Search results for: communication with physical layer security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14017

Search results for: communication with physical layer security

13087 Enhancing Healthcare Data Protection and Security

Authors: Joseph Udofia, Isaac Olufadewa

Abstract:

Everyday, the size of Electronic Health Records data keeps increasing as new patients visit health practitioner and returning patients fulfil their appointments. As these data grow, so is their susceptibility to cyber-attacks from criminals waiting to exploit this data. In the US, the damages for cyberattacks were estimated at $8 billion (2018), $11.5 billion (2019) and $20 billion (2021). These attacks usually involve the exposure of PII. Health data is considered PII, and its exposure carry significant impact. To this end, an enhancement of Health Policy and Standards in relation to data security, especially among patients and their clinical providers, is critical to ensure ethical practices, confidentiality, and trust in the healthcare system. As Clinical accelerators and applications that contain user data are used, it is expedient to have a review and revamp of policies like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Fast Healthcare Interoperability Resources (FHIR), all aimed to ensure data protection and security in healthcare. FHIR caters for healthcare data interoperability, FHIR caters to healthcare data interoperability, as data is being shared across different systems from customers to health insurance and care providers. The astronomical cost of implementation has deterred players in the space from ensuring compliance, leading to susceptibility to data exfiltration and data loss on the security accuracy of protected health information (PHI). Though HIPAA hones in on the security accuracy of protected health information (PHI) and PCI DSS on the security of payment card data, they intersect with the shared goal of protecting sensitive information in line with industry standards. With advancements in tech and the emergence of new technology, it is necessary to revamp these policies to address the complexity and ambiguity, cost barrier, and ever-increasing threats in cyberspace. Healthcare data in the wrong hands is a recipe for disaster, and we must enhance its protection and security to protect the mental health of the current and future generations.

Keywords: cloud security, healthcare, cybersecurity, policy and standard

Procedia PDF Downloads 71
13086 Investigation of Various Variabilities of Attitudes toward Teaching as a Profession Levels of Physical Education and Sports School Students

Authors: Turan Cetinkaya, Abdurrahman Kırtepe

Abstract:

The aim of this study is to determine the relation of the level attitudes toward teaching as a profession to various variables of the students in physical education and sports departments. 277 students who are studying at the departments of physical education and sports teaching, sports management and coaching in Ahi Evran University, College of Physical Education and Sports participated to the research. Personal information tool and teaching profession scale consisting 34 items were used as data collection tool in the research. Distribution, frequency, t test and anova test were used in comparison of the related data. As a result of statistical analysis, attitudes toward teaching as a profession levels do not differ according to gender, but significant differences were detected in the exercise regularly and department.

Keywords: teaching profession, attitude, physical education and sports students, university students

Procedia PDF Downloads 275
13085 Electrodeposition of NiO Films from Organic Solvent-Based Electrolytic Solutions for Solar Cell Application

Authors: Thierry Pauporté, Sana Koussi, Fabrice Odobel

Abstract:

The preparation of semiconductor oxide layers and structures by soft techniques is an important field of research. Higher performances are expected from the optimizing of the oxide films and then use of new methods of preparation for a better control of their chemical, morphological, electrical and optical properties. We present the preparation of NiO by electrodeposition from pure polar aprotic medium and mixtures with water. The effect of the solvent, of the electrochemical deposition parameters and post-deposition annealing treatment on the structural, morphological and optical properties of the films is investigated. We remarkably show that the solvent is inserted in the deposited layer and act as a blowing agent, giving rise to mesoporous films after elimination by thermal annealing. These layers of p-type oxide have been successfully used, after sensitization by a dye, in p-type dye-sensitized solar cells. The effects of the solvent on the layer properties and the application of these layers in p-type dye-sensitized solar cells are described.

Keywords: NiO, layer, p-type sensitized solar cells, electrodeposition

Procedia PDF Downloads 283
13084 Measurement and Evaluation Patterns Practiced by Physical Education Teachers in North Badia in Jordan

Authors: Aman Kasawneh, Wasfi Khazalah, Abedalbasit Abedalhafiz

Abstract:

This study aimed to identify the patterns of measurement and evaluation practiced by physical education in the schools of North Badia in Jordan, as well as identifying the statistical differences according to gender, educational qualification, and the experience. The sample consisted of 118 physical education teachers 58 males and 60 females chosen randomly from the schools of North Badia in Jordan. The completed a questionnaire developed by the researchers after verifying its validity and reliability. The results indicated a clear weakness in the practice of measurement and evaluation patterns by physical education teachers. Also no significant differences were found between male and female teachers, however, significant differences were found between bachelor degree holders and their counter parts and between teachers with less than eight years of experience. The researchers recommended the necessity of preparing the P.E teachers regarding the patterns of measurement and evaluation within the sport field as one of the essentials for improving and developing physical education at schools.

