Search results for: perception control system security strategy
30192 Evolved Bat Algorithm Based Adaptive Fuzzy Sliding Mode Control with LMI Criterion
Authors: P.-W. Tsai, C.-Y. Chen, C.-W. Chen
Abstract:
In this paper, the stability analysis of a GA-Based adaptive fuzzy sliding model controller for a nonlinear system is discussed. First, a nonlinear plant is well-approximated and described with a reference model and a fuzzy model, both involving FLC rules. Then, FLC rules and the consequent parameter are decided on via an Evolved Bat Algorithm (EBA). After this, we guarantee a new tracking performance inequality for the control system. The tracking problem is characterized to solve an eigenvalue problem (EVP). Next, an adaptive fuzzy sliding model controller (AFSMC) is proposed to stabilize the system so as to achieve good control performance. Lyapunov’s direct method can be used to ensure the stability of the nonlinear system. It is shown that the stability analysis can reduce nonlinear systems into a linear matrix inequality (LMI) problem. Finally, a numerical simulation is provided to demonstrate the control methodology.Keywords: adaptive fuzzy sliding mode control, Lyapunov direct method, swarm intelligence, evolved bat algorithm
Procedia PDF Downloads 44530191 Safety, Healthy, Intact, and Halal as New Indonesia Policy on Food Security and Safety to Support SDG'S: Sustainable Development Goals
Authors: Ramadhan Febriansyah, Sarah Novianti, Santi Agustini
Abstract:
Indonesia is a big country with Moslem population. The government must fulfill all needs of the people. However, we do not have a good policy yet especially on healthy, safety and halal food. We try to offer a new solution to overcome this with ASUH (Aman, Sehat, Utuh, Halal) or in English is SHIH (Safe, Healthy, Intact, Halal) as alternative Indonesian policy on food security. This policy is Indonesian Government’s commitment to support Sustainability Development Goals program for the zero hunger (end hunger, to achieve food security and improved nutrition for Indonesian people, of course, to promote sustainable agriculture). Hopefully, it not only can increasing quality on food especially on livestock goods (meat, egg, milk) but also to guarantee the halal food. However, this policy can be an example to others country especially Moslem countries to support SDG’s programs. This research conducted means of the descriptive method; the authors find compare the secondary data obtained from journals, textbook and scientific articles in order to determine the factors that influence food safety and food security. Relevant data used and contain a description of SDG’s as well as about the system food safety and food security that SHIH (Safe, Healthy, Intact and Halal) so these ideas can be implemented.Keywords: food safety, food security, food sovereignty, halal SDG's
Procedia PDF Downloads 38330190 China’s Hedging Strategy in Response to the Russia-Ukraine Conflict
Authors: Zhao Xinlei
Abstract:
The outbreak of the Ukraine crisis has had an important impact on the global political and economic order, especially the global food crisis and energy crisis, thus aggravating social and political conflicts. At the same time, with the intensification of the Ukraine crisis, the United States and European countries have imposed severe economic sanctions on Russia to prevent and contain Russia's special military operations against Ukraine. The essence of the Ukraine crisis is a geopolitical conflict and competition between Russia and the United States. For a long time, the United States has always regarded Russia as a serious strategic crisis and challenge. Therefore, for the United States, the outbreak of the Ukraine crisis is an extremely important opportunity to condemn and stop Russia's actions from an international perspective. In this process, China plays a very special role. This special positioning is not only reflected in the long-term friendly relationship between China and Russia and mutual support and assistance on the international stage but also in the complex economic relationship and interdependence between China and the United States. Therefore, China has adopted a "hedging strategy" in dealing with the Ukrainian crisis, and the use of the hedging strategy not only plays a special role in safeguarding China's own security and interests but also because China can act as an intermediary to coordinate Russia and the United States to promote the resolution of the Ukrainian crisis in a peaceful manner.Keywords: Ukraine crisis Russia-Ukraine conflict balanced strategy Sino-US competition
Procedia PDF Downloads 8330189 Instructional Information Resources
Authors: Parveen Kumar
Abstract:
This article discusses institute information resources. Information, in its most restricted technical sense, is a sequence of symbols that can be interpreted as message information can be recorded as signs, or transmitted as signals. Information is any kind of event that affects the state of a dynamic system. Conceptually, information is the message being conveyed. This concept has numerous other meanings in different contexts. Moreover, the concept of information is closely related to notions of constraint, communication, control, data, form, instruction, knowledge, meaning, mental stimulus, pattern, perception, representation, and especially entropy.Keywords: institutions, information institutions, information services for mission-oriented institute, pattern
