Search results for: smart draw
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1863

Search results for: smart draw

933 Mechanisms to Combat Maritime Terrorism in the Law of the Kingdom of Saudi Arabia and International Law

Authors: Khaleed Alsufyyan

Abstract:

This doctoral research has been successfully approved by a specialist upgrade panel, and it presents the proposition that the KSA policy for combating maritime terrorism is inadequate and current governance frameworks, including laws, are insufficiently developed to respond effectively and fairly to maritime terrorism. It will examine the legal system in the KSA in terms of effectiveness fairness, as well as investigate this proposition to determine what factors have contributed to such a deficiency. The main focus of this research will draw upon the policies, laws, and practices of the KSA, as well as UK and international laws and policies, to assess whether it is feasible to apply them in the context of the KSA. This thesis will recommend strategies regarding maritime terrorism to enrich the legal and policy frameworks and address the current and future dynamics of maritime terrorism adequately. To derive suitable improvements, UK policies, laws, and practices will be considered for policy transfer purposes. As for studies focused on the KSA, since the KSA is a Muslim state, it will be important to assess the impact of Islamic Law or Sharia Law subject to the doctrines of fairness and effectiveness to comprehend how the KSA’s legal system operates and determine the boundaries it sets for the response to maritime terrorism. This thesis will propose that more reforms are needed to effectively and fairly deal with maritime terrorism based on the prevailing understanding of Sharia law. The research will address the international perspectives on the problem of maritime terrorism and international cooperation of the KSA regarding maritime terrorism and consider the need for further developments.

Keywords: maritime terrorism, maritime security, combat maritime terrorism in the KSA, protecting maritime transport against terrorism

Procedia PDF Downloads 78
932 Spatial Audio Player Using Musical Genre Classification

Authors: Jun-Yong Lee, Hyoung-Gook Kim

Abstract:

In this paper, we propose a smart music player that combines the musical genre classification and the spatial audio processing. The musical genre is classified based on content analysis of the musical segment detected from the audio stream. In parallel with the classification, the spatial audio quality is achieved by adding an artificial reverberation in a virtual acoustic space to the input mono sound. Thereafter, the spatial sound is boosted with the given frequency gains based on the musical genre when played back. Experiments measured the accuracy of detecting the musical segment from the audio stream and its musical genre classification. A listening test was performed based on the virtual acoustic space based spatial audio processing.

Keywords: automatic equalization, genre classification, music segment detection, spatial audio processing

Procedia PDF Downloads 424
931 Retrospective Data Analysis of Penetrating Injuries Admitted to Jigme Dorji Wangchuck National Referral Hospital (JDWNRH), Thimphu, Bhutan, Due to Traditional Sports over a Period of 3 Years

Authors: Sonam Kelzang

Abstract:

Background: Penetrating injuries as a result of traditional sports (Archery and Khuru) are commonly seen in Bhutan. To our knowledge, there is no study carried out looking into the data of penetrating injuries due to traditional sports. Aim: This is a retrospective analysis of cases of penetrating injuries as a result of traditional sports admitted to JDWNRH over the last 3 years to draw an inference on the pattern of injury and associated morbidity and mortality. Method: Data on penetrating injuries related to traditional sports (Archery and Khuru) were collected and reviewed over the period of 3 years. Assault cases were excluded. For each year we analysed age, sex, parts of the body affected, agent of injury and whether admission was required or not. Results: Out of the total 44 victims of penetrating injury by traditional sports (Archery and Khuru) between 2013 and 2015 (average of 15 cases of penetrating injuries per year). Eighty-five percent were male and 15% were female. Their age ranged from 4 yrs to 62 years. Sixty-one percent of the victims were in the working age group of 19-58 years; 30% of the victims were referred from various district hospitals; 38% of the victims needed admission; 42 % of the victims suffered injury to the head; and 54% of the injuries were caused by Khuru. Conclusion: Penetrating injuries due to traditional sports admitted to JDWNRH, Thimphu, remained same over the three years period despite safety regulations in place. Although there were no deaths during the last three years, morbidity still remains high.

Keywords: archery, Bhutan, Khuru, darts

Procedia PDF Downloads 162
930 Interwoven Realms: The Relationship Between Textiles, Fashion, and Architecture

Authors: Toktam mehrabani

Abstract:

