Search results for: privacy-preserving technologies
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3568

Search results for: privacy-preserving technologies

2608 Sustainable Crop Production: Greenhouse Gas Management in Farm Value Chain

Authors: Aswathaman Vijayan, Manish Jha, Ullas Theertha

Abstract:

Climate change and Global warming have become an issue for both developed and developing countries and perhaps the biggest threat to the environment. We at ITC Limited believe that a company’s performance must be measured by its Triple Bottom Line contribution to building economic, social and environmental capital. This Triple Bottom Line strategy focuses on - Embedding sustainability in business practices, Investing in social development and Adopting a low carbon growth path with a cleaner environment approach. The Agri Business Division - ILTD operates in the tobacco crop growing regions of Andhra Pradesh and Karnataka province of India. The Agri value chain of the company comprises of two distinct phases: First phase is Agricultural operations undertaken by ITC trained farmers and the second phase is Industrial operations which include marketing and processing of the agricultural produce. This research work covers the Greenhouse Gas (GHG) management strategy of ITC in the Agricultural operations undertaken by the farmers. The agriculture sector adds considerably to global GHG emissions through the use of carbon-based energies, use of fertilizers and other farming operations such as ploughing. In order to minimize the impact of farming operations on the environment, ITC has a taken a big leap in implementing system and process in reducing the GHG impact in farm value chain by partnering with the farming community. The company has undertaken a unique three-pronged approach for GHG management at the farm value chain: 1) GHG inventory at farm value chain: Different sources of GHG emission in the farm value chain were identified and quantified for the baseline year, as per the IPCC guidelines for greenhouse gas inventories. The major sources of emission identified are - emission due to nitrogenous fertilizer application during seedling production and main-field; emission due to diesel usage for farm machinery; emission due to fuel consumption and due to burning of crop residues. 2) Identification and implementation of technologies to reduce GHG emission: Various methodologies and technologies were identified for each GHG emission source and implemented at farm level. The identified methodologies are – reducing the consumption of chemical fertilizer usage at the farm through site-specific nutrient recommendation; Usage of sharp shovel for land preparation to reduce diesel consumption; implementation of energy conservation technologies to reduce fuel requirement and avoiding burning of crop residue by incorporation in the main field. These identified methodologies were implemented at farm level, and the GHG emission was quantified to understand the reduction in GHG emission. 3) Social and farm forestry for CO2 sequestration: In addition, the company encouraged social and farm forestry in the waste lands to convert it into green cover. The plantations are carried out with fast growing trees viz., Eucalyptus, Casuarina, and Subabul at the rate of 10,000 Ha of land per year. The above approach minimized considerable amount of GHG emission at the farm value chain benefiting farmers, community, and environment at a whole. In addition, the CO₂ stock created by social and farm forestry program has made the farm value chain to become environment-friendly.

Keywords: CO₂ sequestration, farm value chain, greenhouse gas, ITC limited

Procedia PDF Downloads 289
2607 The Use of Crisis Workplace Technology to Protect Communication Processes of Critical Infrastructure

Authors: Jiri Barta, Jiří F. Urbanek

Abstract:

This paper deals with a protection of the national and European infrastructure. It is issue nowadays. The paper deals with the perspectives and possibilities of "smart solutions" to critical infrastructure protection. The research project deals with computers aided technologies are used from the perspective of new, better protection of selected infrastructure objects. Protection is focused on communication and information channels. These communication and information channels are very important for the functioning of the system of protection of critical infrastructure elements.

Keywords: interoperability, communication systems, controlling proces, critical infrastructure, crisis workplaces, continuity

Procedia PDF Downloads 294
2606 Understanding the Basics of Information Security: An Act of Defense

Authors: Sharon Q. Yang, Robert J. Congleton

Abstract:

Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.

Keywords: cybercrimes, hacking technologies, higher education, information security, libraries

Procedia PDF Downloads 123
2605 Students’ Perception of Their M-Learning Readiness

Authors: Sulaiman Almutairy, Trevor Davies, Yota Dimitriadi

Abstract:

This paper presents study investigating how to understand better the psychological readiness for mobile learning (m-learning) among Saudi students, while also evaluating m-learning in Saudi Arabia-a topic that has not yet received adequate attention from researchers. Data was acquired through a questionnaire administered to 131 Saudi students at UK universities, in July 2013. The study confirmed that students are confident using mobile devices in their daily lives and that they would welcome more opportunities for mobile learning. The findings indicated that Saudi higher education students are highly familiar with, and are psychologically ready for, m-learning.

Keywords: m-learning, mobile technologies, psychological readiness, higher education

Procedia PDF Downloads 513
2604 Controlled Digital Lending, Equitable Access to Knowledge and Future Library Services

Authors: Xuan Pang, Alvin L. Lee, Peggy Glatthaar

Abstract:

Libraries across the world have been an innovation engine of creativity and opportunityin many decades. The on-going global epidemiology outbreak and health crisis experience illuminates potential reforms, rethinking beyond traditional library operations and services. Controlled Digital Lending (CDL) is one of the emerging technologies libraries used to deliver information digitally in support of online learning and teachingand make educational materials more affordable and more accessible. CDL became a popular term in the United States of America (USA) as a result of a white paper authored by Kyle K. Courtney (Harvard University) and David Hansen (Duke University). The paper gave the legal groundwork to explore CDL: Fair Use, First Sale Doctrine, and Supreme Court rulings. Library professionals implemented this new technology to fulfill their users’ needs. Three libraries in the state of Florida (University of Florida, Florida Gulf Coast University, and Florida A&M University) started a conversation about how to develop strategies to make CDL work possible at each institution. This paper shares the stories of piloting and initiating a CDL program to ensure students have reliable, affordable access to course materials they need to be successful. Additionally, this paper offers an overview of the emerging trends of Controlled Digital Lending in the USA and demonstrates the development of the CDL platforms, policies, and implementation plans. The paper further discusses challenges and lessons learned and how each institution plans to sustain the program into future library services. The fundamental mission of the library is providing users unrestricted access to library resources regardless of their physical location, disability, health status, or other circumstances. The professional due diligence of librarians, as information professionals, is to makeeducational resources more affordable and accessible.CDL opens a new frontier of library services as a mechanism for library practice to enhance user’s experience of using libraries’ services. Libraries should consider exploring this tool to distribute library resources in an effective and equitable way. This new methodology has potential benefits to libraries and end users.

