Search results for: physical layer wireless security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11128

Search results for: physical layer wireless security

10228 SOTM: A New Cooperation Based Trust Management System for VANET

Authors: Amel Ltifi, Ahmed Zouinkhi, Mohamed Salim Bouhlel

Abstract:

Security and trust management in Vehicular Ad-hoc NETworks (VANET) is a crucial research domain which is the scope of many researches and domains. Although, the majority of the proposed trust management systems for VANET are based on specific road infrastructure, which may not be present in all the roads. Therefore, road security should be managed by vehicles themselves. In this paper, we propose a new Self Organized Trust Management system (SOTM). This system has the responsibility to cut with the spread of false warnings in the network through four principal components: cooperation, trust management, communication and security.

Keywords: ative vehicle, cooperation, trust management, VANET

Procedia PDF Downloads 406
10227 Interdisciplinary Integrated Physical Education Program Using a Philosophical Approach

Authors: Ellie Abdi, Susana Juniu

Abstract:

The purpose of this presentation is to describe an interdisciplinary teaching program that integrates physical education concepts using a philosophical approach. The presentation includes a review of: a) the philosophy of American education, b) the philosophy of sports and physical education, c) the interdisciplinary physical education program, d) professional development programs, (e) the Success of this physical education program, f) future of physical education. This unique interdisciplinary program has been implemented in an urban school physical education discipline in East Orange, New Jersey for over 10 years. During the program the students realize that the bodies go through different experiences. The body becomes a place where a child can recognize in an enjoyable way to express and perceive particular feelings or mental states. Children may distinguish themselves to have high abilities in the social or other domains but low abilities in the field of athletics. The goal of this program for the individuals is to discover new skills, develop and demonstrate age appropriate mastery level at different tasks, therefore the program consists of 9 to 12 sports, including many game. Each successful experience increases the awareness ability. Engaging in sports and physical activities are social movements involving groups of children in situations such as teams, friends, and recreational settings, which serve as a primary socializing agent for teaching interpersonal skills. As a result of this presentation the audience will reflect and explore how to structure a physical education program to integrate interdisciplinary subjects with philosophical concepts.

Keywords: interdisciplinary disciplines, philosophical concepts, physical education, interdisciplinary teaching program

Procedia PDF Downloads 478
10226 Energy Efficient Clustering with Reliable and Load-Balanced Multipath Routing for Wireless Sensor Networks

Authors: Alamgir Naushad, Ghulam Abbas, Shehzad Ali Shah, Ziaul Haq Abbas

Abstract:

Unlike conventional networks, it is particularly challenging to manage resources efficiently in Wireless Sensor Networks (WSNs) due to their inherent characteristics, such as dynamic network topology and limited bandwidth and battery power. To ensure energy efficiency, this paper presents a routing protocol for WSNs, namely, Enhanced Hybrid Multipath Routing (EHMR), which employs hierarchical clustering and proposes a next hop selection mechanism between nodes according to a maximum residual energy metric together with a minimum hop count. Load-balancing of data traffic over multiple paths is achieved for a better packet delivery ratio and low latency rate. Reliability is ensured in terms of higher data rate and lower end-to-end delay. EHMR also enhances the fast-failure recovery mechanism to recover a failed path. Simulation results demonstrate that EHMR achieves a higher packet delivery ratio, reduced energy consumption per-packet delivery, lower end-to-end latency, and reduced effect of data rate on packet delivery ratio when compared with eminent WSN routing protocols.

Keywords: energy efficiency, load-balancing, hierarchical clustering, multipath routing, wireless sensor networks

Procedia PDF Downloads 64
10225 Challenges of Good Government in Enhancing Food Security for Sustainable National Development in Nigeria

Authors: Egboja Simon, Agi Sunday

Abstract:

One of the most important key to success of a nation is to ensure steady development and national economic self - sufficiency and independence. There have been challenges in food security related issues in many developing nations. The problems may be as a result of rise in food price across the globe diminishing global food reserve and erratic weather patterns among other factors. In Nigeria several Agricultural politics have been formulated to curtail food security challenges. Unfortunately, these policies have not yielded the deserved results of increase food production. This paper is designed to identify the various challenges confronting food security in Nigeria with a view of highlighting the reasons that accounting for these problems. This paper also suggests ways of addressing these challenges and concludes by saying that subsidization of the process of farm inputs like fertilizer, improved seed and agro chemicals education of the farmers on modern methods of farming through extension services, improvisation of villages based food storage mechanism and provision of infrastructural facilities in rural areas to facilitate the preservation and easy evacuation of farm produce should be encouraged.