Textiles, fashion, and architecture, though seemingly disparate fields, share a deep and evolving relationship. This paper explores the intersection of these disciplines, examining how the tactile, structural, and aesthetic qualities of textiles have influenced both fashion and architecture over time. By investigating historical and contemporary examples, this paper seeks to unravel the ways in which textiles and fashion have not only shaped architectural design but have also acted as a bridge between functionality, art, and human experience in the built environment.Textiles have been integral to human culture since the dawn of civilization. Their presence transcends mere functionality, serving as a medium for artistic expression, cultural identity, and social commentary. Fashion, derived from textiles, has long been associated with personal identity and societal trends, while architecture reflects human needs, environmental context, and cultural values. This paper posits that the relationship between textiles, fashion, and architecture is more interconnected than often perceived, with each influencing and inspiring the other across time. Textiles in Architectural Design: From ancient draperies in temples to tapestries in castles, textiles have adorned structures, softening rigid spaces and adding layers of warmth and luxury. Fabric screens and curtains have also served functional purposes, such as controlling light, acoustics, and temperature. Fashion as Architectural Expression: Renaissance and Baroque fashion used exaggerated forms, corsetry, and layers to mirror the grandiosity of architectural styles of the time. Clothing acted as wearable architecture, with structured garments mirroring the strong lines and curves of buildings..Structural Textiles in Architecture: In the 21st century, textiles are no longer just decorative; they have become integral to architectural innovation. Materials like tensile fabrics and smart textiles are used in creating flexible, lightweight structures. Iconic examples include Frei Otto’s work with tensile membranes, seen in the Munich Olympic Stadium.Technological advancements have drastically transformed the relationship between textiles, fashion, and architecture. Digital tools like 3D printing and laser cutting allow designers in both fields to push the limits of form and structure. Smart textiles that react to environmental stimuli are being explored for use in both wearable technology and adaptable architecture, such as facades that change in response to weather conditions. Textiles, fashion, and architecture are inextricably linked through their shared exploration of form, structure, and expression. This interdisciplinary relationship continues to evolve, driven by technological advancements and a growing emphasis on sustainability. As fashion becomes more architectural in its construction and architecture more fluid in its forms, the lines between these disciplines blur, offering new possibilities for creativity and functionality in both wearable and built environments.

Keywords: textiles in architecture, fashion and architecture, textile architecture, structural textiles, wearable architecture, architectural fashion

Procedia PDF Downloads 20
929 The Use of Computer Simulation as Technological Education for Crisis Management Staff

Authors: Jiří Barta, Josef Krahulec, Jiří F. Urbánek

Abstract:

Education and practical training crisis management members are a topical issue nowadays. The paper deals with the perspectives and possibilities of ‘smart solutions’ to education for crisis management staff. Currently, there are a large number of simulation tools, which notes that they are suitable for practical training of crisis management staff. The first part of the paper is focused on the introduction of the technology simulation tools. The simulators aim is to create a realistic environment for the practical training of extending units of crisis staff. The second part of the paper concerns the possibilities of using the simulation technology to the education process. The aim of this section is to introduce the practical capabilities and potential of the simulation programs for practical training of crisis management staff.

Keywords: crisis management staff, computer simulation, software, technological education

Procedia PDF Downloads 347
928 The Acute Impact of the Intake of Breadsticks from Different Durum Wheat Flour Mixtures on Postprandial Inflammation, Oxidative Stress, and Antiplatelet Activity in Healthy Volunteers: A Pilot Cross-Over Nutritional Intervention

Authors: O. I. Papagianni, P. Potsaki, K. Almpounioti, D. Chatzicharalampous, A. Voutsa, O. Katira, A. Michalaki, H. C. Karantonis, A. E. Koutelidakis

Abstract:

High intakes of carbohydrates and fats have been associated with an increased risk of chronic diseases due to the role of postprandial oxidative stress. This pilot nutritional intervention aimed to examine the acute effect of consuming two different types of breadsticks prepared from durum wheat flour mixtures differing in total phenolic content on postprandial inflammatory and oxidant responses in healthy volunteers. A cross-over, controlled, and single-blind clinical trial was designed, and two isocaloric high-fat and high-carbohydrate meals were tested. Serum total, HDL- and LDL-cholesterol, triglycerides, glucose, CRP, uric acid, plasma total antioxidant capacity, and antiplatelet activity were determined in fasting and 30, 60, and 120 min after consumption. The results showed a better postprandial HDL-cholesterol and total antioxidant activity response in the intervention group. The choice of durum wheat flours with higher phenolic content and antioxidant activity is presented as promising for human health, and clinical studies will expand to draw safer conclusions.

Keywords: breadsticks, durum wheat flours, postprandial inflammation, postprandial oxidative stress, ex vivo antiplatelet activity

Procedia PDF Downloads 71
927 Application of Deep Learning Algorithms in Agriculture: Early Detection of Crop Diseases

Authors: Manaranjan Pradhan, Shailaja Grover, U. Dinesh Kumar

Abstract:

Farming community in India, as well as other parts of the world, is one of the highly stressed communities due to reasons such as increasing input costs (cost of seeds, fertilizers, pesticide), droughts, reduced revenue leading to farmer suicides. Lack of integrated farm advisory system in India adds to the farmers problems. Farmers need right information during the early stages of crop’s lifecycle to prevent damage and loss in revenue. In this paper, we use deep learning techniques to develop an early warning system for detection of crop diseases using images taken by farmers using their smart phone. The research work leads to building a smart assistant using analytics and big data which could help the farmers with early diagnosis of the crop diseases and corrective actions. The classical approach for crop disease management has been to identify diseases at crop level. Recently, ImageNet Classification using the convolutional neural network (CNN) has been successfully used to identify diseases at individual plant level. Our model uses convolution filters, max pooling, dense layers and dropouts (to avoid overfitting). The models are built for binary classification (healthy or not healthy) and multi class classification (identifying which disease). Transfer learning is used to modify the weights of parameters learnt through ImageNet dataset and apply them on crop diseases, which reduces number of epochs to learn. One shot learning is used to learn from very few images, while data augmentation techniques are used to improve accuracy with images taken from farms by using techniques such as rotation, zoom, shift and blurred images. Models built using combination of these techniques are more robust for deploying in the real world. Our model is validated using tomato crop. In India, tomato is affected by 10 different diseases. Our model achieves an accuracy of more than 95% in correctly classifying the diseases. The main contribution of our research is to create a personal assistant for farmers for managing plant disease, although the model was validated using tomato crop, it can be easily extended to other crops. The advancement of technology in computing and availability of large data has made possible the success of deep learning applications in computer vision, natural language processing, image recognition, etc. With these robust models and huge smartphone penetration, feasibility of implementation of these models is high resulting in timely advise to the farmers and thus increasing the farmers' income and reducing the input costs.

