masooda Bashir

Abstract:

With increased Internet Communication Technology(ICT), the virtual world has become the new normal. At the same time, there is an unprecedented collection of massive amounts of data by both private and public entities. Unfortunately, this increase in data collection has been in tandem with an increase in data misuse and data breach. Regrettably, the majority of data breach and data misuse claims have been unsuccessful in the United States courts for the failure of proof of direct injury to physical or economic interests. The requirement to express data privacy harms from an economic or physical stance negates the fact that not all data harms are physical or economic in nature. The challenge is compounded by the fact that data breach harms and risks do not attach immediately. This research will use a descriptive and normative approach to show that not all data harms can be expressed in economic or physical terms. Expressing privacy harms purely from an economic or physical harm perspective negates the fact that data insecurity may result into harms which run counter the functions of privacy in our lives. The promotion of liberty, selfhood, autonomy, promotion of human social relations and the furtherance of the existence of a free society. There is no economic value that can be placed on these functions of privacy. The proposed approach addresses data harms from a psychological and social perspective.

Keywords: data breach and misuse, economic harms, privacy harms, psychological harms

Procedia PDF Downloads 197
25183 Studies on Interaction between Anionic Polymer Sodium Carboxymethylcellulose with Cationic Gemini Surfactants

Authors: M. Kamil, Rahber Husain Khan

Abstract:

In the present study, the Interaction of anionic polymer, sodium carboxymethylcellulose (NaCMC), with cationic gemini surfactants 2,2[(oxybis(ethane-1,2-diyl))bis(oxy)]bis(N-hexadecyl1-N,N-[di(E2)/tri(E3)]methyl1-2-oxoethanaminium)chloride (16-E2-16 and 16-E3-16) and conventional surfactant (CTAC) in aqueous solutions have been studied by surface tension measurement of binary mixtures (0.0- 0.5 wt% NaCMC and 1 mM gemini surfactant/10 mM CTAC solution). Surface tension measurements were used to determine critical aggregation concentration (CAC) and critical micelle concentration (CMC). The maximum surface excess concentration (Ґmax) at the air-water interface was evaluated by the Gibbs adsorption equation. The minimum area per surfactant molecule was evaluated, which indicates the surfactant-polymer Interaction in a mixed system. The effect of changing surfactant chain length on CAC and CMC values of mixed polymer-surfactant systems was examined. From the results, it was found that the gemini surfactant interacts strongly with NaCMC as compared to its corresponding monomeric counterpart CTAC. In these systems, electrostatic interactions predominate. The lowering of surface tension with an increase in the concentration of surfactants is higher in the case of gemini surfactants almost 10-15 times. The measurements indicated that the Interaction between NaCMC-CTAC resulted in complex formation. The volume of coacervate increases with an increase in CTAC concentration; however, above 0.1 wt. % concentration coacervate vanishes.

Keywords: anionic polymer, gemni surfactants, tensiometer, CMC, interaction

Procedia PDF Downloads 89
25182 Providing Support On-Time: Need to Establish De-Radicalization Hotlines

Authors: Ashir Ahmed

Abstract:

Peacekeeping is a collective responsibility of governments, law enforcement agencies, communities, families, and individuals. Moreover, the complex nature of peacekeeping activities requires a holistic and collaborative approach where various community sectors work together to form collective strategies that are likely to be more effective than strategies designed and delivered in isolation. Similarly, it is important to learn from past programs to evaluate the initiatives that have worked well and the areas that need further improvement. Review of recent peacekeeping initiatives suggests that there have been tremendous efforts and resources put in place to deal with the emerging threat of terrorism, radicalization and violent extremism through number of de-radicalization programs. Despite various attempts in designing and delivering successful programs for deradicalization, the threat of people being radicalized is growing more than ever before. This research reviews the prominent de-radicalization programs to draw an understanding of their strengths and weaknesses. Some of the weaknesses in the existing programs include. Inaccessibility: Limited resources, geographical location of potential participants (for offline programs), inaccessibility or inability to use various technologies (for online programs) makes it difficult for people to participate in de-radicalization programs. Timeliness: People might need to wait for a program on a set date/time to get the required information and to get their questions answered. This is particularly true for offline programs. Lack of trust: The privacy issues and lack of trust between participants and program organizers are another hurdle in the success of de-radicalization programs. The fear of sharing participants information with organizations (such as law enforcement agencies) without their consent led them not to participate in these programs. Generalizability: Majority of these programs are very generic in nature and do not cater the specific needs of an individual. Participants in these programs may feel that the contents are irrelevant to their individual situations and hence feel disconnected with purpose of the programs. To address the above-mentioned weaknesses, this research developed a framework that recommends some improvements in de-radicalization programs. One of the recommendations is to offer 24/7, secure, private and online hotline (also referred as helpline) for the people who have any question, concern or situation to discuss with someone who is qualified (a counsellor) to deal with people who are vulnerable to be radicalized. To make these hotline services viable and sustainable, the existing organizations offering support for depression, anxiety or suicidal ideation could additionally host these services. These helplines should be available via phone, the internet, social media and in-person. Since these services will be embedded within existing and well-known services, they would likely to get more visibility and promotion. The anonymous and secure conversation between a person and a counsellor would ensure that a person can discuss the issues without being afraid of information sharing with any third party – without his/her consent. The next stage of this project would include the operationalization of the framework by collaborating with other organizations to host de-radicalization hotlines and would assess the effectiveness of such initiatives.

