Search results for: security safe
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4287

Search results for: security safe

3447 Time Estimation of Return to Sports Based on Classification of Health Levels of Anterior Cruciate Ligament Using a Convolutional Neural Network after Reconstruction Surgery

Authors: Zeinab Jafari A., Ali Sharifnezhad B., Mohammad Razi C., Mohammad Haghpanahi D., Arash Maghsoudi

Abstract:

Background and Objective: Sports-related rupture of the anterior cruciate ligament (ACL) and following injuries have been associated with various disorders, such as long-lasting changes in muscle activation patterns in athletes, which might last after ACL reconstruction (ACLR). The rupture of the ACL might result in abnormal patterns of movement execution, extending the treatment period and delaying athletes’ return to sports (RTS). As ACL injury is especially prevalent among athletes, the lengthy treatment process and athletes’ absence from sports are of great concern to athletes and coaches. Thus, estimating safe time of RTS is of crucial importance. Therefore, using a deep neural network (DNN) to classify the health levels of ACL in injured athletes, this study aimed to estimate the safe time for athletes to return to competitions. Methods: Ten athletes with ACLR and fourteen healthy controls participated in this study. Three health levels of ACL were defined: healthy, six-month post-ACLR surgery and nine-month post-ACLR surgery. Athletes with ACLR were tested six and nine months after the ACLR surgery. During the course of this study, surface electromyography (sEMG) signals were recorded from five knee muscles, namely Rectus Femoris (RF), Vastus Lateralis (VL), Vastus Medialis (VM), Biceps Femoris (BF), Semitendinosus (ST), during single-leg drop landing (SLDL) and forward hopping (SLFH) tasks. The Pseudo-Wigner-Ville distribution (PWVD) was used to produce three-dimensional (3-D) images of the energy distribution patterns of sEMG signals. Then, these 3-D images were converted to two-dimensional (2-D) images implementing the heat mapping technique, which were then fed to a deep convolutional neural network (DCNN). Results: In this study, we estimated the safe time of RTS by designing a DCNN classifier with an accuracy of 90 %, which could classify ACL into three health levels. Discussion: The findings of this study demonstrate the potential of the DCNN classification technique using sEMG signals in estimating RTS time, which will assist in evaluating the recovery process of ACLR in athletes.

Keywords: anterior cruciate ligament reconstruction, return to sports, surface electromyography, deep convolutional neural network

Procedia PDF Downloads 60
3446 Modalmetric Fiber Sensor and Its Applications

Authors: M. Zyczkowski, P. Markowski, M. Karol

Abstract:

The team from IOE MUT is developing fiber optic sensors for the security systems for 15 years. The conclusions of the work indicate that these sensors are complicated. Moreover, these sensors are expensive to produce and require sophisticated signal processing methods.We present the results of the investigations of three different applications of the modalmetric sensor: • Protection of museum collections and heritage buildings, • Protection of fiber optic transmission lines, • Protection of objects of critical infrastructure. Each of the presented applications involves different requirements for the system. The results indicate that it is possible to developed a fiber optic sensor based on a single fiber. Modification of optoelectronic parts with a change of the length of the sensor and the method of reflections of propagating light at the end of the sensor allows to adjust the system to the specific application.

Keywords: modalmetric fiber optic sensor, security sensor, optoelectronic parts, signal processing

Procedia PDF Downloads 606
3445 Image Steganography Using Least Significant Bit Technique

Authors: Preeti Kumari, Ridhi Kapoor

Abstract:

 In any communication, security is the most important issue in today’s world. In this paper, steganography is the process of hiding the important data into other data, such as text, audio, video, and image. The interest in this topic is to provide availability, confidentiality, integrity, and authenticity of data. The steganographic technique that embeds hides content with unremarkable cover media so as not to provoke eavesdropper’s suspicion or third party and hackers. In which many applications of compression, encryption, decryption, and embedding methods are used for digital image steganography. Due to compression, the nose produces in the image. To sustain noise in the image, the LSB insertion technique is used. The performance of the proposed embedding system with respect to providing security to secret message and robustness is discussed. We also demonstrate the maximum steganography capacity and visual distortion.

Keywords: steganography, LSB, encoding, information hiding, color image

Procedia PDF Downloads 459
3444 Adverse Effects of Natural Pesticides on Human and Animals: An Experimental Analysis

Authors: Abdel-Tawab H. Mossa

Abstract:

Synthetic pesticides are widely used in large-scale worldwide for control pests in agriculture and public health sectors in both developed and developing countries. Although the positive role of pesticides, they have many adverse toxic effects on humans, animals, and the ecosystem. Therefore, in the last few years, scientists have been searching for new active compounds from natural resources as an alternative to synthetic pesticides. Currently, many commercial natural pesticides are available commercially worldwide. These products are recommended for uses in organic farmers and considered as safe pesticides. This paper focuses on the adverse effects of natural pesticides on mammals. Available commercial pesticides in the market contain essential oils (e.g. pepper, cinnamon, and garlic), plant extracts, microorganism (e.g. bacteria, fungi or their toxin), mineral oils and some active compounds from natural recourses e.g. spinosad, neem, pyrethrum, rotenone, abamectin and other active compounds from essential oils (EOs). Some EOs components, e.g., thujone, pulegone, and thymol have high acute toxicity (LD50) is 87.5, 150 and 980 mg/kg. B.wt on mice, respectively. Natural pesticides such as spinosad, pyrethrum, neem, abamectin, and others have toxicological effects to mammals and ecosystem. These compounds were found to cause hematotoxicity, hepato-renal toxicity, biochemical alteration, reproductive toxicity, genotoxicity, and mutagenicity. It caused adverse effects on the ecosystem. Therefore, natural pesticides in general not safe and have high acute toxicity and can induce adverse effects at long-term exposure.