Keywords: analytics in agriculture, CNN, crop disease detection, data augmentation, image recognition, one shot learning, transfer learning

Procedia PDF Downloads 115
926 LuMee: A Centralized Smart Protector for School Children who are Using Online Education

Authors: Lumindu Dilumka, Ranaweera I. D., Sudusinghe S. P., Sanduni Kanchana A. M. K.

Abstract:

This study was motivated by the challenges experienced by parents and guardians in ensuring the safety of children in cyberspace. In the last two or three years, online education has become very popular all over the world due to the Covid 19 pandemic. Therefore, parents, guardians and teachers must ensure the safety of children in cyberspace. Children are more likely to go astray and there are plenty of online programs are waiting to get them on the wrong track and also, children who are engaging in the online education can be distracted at any moment. Therefore, parents should keep a close check on their children's online activity. Apart from that, due to the unawareness of children, they tempt to share their sensitive information, causing a chance of being a victim of phishing attacks from outsiders. These problems can be overcome through the proposed web-based system. We use feature extraction, web tracking and analysis mechanisms, image processing and name entity recognition to implement this web-based system.

Keywords: online education, cyber bullying, social media, face recognition, web tracker, privacy data

Procedia PDF Downloads 83
925 The Old Basis of Press Authority and New Media: Devolution of Communication Power Base in Nigeria by X (Formally Twitter)

Authors: Nzeaka Emmanuel Ezimako

Abstract:

With the advent of new media, especially X, the government's previous foundation of media power and control in Nigeria has been diminished because they can no longer regulate the public sphere to control social action and reactions. This study examined how IPOB (Indigenous People of Biafra) resistance and the 2020 #Endsars aborted revolution were able to control public discourse during social upheavals, as well as how the new media have diminished the influence that the government and media owners once had over Nigerians. This study is significant because it recognizes the social transformation brought about by the emergence of new media, particularly with the most widely used social media platform in Nigeria, X, and how citizen media activity is altering the media ecosystem and challenging the government and private media owners' hegemony over news coverage in Nigeria to the point where the government saw X as a blatant threat to its hegemony and banned it in 2021. This study used a triangulation of qualitative and quantitative analysis with 300 respondents (n=300) from different sectors of the media practitioners, scholars, and university students in Nigeria to draw a conclusion in line with Democratic Participant Media Theory, which questions the necessity for centralized media regulated by the government and conglomerates. The contributions to filling the gap in the literature are meant to aid readers in comprehending how X has developed into a dominant force in Nigerian media, particularly during the crisis. The study offers recommendations for media executives, policymakers, and the public on how to manage the media conflict that has developed because of the loss of official government oversight of the mass media due to the emergence of X in the media space.

Keywords: Twitter, new media, regulations, dominance, resistance

Procedia PDF Downloads 83
924 Pragmatic Competence of Jordanian EFL Learners

Authors: Dina Mahmoud Hammouri

Abstract:

The study investigates the Jordanian EFL learners’ pragmatic competence through their production of the speech acts of responding to requests, making suggestions, making threats and expressing farewells. The sample of the study consists of 130 Jordanian EFL learners and native speakers. 2600 responses were collected through a Discourse Completion Test (DCT). The findings of the study revealed that the tested students showed similarities and differences in performing the strategies of four speech acts. Differences in the students’ performances led to pragmatic failure instances. The pragmatic failure committed by students refers to a lack of linguistic competence (i.e., pragmalinguistic failure), sociocultural differences and pragmatic transfer (i.e., sociopragmatic failure). EFL learners employed many mechanisms to maintain their communicative competence; the analysis of the test on speech acts showed learners’ tendency towards using particular strategies, resorting to modify strategies and relating them to their grammatical competence, prefabrication, performing long forms, buffing and transfer. The results were also suggestive of the learners’ lack of pragmalinguistic and sociopragmatic knowledge. The implications of this study are for language teachers to teach interlanguage pragmatics explicitly in EFL contexts to draw learners’ attention to both pragmalinguistic and sociopragmatic features, pay more attention to these areas and allocate more time and practice to solve learners’ problems in these areas. The implication of this study is also for pedagogical material designers to provide sufficient and well-organized pragmatic input.