Procedia PDF Downloads 37630188 Marketing Social Innovation: Finding Competitive Advantage in Social Enterprise Methodology
Authors: Ted Gournelos
Abstract:
Marketing approaches in practice and academic literature usually foreground the importance of product and brand awareness in strategy. Decisions emphasize justifications and promotions of existing projects, which has the unintended consequence of pushing marketing, public relations, and other communications to secondary strategies and tactics rather than as inherent pieces of organizational development. In other words, marketers implement what others have already decided. This is a challenge not only for the communications field, but also for the organizations themselves, since integrated communications employees are often the primary, if not the only, touchpoints for client/customer/user research and interaction. Organizations thus become increasingly out of touch, raising the risk of public or human resources crisis and decreasing the focus on opportunities for development and growth. This paper will discuss the potential for social entrepreneurship to refocus marketing and communications professionals on primary strategy, and suggest best practices for developing initiatives not only to impact marketing efforts themselves, but also the guiding organizational approaches to project management, human resources, corporate social responsibility, and research. It will provide a comparative analysis of social media marketing efforts conducted by food security non-governmental organizations from several countries, pointing out both flaws and areas of opportunity for integration with for-profit organizational strategy, and discuss the implications of descriptive, proactive, and interactive messaging.Keywords: social enterprise, strategy, innovation, social media
Procedia PDF Downloads 31930187 Investigation of the GFR2400 Reactivity Control System
Authors: Ján Haščík, Štefan Čerba, Jakub Lüley, Branislav Vrban
Abstract:
The presented paper is related to the design methods and neutronic characterization of the reactivity control system in the large power unit of Generation IV Gas cooled Fast Reactor – GFR2400. The reactor core is based on carbide pin fuel type with the application of refractory metallic liners used to enhance the fission product retention of the SiC cladding. The heterogeneous design optimization of control rod is presented and the results of rods worth and their interferences in a core are evaluated. In addition, the idea of reflector removal as an additive reactivity management option is investigated and briefly described.Keywords: control rods design, GFR2400, hot spot, movable reflector, reactivity
Procedia PDF Downloads 43730186 Study on Optimal Control Strategy of PM2.5 in Wuhan, China
Authors: Qiuling Xie, Shanliang Zhu, Zongdi Sun
Abstract:
In this paper, we analyzed the correlation relationship among PM2.5 from other five Air Quality Indices (AQIs) based on the grey relational degree, and built a multivariate nonlinear regression equation model of PM2.5 and the five monitoring indexes. For the optimal control problem of PM2.5, we took the partial large Cauchy distribution of membership equation as satisfaction function. We established a nonlinear programming model with the goal of maximum performance to price ratio. And the optimal control scheme is given.Keywords: grey relational degree, multiple linear regression, membership function, nonlinear programming
Procedia PDF Downloads 30030185 Development and Test of an Open Source PX4 Controler for omnidirectional Unmanned Surface Vehicle
Authors: Norbert Szulc, Cezary Wieczorkowski, Igor Baranowski
Abstract:
In this paper, a control system that bridges the gap in support for Unmanned Surface Vessels in the PX4 Opensource Autopilot was developed. The system is designed for an omnidirectional water craft with four motors. A modular autopilot architecture design centred around publish-subscribe interprocess communication was used. The paper presents the implementation and integration process of a generic surface vehicle controller capable of driving any configuration of motors through the recently introduced in control allocator in PX4 autopilot. The proposed approach was successfully tested in a case study through implementation on the ASV Perkoz.Keywords: control system, PX4, drones, rovers, surface vessels, omnidirectional
Procedia PDF Downloads 8730184 Knowledge Discovery from Production Databases for Hierarchical Process Control
Authors: Pavol Tanuska, Pavel Vazan, Michal Kebisek, Dominika Jurovata
Abstract:
The paper gives the results of the project that was oriented on the usage of knowledge discoveries from production systems for needs of the hierarchical process control. One of the main project goals was the proposal of knowledge discovery model for process control. Specifics data mining methods and techniques was used for defined problems of the process control. The gained knowledge was used on the real production system, thus, the proposed solution has been verified. The paper documents how it is possible to apply new discovery knowledge to be used in the real hierarchical process control. There are specified the opportunities for application of the proposed knowledge discovery model for hierarchical process control.Keywords: hierarchical process control, knowledge discovery from databases, neural network, process control
Procedia PDF Downloads 48130183 Development of a Data Security Model Using Steganography
Authors: Terungwa Simon Yange, Agana Moses A.