Keywords: governance, security, food, development, conflict, hunger, society, sustainability

Procedia PDF Downloads 309
10224 Investigation of the Relationship between Physical Activity and Stress and Mental Health in the Elderly

Authors: Mohamad Reza Khodabakhsh

Abstract:

Physical activity is important because it affects the stress and mental health of the elderly. The purpose of this research is to examine the relationship between the physical activity of the elderly and stress and mental health. The current research is correlational research, and the studied population includes all the elderly who are engaged in sports in the parks of Mashhad city in 2021. The whole community consists of 200 people. Sampling was done by the headcount method. The tool used in this research is a questionnaire. The physical activity questionnaire is Likert. General GHQ is based on the self-report method. The study method is correlation type to find the relationship between predictor and predicted variables, and the multiple regression method was used for the relationships between the sub-components. And the results showed that physical activity has the effect of reducing the stress of the elderly and improving their mental health. In general, the results of this research indicate the confirmation of the research hypotheses.

Keywords: relationship, physical activity, stress, mental health, elderly

Procedia PDF Downloads 74
10223 The Effect of Physical Activity and Responses of Leptin

Authors: Sh. Khoshemehry, M. J. Pourvaghar, M. E. Bahram

Abstract:

In modern life, daily physical activity is relatively reduced, which is why the incidence of some diseases associated with overweight and obesity, such as hypertension, diabetes and other chronic illnesses, even in young people are observed. Obesity and overweight is one of the most common metabolic disorders in industrialized countries and in developing countries. One consequence of pathological obesity is cardiovascular disease and metabolic syndrome. In the past, it was believed that adipose tissue was ineffective and served only for storing triglycerides. In this review article, it was tried to refer to the esteemed scientific sources about physical activity and responses of leptin.

Keywords: disease, leptin, obesity, physical activity

Procedia PDF Downloads 325
10222 Control Flow around NACA 4415 Airfoil Using Slot and Injection

Authors: Imine Zakaria, Meftah Sidi Mohamed El Amine

Abstract:

One of the most vital aerodynamic organs of a flying machine is the wing, which allows it to fly in the air efficiently. The flow around the wing is very sensitive to changes in the angle of attack. Beyond a value, there is a phenomenon of the boundary layer separation on the upper surface, which causes instability and total degradation of aerodynamic performance called a stall. However, controlling flow around an airfoil has become a researcher concern in the aeronautics field. There are two techniques for controlling flow around a wing to improve its aerodynamic performance: passive and active controls. Blowing and suction are among the active techniques that control the boundary layer separation around an airfoil. Their objective is to give energy to the air particles in the boundary layer separation zones and to create vortex structures that will homogenize the velocity near the wall and allow control. Blowing and suction have long been used as flow control actuators around obstacles. In 1904 Prandtl applied a permanent blowing to a cylinder to delay the boundary layer separation. In the present study, several numerical investigations have been developed to predict a turbulent flow around an aerodynamic profile. CFD code was used for several angles of attack in order to validate the present work with that of the literature in the case of a clean profile. The variation of the lift coefficient CL with the momentum coefficient

Keywords: CFD, control flow, lift, slot

Procedia PDF Downloads 174
10221 Migration and Human Security: An Analysis of a Neglected Ethnic Rohingya's Exodus in Myanmar and Its Regional Security Implications

Authors: Zarina Othman, Bakri Mat, Aini Fatihah Roslam

Abstract:

The Burmese ethnic known as Rohingya is one of the world’s most persecuted ethnic minorities on earth. They have been massacred, discriminated, humiliated, gang-raped, trafficked, abused and neglected. More than one million Rohingyas have been displaced internally and overseas. Currently, Rohingya asylum seekers can be found in India, Bangladesh, Thailand, Malaysia, and Indonesia. This forced migration is unacceptable since the Rohingya are stateless although they have been part of Myanmar for more than one century. Why the Rohingyas crisis is important to be analyse from human security perspectives? Understanding the human security of the Rohingya is important because the crisis may have implication on the regional stability in South and South-East Asia. The objectives of the research are to provide an explanation to the current human security situation in Myanmar, to analyse the regional implication of the Rohingya’s crisis and to recommend the workable solution that may help to reduce the tension. To analyze and demonstrate the case, the research has adopted the BAGHUS or Bangi Human Security Approach, a Southeast Asian human security model, designed to protect the weakest and the vital core of human life across national borders. Based on a qualitative research, and a review of literature from secondary sources of books, reports and academic journals, the research has conducted interviews with 1) Rohingya respondents in Cox’s Baza in February 2017; 2) experts and scholars in the field in Bangladesh, Myanmar and Malaysia. Preliminary findings suggest that conflicts lead to displacement and migration across borders, human insecurity is an issue where the implementation of human rights is too slow to take place even in sovereign state like Myanmar. The political and economic interests of many extraregional powers have further contributed to the current crisis. Human security perspectives is suggested as the workable solution for stability and peace in the region.