Keywords: natural pesticides, toxicity, safety, genotoxicity, ecosystem, biochemical

Procedia PDF Downloads 157
3443 Digital Governance Decision-Making in the Aftermath of Cybersecurity Crises, Lessons from Estonia

Authors: Logan Carmichael

Abstract:

As the world’s governments seek to increasingly digitize their service provisions, there exists a subsequent and fully valid concern about the security underpinning these digital governance provisions. Estonia, a small and innovative Baltic nation, has been refining both its digital governance structure and cybersecurity mechanisms for over three decades and has been praised as global ‘best practice’ in both fields. However, the security of the Estonian digital governance system has been ever-evolving and significantly shaped by cybersecurity crises. This paper examines said crises – 2007 cyberattacks on Estonian government, banks, and news media; the 2017 e-ID crisis; the ongoing COVID-19 pandemic; and the 2022 Russian invasion of Ukraine – and how governance decision-making following these crises has shaped the cybersecurity of the digital governance structure in Estonia. This paper employs a blended constructivist and historical institutionalist theoretical approach as a useful means to view governance and decision-making in the wake of cybersecurity incidents affecting the Estonian digital governance structure. Together, these theoretical groundings frame the topics of cybersecurity and digital governance in an Estonian context through a lens of ideation and experience, as well as institutional path dependencies over time and cybersecurity crises as critical junctures to study. Furthermore, this paper takes a qualitative approach, employing discourse analysis, policy analysis, and elite interviewing of Estonian officials involved in digital governance and cybersecurity in order to glean nuanced perspectives into the processes that followed these four crises. Ultimately, the results of this paper will offer insight into how governments undertake policy-driven change following cybersecurity crises to ensure sufficient security of their digitized service provisions. This paper’s findings are informative not only in continued decision-making in the Estonian system but also in other states currently implementing a digital governance structure, for which security mechanisms are of the utmost importance.

Keywords: cybersecurity, digital governance, Estonia, crisis management, governance in crisis

Procedia PDF Downloads 98
3442 Causality between Stock Indices and Cryptocurrencies during the Russia-Ukraine War

Authors: Nidhal Mgadmi, Abdelhafidh Othmani

Abstract:

This article examines the causal relationship between stock indices and cryptocurrencies during the current war between Russia and Ukraine. The econometric investigation runs from February 24, 2022, to April 12, 2023, focusing on seven stock market indices (S&P500, DAX, CAC40, Nikkei, TSX, MOEX, and PFTS) and seven cryptocurrencies (Bitcoin, Ethereum, Litcoin, Dash, Ripple, DigiByte and XEM). In this article, we try to understand how investors react to fluctuations in financial assets to seek safe havens in cryptocurrencies. We used dynamic causality to detect a possible causal relationship in the short term and seven models to estimate the long-term relationship between cryptocurrencies and financial assets. The causal relationship between financial market indexes and cryptocurrency coins in the short run indicates that three famous cryptocurrencies (BITCOIN, ETHEREUM, RIPPLE) and the two digital assets with minor popularity (XEM, Digibyte) are impacted by the German, Russian, and Ukrainian stock markets. In the long run, we found a positive and significate effect of the American, Canadian, French, and Ukrainian stock market indexes on Bitcoin. Thus, the stability of the traditional financial markets during the current war period can be explained on the one hand by investors’ fears of an unstable business climate, and on the other hand, by speculators’ sentiment towards new electronic products, which are perceived as hedging instruments and a safe haven in the face of the conflict between Ukraine and Russia.

Keywords: causality, stock indices, cryptocurrency, war, Russia, Ukraine

Procedia PDF Downloads 54
3441 Guidelines for Proper Internal Control of Internet Payment: A Case Study of Internet Payment Gateway, Thailand

Authors: Pichamon Chansuchai

Abstract:

The objective of this research were to investigate electronic payment system on the internet and offer the guidelines for proper internal control of the payment system based on international standard security control (ISO/IEC 17799:2005),in a case study of payment of the internet, Thailand. The guidelines covered five important areas: (1) business requirement for access control, (2) information systems acquisition, development and maintenance, (3) information security incident management, (4) business continuity management, and (5) compliance with legal requirement. The findings from this qualitative study revealed the guidelines for proper internet control that were more reliable and allow the same line of business to implement the same system of control.