Abstract:
This paper studied steganography and designed a simplistic approach to a steganographic tool for hiding information in image files with the view of addressing the security challenges with data by hiding data from unauthorized users to improve its security. The Structured Systems Analysis and Design Method (SSADM) was used in this work. The system was developed using Java Development Kit (JDK) 1.7.0_10 and MySQL Server as its backend. The system was tested with some hypothetical health records which proved the possibility of protecting data from unauthorized users by making it secret so that its existence cannot be easily recognized by fraudulent users. It further strengthens the confidentiality of patient records kept by medical practitioners in the health setting. In conclusion, this work was able to produce a user friendly steganography software that is very fast to install and easy to operate to ensure privacy and secrecy of sensitive data. It also produced an exact copy of the original image and the one carrying the secret message when compared with each.Keywords: steganography, cryptography, encryption, decryption, secrecy
Procedia PDF Downloads 26630182 Sliding Mode Control of the Power of Doubly Fed Induction Generator for Variable Speed Wind Energy Conversion System
Authors: Ahmed Abbou, Ali Mousmi, Rachid El Akhrif
Abstract:
This research paper aims to reduce the chattering phenomenon due to control by sliding mode control applied on a wind energy conversion system based on the doubly fed induction generator (DFIG). Our goal is to offset the effect of parametric uncertainties and come as close as possible to the dynamic response solicited by the control law in the ideal case and therefore force the active and reactive power generated by the DFIG to accurately follow the reference values which are provided to it. The simulation results using Matlab / Simulink demonstrate the efficiency and performance of the proposed technique while maintaining the simplicity of control by first order sliding mode.Keywords: correction of the equivalent command, DFIG, induction machine, sliding mode controller
Procedia PDF Downloads 41630181 Efficient Signcryption Scheme with Provable Security for Smart Card
Authors: Jayaprakash Kar, Daniyal M. Alghazzawi
Abstract:
The article proposes a novel construction of signcryption scheme with provable security which is most suited to implement on smart card. It is secure in random oracle model and the security relies on Decisional Bilinear Diffie-Hellmann Problem. The proposed scheme is secure against adaptive chosen ciphertext attack (indistiguishbility) and adaptive chosen message attack (unforgebility). Also, it is inspired by zero-knowledge proof. The two most important security goals for smart card are Confidentiality and authenticity. These functions are performed in one logical step in low computational cost.Keywords: random oracle, provable security, unforgebility, smart card
Procedia PDF Downloads 59330180 Stabilization Control of the Nonlinear AIDS Model Based on the Theory of Polynomial Fuzzy Control Systems
Authors: Shahrokh Barati
Abstract:
In this paper, we introduced AIDS disease at first, then proposed dynamic model illustrate its progress, after expression of a short history of nonlinear modeling by polynomial phasing systems, we considered the stability conditions of the systems, which contained a huge amount of researches in order to modeling and control of AIDS in dynamic nonlinear form, in this approach using a frame work of control any polynomial phasing modeling system which have been generalized by part of phasing model of T-S, in order to control the system in better way, the stability conditions were achieved based on polynomial functions, then we focused to design the appropriate controller, firstly we considered the equilibrium points of system and their conditions and in order to examine changes in the parameters, we presented polynomial phase model that was the generalized approach rather than previous Takagi Sugeno models, then with using case we evaluated the equations in both open loop and close loop and with helping the controlling feedback, the close loop equations of system were calculated, to simulate nonlinear model of AIDS disease, we used polynomial phasing controller output that was capable to make the parameters of a nonlinear system to follow a sustainable reference model properly.Keywords: polynomial fuzzy, AIDS, nonlinear AIDS model, fuzzy control systems
Procedia PDF Downloads 46830179 Active Power Control of PEM Fuel Cell System Power Generation Using Adaptive Neuro-Fuzzy Controller
Authors: Khaled Mammar
Abstract:
This paper presents an application of adaptive neuro-fuzzy controller for PEM fuel cell system. The model proposed for control include a fuel cell stack model, reformer model and DC/AC inverter model. Furthermore, a Fuzzy Logic (FLC) and adaptive neuro-fuzzy controllers are used to control the active power of PEM fuel cell system. The controllers modify the hydrogen flow feedback from the terminal load. The validity of the controller is verified when the fuel cell system model is used in conjunction with the ANFIS controller to predict the response of the active power. Simulation results confirmed the high-performance capability of the neuo-fuzzy to control power generation.Keywords: fuel cell, PEMFC, modeling, simulation, Fuzzy Logic Controller, FLC, adaptive neuro-fuzzy controller, ANFIS
Procedia PDF Downloads 46030178 Examples of Techniques and Algorithms Used in Wlan Security
Authors: Vahid Bairami Rad
Abstract:
Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security
Procedia PDF Downloads 57030177 Regional Pole Placement by Saturated Power System Stabilizers
Authors: Hisham M. Soliman, Hassan Yousef
Abstract:
This manuscript presents new results on design saturated power system stabilizers (PSS) to assign system poles within a desired region for achieving good dynamic performance. The regional pole placement is accomplished against model uncertainties caused by different load conditions. The design is based on a sufficient condition in the form of linear matrix inequalities (LMI) which forces the saturated nonlinear controller to lie within the linear zone. The controller effectiveness is demonstrated on a single machine infinite bus system.Keywords: power system stabilizer, saturated control, robust control, regional pole placement, linear matrix inequality (LMI)
Procedia PDF Downloads 56530176 Investigations into Effect of Neural Network Predictive Control of UPFC for Improving Transient Stability Performance of Multimachine Power System
Authors: Sheela Tiwari, R. Naresh, R. Jha
Abstract:
The paper presents an investigation into the effect of neural network predictive control of UPFC on the transient stability performance of a multi-machine power system. The proposed controller consists of a neural network model of the test system. This model is used to predict the future control inputs using the damped Gauss-Newton method which employs ‘backtracking’ as the line search method for step selection. The benchmark 2 area, 4 machine system that mimics the behavior of large power systems is taken as the test system for the study and is subjected to three phase short circuit faults at different locations over a wide range of operating conditions. The simulation results clearly establish the robustness of the proposed controller to the fault location, an increase in the critical clearing time for the circuit breakers and an improved damping of the power oscillations as compared to the conventional PI controller.Keywords: identification, neural networks, predictive control, transient stability, UPFC
Procedia PDF Downloads 37130175 Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Industry
Authors: Sofia Ahanj Sofia Ahanj, Mahsa Rahmani Mahsa Rahmani, Zahra Sadeghigol, Vida Nobakht Vida Nobakht
Abstract:
Providing security in the electricity industry, as one of the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both technical and managerial dimensions is discussed in the laboratory. There are various standards in the field of general ICT technical-security evaluation. The most important are ISO / IEC 15408, ISO / IEC 27001 and NIST SP 800-53. In the present paper, these standards are first examined. Then, the standards and reports in the industrial field have been reviewed and compared, and finally, based on the results and special considerations of information and communication technology equipment in the electricity industry, the appropriate methodology has been presented.Keywords: security standards, ISO/IEC 15408, ISA/IEC 62443 series, NIST SP 800-53, NISTIR 7628
Procedia PDF Downloads 16830174 Research on Malware Application Patterns of Using Permission Monitoring System
Authors: Seung-Hwan Ju, Yo-Han Choi, Hee-Suk Seo, Tae-Kyung Kim
Abstract:
This study investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloaded. The pattern analysis is based on a smaller data set consisting of confirmed malicious applications. The method is evaluated based on its ability to recognize malicious potential in the analyzed applications. In this study, we develop a system to monitor that mobile application permission at application update. This study is a service-based malware analysis. It will be based on the mobile security study.Keywords: malware patterns, application permission, application analysis, security
Procedia PDF Downloads 52530173 A Visual Inspection System for Automotive Sheet Metal Chasis Parts Produced with Cold-Forming Method
Authors: İmren Öztürk Yılmaz, Abdullah Yasin Bilici, Yasin Atalay Candemir
Abstract:
The system consists of 4 main elements: motion system, image acquisition system, image processing software, and control interface. The parts coming out of the production line to enter the image processing system with the conveyor belt at the end of the line. The 3D scanning of the produced part is performed with the laser scanning system integrated into the system entry side. With the 3D scanning method, it is determined at what position and angle the parts enter the system, and according to the data obtained, parameters such as part origin and conveyor speed are calculated with the designed software, and the robot is informed about the position where it will take part. The robot, which receives the information, takes the produced part on the belt conveyor and shows it to high-resolution cameras for quality control. Measurement processes are carried out with a maximum error of 20 microns determined by the experiments.Keywords: quality control, industry 4.0, image processing, automated fault detection, digital visual inspection
Procedia PDF Downloads 11330172 SVM-DTC Using for PMSM Speed Tracking Control
Authors: Kendouci Khedidja, Mazari Benyounes, Benhadria Mohamed Rachid, Dadi Rachida
Abstract:
In recent years, direct torque control (DTC) has become an alternative to the well-known vector control especially for permanent magnet synchronous motor (PMSM). However, it presents a problem of field linkage and torque ripple. In order to solve this problem, the conventional DTC is combined with space vector pulse width modulation (SVPWM). This control theory has achieved great success in the control of PMSM. That has become a hotspot for resolving. The main objective of this paper gives us an introduction of the DTC and SVPWM-DTC control theory of PMSM which has been simulating on each part of the system via Matlab/Simulink based on the mathematical modeling. Moreover, the outcome of the simulation proved that the improved SVPWM- DTC of PMSM has a good dynamic and static performance.Keywords: PMSM, DTC, SVM, speed control
Procedia PDF Downloads 38930171 A Review of Food Security Policy Research in Central Asia
Authors: Mergen Dyussenov
Abstract:
Food security has become a prominent issue on the global policy agenda. Yet, one particular region that remains understudied is a cohort of Central Asian countries. To shed light onto the issue, the paper looks into a review of existing literature related to food security policies in Central Asia. In so doing, it seeks to systematize the context analyzed, key findings, and recommendations. Furthermore, it analyzes the role of key actors in promoting the food security policies across Central Asian nations. Finally, the paper attempts to set the agenda for further research.Keywords: food security, central Asia, the role of actors, policy analysis
Procedia PDF Downloads 32630170 Modeling and Power Control of DFIG Used in Wind Energy System
Authors: Nadia Ben Si Ali, Nadia Benalia, Nora Zerzouri
Abstract:
Wind energy generation has attracted great interests in recent years. Doubly Fed Induction Generator (DFIG) for wind turbines are largely deployed because variable-speed wind turbines have many advantages over fixed-speed generation such as increased energy capture, operation at maximum power point, improved efficiency, and power quality. This paper presents the operation and vector control of a Doubly-fed Induction Generator (DFIG) system where the stator is connected directly to a stiff grid and the rotor is connected to the grid through bidirectional back-to-back AC-DC-AC converter. The basic operational characteristics, mathematical model of the aerodynamic system and vector control technique which is used to obtain decoupled control of powers are investigated using the software Mathlab/Simulink.Keywords: wind turbine, Doubly Fed Induction Generator, wind speed controller, power system stability
Procedia PDF Downloads 37930169 Synthetic Optimizing Control of Wind-Wave Hybrid Energy Conversion System
Authors: Lei Xue, Liye Zhao, Jundong Wang, Yu Xue
Abstract:
A hybrid energy conversion system composed of a floating offshore wind turbine (FOWT) and wave energy converters (WECs) may possibly reduce the levelized cost of energy, improving the platform dynamics and increasing the capacity to harvest energy. This paper investigates the aerodynamic performance and dynamic responses of the combined semi-submersible FOWT and point-absorber WECs in frequency and time domains using synthetic optimizing control under turbulent wind and irregular wave conditions. Individual pitch control is applied to the FOWT part, while spring–damping control is used on the WECs part, as well as the synergistic control effect of both are studied. The effect of the above control optimization is analyzed under several typical working conditions, such as below-rated wind speed, rated wind speed, and above-rated wind speed by OpenFAST and WEC-Sim software. Particularly, the wind-wave misalignment is also comparatively investigated, which has demonstrated the importance of applying proper integrated optimal control in this hybrid energy system. More specifically, the combination of individual pitch control and spring–damping control is able to mitigate the platform pitch motion and improve output power. However, the increase in blade root load needs to be considered which needs further investigations in the future.Keywords: floating offshore wind turbine, wave energy converters, control optimization, individual pitch control, dynamic response