Keywords: human security, migration, Myanmar, regional security, Rohingya

Procedia PDF Downloads 138
10220 Importance of Human Factors on Cybersecurity within Organizations: A Study of Attitudes and Behaviours

Authors: Elham Rajabian

Abstract:

The ascent of cybersecurity incidents is a rising threat to most organisations in general, while the impact of the incidents is unique to each of the organizations. It is a need for behavioural sciences to concentrate on employees’ behaviour in order to prepare key security mitigation opinions versus cybersecurity incidents. There are noticeable differences among users of a computer system in terms of complying with security behaviours. We can discuss the people's differences under several subjects such as delaying tactics on something that must be done, the tendency to act without thinking, future thinking about unexpected implications of present-day issues, and risk-taking behaviours in security policies compliance. In this article, we introduce high-profile cyber-attacks and their impacts on weakening cyber resiliency in organizations. We also give attention to human errors that influence network security. Human errors are discussed as a part of psychological matters to enhance compliance with the security policies. The organizational challenges are studied in order to shape a sustainable cyber risks management approach in the related work section. Insiders’ behaviours are viewed as a cyber security gap to draw proper cyber resiliency in section 3. We carry out the best cybersecurity practices by discussing four CIS challenges in section 4. In this regard, we provide a guideline and metrics to measure cyber resilience in organizations in section 5. In the end, we give some recommendations in order to build a cybersecurity culture based on individual behaviours.

Keywords: cyber resilience, human factors, cybersecurity behavior, attitude, usability, security culture

Procedia PDF Downloads 78
10219 Location Tracking of Human Using Mobile Robot and Wireless Sensor Networks

Authors: Muazzam A. Khan

Abstract:

In order to avoid dangerous environmental disasters, robots are being recognized as good entrants to step in as human rescuers. Robots has been gaining interest of many researchers in rescue matters especially which are furnished with advanced sensors. In distributed wireless robot system main objective for a rescue system is to track the location of the object continuously. This paper provides a novel idea to track and locate human in disaster area using stereo vision system and ZigBee technology. This system recursively predict and updates 3D coordinates in a robot coordinate camera system of a human which makes the system cost effective. This system is comprised of ZigBee network which has many advantages such as low power consumption, self-healing low data rates and low cost.

Keywords: stereo vision, segmentation, classification, human tracking, ZigBee module

Procedia PDF Downloads 473
10218 Implementation of a Web-Based Wireless ECG Measuring and Recording System

Authors: Onder Yakut, Serdar Solak, Emine Dogru Bolat

Abstract:

Measuring the Electrocardiogram (ECG) signal is an essential process for the diagnosis of the heart diseases. The ECG signal has the information of the degree of how much the heart performs its functions. In medical diagnosis and treatment systems, Decision Support Systems processing the ECG signal are being developed for the use of clinicians while medical examination. In this study, a modular wireless ECG (WECG) measuring and recording system using a single board computer and e-Health sensor platform is developed. In this designed modular system, after the ECG signal is taken from the body surface by the electrodes first, it is filtered and converted to digital form. Then, it is recorded to the health database using Wi-Fi communication technology. The real time access of the ECG data is provided through the internet utilizing the developed web interface.

Keywords: ECG, e-health sensor shield, Raspberry Pi, wiFi technology

Procedia PDF Downloads 379
10217 Voice over IP Quality of Service Evaluation for Mobile Ad Hoc Network in an Indoor Environment for Different Voice Codecs

Authors: Lina Abou Haibeh, Nadir Hakem, Ousama Abu Safia

Abstract:

In this paper, the performance and quality of Voice over IP (VoIP) calls carried over a Mobile Ad Hoc Network (MANET) which has a number of SIP nodes registered on a SIP Proxy are analyzed. The testing campaigns are carried out in an indoor corridor structure having a well-defined channel’s characteristics and model for the different voice codecs, G.711, G.727 and G.723.1. These voice codecs are commonly used in VoIP technology. The calls’ quality are evaluated using four Quality of Service (QoS) metrics, namely, mean opinion score (MOS), jitter, delay, and packet loss. The relationship between the wireless channel’s parameters and the optimum codec is well-established. According to the experimental results, the voice codec G.711 has the best performance for the proposed MANET topology