Keywords: evaluation, measurement, evaluation, physical education teacher, Jordanian

Procedia PDF Downloads 447
13083 Perfectly Matched Layer Boundary Stabilized Using Multiaxial Stretching Functions

Authors: Adriano Trono, Federico Pinto, Diego Turello, Marcelo A. Ceballos

Abstract:

Numerical modeling of dynamic soil-structure interaction problems requires an adequate representation of the unbounded characteristics of the ground, material non-linearity of soils, and geometrical non-linearities such as large displacements due to rocking of the structure. In order to account for these effects simultaneously, it is often required that the equations of motion are solved in the time domain. However, boundary conditions in conventional finite element codes generally present shortcomings in fully absorbing the energy of outgoing waves. In this sense, the Perfectly Matched Layers (PML) technique allows a satisfactory absorption of inclined body waves, as well as surface waves. However, the PML domain is inherently unstable, meaning that it its instability does not depend upon the discretization considered. One way to stabilize the PML domain is to use multiaxial stretching functions. This development is questionable because some Jacobian terms of the coordinate transformation are not accounted for. For this reason, the resulting absorbing layer element is often referred to as "uncorrected M-PML” in the literature. In this work, the strong formulation of the "corrected M-PML” absorbing layer is proposed using multiaxial stretching functions that incorporate all terms of the coordinate transformation. The results of the stable model are compared with reference solutions obtained from extended domain models.

Keywords: mixed finite elements, multiaxial stretching functions, perfectly matched layer, soil-structure interaction

Procedia PDF Downloads 60
13082 Nice Stadium: Design of a Flat Single Layer ETFE Roof

Authors: A. Escoffier, A. Albrecht, F. Consigny

Abstract:

In order to host the Football Euro in 2016, many French cities have launched architectural competitions in recent years to improve the quality of their stadiums. The winning project in Nice was designed by Wilmotte architects together with Elioth structural engineers. It has a capacity of 35,000 seats. Its roof structure consists of a complex 3D shape timber and steel lattice and is covered by 25,000m² of ETFE, 10,500m² of PES-PVC fabric and 8,500m² of photovoltaic panels. This paper focuses on the ETFE part of the cover. The stadium is one of the first constructions to use flat single layer ETFE on such a big area. Due to its relatively recent appearance in France, ETFE structures are not yet covered by any regulations and the existing codes for fabric structures cannot be strictly applied. Rather, they are considered as cladding systems and therefore have to be approved by an “Appréciation Technique d’Expérimentation” (ATEx), during which experimental tests have to be performed. We explain the method that we developed to justify the ETFE, which eventually led to bi-axial tests to clarify the allowable stress in the film.

Keywords: biaxial test, creep, ETFE, single layer, stadium roof

Procedia PDF Downloads 231
13081 The Relationship among Attachment Styles, Humor Styles and Communication Patterns in Female Married Students

Authors: Elham Fathi, Seyed Mohammad Kalantarkousheh, Abolfazl Hatami Varzane

Abstract:

The present study aimed to determine predict capacity of the relationship among attachment styles, humor styles and communication patterns in female married students. Statistical population consisted of female married students from Allameh Tabataba’i University. The research sample consisted of 104 married students selected through convenience sampling. They responded to study instruments that consisted of attachment styles, humor styles and Communication patterns questionnaires. Data was analyzed by means of correlation method. The results indicated significant positive relationship between secure attachment styles with adaptive humor styles, and anxious attachment styles with maladaptive humor styles. Also a negative relationship between avoidant attachment with affiliative humor, and anxious attachment with self-enhancing humor was found. Furthermore, a negative relationship between self- enhancing humor styles with demand – withdraw communication pattern, and between affiliative humor with mutual avoidant communication pattern and a positive relationship between affiliative humor with mutual constructive communication pattern was observed. The relationship between secure attachment with mutual constructive communication pattern was positive, while relationship between avoidant attachment to mutual constructive communication pattern was negative and significant and its relation with mutual avoidant communication pattern was significantly positive. The result of regression analysis indicated that affliative humor style and secure attachment style, positively predicted mutual constructive communication pattern. Avoidant attachment style positively and affliative humor style negatively predicted the mutual avoidant communication pattern. And self-enhancing humor style negatively predicted the demand – withdraw communication pattern style.