Keywords: controlled digital lending, emerging technologies, equitable access, collaborations

Procedia PDF Downloads 130
2603 Reliable Multicast Communication in Next Generation Networks

Authors: Muazzam Ali Khan Khattak

Abstract:

Next Generation Network is combination of different networks having different technologies. Due to mobile nature of nodes the movement of nodes occurs from one network to another network. Multicasting in such networks is still a hot issue of research because the user in today's world wants reliable communication wherever it lies. Due to heterogeneity of NGN it is very difficult to handle reliable multicast communication. In this paper we proposed an improved scheme for reliable multicast communication in next generation networks. Because multicast communication is very important to deliver same data packets to multiple receivers and minimize the network traffic. This new scheme will make the multicast communication in NGN more reliable and efficient.

Keywords: next generation networks, route request, IPT, NACK, ARQ, DTN

Procedia PDF Downloads 495
2602 A PHREEQC Reactive Transport Simulation for Simply Determining Scaling during Desalination

Authors: Andrew Freiburger, Sergi Molins

Abstract:

Freshwater is a vital resource; yet, the supply of clean freshwater is diminishing as the consequence of melting snow and ice from global warming, pollution from industry, and an increasing demand from human population growth. The unsustainable trajectory of diminishing water resources is projected to jeopardize water security for billions of people in the 21st century. Membrane desalination technologies may resolve the growing discrepancy between supply and demand by filtering arbitrary feed water into a fraction of renewable, clean water and a fraction of highly concentrated brine. The leading hindrance of membrane desalination is fouling, whereby the highly concentrated brine solution encourages micro-organismal colonization and/or the precipitation of occlusive minerals (i.e. scale) upon the membrane surface. Thus, an understanding of brine formation is necessary to mitigate membrane fouling and to develop efficacious desalination technologies that can bolster the supply of available freshwater. This study presents a reactive transport simulation of brine formation and scale deposition during reverse osmosis (RO) desalination. The simulation conceptually represents the RO module as a one-dimensional domain, where feed water directionally enters the domain with a prescribed fluid velocity and is iteratively concentrated in the immobile layer of a dual porosity model. Geochemical PHREEQC code numerically evaluated the conceptual model with parameters for the BW30-400 RO module and for real water feed sources – e.g. the Red and Mediterranean seas, and produced waters from American oil-wells, based upon peer-review data. The presented simulation is computationally simpler, and hence less resource intensive, than the existent and more rigorous simulations of desalination phenomena, like TOUGHREACT. The end-user may readily prepare input files and execute simulations on a personal computer with open source software. The graphical results of fouling-potential and brine characteristics may therefore be particularly useful as the initial tool for screening candidate feed water sources and/or informing the selection of an RO module.

Keywords: desalination, PHREEQC, reactive transport, scaling

Procedia PDF Downloads 127
2601 Kuwait Environmental Remediation Program: Waste Management Data Analytics for Planning and Optimization of Waste Collection

Authors: Aisha Al-Baroud

Abstract:

The United Nations Compensation Commission (UNCC), Kuwait National Focal Point (KNFP) and Kuwait Oil Company (KOC) cooperated in a joint project to undertake comprehensive and collaborative efforts to remediate 26 million m3 of crude oil contaminated soil that had resulted from the Gulf War in 1990/1991. These efforts are referred to as the Kuwait Environmental Remediation Program (KERP). KOC has developed a Total Remediation Solution (TRS) for KERP, which will guide the Remediation projects, comprises of alternative remedial solutions with treatment techniques inclusive of limited landfills for non-treatable soil materials disposal, and relies on treating certain ranges of Total Petroleum Hydrocarbon (TPH) contamination with the most appropriate remediation techniques. The KERP Remediation projects will be implemented within the KOC’s oilfields in North and South East Kuwait. The objectives of this remediation project is to clear land for field development and treat all the oil contaminated features (dry oil lakes, wet oil lakes, and oil contaminated piles) through TRS plan to optimize the treatment processes and minimize the volume of contaminated materials to be placed into landfills. The treatment strategy will comprise of Excavation and Transportation (E&T) of oil contaminated soils from contaminated land to remote treatment areas and to use appropriate remediation technologies or a combination of treatment technologies to achieve remediation target criteria (RTC). KOC has awarded five mega projects to achieve the same and is currently in the execution phase. As a part of the company’s commitment to environment and for the fulfillment of the mandatory HSSEMS procedures, all the Remediation contractors needs to report waste generation data from the various project activities on a monthly basis. Data on waste generation is collected in order to implement cost-efficient and sustainable waste management operations. Data analytics approaches can be built on the top of the data to produce more detailed, and in-time waste generation information for the basis of waste management and collection. The results obtained highlight the potential of advanced data analytic approaches in producing more detailed waste generation information for planning and optimization of waste collection and recycling.