Keywords: wireless channel modelling, Voip, MANET, session initiation protocol (SIP), QoS

Procedia PDF Downloads 208
10216 A Secure Digital Signature Scheme with Fault Tolerance Based on the Improved RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. In this paper, we propose a secure and efficient digital signature scheme with fault tolerance based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains three prime numbers and overcome several attacks possible on RSA. By using the Chinese Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption side and it provides high security also.

Keywords: digital signature, fault tolerance, RSA, security analysis

Procedia PDF Downloads 459
10215 Enhanced Model for Risk-Based Assessment of Employee Security with Bring Your Own Device Using Cyber Hygiene

Authors: Saidu I. R., Shittu S. S.

Abstract:

As the trend of personal devices accessing corporate data continues to rise through Bring Your Own Device (BYOD) practices, organizations recognize the potential cost reduction and productivity gains. However, the associated security risks pose a significant threat to these benefits. Often, organizations adopt BYOD environments without fully considering the vulnerabilities introduced by human factors in this context. This study presents an enhanced assessment model that evaluates the security posture of employees in BYOD environments using cyber hygiene principles. The framework assesses users' adherence to best practices and guidelines for maintaining a secure computing environment, employing scales and the Euclidean distance formula. By utilizing this algorithm, the study measures the distance between users' security practices and the organization's optimal security policies. To facilitate user evaluation, a simple and intuitive interface for automated assessment is developed. To validate the effectiveness of the proposed framework, design science research methods are employed, and empirical assessments are conducted using five artifacts to analyze user suitability in BYOD environments. By addressing the human factor vulnerabilities through the assessment of cyber hygiene practices, this study aims to enhance the overall security of BYOD environments and enable organizations to leverage the advantages of this evolving trend while mitigating potential risks.

Keywords: security, BYOD, vulnerability, risk, cyber hygiene

Procedia PDF Downloads 58
10214 How to Ensure Environmental Sustainability and Food Security through the Use of Payments for Environmental Services in Developing Countries

Authors: Carlos Alves

Abstract:

This research paper demonstrates how payments for environmental services (PES) can be an effective mechanism to combat food insecurity and reduce environmental degradation in developing countries. The paper begins by discussing how environmental services affect each one of the pillars of food security: availability, access, and utilization of food. However, due to numerous global environmental challenges, a new pillar of food security based on environmental sustainability is proposed and discussed. An argument is then made that PES can usefully combat food insecurity. It can provide an extra income to those who take on environmental service and help them to have a better access to food. In order to be successful in addressing food insecurity, PES schemes should target on the poor and redress issues that can prevent their effectiveness. Finally, the research presents a case study that discusses how several developing countries addressed problems and successfully developed PES programs.

Keywords: environmental sustainability, food security, nutrition, payments for environmental services

Procedia PDF Downloads 376
10213 Engineering of Stable and Improved Electrochemical Activities of Redox Dominating Charge Storage Electrode Materials

Authors: Girish Sambhaji Gund

Abstract:

The controlled nanostructure growth and its strong coupling with the current collector are key factors to achieve good electrochemical performance of faradaic-dominant electroactive materials. We employed binder-less and additive-free hydrothermal and physical vapor doping methods for the synthesis of nickel (Ni) and cobalt (Co) based compounds nanostructures (NiO, NiCo2O4, NiCo2S4) deposited on different conductive substrates such as carbon nanotube (CNT) on stainless steel, and reduced graphene oxide (rGO) and N-doped rGO on nickel foam (NF). The size and density of Ni- and Co-based compound nanostructures are controlled through the strong coupling with carbon allotropes on stainless steel and NF substrates. This controlled nanostructure of Ni- and Co-based compounds with carbon allotropes leads to stable faradaic electrochemical reactions at the material/current collector interface and within the electrode, which is consequence of strong coupling of nanostructure with functionalized carbon surface as a buffer layer. Thus, it is believed that the results provide the synergistic approaches to stabilize electrode materials physically and chemically, and hence overall electrochemical activity of faradaic dominating battery-type electrode materials through buffer layer engineering.