Keywords: de-radicalization, framework, hotlines, peacekeeping

Procedia PDF Downloads 216
25181 Machine Learning Analysis of Student Success in Introductory Calculus Based Physics I Course

Authors: Chandra Prayaga, Aaron Wade, Lakshmi Prayaga, Gopi Shankar Mallu

Abstract:

This paper presents the use of machine learning algorithms to predict the success of students in an introductory physics course. Data having 140 rows pertaining to the performance of two batches of students was used. The lack of sufficient data to train robust machine learning models was compensated for by generating synthetic data similar to the real data. CTGAN and CTGAN with Gaussian Copula (Gaussian) were used to generate synthetic data, with the real data as input. To check the similarity between the real data and each synthetic dataset, pair plots were made. The synthetic data was used to train machine learning models using the PyCaret package. For the CTGAN data, the Ada Boost Classifier (ADA) was found to be the ML model with the best fit, whereas the CTGAN with Gaussian Copula yielded Logistic Regression (LR) as the best model. Both models were then tested for accuracy with the real data. ROC-AUC analysis was performed for all the ten classes of the target variable (Grades A, A-, B+, B, B-, C+, C, C-, D, F). The ADA model with CTGAN data showed a mean AUC score of 0.4377, but the LR model with the Gaussian data showed a mean AUC score of 0.6149. ROC-AUC plots were obtained for each Grade value separately. The LR model with Gaussian data showed consistently better AUC scores compared to the ADA model with CTGAN data, except in two cases of the Grade value, C- and A-.

Keywords: machine learning, student success, physics course, grades, synthetic data, CTGAN, gaussian copula CTGAN

Procedia PDF Downloads 44
25180 Critical Factors in the Formation, Development and Survival of an Eco-Industrial Park: A Systemic Understanding of Industrial Symbiosis

Authors: Iván González, Pablo Andrés Maya, Sebastián Jaén

Abstract:

Eco-industrial parks (EIPs) work as networks for the exchange of by-products, such as materials, water, or energy. This research identifies the relevant factors in the formation of EIPs in different industrial environments around the world. Then an aggregation of these factors is carried out to reduce them from 50 to 17 and classify them according to 5 fundamental axes. Subsequently, the Vester Sensitivity Model (VSM) systemic methodology is used to determine the influence of the 17 factors on an EIP system and the interrelationship between them. The results show that the sequence of effects between factors: Trust and Cooperation → Business Association → Flows → Additional Income represents the “backbone” of the system, being the most significant chain of influences. In addition, the Organizational Culture represents the turning point of the Industrial Symbiosis on which it must act correctly to avoid falling into unsustainable economic development. Finally, the flow of Information should not be lost since it is what feeds trust between the parties, and the latter strengthens the system in the face of individual or global imbalances. This systemic understanding will enable the formulation of pertinent policies by the actors that interact in the formation and permanence of the EIP. In this way, it seeks to promote large-scale sustainable industrial development, integrating various community actors, which in turn will give greater awareness and appropriation of the current importance of sustainability in industrial production.

Keywords: critical factors, eco-industrial park, industrial symbiosis, system methodology

Procedia PDF Downloads 126
25179 Decoding the Structure of Multi-Agent System Communication: A Comparative Analysis of Protocols and Paradigms

Authors: Gulshad Azatova, Aleksandr Kapitonov, Natig Aminov

Abstract:

Multiagent systems have gained significant attention in various fields, such as robotics, autonomous vehicles, and distributed computing, where multiple agents cooperate and communicate to achieve complex tasks. Efficient communication among agents is a crucial aspect of these systems, as it directly impacts their overall performance and scalability. This scholarly work provides an exploration of essential communication elements and conducts a comparative assessment of diverse protocols utilized in multiagent systems. The emphasis lies in scrutinizing the strengths, weaknesses, and applicability of these protocols across various scenarios. The research also sheds light on emerging trends within communication protocols for multiagent systems, including the incorporation of machine learning methods and the adoption of blockchain-based solutions to ensure secure communication. These trends provide valuable insights into the evolving landscape of multiagent systems and their communication protocols.