Keywords: waste, tencnolgies, KERP, data, soil

Procedia PDF Downloads 108
2600 Assessment of Factors Influencing Adoption of Agroforestry Technologies in Halaba Special Woreda, Southern Ethiopia

Authors: Mihretu Erjabo

Abstract:

Halaba special district is characterized by drought, soil erosion, high population pressure, poor livestock production, lack of feed for livestock, very deep water table, very low productivity of crops and food insufficiency. In order to address these problems, the woreda agricultural development office along with other management practices such as soil physical conservation measures agroforestry was introduced decades ago as a means to alleviate the problem. However, the level of agroforestry adoption remains low. Objective of this study was to identify the factors that influence adoption of agroforestry technologies by farmers in the district. Random sampling was employed to select two kebele administrations and respondents. Data collection was conducted by rural household questionnaire survey, participatory rural appraisal, questionnaires for local and woreda extension staff, secondary data resources and field observation. A sample of 12 key informants, 6 extension staffs, and 182 households, were used in the data collection. Chi square test used to determine significant relationships between adoption of agroforestry and 15 selected variables. Out of which eleven were found to be significant to affect farmers’ adoptiveness. These were frequency of visits of farmers (13.39%), participation in training (11.49%), farmers’ attitude towards agroforestry practices (10.61%), frequency of visits of extensionists (10.38%), participation in extension meeting (10.34%), participation in field day (10.28%), land holding size (9.29%), level of literacy (8.78%), awareness about the importance of agroforestry technology packages (7.06%), time taken from their residence to nearest extension (5.04%) and gender of respondents (3.34%). This study also identified various factors that result in low adoption rates of agroforestry including fear of competition, seedling, rainfall and labour shortage, free grazing, financial problem, expecting trees as soil degrader and long span of trees and lack of need ranking. To improve farmers’ adoption, the factors identified should be well addressed by launching a series and recurrent outreach extension program appropriate and suitable to farmers need.

Keywords: farmers attitude, farmers participation, soil degradation, technology packages

Procedia PDF Downloads 153
2599 Internet-Of-Things and Ergonomics, Increasing Productivity and Reducing Waste: A Case Study

Authors: V. Jaime Contreras, S. Iliana Nunez, S. Mario Sanchez

Abstract:

Inside a manufacturing facility, we can find innumerable automatic and manual operations, all of which are relevant to the production process. Some of these processes add more value to the products more than others. Manual operations tend to add value to the product since they can be found in the final assembly area o final operations of the process. In this areas, where a mistake or accident can increase the cost of waste exponentially. To reduce or mitigate these costly mistakes, one approach is to rely on automation to eliminate the operator from the production line - requires a hefty investment and development of specialized machinery. In our approach, the center of the solution is the operator through sufficient and adequate instrumentation, real-time reporting and ergonomics. Efficiency and reduced cycle time can be achieved thorough the integration of Internet-of-Things (IoT) ready technologies into assembly operations to enhance the ergonomics of the workstations. Augmented reality visual aids, RFID triggered personalized workstation dimensions and real-time data transfer and reporting can help achieve these goals. In this case study, a standard work cell will be used for real-life data acquisition and a simulation software to extend the data points beyond the test cycle. Three comparison scenarios will run in the work cell. Each scenario will introduce a dimension of the ergonomics to measure its impact independently. Furthermore, the separate test will determine the limitations of the technology and provide a reference for operating costs and investment required. With the ability, to monitor costs, productivity, cycle time and scrap/waste in real-time the ROI (return on investment) can be determined at the different levels to integration. This case study will help to show that ergonomics in the assembly lines can make significant impact when IoT technologies are introduced. Ergonomics can effectively reduce waste and increase productivity with minimal investment if compared with setting up to custom machine.

Keywords: augmented reality visual aids, ergonomics, real-time data acquisition and reporting, RFID triggered workstation dimensions

Procedia PDF Downloads 212
2598 Cybersecurity Awareness Among Applied Sciences Student Population

Authors: Sanja Bracun, Nikolina Kasunic

Abstract:

After graduation, the student population of applied sciences will become the population of employees on IT experts’ positions or "just" business users of certain IT technologies for which the level of awareness of existing cybersecurity risks is extremely important. This research results define the current cybersecurity awareness level of students at Zagreb University of Applied Sciences (TVZ), what can be useful not only for teaching staff to form a curriculum related to cybersecurity more accurately but also to employers to know what to expect from their future employees regarding cybersecurity awareness level.

Keywords: student population cybersecurity awareness, cybersecurity awareness, cybersecurity, applied sciences students

Procedia PDF Downloads 248
2597 SPARK: An Open-Source Knowledge Discovery Platform That Leverages Non-Relational Databases and Massively Parallel Computational Power for Heterogeneous Genomic Datasets

Authors: Thilina Ranaweera, Enes Makalic, John L. Hopper, Adrian Bickerstaffe

Abstract:

Data are the primary asset of biomedical researchers, and the engine for both discovery and research translation. As the volume and complexity of research datasets increase, especially with new technologies such as large single nucleotide polymorphism (SNP) chips, so too does the requirement for software to manage, process and analyze the data. Researchers often need to execute complicated queries and conduct complex analyzes of large-scale datasets. Existing tools to analyze such data, and other types of high-dimensional data, unfortunately suffer from one or more major problems. They typically require a high level of computing expertise, are too simplistic (i.e., do not fit realistic models that allow for complex interactions), are limited by computing power, do not exploit the computing power of large-scale parallel architectures (e.g. supercomputers, GPU clusters etc.), or are limited in the types of analysis available, compounded by the fact that integrating new analysis methods is not straightforward. Solutions to these problems, such as those developed and implemented on parallel architectures, are currently available to only a relatively small portion of medical researchers with access and know-how. The past decade has seen a rapid expansion of data management systems for the medical domain. Much attention has been given to systems that manage phenotype datasets generated by medical studies. The introduction of heterogeneous genomic data for research subjects that reside in these systems has highlighted the need for substantial improvements in software architecture. To address this problem, we have developed SPARK, an enabling and translational system for medical research, leveraging existing high performance computing resources, and analysis techniques currently available or being developed. It builds these into The Ark, an open-source web-based system designed to manage medical data. SPARK provides a next-generation biomedical data management solution that is based upon a novel Micro-Service architecture and Big Data technologies. The system serves to demonstrate the applicability of Micro-Service architectures for the development of high performance computing applications. When applied to high-dimensional medical datasets such as genomic data, relational data management approaches with normalized data structures suffer from unfeasibly high execution times for basic operations such as insert (i.e. importing a GWAS dataset) and the queries that are typical of the genomics research domain. SPARK resolves these problems by incorporating non-relational NoSQL databases that have been driven by the emergence of Big Data. SPARK provides researchers across the world with user-friendly access to state-of-the-art data management and analysis tools while eliminating the need for high-level informatics and programming skills. The system will benefit health and medical research by eliminating the burden of large-scale data management, querying, cleaning, and analysis. SPARK represents a major advancement in genome research technologies, vastly reducing the burden of working with genomic datasets, and enabling cutting edge analysis approaches that have previously been out of reach for many medical researchers.

Keywords: biomedical research, genomics, information systems, software

Procedia PDF Downloads 263
2596 Development of Alternative Fuels Technologies: Compressed Natural Gas Home Refueling Station

Authors: Szymon Kuczynski, Krystian Liszka, Mariusz Laciak, Andrii Oliinyk, Adam Szurlej

Abstract:

Compressed natural gas (CNG) represents an excellent compromise between the availability of a technology that is proven and relatively easy to use in many areas of the automotive industry and incurred costs. This fuel causes a lower corrosion effect due to the lower content of products causing the potential difference on the walls of the engine system. Natural gas powered vehicles (NGVs) do not emit any substances that can contaminate water or land. The absence of carcinogenic substances in gaseous fuel extends the life of the engine. In the longer term, it contributes positively to waste management as well as waste disposal. Popularization of propulsion systems powered by natural gas CNG positively affects the reduction of heavy duty transport. For these reasons, CNG as a fuel stimulates considerable interest around the world. Over the last few years, technologies related to use of natural gas as an engine fuel have been developed and improved. These solutions have evolved from the prototype phase to the industrial scale implementation. The widespread availability of gaseous fuels has led to the development of a technology that allows the CNG fuel to be refueled directly from the urban gas network to the vehicle tank (ie. HYGEN - CNGHRS). Home refueling installations, although they have been known for many years, are becoming increasingly important in the present day. The major obstacle in the sale of this technology was, until recently, quite high capital expenditure compared to the later benefits. Home refueling systems allow refueling vehicle tank, with full control of fuel costs and refueling time. CNG Home Refueling Stations (such as HYGEN) allow gas value chain to overcome the dogma that there is a lack of refueling infrastructure allowing companies in gas value chain to participate in transportation market. Technology is based on one stage hydraulic compressor (instead of multistage mechanical compressor technology) which provides the possibility to compress low pressure gas from distribution gas network to 200 bar for its further usage as a fuel for NGVs. This boosts revenues and profits of gas companies by expanding its presence in higher margin of energy sector.

Keywords: alternative fuels, CNG (compressed natural gas), CNG stations, NGVs (natural gas vehicles), gas value chain

Procedia PDF Downloads 195
2595 The Mental Workload of ICU Nurses in Performing Human-Machine Tasks: A Cross-sectional Survey

Authors: Yan Yan, Erhong Sun, Lin Peng, Xuchun Ye

Abstract:

Aims: The present study aimed to explore Intensive Care Unit(ICU) nurses’ mental workload (MWL) and associated factors with it in performing human-machine tasks. Background: A wide range of emerging technologies have penetrated widely in the field of health care, and ICU nurses are facing a dramatic increase in nursing human-machine tasks. However, there is still a paucity of literature reporting on the general MWL of ICU nurses performing human-machine tasks and the associated influencing factors. Methods: A cross-sectional survey was employed. The data was collected from January to February 2021 from 9 tertiary hospitals in 6 provinces (Shanghai, Gansu, Guangdong, Liaoning, Shandong, and Hubei). Two-stage sampling was used to recruit eligible ICU nurses (n=427). The data were collected with an electronic questionnaire comprising sociodemographic characteristics and the measures of MWL, self-efficacy, system usability, and task difficulty. The univariate analysis, two-way analysis of variance(ANOVA), and a linear mixed model were used for data analysis. Results: Overall, the mental workload of ICU nurses in performing human-machine tasks was medium (score 52.04 on a 0-100 scale). Among the typical nursing human-machine tasks selected, the MWL of ICU nurses in completing first aid and life support tasks (‘Using a defibrillator to defibrillate’ and ‘Use of ventilator’) was significantly higher than others (p < .001). And ICU nurses’ MWL in performing human-machine tasks was also associated with age (p = .001), professional title (p = .002), years of working in ICU (p < .001), willingness to study emerging technology actively (p = .006), task difficulty (p < .001), and system usability (p < .001). Conclusion: The MWL of ICU nurses is at a moderate level in the context of a rapid increase in nursing human-machine tasks. However, there are significant differences in MWL when performing different types of human-machine tasks, and MWL can be influenced by a combination of factors. Nursing managers need to develop intervention strategies in multiple ways. Implications for practice: Multidimensional approaches are required to perform human-machine tasks better, including enhancing nurses' willingness to learn emerging technologies actively, developing training strategies that vary with tasks, and identifying obstacles in the process of human-machine system interaction.