Keywords: attachment styles, communication patterns, humor styles, female married students

Procedia PDF Downloads 366
13080 Public Wi-Fi Security Threat Evil Twin Attack Detection Based on Signal Variant and Hop Count

Authors: Said Abdul Ahad Ahadi, Elyas Baray, Nitin Rakesh, Sudeep Varshney

Abstract:

Wi-Fi is a widely used internet source that is used to provide internet access in many areas such as Stores, Cafes, University campuses, Restaurants and so on. This technology brought more facilities in communication and networking. On the other hand, due to the transmission of data over the air, which makes the network vulnerable, so it becomes prone to various threats such as Evil Twin and etc. The Evil Twin is a kind of adversary which impersonates a legitimate access point (LAP) as it can happen by spoofing the name (SSID) and MAC address (BSSID) of a legitimate access point (LAP). And this attack can cause many threats such as MITM, Service Interruption, Access point service blocking. Various Evil Twin Attack Detection Techniques are proposed, but they require additional hardware, or they require protocol modification. In this paper, we proposed a new technique based on Access Point’s two fingerprints, Received Signal Strength Indicator (RSSI) and Hop Count, that is hard to copy by an adversary. And we implemented the technique in a system called “ETDetector,” which can detect and prevent the attack.

Keywords: evil twin, LAP, SSID, Wi-Fi security, signal variation, ETAD, kali linux, scapy, python

Procedia PDF Downloads 134
13079 Micro-Arc Oxidation Titanium and Post Treatment by Cold Plasma and Graft Polymerization of Acrylic Acid for Biomedical Application

Authors: Shu-Chuan Liao, Chia-Ti Chang, Ko-Shao Chen

Abstract:

Titanium and its alloy are widely used in many fields such as dentistry or orthopaedics. Due to their high strength low elastic modulus that chemical inertness and bio inert. The micro-arc oxidation used to formation a micro porous ceramic oxide layer film on Titanium surface and also to improve the resistance corrosion. For improving the biocompatibility, micro-arc oxidation surfaces bio-inert need to introduce reactive group. We introduced boundary layer by used plasma enhanced chemical vapor deposition of hexamethyldisilazane (HMDS) and organic active layer by UV light graft reactive monomer acrylic acid (AAc) therefore we can immobilize Chondroitin sulphate on surface easily by crosslinking EDC/NHS. The surface properties and composition of the modified layer were measured by scanning electron microscopy (SEM), X-ray photoelectron spectroscopy (XPS) and X-ray diffraction (XRD) and water contact angle. Water contact angle of the plasma-treated Ti surface decreases from 60° to 38°, which is an indication of hydrophilicity. The results of electrochemical polarization analysis showed that the sample plasma treated at micro-arc oxidation after plasma treatment has the best corrosion resistance. The result showed that we can immobilize chondroitin sulfate successful by a series of modification and MTT assay indicated the biocompatibility has been improved in this study.

Keywords: MAO, plasma, graft polymerization, biomedical application

Procedia PDF Downloads 249
13078 An Extended Model for Sustainable Food and Nutrition Security in the Agrifood Sector

Authors: Ioannis Manikas

Abstract:

The increased consumer demand for environmentally friendly production and distribution practices and the stricter environmental regulations turned environmental aspects into important criteria in business decision-making. On the other hand, Food and Nutrition Security (FNS) has evolved dramatically during the last decades in theory and practice serving as a reference point for exchanging experiences among all agents involved in programs and projects to fostering policy and strategy development. Global pressures make it more important than ever to gain a better understanding of the contribution that agrifood businesses make to FNS and to examine ways to make them more resilient in an increasingly globalized and uncertain world. This study extends the standard three-dimensional model of sustainability to include two more dimensions: A technological dimension and a policy/political dimension. Apart from the economic, environmental and social dimensions regularly used in sustainability literature, the extended model will accurately represent the measures and policies addressing food and nutrition security.

Keywords: food and nutrition security, sustainability, food safety, resilience

Procedia PDF Downloads 320
13077 The Effect of Cross-Curriculum of L1 and L2 on Elementary School Students’ Linguistic Proficiency: To Sympathize with Others

Authors: Reiko Yamamoto

Abstract:

This paper reports on a project to integrate Japanese (as a first language) and English (as a second language) education. This study focuses on the mutual effects of the two languages on the linguistic proficiency of elementary school students. The research team consisted of elementary school teachers and researchers at a university. The participants of the experiment were students between 3rd and 6th grades at an elementary school. The research process consisted of seven steps: 1) specifying linguistic proficiency; 2) developing the cross-curriculum of L1 and L2; 3) forming can-do statements; 4) creating a self-evaluation questionnaire; 5) executing the self-evaluation questionnaire at the beginning of the school year; 6) instructing L1 and L2 based on the curriculum; and 7) executing the self-evaluation questionnaire at the beginning of the next school year. In Step 1, the members of the research team brainstormed ways to specify elementary school students’ linguistic proficiency that can be observed in various scenes. It was revealed that the teachers evaluate their students’ linguistic proficiency on the basis of the students’ utterances, but also informed by their non-verbal communication abilities. This led to the idea that competency for understanding others’ minds through the use of physical movement or bodily senses in communication in L1 – to sympathize with others – can be transferred to that same competency in communication in L2. Based on the specification of linguistic proficiency that L1 and L2 have in common, a cross-curriculum of L1 and L2 was developed in Step 2. In Step 3, can-do statements based on the curriculum were also formed, building off of the action-oriented approach from the Common European Framework of Reference for Languages (CEFR) used in Europe. A self-evaluation questionnaire consisting of the main can-do statements was given to the students between 3rd grade and 6th grade at the beginning of the school year (Step 4 and Step 5), and all teachers gave L1 and L2 instruction based on the curriculum to the students for one year (Step 6). The same questionnaire was given to the students at the beginning of the next school year (Step 7). The results of statistical analysis proved the enhancement of the students’ linguistic proficiency. This verified the validity of developing the cross-curriculum of L1 and L2 and adapting it in elementary school. It was concluded that elementary school students do not distinguish between L1 and L2, and that they just try to understand others’ minds through physical movement or senses in any language.