Keywords: pragmatic failure, Jordanian EFL learner, sociopragmatic competence, pragmalinguistic competence

Procedia PDF Downloads 76
923 A Robotic “Puppet Master” Application to ASD Therapeutic Support

Authors: Sophie Sakka, Rénald Gaboriau

Abstract:

This paper describes a preliminary work aimed at setting a therapeutic support for autistic teenagers using three humanoid robots NAO shared by ASD (Autism Spectrum Disorder) subjects. The studied population had attended successfully a first year program, and were observed with a second year program using the robots. This paper focuses on the content and the effects of the second year program. The approach is based on a master puppet concept: the subjects program the robots, and use them as an extension for communication. Twenty sessions were organized, alternating ten preparatory sessions and ten robotics programming sessions. During the preparatory sessions, the subjects write a story to be played by the robots. During the robot programming sessions, the subjects program the motions to be realized to make the robot tell the story. The program was concluded by a public performance. The experiment involves five ASD teenagers aged 12-15, who had all attended the first year robotics training. As a result, a progress in voluntary and organized communication skills of the five subjects was observed, leading to improvements in social organization, focus, voluntary communication, programming, reading and writing abilities. The changes observed in the subjects general behavior took place in a short time, and could be observed from one robotics session to the next one. The approach allowed the subjects to draw the limits of their body with respect to the environment, and therefore helped them confronting the world with less anxiety.

Keywords: autism spectrum disorder, robot, therapeutic support, rob'autism

Procedia PDF Downloads 242
922 Analysing the Stability of Electrical Grid for Increased Renewable Energy Penetration by Focussing on LI-Ion Battery Storage Technology

Authors: Hemendra Singh Rathod

Abstract:

Frequency is, among other factors, one of the governing parameters for maintaining electrical grid stability. The quality of an electrical transmission and supply system is mainly described by the stability of the grid frequency. Over the past few decades, energy generation by intermittent sustainable sources like wind and solar has seen a significant increase globally. Consequently, controlling the associated deviations in grid frequency within safe limits has been gaining momentum so that the balance between demand and supply can be maintained. Lithium-ion battery energy storage system (Li-Ion BESS) has been a promising technology to tackle the challenges associated with grid instability. BESS is, therefore, an effective response to the ongoing debate whether it is feasible to have an electrical grid constantly functioning on a hundred percent renewable power in the near future. In recent years, large-scale manufacturing and capital investment into battery production processes have made the Li-ion battery systems cost-effective and increasingly efficient. The Li-ion systems require very low maintenance and are also independent of geographical constraints while being easily scalable. The paper highlights the use of stationary and moving BESS for balancing electrical energy, thereby maintaining grid frequency at a rapid rate. Moving BESS technology, as implemented in the selected railway network in Germany, is here considered as an exemplary concept for demonstrating the same functionality in the electrical grid system. Further, using certain applications of Li-ion batteries, such as self-consumption of wind and solar parks or their ancillary services, wind and solar energy storage during low demand, black start, island operation, residential home storage, etc. offers a solution to effectively integrate the renewables and support Europe’s future smart grid. EMT software tool DIgSILENT PowerFactory has been utilised to model an electrical transmission system with 100% renewable energy penetration. The stability of such a transmission system has been evaluated together with BESS within a defined frequency band. The transmission system operators (TSO) have the superordinate responsibility for system stability and must also coordinate with the other European transmission system operators. Frequency control is implemented by TSO by maintaining a balance between electricity generation and consumption. Li-ion battery systems are here seen as flexible, controllable loads and flexible, controllable generation for balancing energy pools. Thus using Li-ion battery storage solution, frequency-dependent load shedding, i.e., automatic gradual disconnection of loads from the grid, and frequency-dependent electricity generation, i.e., automatic gradual connection of BESS to the grid, is used as a perfect security measure to maintain grid stability in any case scenario. The paper emphasizes the use of stationary and moving Li-ion battery storage for meeting the demands of maintaining grid frequency and stability for near future operations.

Keywords: frequency control, grid stability, li-ion battery storage, smart grid

Procedia PDF Downloads 143
921 The Twin Terminal of Pedestrian Trajectory Based on City Intelligent Model (CIM) 4.0

Authors: Chen Xi, Lao Xuerui, Li Junjie, Jiang Yike, Wang Hanwei, Zeng Zihao

Abstract:

To further promote the development of smart cities, the microscopic "nerve endings" of the City Intelligent Model (CIM) are extended to be more sensitive. In this paper, we develop a pedestrian trajectory twin terminal based on the CIM and CNN technology. It also uses 5G networks, architectural and geoinformatics technologies, convolutional neural networks, combined with deep learning networks for human behaviour recognition models, to provide empirical data such as 'pedestrian flow data and human behavioural characteristics data', and ultimately form spatial performance evaluation criteria and spatial performance warning systems, to make the empirical data accurate and intelligent for prediction and decision making.