Keywords: audit, best practice, internet, payment

Procedia PDF Downloads 484
3440 Lactic Acid, Citric Acid, and Potassium Bitartrate Non-Hormonal Prescription Vaginal PH Modulator Gel for the Prevention of Pregnancy

Authors: Shanna Su, Kathleen Vincent

Abstract:

Introduction: A non-hormonal prescription vaginal pH modulator (VPM) gel (Phexxi®), with active ingredients lactic acid, citric acid, and potassium bitartrate, has recently been approved for the prevention of pregnancy in the United States. The objective of this review is to compile the evidence available from published preclinical and clinical trials to support its use. Areas covered: PubMed was searched for published literature on VPM gel. Two Phase III trials were found on the clinicaltrials.gov database. The results demonstrated that VPM gel is safe, with minimal side effects, and effective (cumulative 6-7 cycle pregnancy rate of 4.1-13.65%, (Pearl Index 27.5) as a contraceptive. Microbicidal effects suggest the potential for the prevention of sexually transmitted infections (STIs); currently, a Phase III clinical trial is being conducted to evaluate the prevention of chlamydia and gonorrhea. Expert opinion: Non-hormonal reversible contraceptive options have been limited to the highly effective copper-releasing intrauterine device that requires insertion by a trained clinician and less effective coitally-associated barrier and spermicide options which are typically available over-the-counter. Spermicides, which improve the efficacy of barrier devices, may increase the risk of Human Immunodeficiency Virus (HIV)/STIs. VPM gel provides a new safe, effective non-hormonal contraceptive option with the potential for prevention of STIs.

Keywords: citric acid, lactic acid, non-hormonal contraception, potassium bitartrate, topical vaginal contraceptive, vaginal pH modulator gel

Procedia PDF Downloads 91
3439 Red Green Blue Image Encryption Based on Paillier Cryptographic System

Authors: Mamadou I. Wade, Henry C. Ogworonjo, Madiha Gul, Mandoye Ndoye, Mohamed Chouikha, Wayne Patterson

Abstract:

In this paper, we present a novel application of the Paillier cryptographic system to the encryption of RGB (Red Green Blue) images. In this method, an RGB image is first separated into its constituent channel images, and the Paillier encryption function is applied to each of the channels pixel intensity values. Next, the encrypted image is combined and compressed if necessary before being transmitted through an unsecured communication channel. The transmitted image is subsequently recovered by a decryption process. We performed a series of security and performance analyses to the recovered images in order to verify their robustness to security attack. The results show that the proposed image encryption scheme produces highly secured encrypted images.

Keywords: image encryption, Paillier cryptographic system, RBG image encryption, Paillier

Procedia PDF Downloads 222
3438 Effects of Using a Recurrent Adverse Drug Reaction Prevention Program on Safe Use of Medicine among Patients Receiving Services at the Accident and Emergency Department of Songkhla Hospital Thailand

Authors: Thippharat Wongsilarat, Parichat tuntilanon, Chonlakan Prataksitorn

Abstract:

Recurrent adverse drug reactions are harmful to patients with mild to fatal illnesses, and affect not only patients but also their relatives, and organizations. To compare safe use of medicine among patients before and after using the recurrent adverse drug reaction prevention program . Quasi-experimental research with the target population of 598 patients with drug allergy history. Data were collected through an observation form tested for its validity by three experts (IOC = 0.87), and analyzed with a descriptive statistic (percentage). The research was conducted jointly with a multidisciplinary team to analyze and determine the weak points and strong points in the recurrent adverse drug reaction prevention system during the past three years, and 546, 329, and 498 incidences, respectively, were found. Of these, 379, 279, and 302 incidences, or 69.4; 84.80; and 60.64 percent of the patients with drug allergy history, respectively, were found to have caused by incomplete warning system. In addition, differences in practice in caring for patients with drug allergy history were found that did not cover all the steps of the patient care process, especially a lack of repeated checking, and a lack of communication between the multidisciplinary team members. Therefore, the recurrent adverse drug reaction prevention program was developed with complete warning points in the information technology system, the repeated checking step, and communication among related multidisciplinary team members starting from the hospital identity card room, patient history recording officers, nurses, physicians who prescribe the drugs, and pharmacists. Including in the system were surveillance, nursing, recording, and linking the data to referring units. There were also training concerning adverse drug reactions by pharmacists, monthly meetings to explain the process to practice personnel, creating safety culture, random checking of practice, motivational encouragement, supervising, controlling, following up, and evaluating the practice. The rate of prescribing drugs to which patients were allergic per 1,000 prescriptions was 0.08, and the incidence rate of recurrent drug reaction per 1,000 prescriptions was 0. Surveillance of recurrent adverse drug reactions covering all service providing points can ensure safe use of medicine for patients.

Keywords: recurrent drug, adverse reaction, safety, use of medicine

Procedia PDF Downloads 440
3437 Determination of Complexity Level in Okike's Merged Irregular Transposition Cipher

Authors: Okike Benjami, Garba Ejd

Abstract:

Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In other to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often decrypted by adversaries with ease. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Okike’s Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.

Keywords: transposition cipher, merged irregular cipher, encryption, complexity level

Procedia PDF Downloads 279
3436 Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve

Authors: Eun-Jun Yoon

Abstract:

Deniable authentication protocol is a new security authentication mechanism which can enable a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. In 2013, Kar proposed a secure ID-based deniable authentication protocol whose security is based on computational infeasibility of solving Elliptic Curve Diffie-Hellman Problem (ECDHP). Kar claimed that the proposed protocol achieves properties of deniable authentication, mutual authentication, and message confidentiality. However, this paper points out that Kar's protocol still suffers from sender spoofing attack and message modification attack unlike its claims.