Keywords: cross curriculum of L1 and L2, elementary school education, language proficiency, sympathy with others

Procedia PDF Downloads 426
13076 Wind Turbine Wake Prediction and Validation under a Stably-Stratified Atmospheric Boundary Layer

Authors: Yilei Song, Linlin Tian, Ning Zhao

Abstract:

Turbulence energetics and structures in the wake of large-scale wind turbines under the stably-stratified atmospheric boundary layer (SABL) can be complicated due to the presence of low-level jets (LLJs), a region of higher wind speeds than the geostrophic wind speed. With a modified one-k-equation, eddy viscosity model specified for atmospheric flows as the sub-grid scale (SGS) model, a realistic atmospheric state of the stable ABL is well reproduced by large-eddy simulation (LES) techniques. Corresponding to the precursor stably stratification, the detailed wake properties of a standard 5-MW wind turbine represented as an actuator line model are provided. An engineering model is proposed for wake prediction based on the simulation statistics and gets validated. Results confirm that the proposed wake model can provide good predictions for wind turbines under the SABL.

Keywords: large-eddy simulation, stably-stratified atmospheric boundary layer, wake model, wind turbine wake

Procedia PDF Downloads 163
13075 Panel Application for Determining Impact of Real Exchange Rate and Security on Tourism Revenues: Countries with Middle and High Level Tourism Income

Authors: M. Koray Cetin, Mehmet Mert

Abstract:

The purpose of the study is to examine impacts on tourism revenues of the exchange rate and country overall security level. There are numerous studies that examine the bidirectional relation between macroeconomic factors and tourism revenues and tourism demand. Most of the studies support the existence of impact of tourism revenues on growth rate but not vice versa. Few studies examine the impact of factors like real exchange rate or purchasing power parity on the tourism revenues. In this context, firstly impact of real exchange rate on tourism revenues examination is aimed. Because exchange rate is one of the main determinants of international tourism services price in guests currency unit. Another determinant of tourism demand for a country is country’s overall security level. This issue can be handled in the context of the relationship between tourism revenues and overall security including turmoil, terrorism, border problem, political violence. In this study, factors are handled for several countries which have tourism revenues on a certain level. With this structure, it is a panel data, and it is evaluated with panel data analysis techniques. Panel data have at least two dimensions, and one of them is time dimensions. The panel data analysis techniques are applied to data gathered from Worldbank data web page. In this study, it is expected to find impacts of real exchange rate and security factors on tourism revenues for the countries that have noteworthy tourism revenues.

Keywords: exchange rate, panel data analysis, security, tourism revenues

Procedia PDF Downloads 334
13074 Ensuring Cyber Security Using Kippo Honeypots

Authors: S. Vivekananda Pandian

Abstract:

A major challenging task in this current scenario is protecting your computer and other electronic gadgets against Cyber-attacks. In this current era Cyber warfare becomes a major threat to the entire world which targets a particular organization or a country spreading the Malwares, Breaching the securities, causing major loss to the organization. Several sectors both public and private are computerized such as Energy sectors, Oil refinery sectors, Defense sectors and Aviation sectors are prone to attacks. Several attacks are unknown while accessing the internet. To study the characteristics and Intention of the Attacker Kippo Honeypots are used. Honeypots are the trap set by us which enables them to monitor the malicious activities and detailed study about attackers which leads to strengthening of the security.