Keywords: mental workload(MWL), nurse, ICU, human-machine, tasks, cross-sectional study, linear mixed model, China

Procedia PDF Downloads 97
2594 Web Development in Information Technology with Javascript, Machine Learning and Artificial Intelligence

Authors: Abdul Basit Kiani, Maryam Kiani

Abstract:

Online developers now have the tools necessary to create online apps that are not only reliable but also highly interactive, thanks to the introduction of JavaScript frameworks and APIs. The objective is to give a broad overview of the recent advances in the area. The fusion of machine learning (ML) and artificial intelligence (AI) has expanded the possibilities for web development. Modern websites now include chatbots, clever recommendation systems, and customization algorithms built in. In the rapidly evolving landscape of modern websites, it has become increasingly apparent that user engagement and personalization are key factors for success. To meet these demands, websites now incorporate a range of innovative technologies. One such technology is chatbots, which provide users with instant assistance and support, enhancing their overall browsing experience. These intelligent bots are capable of understanding natural language and can answer frequently asked questions, offer product recommendations, and even help with troubleshooting. Moreover, clever recommendation systems have emerged as a powerful tool on modern websites. By analyzing user behavior, preferences, and historical data, these systems can intelligently suggest relevant products, articles, or services tailored to each user's unique interests. This not only saves users valuable time but also increases the chances of conversions and customer satisfaction. Additionally, customization algorithms have revolutionized the way websites interact with users. By leveraging user preferences, browsing history, and demographic information, these algorithms can dynamically adjust the website's layout, content, and functionalities to suit individual user needs. This level of personalization enhances user engagement, boosts conversion rates, and ultimately leads to a more satisfying online experience. In summary, the integration of chatbots, clever recommendation systems, and customization algorithms into modern websites is transforming the way users interact with online platforms. These advanced technologies not only streamline user experiences but also contribute to increased customer satisfaction, improved conversions, and overall website success.

Keywords: Javascript, machine learning, artificial intelligence, web development

Procedia PDF Downloads 74
2593 Proposing Smart Clothing for Addressing Criminal Acts Against Women in South Africa

Authors: Anne Mastamet-Mason

Abstract:

Crimes against women is a global concern, and South Africa, in particular, is in a dilemma of dealing with constant criminal acts that face the country. Debates on violence against women in South Africa cannot be overemphasised any longer as crimes continue to rise year by year. The recent death of a university student at the University of Cape Town, as well as many other cases, continues to strengthen the need to find solutions from all the spheres of South African society. The advanced textiles market contains a high number and variety of technologies, many of which have protected status and constitute a relatively small portion of the textiles used for the consumer market. Examples of advanced textiles include nanomaterials, such as silver, titanium dioxide and zinc oxide, designed to create an anti-microbial and self-cleaning layer on top of the fibers, thereby reducing body smell and soiling. Smart textiles propose materials and fabrics versatile and adaptive to different situations and functions. Integrating textiles and computing technologies offer an opportunity to come up with differentiated characteristics and functionality. This paper presents a proposal to design a smart camisole/Yoga sports brazier and a smart Yoga sports pant garment to be worn by women while alone and while in purported danger zones. The smart garments are to be worn under normal clothing and cannot be detected or seen, or suspected by perpetrators. The garments are imbued with devices to sense any physical aggression and any abnormal or accelerated heartbeat that may be exhibited by the victim of violence. The signals created during the attack can be transmitted to the police and family members who own a mobile application system that accepts signals emitted. The signals direct the receiver to the exact location of the offence, and the victim can be rescued before major violations are committed. The design of the Yoga sports garments will be done by Professor Mason, who is a fashion designer by profession, while the mobile phone application system will be developed by Mr. Amos Yegon, who is an independent software developer.

Keywords: smart clothing, wearable technology, south africa, 4th industrial revolution

Procedia PDF Downloads 197
2592 DOS and DDOS Attacks

Authors: Amin Hamrahi, Niloofar Moghaddam

Abstract:

Denial of Service is for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Denial of Service (DoS) attacks have become a major threat to current computer networks. Many recent DoS attacks were launched via a large number of distributed attacking hosts in the Internet. These attacks are called distributed denial of service (DDoS) attacks. To have a better understanding on DoS attacks, this article provides an overview on existing DoS and DDoS attacks and major defense technologies in the Internet.

Keywords: denial of service, distributed denial of service, traffic, flooding

Procedia PDF Downloads 386
2591 Simulation Programs to Education of Crisis Management Members

Authors: Jiri Barta

Abstract:

This paper deals with a simulation programs and technologies using in the educational process for members of the crisis management. Risk analysis, simulation, preparation and planning are among the main activities of workers of crisis management. Made correctly simulation of emergency defines the extent of the danger. On this basis, it is possible to effectively prepare and plan measures to minimize damage. The paper is focused on simulation programs that are trained at the University of Defence. Implementation of the outputs from simulation programs in decision-making processes of crisis staffs is one of the main tasks of the research project.

