Search results for: privacy enhancing technologies
5155 Estimating the Potential of Solar Energy: A Moroccan Case Study
Authors: Fakhreddin El Wali Elalaoui, Maatouk Mustapha
Abstract:
The problem of global climate change isbecoming more and more serious. Therefore, there is a growing interest in renewable energy sources to minimize the impact of this phenomenon. Environmental policies are changing in different countries, including Morocco, with a greater focus on the integration and development of renewable energy projects. The purpose of this paper is to evaluate the potential of solar power plants in Morocco based on two technologies: concentrated solar power (CSP) and photovoltaics (PV). In order to perform an accurate search, we must follow a certain method to select the correct criteria. Four selection criteria were retained: climate, topography, location, and water resources. AnalyticHierarchy Process (AHP) was used to calculate the weight/importance of each criterion. Once obtained, weights are applied to the map for each criterion to produce a final ranking that ranks regions according to their potential. The results show that Morocco has strong potential for both technologies, especially in the southern region. Finally, this work is the first in the field to include the whole of Morocco in the study area.Keywords: PV, Csp, solar energy, GIS
Procedia PDF Downloads 965154 Descriptive Analysis: New Media Influence on Decision Makers
Authors: Bashaiar Alsanaa
Abstract:
The process of decision making requires environment surveillance and public opinion monitoring, both of which can be attained through effective use of social media. This study aims to investigate the extent to which new media influence the decision making process by the Kuwaiti government. The research explores how unprecedented access to information as well as dynamic user-interaction made possible by new technologies play a significant role in all aspects of decision making whether on the end of the public or decision makers themselves. The research analyzes two case studies where public opinion was forceful on social media in order to explore how such media create interactive and liberal environments for individuals to participate in the process of taking action with regards to political, economic and social issues. The findings of this descriptive study indicate the overwhelming extent to which social media are being used in Kuwait to create new social reform by the government based on citizen interaction with current topics.Keywords: communication, descriptive, new media technologies, social media.
Procedia PDF Downloads 1185153 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks
Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas
Abstract:
Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model
Procedia PDF Downloads 585152 A Comprehensive Study on CO₂ Capture and Storage: Advances in Technology and Environmental Impact Mitigation
Authors: Oussama Fertaq
Abstract:
This paper investigates the latest advancements in CO₂ capture and storage (CCS) technologies, which are vital for addressing the growing challenge of climate change. The study focuses on multiple techniques for CO₂ capture, including chemical absorption, membrane separation, and adsorption, analyzing their efficiency, scalability, and environmental impact. The research further explores geological storage options such as deep saline aquifers and depleted oil fields, providing insights into the challenges and opportunities presented by each method. This paper emphasizes the importance of integrating CCS with existing industrial processes to reduce greenhouse gas emissions effectively. It also discusses the economic and policy frameworks required to promote wider adoption of CCS technologies. The findings of this study offer a comprehensive view of the potential of CCS in achieving global climate goals, particularly in hard-to-abate sectors such as energy and manufacturing.Keywords: CO₂ capture, carbon storage, climate change mitigation, carbon sequestration, environmental sustainability
Procedia PDF Downloads 115151 Effect of Ausubel's Advance Organizer Model to Enhancing Meta-Cognition of Students at Secondary Level
Authors: Qaisara Parveen, M. Imran Yousuf
Abstract:
The purpose of this study was to find the effectiveness of the use of advance organizer model for enhancing meta-cognition of students in the subject of science. It was hypothesized that the students of experimental group taught through advance organizer model would show the better cognition than the students of control group taught through traditional teaching. The population of the study consisted of all secondary school students studying in government high school located in Rawalpindi. The sample of the study consisted of 50 students of 9th class of humanities group. The sample was selected on the basis of their pretest scores through matching, and the groups were randomly assigned for the treatment. The experimental group was taught through advance organizer model while the control group was taught through traditional teaching. The self-developed achievement test was used for the purpose of pretest and posttest. After collecting the pre-test score and post-test score, the data was analyzed and interpreted by use of descriptive statistics as mean and standard deviation and inferential statistics t-test. The findings indicate that students taught using advance organizers had a higher level of meta-cognition as compared to control group. Further, meta cognition level of boys was found higher than that of girls students. This study also revealed the fact that though the students at different meta-cognition level approached learning situations in a different manner, Advance organizer model is far superior to Traditional method of teaching.Keywords: descriptive, experimental, humanities, meta-cognition, statistics, science
Procedia PDF Downloads 3155150 Moderate Electric Field and Ultrasound as Alternative Technologies to Raspberry Juice Pasteurization Process
Authors: Cibele F. Oliveira, Debora P. Jaeschke, Rodrigo R. Laurino, Amanda R. Andrade, Ligia D. F. Marczak
Abstract:
Raspberry is well-known as a good source of phenolic compounds, mainly anthocyanin. Some studies pointed out the importance of these bioactive compounds consumption, which is related to the decrease of the risk of cancer and cardiovascular diseases. The most consumed raspberry products are juices, yogurts, ice creams and jellies and, to ensure the safety of these products, raspberry is commonly pasteurized, for enzyme and microorganisms inactivation. Despite being efficient, the pasteurization process can lead to degradation reactions of the bioactive compounds, decreasing the products healthy benefits. Therefore, the aim of the present work was to evaluate moderate electric field (MEF) and ultrasound (US) technologies application on the pasteurization process of raspberry juice and compare the results with conventional pasteurization process. For this, phenolic compounds, anthocyanin content and physical-chemical parameters (pH, color changes, titratable acidity) of the juice were evaluated before and after the treatments. Moreover, microbiological analyses of aerobic mesophiles microorganisms, molds and yeast were performed in the samples before and after the treatments, to verify the potential of these technologies to inactivate microorganisms. All the pasteurization processes were performed in triplicate for 10 min, using a cylindrical Pyrex® vessel with a water jacket. The conventional pasteurization was performed at 90 °C using a hot water bath connected to the extraction cell. The US assisted pasteurization was performed using 423 and 508 W cm-2 (75 and 90 % of ultrasound intensity). It is important to mention that during US application the temperature was kept below 35 °C; for this, the water jacket of the extraction cell was connected to a water bath with cold water. MEF assisted pasteurization experiments were performed similarly to US experiments, using 25 and 50 V. Control experiments were performed at the maximum temperature of US and MEF experiments (35 °C) to evaluate only the effect of the aforementioned technologies on the pasteurization. The results showed that phenolic compounds concentration in the juice was not affected by US and MEF application. However, it was observed that the US assisted pasteurization, performed at the highest intensity, decreased anthocyanin content in 33 % (compared to in natura juice). This result was possibly due to the cavitation phenomena, which can lead to free radicals formation and accumulation on the medium; these radicals can react with anthocyanin decreasing the content of these antioxidant compounds in the juice. Physical-chemical parameters did not present statistical differences for samples before and after the treatments. Microbiological analyses results showed that all the pasteurization treatments decreased the microorganism content in two logarithmic cycles. However, as values were lower than 1000 CFU mL-1 it was not possible to verify the efficacy of each treatment. Thus, MEF and US were considered as potential alternative technologies for pasteurization process, once in the right conditions the application of the technologies decreased microorganism content in the juice and did not affected phenolic and anthocyanin content, as well as physical-chemical parameters. However, more studies are needed regarding the influence of MEF and US processes on microorganisms’ inactivation.Keywords: MEF, microorganism inactivation, anthocyanin, phenolic compounds
Procedia PDF Downloads 2425149 Post-harvest Handling Practices and Technologies Harnessed by Smallholder Fruit Crop Farmers in Vhembe District, Limpopo Province, South Africa
Authors: Vhahangwele Belemu, Isaac Busayo Oluwatayo
Abstract:
Post-harvest losses pose a serious challenge to smallholder fruit crop farmers, especially in the rural communities of South Africa, affecting their economic livelihoods and food security. This study investigated the post-harvest handling practices and technologies harnessed by smallholder fruit crop farmers in the Vhembe district of Limpopo province, South Africa. Data were collected on a random sample of 224 smallholder fruit crop farmers selected from the four municipalities of the district using a multistage sampling technique. Analytical tools employed include descriptive statistics and the tobit regression model. A descriptive analysis of farmers’ socioeconomic characteristics showed that a sizeable number of these farmers are still in their active working age (mean = 52 years) with more males (63.8%) than their female (36.2%) counterparts. Respondents’ distribution by educational status revealed that only a few of these had no formal education (2.2%), with the majority having secondary education (48.7%). Results of data analysis further revealed that the prominent post-harvest technologies and handling practices harnessed by these farmers include using appropriate harvesting techniques (20.5%), selling at a reduced price (19.6%), transportation consideration (18.3%), cleaning and disinfecting (17.9%), sorting and grading (16.5%), manual cleaning (15.6%) and packaging technique (11.6%) among others. The result of the Tobit regression analysis conducted to examine the determinants of post-harvest technologies and handling practices harnessed showed that age, educational status of respondents, awareness of technology/handling practices, farm size, access to credit, extension contact, and membership of association were the significant factors. The study suggests enhanced awareness creation, access to credit facility and improved access to market as important factors to consider by relevant stakeholders to assist smallholder fruit crop farmers in the study area.Keywords: fruit crop farmers, handling practices, post harvest losses, smallholder, Vhembe District, South Africa
Procedia PDF Downloads 565148 Horizon Scanning of Disruptive Technology Trends in Marine for 2030 Horizon
Authors: Jose Gonzalez, Fai Cheng, Ivy Fan
Abstract:
Shipping has a mature and ever expanding worldwide market. The future of the marine industry itself is not only irrevocably linked with the global economic, social, and political landscape; it is also subject to the technological developments in different fields. Some of them may have never been linked to the marine industry before. Companies in the marine sector are getting more dependent on technologies to achieve competitive advantage in an increasing open market. Technologies can be fused across different business functions and geopolitical influences. A successful marine business should be prepared to embrace such potential changes that lie ahead. The present paper intends to articulate long-term marine technology strategies from an industrial perspective. Methodology and current development are introduced. The paper will also provide insight into future technological trends demand for major commercial ship types. It may also assist different stakeholders in tailoring their long-term strategies to achieve a Sea Change and to uncap opportunity.Keywords: commercial sector, marine, trends, technology