Keywords: metal compounds, carbon allotropes, doping, electrochemicstry, hybrid supercapacitor

Procedia PDF Downloads 60
10212 Effect of Resistance Training on Muscle Strength, IGF₁, and Physical Performance of Volleyball Players

Authors: Menan M. Elsayed, Hussein A. Heshmat

Abstract:

The aim of the study is to assess the effect of resistance training on muscle strength and physical performance of volleyball players of Physical Education College, Helwan University. The researcher used the experimental method of pre-post measurements of one group of 10 volleyball players. The execution of the program was through the period of 12/8/2018 to 12/10/2018; included 24 training units, 3 training units weekly for 8 weeks. The training program revealed an improvement in post measurement of muscle strength, IGF₁ (insulin-like growth factor 1), and physical performance of players. It may be concluded that the resistance training may include changes in hormones and muscle fibers leading to hypertrophy of the muscle and physical performance. It is recommended to use the results of the study in rationing the loads and training programs.

Keywords: IGF₁, muscle strength, physical performance, resistance training, volleyball players

Procedia PDF Downloads 175
10211 The Response of Optical Properties to Temperature in Three-Layer Micro Device Under Influence of Casimir Force

Authors: Motahare Aali, Fatemeh Tajik

Abstract:

Here, we investigate the sensitivity the Casimir force and consequently dynamical actuation of a three-layer microswitch to some ambient conditions. In fact, we have considered the effect of optical properties on the stable operation of the microswitch for both good (e.g. metals) and poor conductors via a three layer Casimir oscillator. Indeed, gold (Au) has been chosen as a good conductor which is widely used for Casimir force measurements, and highly doped conductive silicon carbide (SiC) has been considered as a poor conductor which is a promising material for device operating under harsh environments. Also, the intervening stratum is considered ethanol or water. It is also supposed that the microswitches are frictionless and autonomous. Using reduction factor diagrams and bifurcation curves, it has been shown how performance of the microswitches is sensitive to temperature and intervening stratum, moreover it is investigated how the conductivity of the components can affect this sensitivity.

Keywords: Casimir force, optical properties, Lifshitz theory, dielectric function

Procedia PDF Downloads 72
10210 Optimized Cluster Head Selection Algorithm Based on LEACH Protocol for Wireless Sensor Networks

Authors: Wided Abidi, Tahar Ezzedine

Abstract:

Low-Energy Adaptive Clustering Hierarchy (LEACH) has been considered as one of the effective hierarchical routing algorithms that optimize energy and prolong the lifetime of network. Since the selection of Cluster Head (CH) in LEACH is carried out randomly, in this paper, we propose an approach of electing CH based on LEACH protocol. In other words, we present a formula for calculating the threshold responsible for CH election. In fact, we adopt three principle criteria: the remaining energy of node, the number of neighbors within cluster range and the distance between node and CH. Simulation results show that our proposed approach beats LEACH protocol in regards of prolonging the lifetime of network and saving residual energy.

Keywords: wireless sensors networks, LEACH protocol, cluster head election, energy efficiency

Procedia PDF Downloads 319
10209 Basics of SCADA Security: A Technical Approach

Authors: Michał Witas

Abstract:

This paper presents a technical approach to analysis of security of SCADA systems. Main goal of the paper is to make SCADA administrators aware of risks resulting from SCADA systems usage and to familiarize with methods that can be adopt to existing or planned system, to increase overall system security level. Because SCADA based systems become a industrial standard, more attention should be paid to the security of that systems. Industrial Control Systems (ICS) like SCADA are responsible for controlling crucial aspects of wide range of industrial processes. In pair with that responsibility, goes a lot of money that can be earned or lost – this fact is main reason of increased interest of attackers. Additionally ICS are often responsible for maintaining resources strategic from the point of view of national economy, like electricity (including nuclear power plants), heating, water resources or military facilities, so they can be targets of terrorist cybernetic attacks. Without proper risk analysis and management, vulnerabilities resulting from the usage of SCADA can be easily exploited by potential attacker. Paper is based mostly on own experience in systems security, gathered during academic studies and professional work in international company. As title suggests, it will cover only basics of topic, because every of points mentioned in the document can be base for additional research and papers.