Keywords: communication, multi-agent systems, protocols, consensus

Procedia PDF Downloads 76
25178 Impact of the Energy Transition on Security of Supply - A Case Study of Vietnam Power System in 2030

Authors: Phuong Nguyen, Trung Tran

Abstract:

Along with the global ongoing energy transition, Vietnam has indicated a strong commitment in the last COP events on the zero-carbon emission target. However, it is a real challenge for the nation to replace fossil-fired power plants by a significant amount of renewable energy sources (RES) while maintaining security of supply. The unpredictability and variability of RES would cause technical issues for supply-demand balancing, network congestions, system balancing, among others. It is crucial to take these into account while planning the future grid infrastructure. This study will address both generation and transmission adequacy and reveal a comprehensive analysis about the impact of ongoing energy transition on the development of Vietnam power system in 2030. This will provide insight for creating an secure, stable, and affordable pathway for the country in upcoming years.

Keywords: generation adequacy, transmission adequacy, security of supply, energy transition

Procedia PDF Downloads 87
25177 Treating Voxels as Words: Word-to-Vector Methods for fMRI Meta-Analyses

Authors: Matthew Baucum

Abstract:

With the increasing popularity of fMRI as an experimental method, psychology and neuroscience can greatly benefit from advanced techniques for summarizing and synthesizing large amounts of data from brain imaging studies. One promising avenue is automated meta-analyses, in which natural language processing methods are used to identify the brain regions consistently associated with certain semantic concepts (e.g. “social”, “reward’) across large corpora of studies. This study builds on this approach by demonstrating how, in fMRI meta-analyses, individual voxels can be treated as vectors in a semantic space and evaluated for their “proximity” to terms of interest. In this technique, a low-dimensional semantic space is built from brain imaging study texts, allowing words in each text to be represented as vectors (where words that frequently appear together are near each other in the semantic space). Consequently, each voxel in a brain mask can be represented as a normalized vector sum of all of the words in the studies that showed activation in that voxel. The entire brain mask can then be visualized in terms of each voxel’s proximity to a given term of interest (e.g., “vision”, “decision making”) or collection of terms (e.g., “theory of mind”, “social”, “agent”), as measured by the cosine similarity between the voxel’s vector and the term vector (or the average of multiple term vectors). Analysis can also proceed in the opposite direction, allowing word cloud visualizations of the nearest semantic neighbors for a given brain region. This approach allows for continuous, fine-grained metrics of voxel-term associations, and relies on state-of-the-art “open vocabulary” methods that go beyond mere word-counts. An analysis of over 11,000 neuroimaging studies from an existing meta-analytic fMRI database demonstrates that this technique can be used to recover known neural bases for multiple psychological functions, suggesting this method’s utility for efficient, high-level meta-analyses of localized brain function. While automated text analytic methods are no replacement for deliberate, manual meta-analyses, they seem to show promise for the efficient aggregation of large bodies of scientific knowledge, at least on a relatively general level.

Keywords: FMRI, machine learning, meta-analysis, text analysis

Procedia PDF Downloads 450
25176 The Role of Relationship Duration in the Expressions of Love

Authors: Thea Silayro, Isabella Tan, Carlo Manuel, Denisse Abellon

Abstract:

Romantic love is highly universal and exists in most cultures. The current study explored its definition for people in different relationship durations and explored how this definition influences their expression of love and their conflict resolutions. Gender‟s influence on the definitions was explored, as well. Nine couples from different relationship durations (2-3 years, 7-10 years and more than 25 years) were interviewed. Transcripts of the interviews underwent thematic analysis. The results of the study suggest that 2-3 years in the relationship is the courting stage, 7-10 years in the relationship is the settling down stage and more than 25 years, the most stable stage. Men and women have similar ways of expressing love and resolving conflicts, but differ in such a way that men highlight actions and women highlight emotions when talking about love; changes in definitions arise internally in men and externally in females. Generally, romantic love is expressed through service. Communication is essential among all couples, and they become more secure with time.

Keywords: relationship duration, love, expressions of love, relationships

Procedia PDF Downloads 336
25175 Identity Verification Using k-NN Classifiers and Autistic Genetic Data

Authors: Fuad M. Alkoot

Abstract:

DNA data have been used in forensics for decades. However, current research looks at using the DNA as a biometric identity verification modality. The goal is to improve the speed of identification. We aim at using gene data that was initially used for autism detection to find if and how accurate is this data for identification applications. Mainly our goal is to find if our data preprocessing technique yields data useful as a biometric identification tool. We experiment with using the nearest neighbor classifier to identify subjects. Results show that optimal classification rate is achieved when the test set is corrupted by normally distributed noise with zero mean and standard deviation of 1. The classification rate is close to optimal at higher noise standard deviation reaching 3. This shows that the data can be used for identity verification with high accuracy using a simple classifier such as the k-nearest neighbor (k-NN). 

Keywords: biometrics, genetic data, identity verification, k nearest neighbor

Procedia PDF Downloads 258