Keywords: urban planning, urban governance, CIM, artificial intelligence, convolutional neural network

Procedia PDF Downloads 135
920 Understanding the Caliphate and Jihad to Prevent Radicalization That Lead to Terrorism: The Role of Social Community in Southeast Asia

Authors: Jordan Daud, Satriya Wibawa, Wahyu Wardhana

Abstract:

In the summer of 2014, the leaders of the Islamic State of Iraq and Syria proclaimed the founding of religious-political system known as the caliphate which titled Islamic State (IS). As Caliph, Abu Bakr Baghdadi advocated Jihad from the Ummah (the Muslim community) to defend the Islamic state from unbelievers. This call for Jihad by IS had encouraged some radical organization in Southeast Asia pledge allegiance to IS and established bases for IS operation in Southeast Asia. This development had increased security concern for possible terrorism action in Southeast Asia, which currently not very active due to counterterrorism efforts from ASEAN member states and its cooperation with the world. This paper firstly tries to draw understanding from Ulema (Muslim cleric) about the conception of caliphate and Jihad based on Quran and Hadith. Secondly, this paper will elaborate counterterrorism efforts from ASEAN countries to prevent radicalization and terrorism act in addressing the call for jihad to establish IS in Southeast Asia. The third, this paper will recommend the role of the social community, especially Ulema, in Southeast Asia to prevent the misunderstanding of Jihad which usually used by terrorist to justify their action. Hopefully, this social community role will decrease the radicalization of Muslim community in Southeast Asia alongside with the counterterrorism efforts to create secure and stable ASEAN community based on shared norm and values.

Keywords: caliphate, jihad, ASEAN, counterterrorism, social community

Procedia PDF Downloads 229
919 Functions of Public Policy in Private International Law

Authors: Fedorova Elena

Abstract:

In this article, we draw a distinction between two important functions of public policy in private international law. The first function is widely recognized and relates to the prevention of application of foreign laws and enforcement of foreign court judgments whenever their effects are incompatible with the domestic legal system of the forum. This effectively protects sovereign rights of the forum state as it allows to resist against the undesirable effects of foreign law-making and law-enforcement policies. The second function is less obvious, but not less important. As the internal private legal relationships, international private relationships are usually governed by rules of public policy, to which the parties can not derogate by mutual agreement. Thefore, for international private law relations public policy has a different function than previously mentioned: in this case, the public policy acts as a defense against unacceptable effects of the party autonomy. Thus, this second function of public policy consists in the limitation of the party autonomy wich effects would be unacceptable for the local legal system. In the frame of this second function the author will analyse two types of public policy which can limit the party autonomy: « substantial » public policy (which regulates the substance of international legal relationship) and « conflictual » public policy (which regulates the party autonomy to choose the law applicable for the substance of relationship). The author provides an analysis of these functions of the public policy in the field of international contract law because of the important role of the principle of party autonomy for international contract relations.

Keywords: public policy, general theory of private international law, substantial public policy, conflictual public policy

Procedia PDF Downloads 568
918 Enhancement of Performance Utilizing Low Complexity Switched Beam Antenna

Authors: P. Chaipanya, R. Keawchai, W. Sombatsanongkhun, S. Jantaramporn

Abstract:

To manage the demand of wireless communication that has been dramatically increased, switched beam antenna in smart antenna system is focused. Implementation of switched beam antennas at mobile terminals such as notebook or mobile handset is a preferable choice to increase the performance of the wireless communication systems. This paper proposes the low complexity switched beam antenna using single element of antenna which is suitable to implement at mobile terminal. Main beam direction is switched by changing the positions of short circuit on the radiating patch. There are four cases of switching that provide four different directions of main beam. Moreover, the performance in terms of Signal to Interference Ratio when utilizing the proposed antenna is compared with the one using omni-directional antenna to confirm the performance improvable.

Keywords: switched beam, shorted circuit, single element, signal to interference ratio

Procedia PDF Downloads 165
917 Communication in a Heterogeneous Ad Hoc Network

Authors: C. Benjbara, A. Habbani

Abstract:

Wireless networks are getting more and more used in every new technology or feature, especially those without infrastructure (Ad hoc mode) which provide a low cost alternative to the infrastructure mode wireless networks and a great flexibility for application domains such as environmental monitoring, smart cities, precision agriculture, and so on. These application domains present a common characteristic which is the need of coexistence and intercommunication between modules belonging to different types of ad hoc networks like wireless sensor networks, mesh networks, mobile ad hoc networks, vehicular ad hoc networks, etc. This vision to bring to life such heterogeneous networks will make humanity duties easier but its development path is full of challenges. One of these challenges is the communication complexity between its components due to the lack of common or compatible protocols standard. This article proposes a new patented routing protocol based on the OLSR standard in order to resolve the heterogeneous ad hoc networks communication issue. This new protocol is applied on a specific network architecture composed of MANET, VANET, and FANET.

Keywords: Ad hoc, heterogeneous, ID-Node, OLSR

Procedia PDF Downloads 210
916 Secure Authentication Scheme Based on Numerical Series Cryptography for Internet of Things

Authors: Maha Aladdin, Khaled Nagaty, Abeer Hamdy

Abstract:

The rapid advancement cellular networks and wireless networks have laid a solid basis for the Internet of Things. IoT has evolved into a unique standard that allows diverse physical devices to collaborate with one another. A service provider gives a variety of services that may be accessed via smart apps anywhere, at any time, and from any location over the Internet. Because of the public environment of mobile communication and the Internet, these services are highly vulnerable to a several malicious attacks, such as unauthorized disclosure by hostile attackers. As a result, the best option for overcoming these vulnerabilities is a strong authentication method. In this paper, a lightweight authentication scheme that is based on numerical series cryptography is proposed for the IoT environments. It allows mutual authentication between IoT devices Parametric study and formal proofs are utilized to illustrate that the pro-posed approach is resistant to a variety of security threats.