Keywords: denial of service, SCADA, security policy, distributed network

Procedia PDF Downloads 353
10208 Beam Deflection with Unidirectionality Due to Zeroth Order and Evanescent Wave Coupling in a Photonic Crystal with a Defect Layer without Corrugations under Oblique Incidence

Authors: Evrim Colak, Andriy E. Serebryannikov, Thore Magath, Ekmel Ozbay

Abstract:

Single beam deflection and unidirectional transmission are examined for oblique incidence in a Photonic Crystal (PC) structure which employs defect layer instead of surface corrugations at the interfaces. In all of the studied cases, the defect layer is placed such that the symmetry is broken. Two types of deflection are observed depending on whether the zeroth order is coupled or not. These two scenarios can be distinguished from each other by considering the simulated field distribution in PC. In the first deflection type, Floquet-Bloch mode enables zeroth order coupling. The energy of the zeroth order is redistributed between the diffraction orders at the defect layer, providing deflection. In the second type, when zeroth order is not coupled, strong diffractions cause blazing and the evanescent waves deliver energy to higher order diffraction modes. Simulated isofrequency contours can be utilized to estimate the coupling behavior. The defect layer is placed at varying rows, preserving the asymmetry of PC while evancescent waves can still couple to higher order modes. Even for deeply buried defect layer, asymmetric transmission and beam deflection are still encountered when the zeroth order is not coupled. We assume ε=11.4 (refractive index close to that of GaAs and Si) for the PC rods. A possible operation wavelength can be within microwave and infrared range. Since the suggested material is low loss, the structure can be scaled down to operate higher frequencies. Thus, a sample operation wavelength is selected as 1.5μm. Although the structure employs no surface corrugations transmission value T≈0.97 can be achieved by means of diffraction order m=-1. Moreover, utilizing an extra line defect, T value can be increased upto 0.99, under oblique incidence even if the line defect layer is deeply embedded in the photonic crystal. The latter configuration can be used to obtain deflection in one frequency range and can also be utilized for the realization of another functionality like defect-mode wave guiding in another frequency range but still using the same structure.

Keywords: asymmetric transmission, beam deflection, blazing, bi-directional splitting, defect layer, dual beam splitting, Floquet-Bloch modes, isofrequency contours, line defect, oblique incidence, photonic crystal, unidirectionality

Procedia PDF Downloads 246
10207 The Role of Physical Capital on the Accessibility of Livelihood of Indigenous People

Authors: Anjli Pathak, Harshit Sosan Lakra, Smriti Mishra

Abstract:

The increasing urbanization affects the external environment in which people exist and imposes livelihood vulnerability to shocks and stresses. Although research on the linkages between urbanization and vulnerability has been increasing, only a few studies have examined the caste/ethnicity in livelihood vulnerability. In this study, we explore how physical capital influences vulnerability among indigenous people in the context of livelihood. The study identifies the dimensions and indicators of physical capital that influence the profile of household vulnerability in the livelihood-building process. The result identified five dimensions and 19 indicators of livelihood vulnerability. The study also visualizes the inter-relationship between physical capital and other livelihood capital in formulating the livelihood vulnerability framework.

Keywords: urbanization, livelihood vulnerability, indigenous people, physical capital

Procedia PDF Downloads 56
10206 The Contribution of the Lomé Charter to Combating Trafficking in Persons at Sea: Nigerian and South African Legal Perspective

Authors: Obinna Emmanuel Nkomadu

Abstract:

A major maritime problem in the African continent is the widespread proliferation of threats to maritime security, and one of which is the traffic in persons (TIP) at sea, which victims are sometimes assaulted, injured, killed, and in many cases go missing. The South African and Nigerian law on TIP at sea is the Prevention and Combating of Trafficking in Persons Act and the Trafficking in Persons (Prohibition) Enforcement and Administration Act, respectively. These legislation prohibits TIP at sea but does not provides effective and efficient national coordination structures and international cooperation measures against traffickers who engage on human trafficking on the African maritime domain. As a result of the limitations on the maritime security laws of most African States and the maritime security threats on the continent, the African Union in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (Lome Charter). The Lomé Charter provides mechanisms for national and international cooperation on maritime security threats, including TIP at sea. However, the Charter is yet to come into force due to the number of States required to accede or ratify the Charter. This paper identifies gaps on existing instruments on TIP at sea by those States and justify on South Africa and Nigeria should adopt the Charter. The justification flow from analysing relevant international law instruments, as well as legislation on human trafficking.