Procedia PDF Downloads 4095147 A Constructivist Grounded Theory Study on the Impact of Automation on People and Gardening
Authors: Hamilton V. Niculescu
Abstract:
Following a three year study conducted on eighteen Irish people that are involved in growing vegetables in various community gardens around Dublin, Republic of Ireland, it was revealed that addition of some automated features aimed at improving agricultural practices represented a process which was regarded as potentially beneficial, and as a great tool to closely monitor climate conditions inside the greenhouses. The participants were provided with a free custom-built mobile app through which they could remotely monitor and control features such as irrigation, air ventilation, and windows to ensure optimal growing conditions for vegetables growing inside purpose-built greenhouses. While the initial interest was generally high, within weeks, the participants' level of interaction with the enclosures slowly declined. By employing a constructivist grounded theory methodology, following focus group discussions, in-depth semi-structured interviews, and observations, it was revealed that participants' trust in newer technologies, and renewables, in particular, was low. There are various reasons for this, but because the participants in this study consist of mainly working-class people, it can be argued that lack of education and knowledge are the main barriers acting against the adoption of innovations. Consequently, it was revealed that most participants eventually decided to "set and forget" the systems in automatic working mode, indicating that the immediate effect of introducing people to assisting technologies also introduced some unintended consequences into their lifestyle. It is argued that this occurrence also indicates the fact that people initially "read" newer technologies and only adopt those features that they find useful and less intrusive in regards to their current lifestyle.Keywords: automation, communication, greenhouse, sustainable
Procedia PDF Downloads 1195146 ICT in Education – A Quest for Quality Learning in the 21st Century
Authors: Adam Johnbull
Abstract:
The paper discusses ICT in Education as a quest for quality learning in the 21st century. Education is the key that unlock the door to development, without adequate education of the citizenry, the development of a nation becomes a sham. Information Communication Technologies (ICTs) has revolutionized the way people work today and are now transforming education systems. As a result, if schools train children in yesterday’s skills and technologies they may not be effective and fit in tomorrow’s world. This is a sufficient reason for ICT’s to win global recognition and attention and thus ensure desire quality in our school system. Thus, the purpose of the paper is to discuss amongst others, what is ICT. The roles of ICT’s in education, limitation and key challenges of integrating ICT to education in the enhancement of student learning and experiences in other to encourage policy makers, school administrators and teachers pay the required attention to integrate this technology in the education system. The paper concludes that regardless of all the limitation characterizing it. ICT benefit education system to provide quality education in the 21st century.Keywords: ICTs, quest, information, global, sham, century
Procedia PDF Downloads 4265145 Evaluating Value of Users' Personal Information Based on Cost-Benefit Analysis
Authors: Jae Hyun Park, Sangmi Chai, Minkyun Kim
Abstract:
As users spend more time on the Internet, the probability of their personal information being exposed has been growing. This research has a main purpose of investigating factors and examining relationships when Internet users recognize their value of private information with a perspective of an economic asset. The study is targeted on Internet users, and the value of their private information will be converted into economic figures. Moreover, how economic value changes in relation with individual attributes, dealer’s traits, circumstantial properties will be studied. In this research, the changes in factors on private information value responding to different situations will be analyzed in an economic perspective. Additionally, this study examines the associations between users’ perceived risk and value of their personal information. By using the cost-benefit analysis framework, the hypothesis that the user’s sense in private information value can be influenced by individual attributes and situational properties will be tested. Therefore, this research will attempt to provide answers for three research objectives. First, this research will identify factors that affect value recognition of users’ personal information. Second, it provides evidences that there are differences on information system users’ economic value of information responding to personal, trade opponent, and situational attributes. Third, it investigates the impact of those attributes on individuals’ perceived risk. Based on the assumption that personal, trade opponent and situation attributes make an impact on the users’ value recognition on private information, this research will present the understandings on the different impacts of those attributes in recognizing the value of information with the economic perspective and prove the associative relationships between perceived risk and decision on the value of users’ personal information. In order to validate our research model, this research used the regression methodology. Our research results support that information breach experience and information security systems is associated with users’ perceived risk. Information control and uncertainty are also related to users’ perceived risk. Therefore, users’ perceived risk is considered as a significant factor on evaluating the value of personal information. It can be differentiated by trade opponent and situational attributes. This research presents new perspective on evaluating the value of users’ personal information in the context of perceived risk, personal, trade opponent and situational attributes. It fills the gap in the literature by providing how users’ perceived risk are associated with personal, trade opponent and situation attitudes in conducting business transactions with providing personal information. It adds to previous literature that the relationship exists between perceived risk and the value of users’ private information in the economic perspective. It also provides meaningful insights to the managers that in order to minimize the cost of information breach, managers need to recognize the value of individuals’ personal information and decide the proper amount of investments on protecting users’ online information privacy.Keywords: private information, value, users, perceived risk, online information privacy, attributes