Keywords: deniable authentication, elliptic curve cryptography, Diffie-Hellman problem, cryptanalysis

Procedia PDF Downloads 320
3435 Achieving Better Security by Using Nonlinear Cellular Automata as a Cryptographic Primitive

Authors: Swapan Maiti, Dipanwita Roy Chowdhury

Abstract:

Nonlinear functions are essential in different cryptoprimitives as they play an important role on the security of the cipher designs. Rule 30 was identified as a powerful nonlinear function for cryptographic applications. However, an attack (MS attack) was mounted against Rule 30 Cellular Automata (CA). Nonlinear rules as well as maximum period CA increase randomness property. In this work, nonlinear rules of maximum period nonlinear hybrid CA (M-NHCA) are studied and it is shown to be a better crypto-primitive than Rule 30 CA. It has also been analysed that the M-NHCA with single nonlinearity injection proposed in the literature is vulnerable against MS attack, whereas M-NHCA with multiple nonlinearity injections provide maximum length cycle as well as better cryptographic primitives and they are also secure against MS attack.

Keywords: cellular automata, maximum period nonlinear CA, Meier and Staffelbach attack, nonlinear functions

Procedia PDF Downloads 298
3434 The Impact of India’s Centre-State Relations on its Maritime Counter-Terrorism Strategy

Authors: Riddhi Shah

Abstract:

Centre-state relations in India are a fascinating area of studies. The structure of the relationship has an effect on every single aspect of life as we know it in India. This paper is an attempt to study centre-state relations in the context of India’s maritime counter-terrorism strategy. Although the Government of India has not publicly stated its counter-terrorism strategy on the sea; intelligence, information sharing, crisis response, finances for internal security and the nation’s legislation for battling terrorism together comprise of India’s maritime-terrorism strategy. Through study of these areas, the paper argues that the centre-state divide has had systemic implications on India’s maritime security and has largely done more harm than good to collective initiatives that aspire to prevent future risk of terrorism from the sea or on the sea.

Keywords: counter-terrorism, maritime terrorism, India, federalism, centre-state relations

Procedia PDF Downloads 588
3433 Investigation of Cost Effective Double Layered Slab for γ-Ray Shielding

Authors: Kulwinder Singh Mann, Manmohan Singh Heer, Asha Rani

Abstract:

The safe storage of radioactive materials has become an important issue. Nuclear engineering necessitates the safe handling of radioactive materials emitting high energy gamma-rays. Hazards involved in handling radioactive materials insist suitable shielded enclosures. With overgrowing use of nuclear energy for meeting the increasing demand of power, there is a need to investigate the shielding behavior of cost effective shielded enclosure (CESE) made from clay-bricks (CB) and fire-bricks (FB). In comparison to the lead-bricks (conventional-shielding), the CESE are the preferred choice in nuclear waste management. The objective behind the present investigation is to evaluate the double layered transmission exposure buildup factors (DLEBF) for gamma-rays for CESE in energy range 0.5-3MeV. For necessary computations of shielding parameters, using existing huge data regarding gamma-rays interaction parameters of all periodic table elements, two computer programs (GRIC-toolkit and BUF-toolkit) have been designed. It has been found that two-layered slabs show effective shielding for gamma-rays in orientation CB followed by FB than the reverse. It has been concluded that the arrangement, FB followed by CB reduces the leakage of scattered gamma-rays from the radioactive source.

Keywords: buildup factor, clay bricks, fire bricks, nuclear wastage management, radiation protective double layered slabs

Procedia PDF Downloads 393
3432 Time Series Modelling for Forecasting Wheat Production and Consumption of South Africa in Time of War

Authors: Yiseyon Hosu, Joseph Akande

Abstract:

Wheat is one of the most important staple food grains of human for centuries and is largely consumed in South Africa. It has a special place in the South African economy because of its significance in food security, trade, and industry. This paper modelled and forecast the production and consumption of wheat in South Africa in the time covid-19 and the ongoing Russia-Ukraine war by using annual time series data from 1940–2021 based on the ARIMA models. Both the averaging forecast and selected models forecast indicate that there is the possibility of an increase with respect to production. The minimum and maximum growth in production is projected to be between 3million and 10 million tons, respectively. However, the model also forecast a possibility of depression with respect to consumption in South Africa. Although Covid-19 and the war between Ukraine and Russia, two major producers and exporters of global wheat, are having an effect on the volatility of the prices currently, the wheat production in South African is expected to increase and meat the consumption demand and provided an opportunity for increase export with respect to domestic consumption. The forecasting of production and consumption behaviours of major crops play an important role towards food and nutrition security, these findings can assist policymakers and will provide them with insights into the production and pricing policy of wheat in South Africa.

Keywords: ARIMA, food security, price volatility, staple food, South Africa

Procedia PDF Downloads 82
3431 A Multicopy Strategy for Improved Security Wireless Sensor Network

Authors: Tuğçe Yücel

Abstract:

A Wireless Sensor Network(WSN) is a collection of sensor nodes which are deployed randomly in an area for surveillance. Efficient utilization of limited battery energy of sensors for increased network lifetime as well as data security are major design objectives for WSN. Moreover secure transmission of data sensed to a base station for further processing. Producing multiple copies of data packets and sending them on different paths is one of the strategies for this purpose, which leads to redundant energy consumption and hence reduced network lifetime. In this work we develop a restricted multi-copy multipath strategy where data move through ‘frequently’ or ‘heavily’ used sensors is copied by the sensor incident to such central nodes and sent on node-disjoint paths. We develop a mixed integer programing(MIP) model and heuristic approach present some preleminary test results.