Keywords: cooperation against trafficking in persons at sea, lomé charter, maritime security, Nigerian legislation on trafficking in persons, South African legislation on trafficking in person, and trafficking in persons at sea

Procedia PDF Downloads 133
10205 To Assess Variables Related to Self-Efficacy for Increasing Physical Activity in Advanced-Stage Cancer Patients

Authors: S. Nikpour, S. Vahidi, H. Haghani

Abstract:

Introduction: Exercise has mental and physical health benefits for patients with advanced stage cancer who actively receive chemotherapy, yet little is known about patients’ levels of interest in becoming more active or their confidence in increasing their activity level. Methods and materials: A convenience sample of 200 patients with advanced-stage cancer who were receiving chemotherapy completed self-report measures assessing physical activity level, mood, and quality-of-life variables. Qualitative data on patient-perceived benefits of, and barriers to, physical activity also were collected, coded by independent raters, and organized by predominant themes. Results: Current physical activity level, physical activity outcome expectations, and positive mood were significantly associated with self-efficacy. Fatigue was the most frequently listed barrier to physical activity; improved physical strength and health were the most commonly listed benefits. Participants identified benefits related to both general health and cancer-symptom management that were related to exercise. 59.5% of participants reported that they were seriously planning to increase or maintain their physical activity level, and over 40% reported having interest in receiving an intervention to become more active. Conclusion: These results suggested that many advanced-stage cancer patients who receive chemotherapy are interested in maintaining or increasing their physical activity level and in receiving professional support for exercise. In addition, these individuals identified general health and cancer-specific benefits of, and barriers to, physical activity. Future research will investigate how these findings may be incorporated into physical activity interventions for advanced-stage oncology patients receiving medical treatment.

Keywords: physical activity, cancer, self-efficacy

Procedia PDF Downloads 519
10204 Single Layer Carbon Nanotubes Array as an Efficient Membrane for Desalination: A Molecular Dynamics Study

Authors: Elisa Y. M. Ang, Teng Yong Ng, Jingjie Yeo, Rongming Lin, Zishun Liu, K. R. Geethalakshmi

Abstract:

By stacking carbon nanotubes (CNT) one on top of another, single layer CNT arrays can perform water-salt separation with ultra-high permeability and selectivity. Such outer-wall CNT slit membrane is named as the transverse flow CNT membrane. By adjusting the slit size between neighboring CNTs, the membrane can be configured to sieve out different solutes, right down to the separation of monovalent salt ions from water. Molecular dynamics (MD) simulation results show that the permeability of transverse flow CNT membrane is more than two times that of conventional axial-flow CNT membranes, and orders of magnitude higher than current reverse osmosis membrane. In addition, by carrying out MD simulations with different CNT size, it was observed that the variance in desalination performance with CNT size is small. This insensitivity of the transverse flow CNT membrane’s performance to CNT size is a distinct advantage over axial flow CNT membrane designs. Not only does the membrane operate well under constant pressure desalination operation, but MD simulations further indicate that oscillatory operation can further enhance the membrane’s desalination performance, making it suitable for operation such as electrodialysis reversal. While there are still challenges that need to be overcome, particularly on the physical fabrication of such membrane, it is hope that this versatile membrane design can bring the idea of using low dimensional structures for desalination closer to reality.

Keywords: carbon nanotubes, membrane desalination, transverse flow carbon nanotube membrane, molecular dynamics

Procedia PDF Downloads 177
10203 Magnetoelectric Effect in Polyvinylidene Fluoride Beta Phase Thin Films

Authors: Belouadah Rabah, Guyomar Daneil, Guiffard Benoit

Abstract:

The magnetoelectric (ME) materials has dielectric polarization induced by the magnetic field or induced magnetization under an electric field. A strong ME effect requires the simultaneous presence of magnetic moments and electric dipoles. In the last decades, extensive research has been conducted on the ME effect in single phase and composite materials. This article reported the results obtained with two samples, the first is mono layer of PVDF bi-stretched and the second is the multi layer PVDF bi-stretched with the Polyurethane filled with micro particles magnetic Fe3O4 (PU+2% Fe3O4). Compare with non ME material like Alumine, a large ME polarization coefficient for the two samples was obtained. The piezoelectric properties of the PVDF and elastic proprieties of Pu+2% Fe3O4 give a big linear ME coefficient of the multi layer PVDF/(Pu+2% Fe3O4) than in the monolayer of PVDF.