Keywords: internet of things, authentication, cryptography, security protocol

Procedia PDF Downloads 117
915 Human Resource Management Challenges in Age of Artificial Intelligence: Methodology of Case Analysis

Authors: Olga Leontjeva

Abstract:

In the age of Artificial Intelligence (AI), some organization management approaches need to be adapted or changed. Human Resource Management (HRM) is a part of organization management that is under the managers' focus nowadays, because AI integration into organization activities brings some HRM-connected challenges. The topic became more significant during the crises of many organizations in the world caused by the coronavirus pandemic (COVID-19). The paper presents an approach, which will be used for the study that is going to be focused on the various case analysis. The author of the future study will analyze the cases of the organizations from Latvia and Spain that are grouped by the size, type of activity and area of business. The information for the cases will be collected through structured interviews and online surveys. The main result presented is the questionnaire developed that will be used for the study as well as the definition and description of sampling. The first round of the survey will be based on convenience sampling that is the main limitation of the study. To conclude, the approach developed will help to collect valid data if the organizations participating in the survey are ready to share their cases in depth, so the researchers could draw the right conclusions and generalize compared organizations’ cases. The questionnaire developed for the survey is applicable for both written online data collection as well as for the interviews. The case analysis will help to identify some HRM challenges that are connected to AI integration into organization activities such as management of different generation employees and their training peculiarities.

Keywords: age of artificial intelligence, case analysis, generation Y and Z employees, human resource management

Procedia PDF Downloads 164
914 Optimal Planning and Design of Hybrid Energy System for Taxila University

Authors: Habib Ur Rahman Habib

Abstract:

Renewable energy resources are being realized as suitable options in hybrid energy planning for on-grid and micro grid. In this paper, operation, planning and optimal design of on-grid distributed energy resources based hybrid system are investigated. The aim is to minimize the cost of the overall energy system keeping in view the environmental emission and minimum penetration of conventional energy resources. Seven grid connected different case studies including diesel only, diesel-renewable based, and renewable based only are designed to perform economic analysis, operational planning and emission. Sensitivity analysis is implemented to investigate the impact of different parameters on the performance of energy resources.

Keywords: data management, renewable energy, distributed energy, smart grid, micro-grid, modeling, energy planning, design optimization

Procedia PDF Downloads 454
913 Indigenous Knowledge Management: Towards Identification of Challenges and Opportunities in Developing Countries

Authors: Desmond Chinedu Oparaku, Emmanuel Uwazie Anyanwu, Oyemike Victor Benson, Ogbonna Isaac-Nnadimele

Abstract:

The purpose of this paper is to provide a theoretical discourse that highlights the challenges associated with management of indigenous knowledge with reference to developing countries. Literature review and brainstorming were used to collect relevant data and draw inferences. The findings indicate that non-existence of indigenous knowledge management policy (IKMP), low level of partnership drive among library and information services providers, non-uniformity of format and content of indigenous knowledge, inadequate funding, and lack of access to ICTs, lack of indigenous people with indigenous expertise and hoarding of knowledge as challenges to indigenous knowledge management. The study is based on literature review and information gathered through brain storming with professional colleagues the geographic scope as developing countries. The study has birth several implication based on the findings made. Professionally, it has necessitated the need for formulating a viable indigenous knowledge management policy (IKMP), creating of collaborative network through partnership, and integration of ICTs to indigenous knowledge management practices by libraries in developing countries etc. The originality of this paper is revealed in its capability as serving as an eye opener to librarians on the need for preserving and managing indigenous knowledge in developing countries. It further unlocks the possibilities of exploring empirical based researches to substantiate the theoretical issues raised in this paper. The findings may be used by library managers to improve indigenous knowledge management (IKM).

Keywords: developing countries, ICTs, indigenous knowledge, knowledge management

Procedia PDF Downloads 334
912 Effective Scheduling of Hybrid Reconfigurable Microgrids Considering High Penetration of Renewable Sources

Authors: Abdollah Kavousi Fard

Abstract:

This paper addresses the optimal scheduling of hybrid reconfigurable microgrids considering hybrid electric vehicle charging demands. A stochastic framework based on unscented transform to model the high uncertainties of renewable energy sources including wind turbine and photovoltaic panels, as well as the hybrid electric vehicles’ charging demand. In order to get to the optimal scheduling, the network reconfiguration is employed as an effective tool for changing the power supply path and avoiding possible congestions. The simulation results are analyzed and discussed in three different scenarios including coordinated, uncoordinated and smart charging demand of hybrid electric vehicles. A typical grid-connected microgrid is employed to show the satisfying performance of the proposed method.