Keywords: crisis management, continuity, critical infrastructure, dangerous substance, education, flood, simulation programs

Procedia PDF Downloads 458
2590 Extremophilic Amylases of Mycelial Fungi Strains Isolated in South Caucasus for Starch Processing

Authors: T. Urushadze, R. Khvedelidze, L. Kutateladze, M. Jobava, T. Burduli, T. Alexidze

Abstract:

There is an increasing interest in reliable, wasteless, ecologically friendly technologies. About 40% of enzymes produced all over the world are used for production of syrups with high concentration of glucose-fructose. One of such technologies complies obtaining fermentable sugar glucose from raw materials containing starch by means of amylases. In modern alcohol-producing factories this process is running in two steps, involving two enzymes of different origin: bacterial α-amylase and fungal glucoamylase, as generally fungal amylases are less thermostable as compared to bacterial amylases. Selection of stable and operable at 700С and higher temperatures enzyme preparation with both α- and glucoamylase activities will allow conducting this process in one step. S. Durmishidze Institute of Biochemistry and Biotechnology owns unique collection of mycelial fungi, isolated from different ecological niches of Caucasus. As a result of screening our collection 39 strains poducing amylases were revealed. Most of them belong to the genus Aspergillus. Optimum temperatures of action of selected amylases from three producers were estableshed to be within the range 67-80°C. A. niger B-6 showed higher α-amylase activity at 67°C, and glucoamylase activity at 62°C, A. niger 6-12 showed higher α-amylase activity at 72°C, and glucoamylase activity at 65°C, Aspergillus niger p8-3 showed higher activities at 82°C and 70°C, for α-amylase and glucoamylase activities, respectively. Exhaustive hydrolysis process of starch solutions of different concentrations (3, 5, 15, and 30 %) with cultural liquid and technical preparation of Aspergillus niger p8-3 enzyme was studied. In case of low concentrations exhaustive hydrolysis of starch lasts 40–60 minutes, in case of high concentrations hydrolysis takes longer time. 98, 6% yield of glucose can be reached at incubation during 12 hours with enzyme cultural liquid and 8 hours incubation with technical preparation of the enzyme at gradual increase of temperature from 50°C to 82°C during the first 20 minutes and further decrease of temperature to 70°C. Temperature setting for high yield of glucose and high hydrolysis (pasteurizing), optimal for activity of these strains is the prerequisite to be able to carry out hydrolysis of starch to glucose in one step, and consequently, using one strain, what will be economically justified.

Keywords: amylase, glucose hydrolisis, stability, starch

Procedia PDF Downloads 345
2589 Comparison of Hydrogen and Electrification Perspectives in Decarbonizing the Transport Sector

Authors: Matteo Nicoli, Gianvito Colucci, Valeria Di Cosmo, Daniele Lerede, Laura Savoldi

Abstract:

The transport sector is currently responsible for approximately 1/3 of greenhouse gas emissions in Europe. In the wider context of achieving carbon neutrality of the global energy system, different alternatives are available to decarbonizethe transport sector. In particular, while electricity is already the most consumed energy commodity in rail transport, battery electric vehicles are one of the zero-emissions options on the market for road transportation. On the other hand, hydrogen-based fuel cell vehicles are available for road and non-road vehicles. The European Commission is strongly pushing toward the integration of hydrogen in the energy systems of European countries and its widespread adoption as an energy vector to achieve the Green Deal targets. Furthermore, the Italian government is defining hydrogen-related objectives with the publication of a dedicated Hydrogen Strategy. The adoption of energy system optimization models to study the possible penetration of alternative zero-emitting transport technologies gives the opportunity to perform an overall analysis of the effects that the development of innovative technologies has on the entire energy system and on the supply-side, devoted to the production of energy carriers such as hydrogen and electricity. Using an open-source modeling framework such as TEMOA, this work aims to compare the role of hydrogen and electric vehicles in the decarbonization of the transport sector. The analysis investigates the advantages and disadvantages of adopting the two options, from the economic point of view (costs associated with the two options) and the environmental one (looking at the emissions reduction perspectives). Moreover, an analysis on the profitability of the investments in hydrogen and electric vehicles will be performed. The study investigates the evolution of energy consumption and greenhouse gas emissions in different transportation modes (road, rail, navigation, and aviation) by detailed analysis of the full range of vehicles included in the techno-economic database used in the TEMOA model instance adopted for this work. The transparency of the analysis is guaranteed by the accessibility of the TEMOA models, based on an open-access source code and databases.

Keywords: battery electric vehicles, decarbonization, energy system optimization models, fuel cell vehicles, hydrogen, open-source modeling, TEMOA, transport

Procedia PDF Downloads 102
2588 The Evolution of Architecture through Digital: A Survey on Fashion Catwalk Becoming Digital

Authors: Valeria Minucciani, Maria Maddalena Margaria

Abstract:

While mathematical tools that make digital architecture possible are very sophisticated and advanced, theoretical development of digital architecture (intended as a discipline that integrates or replaces the real architecture) is not. The fashion show, that involves interiors architecture, exhibit design and scenography, has been exploiting for ten years the opportunities offered by digital technologies. To gain greater visibility and to reach a wider audience, high-level experimentations have been performed. The aim of this paper is in investigating, through the analysis of some cases of virtual fashion shows, the 'architectural' impact of the virtual conception of interior space.

Keywords: digital interiors, exhibit, fashion catwalk, architectural theory

Procedia PDF Downloads 416
2587 Maximum Efficiency of the Photovoltaic Cells Using a Genetic Algorithm

Authors: Latifa Sabri, Mohammed Benzirar, Mimoun Zazoui

Abstract:

The installation of photovoltaic systems is one of future sources to generate electricity without emitting pollutants. The photovoltaic cells used in these systems have demonstrated enormous efficiencies and advantages. Several researches have discussed the maximum efficiency of these technologies, but only a few experiences have succeeded to right weather conditions to get these results. In this paper, two types of cells were selected: crystalline and amorphous silicon. Using the method of genetic algorithm, the results show that for an ambient temperature of 25°C and direct irradiation of 625 W/m², the efficiency of crystalline silicon is 12% and 5% for amorphous silicon.