Keywords: magnetoelectric effect, polymers, magnetic particles, composites, films

Procedia PDF Downloads 382
10202 User Authentication Using Graphical Password with Sound Signature

Authors: Devi Srinivas, K. Sindhuja

Abstract:

This paper presents architecture to improve surveillance applications based on the usage of the service oriented paradigm, with smart phones as user terminals, allowing application dynamic composition and increasing the flexibility of the system. According to the result of moving object detection research on video sequences, the movement of the people is tracked using video surveillance. The moving object is identified using the image subtraction method. The background image is subtracted from the foreground image, from that the moving object is derived. So the Background subtraction algorithm and the threshold value is calculated to find the moving image by using background subtraction algorithm the moving frame is identified. Then, by the threshold value the movement of the frame is identified and tracked. Hence, the movement of the object is identified accurately. This paper deals with low-cost intelligent mobile phone-based wireless video surveillance solution using moving object recognition technology. The proposed solution can be useful in various security systems and environmental surveillance. The fundamental rule of moving object detecting is given in the paper, then, a self-adaptive background representation that can update automatically and timely to adapt to the slow and slight changes of normal surroundings is detailed. While the subtraction of the present captured image and the background reaches a certain threshold, a moving object is measured to be in the current view, and the mobile phone will automatically notify the central control unit or the user through SMS (Short Message System). The main advantage of this system is when an unknown image is captured by the system it will alert the user automatically by sending an SMS to user’s mobile.

Keywords: security, graphical password, persuasive cued click points

Procedia PDF Downloads 521
10201 Comprehensive Analysis of Power Allocation Algorithms for OFDM Based Communication Systems

Authors: Rakesh Dubey, Vaishali Bahl, Dalveer Kaur

Abstract:

The spiralling urge for high rate data transmission over wireless mediums needs intelligent use of electromagnetic resources considering restrictions like power ingestion, spectrum competence, robustness against multipath propagation and implementation intricacy. Orthogonal frequency division multiplexing (OFDM) is a capable technique for next generation wireless communication systems. For such high rate data transfers there is requirement of proper allocation of resources like power and capacity amongst the sub channels. This paper illustrates various available methods of allocating power and the capacity requirement with the constraint of Shannon limit.

Keywords: Additive White Gaussian Noise, Multi-Carrier Modulation, Orthogonal Frequency Division Multiplexing (OFDM), Signal to Noise Ratio (SNR), Water Filling

Procedia PDF Downloads 536
10200 Optimization of a Hand-Fan Shaped Microstrip Patch Antenna by Means of Orthogonal Design Method of Design of Experiments for L-Band and S-Band Applications

Authors: Jaswinder Kaur, Nitika, Navneet Kaur, Rajesh Khanna

Abstract:

A hand-fan shaped microstrip patch antenna (MPA) for L-band and S-band applications is designed, and its characteristics have been reconnoitered. The proposed microstrip patch antenna with double U-slot defected ground structure (DGS) is fabricated on an FR4 substrate which is a very readily available and inexpensive material. The suggested antenna is optimized using Orthogonal Design Method (ODM) of Design of Experiments (DOE) to cover the frequency range from 0.91-2.82 GHz for L-band and S-band applications. The L-band covers the frequency range of 1-2 GHz, which is allocated to telemetry, aeronautical, and military systems for passive satellite sensors, weather radars, radio astronomy, and mobile communication. The S-band covers the frequency range of 2-3 GHz, which is used by weather radars, surface ship radars and communication satellites and is also reserved for various wireless applications such as Worldwide Interoperability for Microwave Access (Wi-MAX), super high frequency radio frequency identification (SHF RFID), industrial, scientific and medical bands (ISM), Bluetooth, wireless broadband (Wi-Bro) and wireless local area network (WLAN). The proposed method of optimization is very time efficient and accurate as compared to the conventional evolutionary algorithms due to its statistical strategy. Moreover, the antenna is tested, followed by the comparison of simulated and measured results.

Keywords: design of experiments, hand fan shaped MPA, L-Band, orthogonal design method, S-Band

Procedia PDF Downloads 116
10199 Mutual Coupling Reduction between Patch Antenna Array Elements Using Metamaterial Z Shaped Resonators

Authors: Oossama Tabbabi, Mondher Labidi, Fethi Choubani, J. David

Abstract:

Modern wireless communication systems require compact design, low cost and simple structure antennas to insure reliability, agility, and high efficiency characteristics. This paper presents a microstrip antenna array designed for 8 GHz applications. To reduce the mutual coupling effects, a Z shape metamaterial structure was imprinted in the microstrip antenna array composed of two elements. Simulation results show the improvement of mutual coupling by adding Z shape metamaterial structure to the antenna substrate. The proposed structure reduces mutual coupling by 19 dB. The simulation has been performed by using HFSS simulator.

Keywords: antenna array, compact design, modern wireless communication, mutual coupling effects

Procedia PDF Downloads 333