Procedia PDF Downloads 5330168 Effect of Cooperative Learning Strategy on Mathematics Achievement and Retention of Senior Secondary School Students of Different Ability Levels in Taraba State, Nigeria
Authors: Onesimus Bulus Shiaki
Abstract:
The study investigated the effect of cooperative learning strategy on mathematics achievement and retention among senior secondary school students of different abilities in Taraba State Nigeria. Cooperative learning strategy could hopefully contribute to students’ achievement which will spur the teachers to develop strategies for better learning. The quasi-experimental of pretest, posttest and control group design was adopted in this study. A sample of one hundred and sixty-four (164) Senior Secondary Two (SS2) students were selected from a population of twelve thousand, eight hundred and seventy-three (12,873) SS2 Students in Taraba State. Two schools with equivalent mean scores in the pre-test were randomly assigned to experimental and control groups. The experimental group students were stratified according to ability levels of low, medium and high. The experimental group was guided by the research assistants using the cooperative learning instructional package. After six weeks post-test was administered to the two groups while the retention test was administered two weeks after the post-test. The researcher developed a 50-item Mathematics Achievement Test (MAT) which was validated by experts obtaining the reliability coefficient of 0.87. Mean scores and standard deviations were used to answer the research questions while the Analysis of Co-variance (ANCOVA) was used to test the hypotheses. Major findings from the statistical analysis showed that cooperative learning strategy has a significant effect on the mean achievement of students as well as retention among students of high, medium and low ability in mathematics. However, cooperative learning strategy has no effect on the interaction of ability level and retention. Based on the results obtained, it was therefore recommended that the adoption of the use of cooperative learning strategy in the teaching and learning of mathematics in senior secondary schools be initiated, maintained and sustained for the benefit of senior secondary school students in Taraba State. Periodic Government sponsored in-service training in form of long vacation training programme, workshops, conferences and seminars on the nature, scope, and use of cooperative learning strategy should be organized for senior secondary school mathematics teachers in Taraba state.Keywords: ability level, cooperative learning, mathematics achievement, retention
Procedia PDF Downloads 16130167 Enhancing Civil Aviation Safety and Security: A Comprehensive Approach
Authors: J. Waldon
Abstract:
The civil aviation industry plays a crucial role in global transportation, connecting people and goods across the world. Ensuring the safety and security of passengers, crew, and aircraft is of paramount importance. This paper aims to address the aspect of training and human factors, amongst others, necessary for enhancing civil aviation safety and security. In this context, we are focusing on the level of attention exhibited in the checking of luggage and travel credentials, with the aim to identify areas of improvement and avoid compromising security and safety at the Nsimalen Airport Yaoundé, Cameroon. We found that there is a lack of proper awareness among both travelers and some staff on the safety and security of goods and passengers. We suggest that improved training and handling, and sensitization in the form of legible billboards are important. Thus, we recommend refresher courses like this one for staff to keep abreast with the fast-changing security landscape in air transport as well as proper sensitization, including health-related issues. In conclusion, we established that the human factors, as well as the frequency of training and refresher courses, have a positive outlook on safety and security in air transport.Keywords: safety, security, passengers, cargo
Procedia PDF Downloads 6730166 A Review Paper on Data Security in Precision Agriculture Using Internet of Things
Authors: Tonderai Muchenje, Xolani Mkhwanazi
Abstract:
Precision agriculture uses a number of technologies, devices, protocols, and computing paradigms to optimize agricultural processes. Big data, artificial intelligence, cloud computing, and edge computing are all used to handle the huge amounts of data generated by precision agriculture. However, precision agriculture is still emerging and has a low level of security features. Furthermore, future solutions will demand data availability and accuracy as key points to help farmers, and security is important to build robust and efficient systems. Since precision agriculture comprises a wide variety and quantity of resources, security addresses issues such as compatibility, constrained resources, and massive data. Moreover, conventional protection schemes used in the traditional internet may not be useful for agricultural systems, creating extra demands and opportunities. Therefore, this paper aims at reviewing state of the art of precision agriculture security, particularly in open field agriculture, discussing its architecture, describing security issues, and presenting the major challenges and future directions.Keywords: precision agriculture, security, IoT, EIDE
Procedia PDF Downloads 9030165 Particle Swarm Optimisation of a Terminal Synergetic Controllers for a DC-DC Converter
Authors: H. Abderrezek, M. N. Harmas
Abstract:
DC-DC converters are widely used as reliable power source for many industrial and military applications, computers and electronic devices. Several control methods were developed for DC-DC converters control mostly with asymptotic convergence. Synergetic control (SC) is a proven robust control approach and will be used here in a so-called terminal scheme to achieve finite time convergence. Lyapunov synthesis is adopted to assure controlled system stability. Furthermore particle swarm optimization (PSO) algorithm, based on an integral time absolute of error (ITAE) criterion will be used to optimize controller parameters. Simulation of terminal synergetic control of a DC-DC converter is carried out for different operating conditions and results are compared to classic synergetic control performance, that which demonstrate the effectiveness and feasibility of the proposed control method.Keywords: DC-DC converter, PSO, finite time, terminal, synergetic control
Procedia PDF Downloads 50330164 Protecting Privacy and Data Security in Online Business
Authors: Bilquis Ferdousi
Abstract:
With the exponential growth of the online business, the threat to consumers’ privacy and data security has become a serious challenge. This literature review-based study focuses on a better understanding of those threats and what legislative measures have been taken to address those challenges. Research shows that people are increasingly involved in online business using different digital devices and platforms, although this practice varies based on age groups. The threat to consumers’ privacy and data security is a serious hindrance in developing trust among consumers in online businesses. There are some legislative measures taken at the federal and state level to protect consumers’ privacy and data security. The study was based on an extensive review of current literature on protecting consumers’ privacy and data security and legislative measures that have been taken.Keywords: privacy, data security, legislation, online business
Procedia PDF Downloads 10630163 Food Security in Nigeria: An Examination of Food Availability and Accessibility in Nigeria
Authors: Okolo Chimaobi Valentine, Obidigbo Chizoba
Abstract:
As a basic physiology need, the threat to sufficient food production is the threat to human survival. Food security has been an issue that has gained global concern. This paper looks at the food security in Nigeria by assessing the availability of food and accessibility of the available food. The paper employed multiple linear regression technique and graphic trends of growth rates of relevant variables to show the situation of food security in Nigeria. Results of the tests revealed that population growth rate was higher than the growth rate of food availability in Nigeria for the earlier period of the study. Commercial bank credit to the agricultural sector, foreign exchange utilization for food and the Agricultural Credit Guarantee Scheme Fund (ACGSF) contributed significantly to food availability in Nigeria. Food prices grew at a faster rate than the average income level, making it difficult to access sufficient food. It implies that prior to the year 2012; there was insufficient food to feed the Nigerian populace. However, continued credit to the food and agricultural sector will ensure sustained and sufficient production of food in Nigeria. Microfinance banks should make sufficient credit available to the smallholder farmer. The government should further control and subsidize the rising price of food to make it more accessible by the people.Keywords: food, accessibility, availability, security
Procedia PDF Downloads 376