Keywords: MIP, sensor, telecommunications, WSN

Procedia PDF Downloads 493
3430 Excitation of Guided Waves in Finite Width Plates Using a Numerical Approach

Authors: Wenbo Duan, Hossein Habibi, Vassilios Kappatos, Cem Selcuk, Tat-Hean Gan

Abstract:

Ultrasonic guided waves are often used to remove ice or fouling in different structures, such as ship hulls, wind turbine blades and so on. To achieve maximum sound power output, it is important that multiple transducers are arranged in a particular way so that a desired mode can be excited. The objective of this paper is thus to provide a theoretical basis for generating a particular mode in a finite width rectangular plate which can be used for removing potential ice or fouling on the plate. The number of transducers and their locations with respect to a particular mode will be investigated, and the link between dispersion curves and practical applications will be explored. To achieve this, a semi-analytical finite element (SAFE) method is used to study the dispersion characteristics of all the modes in the ultrasonic frequency range. The detailed modal shapes will be revealed, and from the modal analysis, the particular mode with the strongest yet continuous transverse and axial displacements on the surfaces of the plate will be chosen for the purpose of removing potential ice or fouling on the plate. The modal analysis is followed by providing information on the number, location and amplitude of transducers needed to excite this particular mode. Modal excitation is then implemented in a standard finite element commercial package, namely COMSOL Multiphysics. Wave motion is visualized in COMSOL, and the mode shapes generated in SAFE is found to be consistent with the mode shapes generated in COMSOL.

Keywords: dispersion analysis, finite width plate, guided wave, modal excitation

Procedia PDF Downloads 457
3429 Knowledge Transfer to Builders in Improving Housing Resilience

Authors: Saima Shaikh, Andre Brown, Wallace Enegbuma

Abstract:

Earthquakes strike both developed and developing countries, causing tremendous damage and the loss of lives of millions of people, mainly due to the collapsing of buildings, particularly in poorer countries. Despite the socio-economic and technological restrictions, the poorer countries have adopted proven and established housing-strengthening techniques from affluent countries. Rural communities are aware of the earthquake-strengthening mechanisms for improving housing resilience, but owing to socio-economic and technological constraints, the seismic guidelines are rarely implemented, resulting in informal construction practice. Unregistered skilled laborers make substantial contributions to the informal construction sector, particularly in rural areas where knowledge is scarce. Laborers employ their local expertise in house construction; however, owing to a lack of seismic expertise in safe building procedures, the authorities' regulated seismic norms are not applied. From the perspective of seismic knowledge transformation in safe buildings practices, the study focuses on the feasibility of seismic guidelines implementation. The study firstly employs a literature review of massive-scale reconstruction after the 2005 earthquake in rural Pakistan. The 2005-earthquake damaged over 400,000 homes, killed 70,000 people and displaced 2.8 million people. The research subsequently corroborated the pragmatic approach using questionnaire field survey among the rural people in 2005-earthquake affected areas. Using the literature and the questionnaire survey, the research analyzing people's perspectives on technical acceptability, financial restrictions, and socioeconomic viability and examines the effectiveness of seismic knowledge transfer in safe buildings practices. The findings support the creation of a knowledge transfer framework in disaster mitigation and recovery planning, assisting rural communities and builders in minimising losses and improving response and recovery, as well as improving housing resilience and lowering vulnerabilities. Finally, certain conclusions are obtained in order to continue the resilience research. The research can be further applied in rural areas of developing countries having similar construction practices.

Keywords: earthquakes, knowledge transfer, resilience, informal construction practices

Procedia PDF Downloads 160
3428 Integrating One Health Approach with National Policies to Improve Health Security post-COVID-19 in Vietnam

Authors: Yasser Sanad, Thu Trang Dao

Abstract:

Introduction: Implementing the One Health (OH) approach requires an integrated, interdisciplinary, and cross-sectoral methodology. OH is a key tool for developing and implementing programs and projects and includes developing ambitious policies that consider the common needs and benefits of human, animal, plant, and ecosystem health. OH helps humanity readjust its path to environmentally friendly and impartial sustainability. As co-leader of the Global Health Security Agenda’s Zoonotic Disease Action Package, Vietnam pioneered a strong OH approach to effectively address early waves of the COVID-19 outbreak in-country. Context and Aim: The repeated surges in COVID-19 in Vietnam challenged the capabilities of the national system and disclosed the gaps in multi-sectoral coordination and resilience. To address this, FHI 360 advocated for the standardization of the OH platform by government actors to increase the resiliency of the system during and post COVID-19. Methods: FHI 360 coordinated technical resources to develop and implement evidence-based OH policies, promoting high-level policy dialogue between the Ministries of Health, Agriculture, and the Environment, and policy research to inform developed policies and frameworks. Through discussions, an OH-building Partnership (OHP) was formed, linking climate change, the environment, and human and animal health. Findings: The OHP Framework created a favorable policy environment within and between sectors, as well as between governments and international health security partners. It also promoted strategic dialogue, resource mobilization, policy advocacy, and integration of international systems with National Steering Committees to ensure accountability and emphasize national ownership. Innovative contribution to policy, practice and/or research: OHP was an effective evidence-based research-to-policy platform linking to the National One Health Strategic Plan (2021-2025). Collectively they serve as a national framework for the implementation and monitoring of OH activities. Through the adoption of policies and plans, the risk of zoonotic pathogens, environmental agent spillover, and antimicrobial resistance can be minimized through strengthening multi-sectoral OH collaboration for health security.