Keywords: microgrid, renewable energy sources, reconfiguration, optimization

Procedia PDF Downloads 266
911 Challenges and Opportunities of Cloud-Based E-Learning Systems

Authors: Kashif Laeeq, Zubair A. Shaikh

Abstract:

The paradigm of education is drastically changing from conventional to e-learning model. Due to ease of learning with various other benefits, several educational institutions are adopting the e-learning models. Some institutions are still willing to transform their educational system on to e-learning, but due to limited resources, they are still compromising on the old traditional system. The cloud computing could be one of the best solutions to overcome this problem by providing hardware, software, and infrastructure resources with cost efficient manner. The adoption of cloud computing in education will bring revolution in this paradigm. This paper introduces various positive features of e-learning and presents a way how cloud computing technology can be provisioned e-learning model. This paper also investigates the numerous challenges and opportunities that would be observed in cloud computing adoption in e-learning domain. The concept and knowledge present in this paper may create a new direction of research in the domain of cloud-based e-learning.

Keywords: cloud-based e-learning, e-learning, cloud computing application, smart learning

Procedia PDF Downloads 404
910 A Deep Reinforcement Learning-Based Secure Framework against Adversarial Attacks in Power System

Authors: Arshia Aflaki, Hadis Karimipour, Anik Islam

Abstract:

Generative Adversarial Attacks (GAAs) threaten critical sectors, ranging from fingerprint recognition to industrial control systems. Existing Deep Learning (DL) algorithms are not robust enough against this kind of cyber-attack. As one of the most critical industries in the world, the power grid is not an exception. In this study, a Deep Reinforcement Learning-based (DRL) framework assisting the DL model to improve the robustness of the model against generative adversarial attacks is proposed. Real-world smart grid stability data, as an IIoT dataset, test our method and improves the classification accuracy of a deep learning model from around 57 percent to 96 percent.

Keywords: generative adversarial attack, deep reinforcement learning, deep learning, IIoT, generative adversarial networks, power system

Procedia PDF Downloads 30
909 The Investigation on the Status of Disaster Prevention and Reduction Knowledge in Rural Pupils in China

Authors: Jian-Na Zhang, Xiao-Li Chen, Si-Jian Li

Abstract:

Objective: In order to investigate current status on knowledge of disaster prevention and reduction in rural pupils, to explore education method on disaster prevention and reduction for rural pupils. Method: A questionnaire was designed based on literature review. Convenient sampling was used in the survey. The questionnaire survey was conducted among 180 students from Huodehong town central primary school which located in Ludian county of Zhaotong city in Yunnan province, where 6.5 magnitude earthquake happened in 2014. The result indicated that the pupils’ knowledge and skills on disaster prevention and reduction relevant poor. The source for them to obtain the knowledge of disaster prevention and reduction included TV (68.9%), followed by their parents (43.9%), while only 24.4% of knowledge is from the teachers. The scores about different natural disaster are ranking in descending order: earthquake (5.39 ±1.27), floods (3.77 ±1.17); debris flow (2.81 ±1.05), family fire (2.16± 0.96). And the disaster experience did not help the pupils enhance the knowledge reserves. There is no statistical significance (P > 0.05) in knowledge scores of disaster prevention and reduction between experienced and non-experienced group. Conclusion: The local disaster experiences did not draw the attention of parents and schools. Knowledge popularization of disaster for local pupils is extremely urgent. It is necessary to take advantage of more mediums to popularize the knowledge and skills about disaster prevention and reduction, for example, family education, school education, newspapers, brochures, etc. The training courses on disaster prevention and reduction which are based on the characteristics of the local rural pupils and the characteristics of the local disasters would be useful.

Keywords: rural, pupils, disaster prevention and reduction knowledge, popularization

Procedia PDF Downloads 347
908 Modelling Biological Treatment of Dye Wastewater in SBR Systems Inoculated with Bacteria by Artificial Neural Network

Authors: Yasaman Sanayei, Alireza Bahiraie

Abstract:

This paper presents a systematic methodology based on the application of artificial neural networks for sequencing batch reactor (SBR). The SBR is a fill-and-draw biological wastewater technology, which is specially suited for nutrient removal. Employing reactive dye by Sphingomonas paucimobilis bacteria at sequence batch reactor is a novel approach of dye removal. The influent COD, MLVSS, and reaction time were selected as the process inputs and the effluent COD and BOD as the process outputs. The best possible result for the discrete pole parameter was a= 0.44. In orderto adjust the parameters of ANN, the Levenberg-Marquardt (LM) algorithm was employed. The results predicted by the model were compared to the experimental data and showed a high correlation with R2> 0.99 and a low mean absolute error (MAE). The results from this study reveal that the developed model is accurate and efficacious in predicting COD and BOD parameters of the dye-containing wastewater treated by SBR. The proposed modeling approach can be applied to other industrial wastewater treatment systems to predict effluent characteristics. Note that SBR are normally operated with constant predefined duration of the stages, thus, resulting in low efficient operation. Data obtained from the on-line electronic sensors installed in the SBR and from the control quality laboratory analysis have been used to develop the optimal architecture of two different ANN. The results have shown that the developed models can be used as efficient and cost-effective predictive tools for the system analysed.