Keywords: attackers, security, Kippo Honeypots, virtual machine

Procedia PDF Downloads 416
13073 Diplomatic Public Relations Techniques for Official Recognition of Palestine State in Europe

Authors: Bilgehan Gultekin, Tuba Gultekin

Abstract:

Diplomatic public relations gives an ideal concept for recognition of palestine state in all over the europe. The first step of official recognition is approval of palestine state in international political organisations such as United Nations and Nato. So, diplomatic public relations provides a recognition process in communication scale. One of the aims of the study titled “Diplomatic Public Relations Techniques for Recognition of Palestine State in Europe” is to present some communication projects on diplomatic way. The study also aims at showing communication process at diplomatic level. The most important level of such kind of diplomacy is society based diplomacy. Moreover,The study provides a wider perspective that gives some creative diplomatic communication strategies for attracting society. To persuade the public for official recognition also is key element of this process. The study also finds new communication routes including persuasion techniques for society. All creative projects are supporting parts in original persuasive process of official recognition of Palestine.

Keywords: diplomatic public relations, diplomatic communication strategies, diplomatic communication, public relations

Procedia PDF Downloads 442
13072 Microstructure and Oxidation Behaviors of Al, Y Modified Silicide Coatings Prepared on an Nb-Si Based Ultrahigh Temperature Alloy

Authors: Xiping Guo, Jing Li

Abstract:

The microstructure of an Si-Al-Y co-deposition coating prepared on an Nb-Si based ultra high temperature alloy by pack cementation process at 1250°C for eight hours was studied. The results showed that the coating was composed of a (Nb,X)Si₂ (X represents Ti, Cr and Hf elements) outer layer, a (Ti,Nb)₅Si₄ middle layer and an Al, Cr-rich inner layer. For comparison, the oxidation behaviors of the coating at 800, 1050 and 1350°C were investigated respectively. Linear oxidation kinetics was found with the parabolic rate constants of 5.29×10⁻², 9×10⁻²and 5.81 mg² cm⁻⁴ h⁻¹, respectively. Catastrophic pesting oxidation has not been found at 800°C even for 100 h. The surface of the scale was covered by compact glassy SiO₂ film. The coating was able to effectively protect the Nb-Si based alloy from oxidation at 1350°C for at least 100 h. The formation process of the scale was testified following an epitaxial growth mechanism. The mechanism responsible for the oxidation behavior of the Si-Al-Y co-deposition coating at 800, 1050 and 1350°C was proposed.

Keywords: Nb-Si based ultra high temperature alloy, oxidation resistance, pack cementation, silicide coating, Al and Y modified

Procedia PDF Downloads 391
13071 Numerical Solutions of Boundary Layer Flow over an Exponentially Stretching/Shrinking Sheet with Generalized Slip Velocity

Authors: Roslinda Nazar, Ezad Hafidz Hafidzuddin, Norihan M. Arifin, Ioan Pop

Abstract:

In this paper, the problem of steady laminar boundary layer flow and heat transfer over a permeable exponentially stretching/shrinking sheet with generalized slip velocity is considered. The similarity transformations are used to transform the governing nonlinear partial differential equations to a system of nonlinear ordinary differential equations. The transformed equations are then solved numerically using the bvp4c function in MATLAB. Dual solutions are found for a certain range of the suction and stretching/shrinking parameters. The effects of the suction parameter, stretching/shrinking parameter, velocity slip parameter, critical shear rate, and Prandtl number on the skin friction and heat transfer coefficients as well as the velocity and temperature profiles are presented and discussed.

Keywords: boundary layer, exponentially stretching/shrinking sheet, generalized slip, heat transfer, numerical solutions

Procedia PDF Downloads 419
13070 Countering Terrorism and Defending Human Right after 9/11: The European Perspective

Authors: Anita Blagojević

Abstract:

It is well known that the terrorist attacks on the New York City and Washington, D.C. prompted unprecedented international action to enhance international cooperation in the prevention and suppression of terrorism. In the months (and years) after September 11, the world community focused on two main efforts: first, on efforts to bring those responsible for terrorist attacks to justice, and second, on efforts to prevent future terrorist attacks. In that sense, many governments took advantage of these efforts to strengthen their national security. In that process, however, human rights and civil liberties of certain groups of people were alleged. As a consequence, part of the price paid for protecting national security against terrorist attacks was the threat of infringement on people's fundamental rights and freedoms. The aim of this paper is to analyze the role of the European Union and the Council of Europe in finding the answer to the one of the main security dilemma for the present era: how to find the balance between the protection of national security and guarantee of the people's rights and fundamental freedoms?

Keywords: terrorism, antiterrorism, European Union, Council of Europe, human rights

Procedia PDF Downloads 368
13069 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks

Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar

Abstract:

Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.