Keywords: one health, national policies, health security, COVID-19, Vietnam

Procedia PDF Downloads 82
3427 Qualitative and Quantitative Analysis of Uranium in Ceramic Tiles Using Laser-Induced Breakdown Spectroscopy and Gamma-Ray Spectroscopy

Authors: Reem M. Altuwirqi, Mohja S. Summan, Entesar A. Ganash, Safia H. Hamidalddin, Tamer E. Youssef, Mohammed A. Gondal

Abstract:

Laser-Induced Breakdown Spectroscopy (LIBS) technique using 1064 nm Nd: YAG laser was optimized and applied for investigating the existence of radioactive elements (uranium) in twenty-six different ceramic tiles. These tiles were collected from the local Saudi market. Qualitative and quantitative analysis for trace radioactive elements like uranium in these samples was achieved using LIBS. The plasma parameters such as temperature and electron density were calculated to confirm that the plasma generated by the tile samples under laser irradiation can be related to analyte concentrations. In order to perform a quantitative analysis, calibration curves were constructed for two uranium lines (U II (424.166 nm) and U II (424.437 nm)). The Uranium activity concentration in Bq/kg for each sample was measured. Cross-validation of LIBS results with a conventional technique such as Gamma-Ray spectroscopy was also carried out for five ceramic samples. The results show that the LIBS method is an effective way of determining radioactive elements such as uranium in ceramic tiles. Moreover, the uranium concentrations of the investigated samples were below the permissible safe limit for building materials in the majority of samples. Such LIBS system could be applied to determine the presence of natural radioactive elements in ceramic tiles and their radioactivity level rapidly to ensure that they are under the safe allowed limit.

Keywords: laser-induced breakdown spectroscopy, gamma-ray spectroscopy, natural radioactivity, uranium, ceramic tiles

Procedia PDF Downloads 158
3426 Off-Policy Q-learning Technique for Intrusion Response in Network Security

Authors: Zheni S. Stefanova, Kandethody M. Ramachandran

Abstract:

With the increasing dependency on our computer devices, we face the necessity of adequate, efficient and effective mechanisms, for protecting our network. There are two main problems that Intrusion Detection Systems (IDS) attempt to solve. 1) To detect the attack, by analyzing the incoming traffic and inspect the network (intrusion detection). 2) To produce a prompt response when the attack occurs (intrusion prevention). It is critical creating an Intrusion detection model that will detect a breach in the system on time and also challenging making it provide an automatic and with an acceptable delay response at every single stage of the monitoring process. We cannot afford to adopt security measures with a high exploiting computational power, and we are not able to accept a mechanism that will react with a delay. In this paper, we will propose an intrusion response mechanism that is based on artificial intelligence, and more precisely, reinforcement learning techniques (RLT). The RLT will help us to create a decision agent, who will control the process of interacting with the undetermined environment. The goal is to find an optimal policy, which will represent the intrusion response, therefore, to solve the Reinforcement learning problem, using a Q-learning approach. Our agent will produce an optimal immediate response, in the process of evaluating the network traffic.This Q-learning approach will establish the balance between exploration and exploitation and provide a unique, self-learning and strategic artificial intelligence response mechanism for IDS.

Keywords: cyber security, intrusion prevention, optimal policy, Q-learning

Procedia PDF Downloads 224
3425 Determining Importance Level of Factors Affecting Selection of Online Shopping Website with AHP: A Research on Young Consumers

Authors: Nurullah Ekmekci, Omer Akkaya, Vural Cagliyan

Abstract:

Increased use of the Internet has resulted in the emergence of a new retail types called online shopping or electronic retail (e-retail). The rapid growth of the Internet has enabled customers to search information about the product and buy these products or services from e-retailers. Although this new form of shopping has grown in a remarkable way because of offering easiness to people, it is not an easy task to capture the success by distinguishing from competitors in this environment which millions of players takes place. For the success, e-retailers should determine the factors which the customers take notice while they are buying from e-retailers. This paper aims to identify the factors that provide preferability for the online shopping websites and the importance levels of these factors. These main criteria which have taken notice are Customer Service Performance (CSP), Website Performance (WSP), Criteria Related to Product (CRP), Ease of Payment (EP), Security/Privacy (SP), Ease of Return (ER), Delivery Service Performance (DSP) and Order Fulfillment Performance (OFP). It has benefited from Analytic Hierarchy Process to determine the priority of the criteria. Based on analysis, Security/Privacy (SP) criteria seems to be most important criterion with 22 % weight. Companies should attach importance to the security and privacy for making their online website more preferable among the online shoppers.

Keywords: AHP (analytical hierarchy process), multi-criteria decision making, online shopping, shopping

Procedia PDF Downloads 229
3424 A Comparative Human Rights Analysis of Expulsion as a Counterterrorism Instrument: An Evaluation of Belgium

Authors: Louise Reyntjens

Abstract:

Where criminal law used to be the traditional response to cope with the terrorist threat, European governments are increasingly relying on administrative paths. The reliance on immigration law fits into this trend. Terrorism is seen as a civilization menace emanating from abroad. In this context, the expulsion of dangerous aliens, immigration law’s core task, is put forward as a key security tool. Governments all over Europe are focusing on removing dangerous individuals from their territory rather than bringing them to justice. This research reflects on the consequences for the expelled individuals’ fundamental rights. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues, igniting the recourse to immigration law as a counterterrorism tool. Yet, they adopt a very different approach on this: the United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand, also 'securitized' its immigration policy after the recent terrorist hit in Stockholm, but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This paper addresses the situation in Belgium. In 2017, the Belgian parliament introduced several legislative changes by which it considerably expanded and facilitated the possibility to expel unwanted aliens. First, the expulsion measure was subjected to new and questionably definitions: a serious attack on the nation’s safety used to be required to expel certain categories of aliens. Presently, mere suspicions suffice to fulfil the new definition of a 'serious threat to national security'. A definition which fails to respond to the principle of legality; the law, nor the prepatory works clarify what is meant by 'a threat to national security'. This creates the risk of submitting this concept’s interpretation almost entirely to the discretion of the immigration authorities. Secondly, in name of intervening more quickly and efficiently, the automatic suspensive appeal for expulsions was abolished. The European Court of Human Rights nonetheless requires such an automatic suspensive appeal under Article 13 and 3 of the Convention. Whether this procedural reform will stand to endure, is thus questionable. This contribution also raises questions regarding expulsion’s efficacy as a key security tool. In a globalized and mobilized world, particularly in a European Union with no internal boundaries, questions can be raised about the usefulness of this measure. Even more so, by simply expelling a dangerous individual, States avoid their responsibility and shift the risk to another State. Criminal law might in these instances be more capable of providing a conclusive and long term response. This contribution explores the human rights consequences of expulsion as a security tool in Belgium. It also offers a critical view on its efficacy for protecting national security.

Keywords: Belgium, counter-terrorism and human rights, expulsion, immigration law

Procedia PDF Downloads 112
3423 Agriculture, Food Security and Poverty Reduction in Nigeria: Cointegration and Granger Causality Approach

Authors: Ogunwole Cecilia Oluwakemi, Timothy Ayomitunde Aderemi

Abstract:

Provision of sufficient food and elimination of abject poverty have usually been the conventional benefits of agriculture in any society. Meanwhile, despite the fact that Nigeria is an agrarian society, food insecurity and poverty have become the issues of concern among both scholars and policymakers in the recent times. Against this backdrop, this study examined the nexus among agriculture, food security, and poverty reduction in Nigeria from 1990 to 2019 within the framework of the Cointegration and Granger Causality approach. Data was collected from the Central Bank of Nigeria Statistical Bulletin and the World Development Indicators, respectively. The following are the major results that emanated from the study. A long run equilibrium relationship exists among agricultural value added, food production index, and GDP per capita in Nigeria. Similarly, there is a unidirectional causality which flows from food production index to poverty reduction in Nigeria. In the same vein, one way causality flows from poverty reduction to agricultural value added in Nigeria. Consequently, this study makes the following recommendation for the policymakers in Nigeria, and other African countries by extension, that agricultural value added and food production are the important variables that cannot be undermined when poverty reduction occupies the central focus of the policymakers. Therefore, any time these policymakers want to reduce poverty, policies that drive agricultural value added and food production should be embarked upon. Therefore, this study will contribute to the literature by establishing the type of linkage that exists between agriculture, food security, and poverty reduction in Nigeria.

Keywords: agriculture, value added, food production, GDP per capita, Nigeria

Procedia PDF Downloads 162
3422 Biometric Recognition Techniques: A Survey

Authors: Shabir Ahmad Sofi, Shubham Aggarwal, Sanyam Singhal, Roohie Naaz

Abstract:

Biometric recognition refers to an automatic recognition of individuals based on a feature vector(s) derived from their physiological and/or behavioral characteristic. Biometric recognition systems should provide a reliable personal recognition schemes to either confirm or determine the identity of an individual. These features are used to provide an authentication for computer based security systems. Applications of such a system include computer systems security, secure electronic banking, mobile phones, credit cards, secure access to buildings, health and social services. By using biometrics a person could be identified based on 'who she/he is' rather than 'what she/he has' (card, token, key) or 'what she/he knows' (password, PIN). In this paper, a brief overview of biometric methods, both unimodal and multimodal and their advantages and disadvantages, will be presented.

Keywords: biometric, DNA, fingerprint, ear, face, retina scan, gait, iris, voice recognition, unimodal biometric, multimodal biometric

Procedia PDF Downloads 743
3421 Developmental Differences of Elementary School Children in Knowledge Acquisition Following a Sexual Abuse Prevention Program

Authors: Chrysanthi Nega, Fotini-Sonia Apergi

Abstract:

Child sexual abuse (CSA) in Greece is a highly prevalent phenomenon and yet remains largely underreported. CSA can negatively impact cognitive, emotional and psychosocial development, as well as personality formation and capacity for initiation and maintenance of healthy interpersonal relationships. It is particularly important for school-based prevention programs to be implemented early in elementary school, as they are reportedly effective in lowering abuse incidences and providing knowledge for coping in threatening environments. The purpose of the current study was to test the effectiveness of a school-based CSA prevention program (Safe-Touches) on Greek elementary school students (grades 1-3, N=272) and explore the effect of age and time of testing (academic term). There was a significant effect of age in the knowledge of Inappropriate Touch, when comparing pre and post-intervention assessments, with third graders showing greatest gains in knowledge, followed by second and first graders. Time of testing during the academic year also had a significant effect, as first graders tested later in the school year, scored higher on knowledge of Inappropriate Touch. The findings of the current study provide insight into the optimal timing to implement CSA prevention programs. Exposure to such programs and incorporation in the school curricula could largely benefit children of the Greek community in terms of safety and awareness.