Procedia PDF Downloads 2395144 Security of Internet of Things: Challenges, Requirements and Future Directions
Authors: Amjad F. Alharbi, Bashayer A. Alotaibi, Fahd S. Alotaibi
Abstract:
The emergence of Internet of Things (IoT) technology provides capabilities for a huge number of smart devices, services and people to be communicate with each other for exchanging data and information over existing network. While as IoT is progressing, it provides many opportunities for new ways of communications as well it introduces many security and privacy threats and challenges which need to be considered for the future of IoT development. In this survey paper, an IoT security issues as threats and current challenges are summarized. The security architecture for IoT are presented from four main layers. Based on these layers, the IoT security requirements are presented to insure security in the whole system. Furthermore, some researches initiatives related to IoT security are discussed as well as the future direction for IoT security are highlighted.Keywords: Internet of Things (IoT), IoT security challenges, IoT security requirements, IoT security architecture
Procedia PDF Downloads 3745143 A Comparative Study of Black Carbon Emission Characteristics from Marine Diesel Engines Using Light Absorption Method
Authors: Dongguk Im, Gunfeel Moon, Younwoo Nam, Kangwoo Chun
Abstract:
Recognition of the needs about protecting environment throughout worldwide is widespread. In the shipping industry, International Maritime Organization (IMO) has been regulating pollutants emitted from ships by MARPOL 73/78. Recently, the Marine Environment Protection Committee (MEPC) of IMO, at its 68th session, approved the definition of Black Carbon (BC) specified by the following physical properties (light absorption, refractory, insolubility and morphology). The committee also agreed to the need for a protocol for any voluntary measurement studies to identify the most appropriate measurement methods. Filter Smoke Number (FSN) based on light absorption is categorized as one of the IMO relevant BC measurement methods. EUROMOT provided a FSN measurement data (measured by smoke meter) of 31 different engines (low, medium and high speed marine engines) of member companies at the 3rd International Council on Clean Transportation (ICCT) workshop on marine BC. From the comparison of FSN, the results indicated that BC emission from low speed marine diesel engines was ranged from 0.009 to 0.179 FSN and it from medium and high speed marine diesel engine was ranged 0.012 to 3.2 FSN. In consideration of measured the low FSN from low speed engine, an experimental study was conducted using both a low speed marine diesel engine (2 stroke, power of 7,400 kW at 129 rpm) and a high speed marine diesel engine (4 stroke, power of 403 kW at 1,800 rpm) under E3 test cycle. The results revealed that FSN was ranged from 0.01 to 0.16 and 1.09 to 1.35 for low and high speed engines, respectively. The measurement equipment (smoke meter) ranges from 0 to 10 FSN. Considering measurement range of it, FSN values from low speed engines are near the detection limit (0.002 FSN or ~0.02 mg/m3). From these results, it seems to be modulated the measurement range of the measurement equipment (smoke meter) for enhancing measurement accuracy of marine BC and evaluation on performance of BC abatement technologies.Keywords: black carbon, filter smoke number, international maritime organization, marine diesel engine (two and four stroke), particulate matter
Procedia PDF Downloads 2765142 Development and Implementation of E-Disease Surveillance Systems for Public Health Southern Africa: A Critical Review
Authors: Taurai T. Chikotie, Bruce W. Watson
Abstract:
The manifestation of ‘new’ infectious diseases and the re-emergence of ‘old’ infectious diseases now present global problems and Southern Africa has not been spared from such calamity. Although having an organized public health system, countries in this region have failed to leverage on the proliferation in use of Information and Communication Technologies to promote effective disease surveillance. Objective: The objective of this study was to critically review and analyse the crucial variables to consider in the development and implementation of electronic disease surveillance systems in public health within the context of Southern Africa. Methodology: A critical review of literature published in English using, Google Scholar, EBSCOHOST, Science Direct, databases from the Centre for Disease Control (CDC and articles from the World Health Organisation (WHO) was undertaken. Manual reference and grey literature searches were also conducted. Results: Little has been done towards harnessing the potential of information technologies towards disease surveillance and this has been due to several challenges that include, lack of funding, lack of health informatics experts, poor supporting infrastructure, an unstable socio-political and socio-economic ecosystem in the region and archaic policies towards integration of information technologies in public health governance. Conclusion: The Southern African region stands to achieve better health outcomes if they adopt the use of e-disease surveillance systems in public health. However, the dynamics and complexities of the socio-economic, socio-political and technical variables would need addressing to ensure the successful development and implementation of e-disease surveillance systems in the region.Keywords: critical review, disease surveillance, public health informatics, Southern Africa
Procedia PDF Downloads 2815141 Enhancing Photocatalytic Hydrogen Production: Modification of TiO₂ by Coupling with Semiconductor Nanoparticles
Authors: Saud Hamdan Alshammari
Abstract:
Photocatalytic water splitting to produce hydrogen (H₂) has obtained significant attention as an environmentally friendly technology. This process, which produces hydrogen from water and sunlight, represents a renewable energy source. Titanium dioxide (TiO₂) plays a critical role in photocatalytic hydrogen production due to its chemical stability, availability, and low cost. Nevertheless, TiO₂'s wide band gap (3.2 eV) limits its visible light absorption and might affect the effectiveness of the photocatalytic. Coupling TiO₂ with other semiconductors is a strategy that can enhance TiO₂ by narrowing its band gap and improving visible light absorption. This paper studies the modification of TiO₂ by coupling it with another semiconductor such as CdS nanoparticles using a reflux reactor and autoclave reactor that helps form a core-shell structure. Characterization techniques, including TEM and UV-Vis spectroscopy, confirmed successful coating of TiO₂ on CdS core, reduction of the band gap from 3.28 eV to 3.1 eV, and enhanced light absorption in the visible region. These modifications are attributed to the heterojunction structure between TiO₂ and CdS.The essential goal of this study is to improve TiO₂ for use in photocatalytic water splitting to enhance hydrogen production. The core-shell TiO₂@CdS nanoparticles exhibited promising results, due to band gap narrowing and improved light absorption. Future work will involve adding Pt as a co-catalyst, which is known to increase surface reaction activity by enhancing proton adsorption. Evaluation of the TiO₂@CdS@Pt catalyst will include performance assessments and hydrogen productivity tests, considering factors such as effective shapes and material ratios. Moreover, the study could be enhanced by studying further modifications to the catalyst and displaying additional performance evaluations. For instance, doping TiO₂ with metals such as nickel (Ni), iron (Fe), and cobalt (Co) and non-metals such as nitrogen (N), carbon (C), and sulfur (S) could positively influence the catalyst by reducing the band gap, enhancing the separation of photogenerated electron-hole pairs, and increasing the surface area, respectively. Additionally, to further improve catalytic performance, examining different catalyst morphologies, such as nanorods, nanowires, and nanosheets, in hydrogen production could be highly beneficial. Optimizing photoreactor design for efficient photon delivery and illumination will further enhance the photocatalytic process. These strategies collectively aim to overcome current challenges and improve the efficiency of hydrogen production via photocatalysis.Keywords: hydrogen production, photocatalytic, water spliiting, semiconductor, nanoparticles
Procedia PDF Downloads 215140 OptiBaha: Design of a Web Based Analytical Tool for Enhancing Quality of Education at AlBaha University
Authors: Nadeem Hassan, Farooq Ahmad
Abstract:
The quality of education has a direct impact on individual, family, society, economy in general and the mankind as a whole. Because of that thousands of research papers and articles are written on the quality of education, billions of dollars are spent and continuously being spent on research and enhancing the quality of education. Academic programs accredited agencies define the various criterion of quality of education; academic institutions obtain accreditation from these agencies to ensure degree programs offered at their institution are of international standards. This R&D aims to build a web based analytical tool (OptiBaha) that finds the gaps in AlBaha University education system by taking input from stakeholders, including students, faculty, staff and management. The input/online-data collected by this tool will be analyzed on core areas of education as proposed by accredited agencies, CAC of ABET and NCAAA of KSA, including student background, language, culture, motivation, curriculum, teaching methodology, assessment and evaluation, performance and progress, facilities, availability of teaching materials, faculty qualification, monitoring, policies and procedures, and more. Based on different analytical reports, gaps will be highlighted, and remedial actions will be proposed. If the tool is implemented and made available through a continuous process the quality of education at AlBaha University can be enhanced, it will also help in fulfilling criterion of accreditation agencies. The tool will be generic in nature and ultimately can be used by any academic institution.Keywords: academic quality, accreditation agencies, higher education, policies and procedures
Procedia PDF Downloads 3015139 Mapping New Technologies for Sustainability along the Fashion Supply Chain
Authors: Hilde Heim
Abstract:
The textile industry is known for its swift adoption of innovations in fashion technology (Fash-Tech). The industry is also known for its harmful effects on the environment. Opportunely, Fash-Tech is expected to facilitate the turn towards more sustainable practice. However, although several technologies have the potential for advancing sustainable practice, many industry players, whether large or small, are confused and misinformed about Fash-Tech adoption, application, and impact. Through a visual poster presentation, this project aims to map global fashion innovations along the supply chain from fibre production to waste management, thus providing a clearer picture of numbers, scale, and adoption. While the project aims to identify Fash-Tech effectiveness in reaching sustainability goals, it also identifies areas of congestion as well as insufficiency in the accessibility of Fash-Tech. This project intends to help inform future decisions in business, investment, and policy for the advancement of sustainable practice.Keywords: fashion technology, sustainability, supply chain, enterprise management
Procedia PDF Downloads 2415138 A Proposal for Systematic Mapping Study of Software Security Testing, Verification and Validation
Authors: Adriano Bessa Albuquerque, Francisco Jose Barreto Nunes
Abstract:
Software vulnerabilities are increasing and not only impact services and processes availability as well as information confidentiality, integrity and privacy, but also cause changes that interfere in the development process. Security test could be a solution to reduce vulnerabilities. However, the variety of test techniques with the lack of real case studies of applying tests focusing on software development life cycle compromise its effective use. This paper offers an overview of how a Systematic Mapping Study (MS) about security verification, validation and test (VVT) was performed, besides presenting general results about this study.Keywords: software test, software security verification validation and test, security test institutionalization, systematic mapping study
Procedia PDF Downloads 4095137 Effectiveness of Micro-Credit Scheme of Community Women and Development (COWAD) in Enhancing Living Standards of Women in Oyo State, Nigeria