Keywords: mobile operating system, security, privacy, Malware

Procedia PDF Downloads 76
13068 Proposal of a Model Supporting Decision-Making Based on Multi-Objective Optimization Analysis on Information Security Risk Treatment

Authors: Ritsuko Kawasaki (Aiba), Takeshi Hiromatsu

Abstract:

Management is required to understand all information security risks within an organization, and to make decisions on which information security risks should be treated in what level by allocating how much amount of cost. However, such decision-making is not usually easy, because various measures for risk treatment must be selected with the suitable application levels. In addition, some measures may have objectives conflicting with each other. It also makes the selection difficult. Moreover, risks generally have trends and it also should be considered in risk treatment. Therefore, this paper provides the extension of the model proposed in the previous study. The original model supports the selection of measures by applying a combination of weighted average method and goal programming method for multi-objective analysis to find an optimal solution. The extended model includes the notion of weights to the risks, and the larger weight means the priority of the risk.

Keywords: information security risk treatment, selection of risk measures, risk acceptance, multi-objective optimization

Procedia PDF Downloads 449
13067 Labor Welfare and Social Security

Authors: Shoaib Alvi

Abstract:

Mahatma Gandhi was said “Man becomes great exactly in the degree in which he works for the welfare of his fellow-men”. Labor welfare is an important fact of Industrial relations. With the growth of industrialization, mechanization and computerization, labor welfare measures have got the fillip. The author believes that Labor welfare includes provisions of various facilities and amenities in and around the work place for the better life of the workers. Labor welfare is, thus, one of the major determinants of industrial relations. It comprises all human efforts the work place for the better life of the worker. The social and economic aspects of the life of the workers have the direct influence on the social and economic development of the nation. Author thinks that there could be multiple objectives in having, labor welfare programme the concern for improving the lot of the workers, a philosophy of humanitarianism or internal social responsibility, a feeling of concern, and caring by providing some of life's basic amenities, besides the basic pay packet. Such caring is supposed to build a sense of loyalty on the part of the employee towards the organization. The author thinks that Social security is the security that the State furnishes against the risks which an individual of small means cannot today, stand up to by himself even in private combination with his fellows. Social security is one of the pillars on which the structure of a welfare state rests, and it constitutes the hardcore of social policy in most countries. It is through social security measures that the state attempts to maintain every citizen at a certain prescribed level below which no one is allowed to fall. According to author, social assistance is a method according to which benefits are given to the needy persons, fulfilling the prescribed conditions, by the government out of its own resources. Author has analyzed and studied the relationship between the labor welfare social security and also studied various international conventions on provisions of social security by International Authorities like United Nations, International Labor Organization, and European Union etc. Author has also studied and analyzed concept of labor welfare and social security schemes of many countries around the globe ex:- Social security in Australia, Social security in Switzerland, Social Security (United States), Mexican Social Security Institute, Welfare in Germany, Social security schemes of India for labor welfare in both organized sector and unorganized sector. In this Research paper, Author has done the study on the Conceptual framework of the Labour Welfare. According to author, labors are highly perishable, which need constant welfare measures for their upgradation and performance in this field. At last author has studied role of trade unions and labor welfare unions and other institutions working for labor welfare, in this research paper author has also identified problems these Unions and labor welfare bodies’ face and tried to find out solutions for the problems and also analyzed various steps taken by the government of various countries around the globe.

Keywords: labor welfare, internal social responsibility, social security, international conventions

Procedia PDF Downloads 557
13066 Gender Recognition with Deep Belief Networks

Authors: Xiaoqi Jia, Qing Zhu, Hao Zhang, Su Yang

Abstract:

A gender recognition system is able to tell the gender of the given person through a few of frontal facial images. An effective gender recognition approach enables to improve the performance of many other applications, including security monitoring, human-computer interaction, image or video retrieval and so on. In this paper, we present an effective method for gender classification task in frontal facial images based on deep belief networks (DBNs), which can pre-train model and improve accuracy a little bit. Our experiments have shown that the pre-training method with DBNs for gender classification task is feasible and achieves a little improvement of accuracy on FERET and CAS-PEAL-R1 facial datasets.

Keywords: gender recognition, beep belief net-works, semi-supervised learning, greedy-layer wise RBMs

Procedia PDF Downloads 435
13065 A Study on Functional Performance and Physical Self-esteem Levels of Differently-Abled Basket Ballplayers: A Case Series

Authors: Prerna Mohan Saxena, Avni Joshi, Raju K Parasher

Abstract:

Disability is a state of decreased functioning associated with disease, disorder, injury, or other health condition, which in the context of one’s environment is experienced as an impairment, activity limitation, or participation restriction. With the concept of disability evolving over the years, the current ICF model of disability has integrated this concept into a comprehensive whole of multiple dimensions of human functioning, including biological, psychological, social, and environmental aspects. Wheelchair basketball is one of the greatest examples of adapted sports for the disabled. Through this study, we aim to evaluate the functional performance and self-esteem levels in differently-abled pediatric wheelchair basketball players, providing an insight on their abilities and deficits and how they can be worked on at a larger level to improve overall performance. The study was conducted on 9 pediatric wheelchair basketball players at Amar Jyoti school for inclusive education Delhi their physical performance was assessed using a battery of tests, and physical self esteem was assessed using the Physical self-description instrument (PSDQ-S). Results showed that 9 participants age ranged between 10-21 years, mostly males with BMI ranging between 16.7 to 28.9 kg/m2 most of them had the experience of 5 to 6 years of playing the sport. The data showed physical performance in accordance to years of experience of playing, physical self esteem showed a different perspective, with experience players scoring less on it. This study supports a multidimensional construct of physical performance and physical self-esteem, suggesting that both may be applied on the wheelchair basketball players at competitive levels.