Keywords: artificial neural network, COD removal, SBR, Sphingomonas paucimobilis

Procedia PDF Downloads 408
907 Using Blockchain Technology to Promote Sustainable Supply Chains: A Survey of Previous Studies

Authors: Saleh Abu Hashanah, Abirami Radhakrishnan, Dessa David

Abstract:

Sustainable practices in the supply chain have been an area of focus that require consideration of environmental, economic, and social sustainability practices. This paper aims to examine the use of blockchain as a disruptive technology to promote sustainable supply chains. Content analysis was used to analyze the uses of blockchain technology in sustainable supply chains. The results showed that blockchain technology features such as traceability, transparency, smart contracts, accountability, trust, immutability, anti-fraud, and decentralization promote sustainable supply chains. It is found that these features have impacted organizational efficiency in operations, transportation, and production, minimizing costs and reducing carbon emissions. In addition, blockchain technology has been found to elicit customer trust in the products.

Keywords: blockchain technology, sustainability, supply chains, economic sustainability, environmental sustainability, social sustainability

Procedia PDF Downloads 102
906 Effect of Oral Immonoglobulin (IgY) Ingestion on Post Exercise Muscle Soreness and Muscle Damage Markers in Females

Authors: Bert H. Jacobson, Taylor Monaghan, John Sellers

Abstract:

Intense resistance-type activity generally elicits delayed onset muscle soreness (DOMS) in individuals unaccustomed to such action. DOMS is a combination of contractile tissue microtrauma, osmotic pressure changes, alteration calcium regulation, and inflammation. Elevated muscle-specific enzyme creatine kinase (CK) is a marker of striated muscle damage. Avian immunoglobulin (IgY) mediates inflammation and may thereby reduce post-exercise DOMS. Purpose: The aim of this study was to compare the effect of oral IgY and placebo (Pl) on CK, serum relevels, and perceived pain following induced DOMS. Methods: Healthy college-aged females (N=16) were randomly divided into an experimental group (IgY) and a control group (PL). CK serum levels were recorded followed by 14 days of supplementation of either IgY or Pl at the following doses: days 1-2 =4.5 g, days 3-5 =9.0 g, and days 6-14 =13.5 g. Following the 14 d, lower limb DOMS was induced using two methods of resistance training. After 48 hours, subjects reported for a second blood draw. Results: One-way ANOVA resulted in the IgY group posting significantly less (p < 0.05) serum CK than the PL group. Furthermore, the IgY group experienced significantly less post-test perceived soreness than the Pl group. Conclusion: IgY supplementation lessens muscle CK levels and perceived muscle soreness following exercise, possibly due to an anti-inflammatory effect. It was suggested that IgY may serve as a buffer for DOMS thereby allowing the participant to continue vigorous exercise without discomfort.

Keywords: muscle, soreness, damage, serum

Procedia PDF Downloads 193
905 An Embarrassingly Simple Semi-supervised Approach to Increase Recall in Online Shopping Domain to Match Structured Data with Unstructured Data

Authors: Sachin Nagargoje

Abstract:

Complete labeled data is often difficult to obtain in a practical scenario. Even if one manages to obtain the data, the quality of the data is always in question. In shopping vertical, offers are the input data, which is given by advertiser with or without a good quality of information. In this paper, an author investigated the possibility of using a very simple Semi-supervised learning approach to increase the recall of unhealthy offers (has badly written Offer Title or partial product details) in shopping vertical domain. The author found that the semisupervised learning method had improved the recall in the Smart Phone category by 30% on A=B testing on 10% traffic and increased the YoY (Year over Year) number of impressions per month by 33% at production. This also made a significant increase in Revenue, but that cannot be publicly disclosed.

Keywords: semi-supervised learning, clustering, recall, coverage

Procedia PDF Downloads 117
904 Importance of Human Factors on Cybersecurity within Organizations: A Study of Attitudes and Behaviours

Authors: Elham Rajabian

Abstract:

The ascent of cybersecurity incidents is a rising threat to most organisations in general, while the impact of the incidents is unique to each of the organizations. It is a need for behavioural sciences to concentrate on employees’ behaviour in order to prepare key security mitigation opinions versus cybersecurity incidents. There are noticeable differences among users of a computer system in terms of complying with security behaviours. We can discuss the people's differences under several subjects such as delaying tactics on something that must be done, the tendency to act without thinking, future thinking about unexpected implications of present-day issues, and risk-taking behaviours in security policies compliance. In this article, we introduce high-profile cyber-attacks and their impacts on weakening cyber resiliency in organizations. We also give attention to human errors that influence network security. Human errors are discussed as a part of psychological matters to enhance compliance with the security policies. The organizational challenges are studied in order to shape a sustainable cyber risks management approach in the related work section. Insiders’ behaviours are viewed as a cyber security gap to draw proper cyber resiliency in section 3. We carry out the best cybersecurity practices by discussing four CIS challenges in section 4. In this regard, we provide a guideline and metrics to measure cyber resilience in organizations in section 5. In the end, we give some recommendations in order to build a cybersecurity culture based on individual behaviours.

Keywords: cyber resilience, human factors, cybersecurity behavior, attitude, usability, security culture

Procedia PDF Downloads 92