Authors: Olufunmilayo Folaranmi
Abstract:
The study aimed at assessing the effectiveness of micro-credit scheme of (COWAD) in enhancing the living standard of women in selected local government areas of Oyo State. A survey research design was adopted for the study. A sample of 250 respondents was purposively selected for the study while a structured questionnaire tagged Effectiveness of Micro-Credit Scheme of Community Women and Development and Living Standards of Women Questionnaire (EMCSCWDQ) was designed to collect data for the study. Data collected was analyzed using frequency distribution, tables, percentages and chi-square statistics. Three hypotheses were tested for the study at 0.05 level of significance. Findings from the study indicated that loan provided by COWAD for women in selected local government areas towards improving their economic conditions has improved the living conditions of the women, promoted their general welfare, and reduced their poverty level. Findings also showed that some beneficiaries were not able to pay back, therefore reducing the effectiveness for future beneficiaries. Based on the findings, it was recommended that the providers of various micro-credit schemes of the state should design a convenient pattern of payment which will provide enough time for the beneficiaries of the loan to sell their goods or work for proper and timely payment. Also, the problem of collateral should be reviewed as the majority of women involved are poor. Other recommendations include replication of COWAD facilities in other NGOs as well as sustainability of the facility.Keywords: micro-credit scheme, welfare, women, development, poverty
Procedia PDF Downloads 1635136 The Scope and Effectiveness of Interactive Voice Response Technologies in Post-Operative Care
Authors: Zanib Nafees, Amir Razaghizad, Ibtisam Mahmoud, Abhinav Sharma, Renzo Cecere
Abstract:
More than one million surgeries are performed each year in Canada, resulting in more than 100,000 associated serious adverse events (SAEs) per year. These are defined as unintended injuries or complications that adversely affect the well-being of patients. In recent years, there has been a proliferation of digital health interventions that have the potential to assist, monitor, and educate patients—facilitating self-care following post-operative discharge. Among digital health, interventions are interactive-voice response technologies (IVRs), which have been shown to be highly effective in certain medical settings. Although numerous IVR-based interventions have been developed, their effectiveness and utility remain unclear, notably in post-operative settings. To the best of our knowledge, no systematic or scoping reviews have evaluated this topic to date. Thus, the objective of this scoping review protocol is to systematically map and explore the literature and evidence describing and examining IVR tools, implementation, evaluation, outcome, and experience for post-operative patients. The focus will be primarily on the evaluation of baseline performance status, clinical assessment, treatment outcomes, and patient management, including self-management and self-monitoring. The objective of this scoping review is to assess the extent of the literature to direct future research efforts by identifying gaps and limitations in the literature and to highlight relevant determinants of positive outcomes in the emerging field of IVR monitoring for health outcomes in post-operative patients.Keywords: digital healthcare technologies, post-surgery, interactive voice technology, interactive voice response
Procedia PDF Downloads 2645135 Communication and Devices: Face to Face Communication versus Communication with Mobile Technologies
Authors: Nuran Öze
Abstract:
With the rapid changes occurring in the last twenty five years, mobile phone technology has influenced every aspect of life. Technological developments within the Internet and mobile phone areas have not only changed communication practices; it has also changed the everyday life practices of individuals. This article has focused on understanding how people’s communication practices and everyday life practices have changed with the smartphone usage. The study was conducted by using in-depth interview method and the research was conducted on twenty Turkish Cypriots who live in Northern Cyprus. According to the research results, communicating via Internet has rapidly replaced face to face communication in recent years. However, results have changed according to generations. Younger generations can easily adapt themselves to technological changes because they are already gaining everyday life practices right now. However, the older generations practices are already present in their everyday life.Keywords: face to face communication, internet, mobile technologies, north Cyprus
Procedia PDF Downloads 3965134 Exploiting JPEG2000 into Reversible Information
Authors: Te-Jen Chang, I-Hui Pan, Kuang-Hsiung Tan, Shan-Jen Cheng, Chien-Wu Lan, Chih-Chan Hu
Abstract:
With the event of multimedia age in order to protect data not to be tampered, damaged, and faked, information hiding technologies are proposed. Information hiding means important secret information is hidden into cover multimedia and then camouflaged media is produced. This camouflaged media has the characteristic of natural protection. Under the undoubted situation, important secret information is transmitted out.Reversible information hiding technologies for high capacity is proposed in this paper. The gray images are as cover media in this technology. We compress gray images and compare with the original image to produce the estimated differences. By using the estimated differences, expression information hiding is used, and higher information capacity can be achieved. According to experimental results, the proposed technology can be approved. For these experiments, the whole capacity of information payload and image quality can be satisfied.Keywords: cover media, camouflaged media, reversible information hiding, gray image
Procedia PDF Downloads 3275133 Introducing Information and Communication Technologies in Prison: A Proposal in Favor of Social Reintegration
Authors: Carmen Rocio Fernandez Diaz
Abstract:
This paper focuses on the relevance of information and communication technologies (hereinafter referred as ‘ICTs’) as an essential part of the day-to-day life of all societies nowadays, as they offer the scenario where an immense number of behaviors are performed that previously took place in the physical world. In this context, areas of reality that have remained outside the so-called ‘information society’ are hardly imaginable. Nevertheless, it is possible to identify a means that continue to be behind this reality, and it is the penitentiary area regarding inmates rights, as security aspects in prison have already be improved by new technologies. Introducing ICTs in prisons is still a matter subject to great rejections. The study of comparative penitentiary systems worldwide shows that most of them use ICTs only regarding educational aspects of life in prison and that communications with the outside world are generally based on traditional ways. These are only two examples of the huge range of activities where ICTs can carry positive results within the prison. Those positive results have to do with the social reintegration of persons serving a prison sentence. Deprivation of liberty entails contact with the prison subculture and the harmful effects of it, causing in cases of long-term sentences the so-called phenomenon of ‘prisonization’. This negative effect of imprisonment could be reduced if ICTs were used inside prisons in the different areas where they can have an impact, and which are treated in this research, as (1) access to information and culture, (2) basic and advanced training, (3) employment, (4) communication with the outside world, (5) treatment or (6) leisure and entertainment. The content of all of these areas could be improved if ICTs were introduced in prison, as it is shown by the experience of some prisons of Belgium, United Kingdom or The United States. However, rejections to introducing ICTs in prisons obey to the fact that it could carry also risks concerning security and the commission of new offences. Considering these risks, the scope of this paper is to offer a real proposal to introduce ICTs in prison, trying to avoid those risks. This enterprise would be done to take advantage of the possibilities that ICTs offer to all inmates in order to start to build a life outside which is far from delinquency, but mainly to those inmates who are close to release. Reforming prisons in this sense is considered by the author of this paper an opportunity to offer inmates a progressive resettlement to live in freedom with a higher possibility to obey the law and to escape from recidivism. The value that new technologies would add to education, employment, communications or treatment to a person deprived of liberty constitutes a way of humanization of prisons in the 21st century.Keywords: deprivation of freedom, information and communication technologies, imprisonment, social reintegration
Procedia PDF Downloads 1655132 Response of Briquettes Application with Different Coating Materials on Yield and Quality of Cucumber [Cucumis sativus (L.)]
Authors: H. B. Torane, M. C. Kasture, S. S. Prabhudesai, P. B. Sanap, V. N. Palsande, J. J. Palkar
Abstract:
The present investigation entitled “Response of briquettes application with different coating materials on yield and quality of Cucumber [Cucumis sativus (L.)]” was conducted at Central Experiment Center, Wakawali during kharif season 2013. The field experiment was laid out in Factorial Randomized Block Design with three replicate. The four coating materials viz., Co – Non coating, C1 – Wax coating, C2 – Jaggary coating, and C3 – Tar coating was applied to Konkan Annapurna Briquette along with three sub treatments of application time i.e B1 – ½ at sowing, B2 - ½ at sowing and ½ at 30 days after sowing and B3 - 1/3 at sowing, 1/3 at 30 days after sowing and 1/3 at 60 days after sowing. It was observed that the application of tar coated Konkan Annapurna Briquettes (KAB) in three times @1/3 quantity of briquettes at sowing time, 1/3 quantity of briquettes at 30 days after sowing and 1/3 quantity of briquettes at 60 days after sowing was found promising to enhancing the cucumber fruit yield, higher vine length, number of fruits vine-1, girth of fruit, length of fruit. It was also observed that the quality of the cucumber fruit increased in terms of ascorbic acid. UB-Godavari forms of briquettes .i.e. are promising source of N, P2O5 and K2O fertilizers as compared to straight fertilizers for enhancing green cucumber fruit yield of Sheetal variety of cucumber in lateritic soil. Amongst the three types of coated briquettes, the tar coated briquettes application was found to be superior for increasing cucumber fruit yield applied in three times @1/3 quantity of briquettes at sowing time, 1/3 quantity of briquettes at 30 days after sowing and 1/3 quantity of briquettes at 60 days after sowing @ 5 briquettes per plant at an interval of 30 days after sowing.Keywords: briquettes, coating, yield, tar, wax and quality
Procedia PDF Downloads 5165131 The Role of Technology in Transforming the Finance, Banking, and Insurance Sectors
Authors: Farid Fahami
Abstract:
This article explores the transformative role of technology in the finance, banking, and insurance sectors. It examines key technological trends such as AI, blockchain, data analytics, and digital platforms and their impact on operations, customer experiences, and business models. The article highlights the benefits of technology adoption, including improved efficiency, cost reduction, enhanced customer experiences, and expanded financial inclusion. It also addresses challenges like cybersecurity, data privacy, and the need for upskilling. Real-world case studies demonstrate successful technology integration, and recommendations for stakeholders emphasize embracing innovation and collaboration. The article concludes by emphasizing the importance of technology in shaping the future of these sectors.Keywords: banking, finance, insurance, technology
Procedia PDF Downloads 725130 Operations Training Using Immersive Technologies: A Development Experience
Authors: A. Aman, S. M. Tang, F. H. Alharrassy
Abstract:
Omanisation was established to increase job opportunities for national employment in Sultanate of Oman. With half of the population below 25 years of age, the sultanate is striving to diversify the economy fast enough to meet the burgeoning number of jobseekers annually. On the other hand, training personnel to be competent oil and gas operators and technicians is a difficult task in a complex reservoir structures in Oman using highly advanced and sophisticated extracting processes. Coupled towards Omanisation which encourages nationals into the oil and gas sector so as to create sustainable employment for the local population, the challenge to churn out competent manpower became a daunting task. Immersive technologies provided the impetus to create a new digital media sector which provided job opportunities as well as the learning contents to enhance the competency-based training for the oil and gas sector in the Sultanate. This lead to a win-win-win collaboration amongst the government represented by the Information Technology Authority (ITA), private sector specialised company (represented by ASM Technologies), jobseekers and oil and gas organisations. This is also one of the first private-public partnership model in the Information Communication Technology (ICT) sector in Oman. A pilot phase was conducted for 8 months to develop four virtual applications for training in equipment and process engineering; oil rig familiarisation, Health Safety Environment (HSE) application, turbine application and the mechanical vapour compressor (MVC) water recycling plant in order to enhance the competency level of the trainees. The immersive applications were installed in operational settings which enabled new employees to practice and understand various processes and procedures regarding enhanced oil recovery. Existing employees used the application to review the working principles in order to carry out troubleshooting scenarios. Concurrently, these applications were also developed by local Omani resources within the country. This created job opportunities for job-seekers as well the establishment of a digital media sector. The purpose of this paper is to discuss how immersive technologies can enhance operational competencies, create job and establish a digital media sector in the Sultanate of Oman.Keywords: immersive, virtual reality, operations training, Omanisation
Procedia PDF Downloads 2295129 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels
Authors: Sartaj Singh, Amar Singh, Ashok Sharma, Sandeep Kaur
Abstract:
With upcoming threats in a digital world, we need to work continuously in the area of security in all aspects, from hardware to software as well as data modelling. The rise in social media activities and hunger for data by various entities leads to cybercrime and more attack on the privacy and security of persons. Cryptography has always been employed to avoid access to important data by using many processes. Symmetric key and asymmetric key cryptography have been used for keeping data secrets at rest as well in transmission mode. Various cryptosystems have evolved from time to time to make the data more secure. In this research article, we are studying various cryptosystems in asymmetric cryptography and their application with usefulness, and much emphasis is given to Elliptic curve cryptography involving algebraic mathematics.Keywords: cryptography, symmetric key cryptography, asymmetric key cryptography
Procedia PDF Downloads 1245128 Influence of CA, SR and BA Substitution on lafeo3Performances During Chemical Looping Processes
Authors: Rong Sun, Laihong Shen
Abstract:
La-based perovskite oxygen carriers, especially the doped-La(M)FeO₃, showed excellent performances during chemical looping processes. However, the mechanisms of the undoped and doped La(M)FeO₃ are not clear at present, making the mechanisms clear may help the development of chemical looping technologies. In this paper, the method based on the density function theory (DFT) was used to analysis the influence of Ca, Sr, and Ba doping of La on the electronic structure, while the CO oxidation mechanisms on the surface of LaFeO₃ and Ca-doped LaFeO₃ oxygen carriers were also analyzed. The results showed that the band gap was decreased by the doping of low valence. While the doping of low valence element Ca, Sr, and Ba at La site simultaneously resulted to the moving of the valence band toward high energy and made the valence band cross the Fermi energy level. This was resulted from the holes generated by divalent ion substitution. The holes can change the total magnetization from antiferromagnet to weakly ferromagnetism. The calculation results about the formation of oxygen vacancy showed that substitutions of Ca, Sr, and Ba caused a large drop in oxygen vacancy formation energy, indicating that the bulk oxygen transport was improved. Based on the optimized bulk of the undoped and Ca-doped LaFeO₃(010) surface, the CO adsorption was analyzed. The results indicated that the adsorption energy increased by divalent ion substitution, meaning that the adsorption stability decreased. The results can provide a certain theoretical basis for the development of perovskite oxides in chemical looping technologies.Keywords: chemical looping technologies, lanthanum ferrate (LaFeO₃), divalent ion substitution, CO oxidation
Procedia PDF Downloads 1025127 Challenges in Multi-Cloud Storage Systems for Mobile Devices
Authors: Rajeev Kumar Bedi, Jaswinder Singh, Sunil Kumar Gupta
Abstract:
The demand for cloud storage is increasing because users want continuous access their data. Cloud Storage revolutionized the way how users access their data. A lot of cloud storage service providers are available as DropBox, G Drive, and providing limited free storage and for extra storage; users have to pay money, which will act as a burden on users. To avoid the issue of limited free storage, the concept of Multi Cloud Storage introduced. In this paper, we will discuss the limitations of existing Multi Cloud Storage systems for mobile devices.Keywords: cloud storage, data privacy, data security, multi cloud storage, mobile devices
Procedia PDF Downloads 6995126 Hedonic Motivations for Online Shopping
Authors: Pui-Lai To, E-Ping Sung
Abstract:
The purpose of this study is to investigate hedonic online shopping motivations. A qualitative analysis was conducted to explore the factors influencing online hedonic shopping motivations. The results of the study indicate that traditional hedonic values, consisting of social, role, self-gratification, learning trends, pleasure of bargaining, stimulation, diversion, status, and adventure, and dimensions of flow theory, consisting of control, curiosity, enjoyment, and telepresence, exist in the online shopping environment. Two hedonic motivations unique to Internet shopping, privacy and online shopping achievement, were found. It appears that the most important hedonic value to online shoppers is having the choice to interact or not interact with others while shopping on the Internet. This study serves as a basis for the future growth of Internet marketing.Keywords: internet shopping, shopping motivation, hedonic motivation
Procedia PDF Downloads 475