Keywords: PV, maximum efficiency, solar cell, genetic algorithm

Procedia PDF Downloads 418
2586 The Impacts of Technology on Operations Costs: The Mediating Role of Operation Flexibility

Authors: Fazli Idris, Jihad Mohammad

Abstract:

The study aims to determine the impact of technology and service operations flexibility, which is divided into external flexibility and internal robustness, on operations costs. A mediation model is proposed that links technology to operations costs via operation flexibility. Drawing on a sample of 475 of operations managers of various service sectors in Malaysia and South Africa, Structural Equation Modeling (SEM) was employed to test the relationship using Smart-PLS procedures. It was found that a significant relationship was established between technologies to operations costs via both operations flexibility dimensions. Theoretical and managerial implications are offered to explain the results.

Keywords: Operations flexibility, technology, costs, mediation

Procedia PDF Downloads 606
2585 A Novel Approach for Energy Utilisation in a Pyrolysis Plant

Authors: S. Murugan, Bohumil Horak

Abstract:

Pyrolysis is one of the possible technologies to derive energy from waste organic substances. In recent years, pilot level and demonstrated plants have been installed in few countries. The heat energy lost during the process is not effectively utilized resulting in less savings of energy and money. This paper proposes a novel approach to integrate a combined heat and power unit(CHP) and reduce the primary energy consumption in a tyre pyrolysis pilot plant. The proposal primarily uses the micro combined heat and power concept that will help to produce both heat and power in the process.

Keywords: pyrolysis, waste tyres, waste plastics, biomass, waste heat

Procedia PDF Downloads 324
2584 Suitability Assessment of Water Harvesting and Land Restoration in Catchment Comprising Abandoned Quarry Site in Addis Ababa, Ethiopia

Authors: Rahel Birhanu Kassaye, Ralf Otterpohl, Kumelachew Yeshitila

Abstract:

Water resource management and land degradation are among the critical issues threatening the suitable livability of many cities in developing countries such as Ethiopia. Rapid expansion of urban areas and fast growing population has increased the pressure on water security. On the other hand, the large transformation of natural green cover and agricultural land loss to settlement and industrial activities such as quarrying is contributing to environmental concerns. Integrated water harvesting is considered to play a crucial role in terms of providing alternative water source to insure water security and helping to improve soil condition, agricultural productivity and regeneration of ecosystem. Moreover, it helps to control stormwater runoff, thus reducing flood risks and pollution, thereby improving the quality of receiving water bodies and the health of inhabitants. The aim of this research was to investigate the potential of applying integrated water harvesting approaches as a provision for water source and enabling land restoration in Jemo river catchment consisting of abandoned quarry site adjacent to a settlement area that is facing serious water shortage in western hilly part of Addis Ababa city, Ethiopia. The abandoned quarry site, apart from its contribution to the loss of aesthetics, has resulted in poor water infiltration and increase in stormwater runoff leading to land degradation and flooding in the downstream. Application of GIS and multi-criteria based analysis are used for the assessment of potential water harvesting technologies considering the technology features and site characteristics of the case study area. Biophysical parameters including precipitation, surrounding land use, surface gradient, soil characteristics and geological aspects are used as site characteristic indicators and water harvesting technologies including retention pond, check dam, agro-forestation employing contour trench system were considered for evaluation with technical and socio-economic factors used as parameters in the assessment. The assessment results indicate the different suitability potential among the analyzed water harvesting and restoration techniques with respect to the abandoned quarry site characteristics. Application of agro-forestation with contour trench system with the revegetation of indigenous plants is found to be the most suitable option for reclamation and restoration of the quarry site. Successful application of the selected technologies and strategies for water harvesting and restoration is considered to play a significant role to provide additional water source, maintain good water quality, increase agricultural productivity at urban peri-urban interface scale and improve biodiversity in the catchment. The results of the study provide guideline for decision makers and contribute to the integration of decentralized water harvesting and restoration techniques in the water management and planning of the case study area.

Keywords: abandoned quarry site, land reclamation and restoration, multi-criteria assessment, water harvesting

Procedia PDF Downloads 212
2583 Advancing Communication Theory in the Age of Digital Technology: Bridging the Gap Between Traditional Models and Emerging Platforms

Authors: Sidique Fofanah

Abstract:

This paper explores the intersection of traditional communication theories and modern digital technologies, analyzing how established models adapt to contemporary communication platforms. It examines the evolving nature of interpersonal, group, and mass communication within digital environments, emphasizing the role of social media, AI-driven communication tools, and virtual reality in reshaping communication paradigms. The paper also discusses the implications for future research and practice in communication studies, proposing an integrated framework that accommodates both classical and emerging theories.

Keywords: communication, traditional models, emerging platforms, digital media

Procedia PDF Downloads 14
2582 The Scientific Phenomenon Revealed in the Holy Quran - an Update

Authors: Arjumand Warsy

Abstract:

The Holy Quran was revealed to Prophet Mohammad (May Peace and Blessings of Allah be upon Him) over fourteen hundred years ago, at a time when majority of the people in Arabia were illiterate and very few could read or write. Any knowledge about medicine, anatomy, biology, astronomy, physics, geology, geophysics or other sciences were almost non-existent. Many superstitious and groundless believes were prevalent and these believes were passed down through past generations. At that time, the Holy Quran was revealed and it presented several phenomenon that have been only currently unveiled, as scientists have worked endlessly to provide explanation for these physical and biological phenomenon applying scientific technologies. Many important discoveries were made during the 20th century and it is interesting to note that many of these discoveries were already present in the Holy Quran fourteen hundred years ago. The Scientific phenomenon, mentioned in the Holy Quran, cover many different fields in biological and physical sciences and have been the source of guidance for a number of scientists. A perfect description of the creation of the universe, the orbits in space, the development process, development of hearing process prior to sight, importance of the skin in sensing pain, uniqueness of fingerprints, role of males in selection of the sex of the baby, are just a few of the many facts present in the Quran that have astonished many scientists. The Quran in Chapter 20, verse 50 states: قَالَ رَبُّنَا الَّذِيۤ اَعْطٰى كُلَّ شَيْءٍ خَلْقَهٗ ثُمَّ هَدٰى ۰۰ (He said "Our Lord is He, Who has given a distinctive form to everything and then guided it aright”). Explaining this brief statement in the light of the modern day Molecular Genetics unveils the entire genetic basis of life and how guidance is stored in the genetic material (DNA) present in the nucleus. This thread like structure, made of only six molecules (sugar, phosphate, adenine, thymine, cytosine and guanine), is so brilliantly structured by the Creator that it holds all the information about each and every living thing, whether it is viruses, bacteria, fungi, plants, animals or humans or any other living being. This paper will present an update on some of the physical and biological phenomena’ presented in the Holy Quran, unveiled using advanced technologies during the last century and will discuss how the need to incorporate this information in the curricula.

Keywords: The Holy Quran, scientific facts, curriculum, Muslims

Procedia PDF Downloads 349
2581 Intersections and Cultural Landscape Interpretation, in the Case of Ancient Messene in the Peloponnese

Authors: E. Maistrou, P. Themelis, D. Kosmopoulos, K. Boulougoura, A. M. Konidi, K. Moretti

Abstract:

InterArch is an ongoing research project that is running since September 2020 and aims to propose a digital application for the enhancement of the cultural landscape, which emphasizes the contribution of physical space and time in digital data organization. The research case study refers to Ancient Messene in the Peloponnese, one of the most important archaeological sites in Greece. The project integrates an interactive approach to the natural environment, aiming at a manifold sensory experience. It combines the physical space of the archaeological site with the digital space of archaeological and cultural data while, at the same time, it embraces storytelling processes by engaging an interdisciplinary approach that familiarizes the user to multiple semantic interpretations. The research project is co‐financed by the European Union and Greek national funds, through the Operational Program Competitiveness, Entrepreneurship, and Innovation, under the call RESEARCH - CREATE – INNOVATE (project code: Τ2ΕΔΚ-01659). It involves mutual collaboration between academic and cultural institutions and the contribution of an IT applications development company. New technologies and the integration of digital data enable the implementation of non‐linear narratives related to the representational characteristics of the art of collage. Various images (photographs, drawings, etc.) and sounds (narrations, music, soundscapes, audio signs, etc.) could be presented according to our proposal through new semiotics of augmented and virtual reality technologies applied in touch screens and smartphones. Despite the fragmentation of tangible or intangible references, material landscape formations, including archaeological remains, constitute the common ground that can inspire cultural narratives in a process that unfolds personal perceptions and collective imaginaries. It is in this context that cultural landscape may be considered an indication of space and historical continuity. It is in this context that history could emerge, according to our proposal, not solely as a previous inscription but also as an actual happening. As a rhythm of occurrences suggesting mnemonic references and, moreover, evolving history projected on the contemporary ongoing cultural landscape.

Keywords: cultural heritage, digital data, landscape, archaeological sites, visitors’ itineraries

Procedia PDF Downloads 78
2580 Life Cycle Assessment of an Onshore Wind Turbine in Kuwait

Authors: Badriya Almutairi, Ashraf El-Hamalawi

Abstract:

Wind energy technologies are considered to be among the most promising types of renewable energy sources due to the growing concerns over climate change and energy security. Kuwait is amongst the countries that began realising the consequences of climate change and the long-term economic and energy security situation, considering options when oil runs out. Added to this are the fluctuating oil prices, rapid increase in population, high electricity consumption and protection of the environment It began to make efforts in the direction of greener solutions for energy needs by looking for alternative forms of energy and assessing potential renewable energy resources, including wind and solar. The aim of this paper is to examine wind energy as an alternative renewable energy source in Kuwait, due to its availability and low cost, reducing the dependency on fossil fuels compared to other forms of renewable energy. This paper will present a life cycle assessment of onshore wind turbine systems in Kuwait, comprising 4 stages; goal and scope of the analysis, inventory analysis, impact assessment and interpretation of the results. It will also provide an assessment of potential renewable energy resources and technologies applied for power generation and the environmental benefits for Kuwait. An optimum location for a site (Shagaya) will be recommended for reasons such as high wind speeds, land availability and distance to the next grid connection, and be the focus of this study. The potential environmental impacts and resources used throughout the wind turbine system’s life-cycle are then analysed using a Life Cycle Assessment (LCA). The results show the total carbon dioxide (CO₂) emission for a turbine with steel pile foundations is greater than emissions from a turbine with concrete foundations by 18 %. The analysis also shows the average CO₂ emissions from electricity generated using crude oil is 645gCO₂/kWh and the carbon footprint per functional unit for a wind turbine ranges between 6.6 g/kWh to 10 g/kWh, an increase of 98%, thus providing cost and environmental benefits by creating a wind farm in Kuwait. Using a cost-benefit analysis, it was also found that the electricity produced from wind energy in Kuwait would cost 17.6fils/kWh (0.05834 $/kWh), which is less than the cost of electricity currently being produced using conventional methods at 22 fils/kW (0.07$/kWh), i.e., a reduction of 20%.

Keywords: CO₂ emissions, Kuwait, life cycle assessment, renewable energy, wind energy

Procedia PDF Downloads 299
2579 Enhancing the Network Security with Gray Code

Authors: Thomas Adi Purnomo Sidhi

Abstract:

Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter.

Keywords: network, network security, grey code, physical layer

Procedia PDF Downloads 496