Keywords: ase series, physical performance, physical self-esteem, wheelchair basketball

Procedia PDF Downloads 118
13064 Thermal Conductivity and Optical Absorption of GaInAsSb/GaSb Laser Structure: Impact of Annealing Time

Authors: Soufiene Ilahi, Noureddine Yacoubi

Abstract:

GaInAsSb grown on GaSb substrate is an interesting material employed as an active layer in vertical-cavity surface-emitting lasers (VCSELs) operating in mid-infrared emission. This material presents some advantages like highs optical absorption coefficient and good thermal conductivity, which is very desirable for VCSEL application. In this paper, we have investigated the effects of thermal annealing on optical properties and thermal conductivity of GaInAsSb/GaSb. The studies are carried out by means of the photo thermal deflection spectroscopy technique (PDS). In fact, optical absorption spectrum and thermal conductivity have been determined by a comparison between the experimental and theoretical phases of the PDS signal. We have found that thermal conductivity increased significantly to 13 W/m.K for GaInAsSb annealed during 60 min. In addition, we have found that bandgap energy is blue-shifted around 30 meV. The amplitudes signal of PDS reveals multiple reflections as a function of annealing time, which reflect the high crystalline quality of the layer.

Keywords: thermal conductivity, bandgap energy of GaInAsSb, GaInAsSb active layer, optical absorption

Procedia PDF Downloads 138
13063 Adaptive Auth - Adaptive Authentication Based on User Attributes for Web Application

Authors: Senthuran Manoharan, Rathesan Sivagananalingam

Abstract:

One of the main issues in system security is Authentication. Authentication can be defined as the process of recognizing the user's identity and it is the most important step in the access control process to safeguard data/resources from being accessed by unauthorized users. The static method of authentication cannot ensure the genuineness of the user. Due to this reason, more innovative authentication mechanisms came into play. At first two factor authentication was introduced and later, multi-factor authentication was introduced to enhance the security of the system. It also had some issues and later, adaptive authentication was introduced. In this research paper, the design of an adaptive authentication engine was put forward. The user risk profile was calculated based on the user parameters and then the user was challenged with a suitable authentication method.

Keywords: authentication, adaptive authentication, machine learning, security

Procedia PDF Downloads 227
13062 US-ASEAN Counter Terrorism Cooperation: Maintaining International Security and Avoiding Muslim Stereotypes

Authors: Jordan Daud, Satriya Wibawa, Wahyu Wardhana

Abstract:

The US Global War on Terror has had effect on Southeast Asia as Second Front of Global War on Terror. Since 2001, ASEAN had adopted legal framework to counter the terrorist threat through numerous approach which accommodate various counterterrorism policy of the ten member states. ASEAN have also enhanced multilateral cooperation with US and its allies in Asia Pacific region in addressing terrorist threat, terrorist funding, cyber terrorism and other forms of terrorism. This cooperation is essential to maintain international security and stability and also assure economic development. This work focuses on the US-ASEAN counterterrorism cooperation due to they identified terrorism as a mutual enemy that posed to human security, infrastructure security, and national security. Having in mind that international terrorism usually connected with Muslim community, this paper will also elaborate the concept of Jihad and Islam revivalism in politics to avoid negative image of Islam and Muslim. This paper argues that as region with large Muslim community, Southeast Asia still need to tighten counter terrorism cooperation and also lessening Muslim stereotypes with terrorism through educating public understanding and inter-faith and intra-faith dialogue to create a better world.

Keywords: ASEAN, U.S., counter terrorism, Muslim stereotypes

Procedia PDF Downloads 233
13061 Food Security in Nigeria: An Examination of Food Availability and Accessibility in Nigeria

Authors: Okolo Chimaobi Valentine, Obidigbo Chizoba

Abstract:

As a basic physiology need, the threat to sufficient food production is the threat to human survival. Food security has been an issue that has gained global concern. This paper looks at the food security in Nigeria by assessing the availability of food and accessibility of the available food. The paper employed multiple linear regression technique and graphic trends of growth rates of relevant variables to show the situation of food security in Nigeria. Results of the tests revealed that population growth rate was higher than the growth rate of food availability in Nigeria for the earlier period of the study. Commercial bank credit to the agricultural sector, foreign exchange utilization for food and the Agricultural Credit Guarantee Scheme Fund (ACGSF) contributed significantly to food availability in Nigeria. Food prices grew at a faster rate than the average income level, making it difficult to access sufficient food. It implies that prior to the year 2012; there was insufficient food to feed the Nigerian populace. However, continued credit to the food and agricultural sector will ensure sustained and sufficient production of food in Nigeria. Microfinance banks should make sufficient credit available to the smallholder farmer. The government should further control and subsidize the rising price of food to make it more accessible by the people.