Keywords: child sexual abuse, Safe-Touches, school-based prevention, schooling

Procedia PDF Downloads 305
3420 Fracking the UK's Shale Gas Regulatory Regime

Authors: Yanal Abul Failat

Abstract:

The production of oil and natural gas from shale formations is becoming a trend, and many countries with technically and economically recoverable unconventional resources are endeavoring to explore how shale formations may benefit the economy and achieve energy security. The trajectory of shale gas development in the UK is highly supported by the government; in the Gas Generation Strategy Paper published by the UK government on 5 December 2013, it is recognized that the shale gas production would decrease reliance on imports and thus enhance the UK’s energy security. Moreover, the UK Institute of Directors report on UK Shale Gas Potential explains that in the UK there is a potential of production peaking at around 1.13 trillion cubic feet (“tcf”) and a sector that could support around 70,000 jobs and secure net benefit to the Treasury in tax revenues. On this basis, there has been a growing interest in the benefits of exploring the UK’s shale gas but a combination of technical challenges faced in shale gas operations, a stern opposition by environmentalists and concerns on the adequacy of the legal framework have slowed the progress of the emerging UK shale industry.

Keywords: shale gas, UK, legal, oil and gas, energy

Procedia PDF Downloads 697
3419 Offshore Facilities Load Out: Case Study of Jacket Superstructure Loadout by Strand Jacking Skidding Method

Authors: A. Rahim Baharudin, Nor Arinee binti Mat Saaud, Muhammad Afiq Azman, Farah Adiba A. Sani

Abstract:

Objectives: This paper shares the case study on the engineering analysis, data analysis, and real-time data comparison for qualifying the stand wires' minimum breaking load and safe working load upon loadout operation for a new project and, at the same time, eliminate the risk due to discrepancies and unalignment of COMPANY Technical Standards to Industry Standards and Practices. This paper demonstrates “Lean Construction” for COMPANY’s Project by sustaining fit-for-purpose Technical Requirements of Loadout Strand Wire Factor of Safety (F.S). The case study utilizes historical engineering data from a few loadout operations by skidding methods from different projects. It is also demonstrating and qualifying the skidding wires' minimum breaking load and safe working load used for loadout operation for substructure and other facilities for the future. Methods: Engineering analysis and comparison of data were taken as referred to the international standard and internal COMPANY standard requirements. Data was taken from nine (9) previous projects for both topsides and jacket facilities executed at the several local fabrication yards where load out was conducted by three (3) different service providers with emphasis on four (4) basic elements: i) Industry Standards for Loadout Engineering and Operation Reference: COMPANY internal standard was referred to superseded documents of DNV-OS-H201 and DNV/GL 0013/ND. DNV/GL 0013/ND and DNVGL-ST-N001 do not mention any requirements of Strand Wire F.S of 4.0 for Skidding / Pulling Operations. ii) Reference to past Loadout Engineering and Execution Package: Reference was made to projects delivered by three (3) major offshore facilities operators. Strand Wire F.S observed ranges from 2.0 MBL (Min) to 2.5 MBL (Max). No Loadout Operation using the requirements of 4.0 MBL was sighted from the reference. iii) Strand Jack Equipment Manufacturer Datasheet Reference: Referring to Strand Jack Equipment Manufactured Datasheet by different loadout service providers, it is shown that the Designed F.S for the equipment is also ranging between 2.0 ~ 2.5. Eight (8) Strand Jack Datasheet Model was referred to, ranging from 15 Mt to 850 Mt Capacity; however, there are NO observations of designed F.S 4.0 sighted. iv) Site Monitoring on Actual Loadout Data and Parameter: Max Load on Strand Wire was captured during 2nd Breakout, which is during Static Condition of 12.9 MT / Strand Wire (67.9% Utilization). Max Load on Strand Wire for Dynamic Conditions during Step 8 and Step 12 is 9.4 Mt / Strand Wire (49.5% Utilization). Conclusion: This analysis and study demonstrated the adequacy of strand wires supplied by the service provider were technically sufficient in terms of strength, and via engineering analysis conducted, the minimum breaking load and safe working load utilized and calculated for the projects were satisfied and operated safely for the projects. It is recommended from this study that COMPANY’s technical requirements are to be revised for future projects’ utilization.

Keywords: construction, load out, minimum breaking load, safe working load, strand jacking, skidding

Procedia PDF Downloads 93
3418 Understanding the Human Element in Cybersecurity: A Literature Review and Recommendations

Authors: Sadiq Nasir

Abstract:

The need for strong cybersecurity measures has been brought to light by society's growing reliance on technology. Cybersecurity breaches continue, with the human aspect playing a crucial role, despite the availability of technology remedies. By analyzing the most recent findings in this area of research on awareness, attitudes, and behaviour, this literature review seeks to comprehend the human element in cybersecurity. A thorough overview of the most recent studies and gaps in the body of knowledge will be determined through a systematic examination of the literature. The paper indicates that in order to address the human component in cybersecurity, a socio-technical strategy is required, and it advocates for additional study in order to fully comprehend the consequences of various interventions. The findings of this study will increase our understanding of cybersecurity and have useful ramifications for companies wanting to strengthen their cybersecurity posture.

Keywords: cybersecurity, cybersecurity awareness, human factor in security, human security

Procedia PDF Downloads 73