Keywords: food, accessibility, availability, security

Procedia PDF Downloads 359
13060 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology

Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar

Abstract:

The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.

Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology

Procedia PDF Downloads 104
13059 Exploration of Copper Fabric in Non-Asbestos Organic Brake-Pads for Thermal Conductivity Enhancement

Authors: Vishal Mahale, Jayashree Bijwe, Sujeet K. Sinha

Abstract:

Range of thermal conductivity (TC) of Friction Materials (FMs) is a critical issue since lower TC leads to accumulation of frictional heat on the working surface, which results in excessive fade while higher TC leads to excessive heat flow towards back-plate resulting in boiling of brake-fluid leading to ‘spongy brakes’. This phenomenon prohibits braking action, which is most undesirable. Therefore, TC of the FMs across the brake pads should not be high while along the brake pad, it should be high. To enhance TC, metals in the forms of powder and fibers are used in the FMs. Apart from TC improvement, metals provide strength and structural integrity to the composites. Due to higher TC Copper (Cu) powder/fiber is a most preferred metallic ingredient in FM industry. However, Cu powders/fibers are responsible for metallic wear debris generation, which has harmful effects on aquatic organisms. Hence to get rid of a problem of metallic wear debris generation and to keep the positive effect of TC improvement, incorporation of Cu fabric in NAO brake-pads can be an innovative solution. Keeping this in view, two realistic multi-ingredient FM composites with identical formulations were developed in the form of brake-pads. Out of which one composite series consisted of a single layer of Cu fabric in the body of brake-pad and designated as C1 while double layer of Cu fabric was incorporated in another brake-pad series with designation of C2. Distance of Cu fabric layer from the back-plate was kept constant for C1 and C2. One more composite (C0) was developed without Cu fabric for the sake of comparison. Developed composites were characterized for physical properties. Tribological performance was evaluated on full scale inertia dynamometer by following JASO C 406 testing standard. It was concluded that Cu fabric successfully improved fade resistance by increasing conductivity of the composite and also showed slight improvement in wear resistance. Worn surfaces of pads and disc were analyzed by SEM and EDAX to study wear mechanism.

Keywords: brake inertia dynamometer, copper fabric, non-asbestos organic (NAO) friction materials, thermal conductivity enhancement

Procedia PDF Downloads 126
13058 A Cross-Cultural Approach for Communication with Biological and Non-Biological Intelligences

Authors: Thomas Schalow

Abstract:

This paper posits the need to take a cross-cultural approach to communication with non-human cultures and intelligences in order to meet the following three imminent contingencies: communicating with sentient biological intelligences, communicating with extraterrestrial intelligences, and communicating with artificial super-intelligences. The paper begins with a discussion of how intelligence emerges. It disputes some common assumptions we maintain about consciousness, intention, and language. The paper next explores cross-cultural communication among humans, including non-sapiens species. The next argument made is that we need to become much more serious about communicating with the non-human, intelligent life forms that already exist around us here on Earth. There is an urgent need to broaden our definition of communication and reach out to the other sentient life forms that inhabit our world. The paper next examines the science and philosophy behind CETI (communication with extraterrestrial intelligences) and how it has proven useful, even in the absence of contact with alien life. However, CETI’s assumptions and methodology need to be revised and based on the cross-cultural approach to communication proposed in this paper if we are truly serious about finding and communicating with life beyond Earth. The final theme explored in this paper is communication with non-biological super-intelligences using a cross-cultural communication approach. This will present a serious challenge for humanity, as we have never been truly compelled to converse with other species, and our failure to seriously consider such intercourse has left us largely unprepared to deal with communication in a future that will be mediated and controlled by computer algorithms. Fortunately, our experience dealing with other human cultures can provide us with a framework for this communication. The basic assumptions behind intercultural communication can be applied to the many types of communication envisioned in this paper if we are willing to recognize that we are in fact dealing with other cultures when we interact with other species, alien life, and artificial super-intelligence. The ideas considered in this paper will require a new mindset for humanity, but a new disposition will prepare us to face the challenges posed by a future dominated by artificial intelligence.

Keywords: artificial intelligence, CETI, communication, culture, language

Procedia PDF Downloads 344