Search results for: human factor in security
14199 Governance, Risk Management, and Compliance Factors Influencing the Adoption of Cloud Computing in Australia
Authors: Tim Nedyalkov
Abstract:
A business decision to move to the cloud brings fundamental changes in how an organization develops and delivers its Information Technology solutions. The accelerated pace of digital transformation across businesses and government agencies increases the reliance on cloud-based services. They are collecting, managing, and retaining large amounts of data in cloud environments makes information security and data privacy protection essential. It becomes even more important to understand what key factors drive successful cloud adoption following the commencement of the Privacy Amendment Notifiable Data Breaches (NDB) Act 2017 in Australia as the regulatory changes impact many organizations and industries. This quantitative correlational research investigated the governance, risk management, and compliance factors contributing to cloud security success. The factors influence the adoption of cloud computing within an organizational context after the commencement of the NDB scheme. The results and findings demonstrated that corporate information security policies, data storage location, management understanding of data governance responsibilities, and regular compliance assessments are the factors influencing cloud computing adoption. The research has implications for organizations, future researchers, practitioners, policymakers, and cloud computing providers to meet the rapidly changing regulatory and compliance requirements.Keywords: cloud compliance, cloud security, data governance, privacy protection
Procedia PDF Downloads 11614198 Intrusion Detection in Cloud Computing Using Machine Learning
Authors: Faiza Babur Khan, Sohail Asghar
Abstract:
With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.Keywords: cloud security, threats, machine learning, random forest, classification
Procedia PDF Downloads 32014197 Effectiveness Factor for Non-Catalytic Gas-Solid Pyrolysis Reaction for Biomass Pellet Under Power Law Kinetics
Authors: Haseen Siddiqui, Sanjay M. Mahajani
Abstract:
Various important reactions in chemical and metallurgical industries fall in the category of gas-solid reactions. These reactions can be categorized as catalytic and non-catalytic gas-solid reactions. In gas-solid reaction systems, heat and mass transfer limitations put an appreciable influence on the rate of the reaction. The consequences can be unavoidable for overlooking such effects while collecting the reaction rate data for the design of the reactor. Pyrolysis reaction comes in this category that involves the production of gases due to the interaction of heat and solid substance. Pyrolysis is also an important step in the gasification process and therefore, the gasification reactivity majorly influenced by the pyrolysis process that produces the char, as a feed for the gasification process. Therefore, in the present study, a non-isothermal transient 1-D model is developed for a single biomass pellet to investigate the effect of heat and mass transfer limitations on the rate of pyrolysis reaction. The obtained set of partial differential equations are firstly discretized using the concept of ‘method of lines’ to obtain a set of ordinary differential equation with respect to time. These equations are solved, then, using MATLAB ode solver ode15s. The model is capable of incorporating structural changes, porosity variation, variation in various thermal properties and various pellet shapes. The model is used to analyze the effectiveness factor for different values of Lewis number and heat of reaction (G factor). Lewis number includes the effect of thermal conductivity of the solid pellet. Higher the Lewis number, the higher will be the thermal conductivity of the solid. The effectiveness factor was found to be decreasing with decreasing Lewis number due to the fact that smaller Lewis numbers retard the rate of heat transfer inside the pellet owing to a lower rate of pyrolysis reaction. G factor includes the effect of the heat of reaction. Since the pyrolysis reaction is endothermic in nature, the G factor takes negative values. The more the negative value higher will be endothermic nature of the pyrolysis reaction. The effectiveness factor was found to be decreasing with more negative values of the G factor. This behavior can be attributed to the fact that more negative value of G factor would result in more energy consumption by the reaction owing to a larger temperature gradient inside the pellet. Further, the analytical expressions are also derived for gas and solid concentrations and effectiveness factor for two limiting cases of the general model developed. The two limiting cases of the model are categorized as the homogeneous model and unreacted shrinking core model.Keywords: effectiveness factor, G-factor, homogeneous model, lewis number, non-catalytic, shrinking core model
Procedia PDF Downloads 13814196 Validity and Reliability of the Iranian Version of the Self-Expansion Questionnaire
Authors: Mehravar Javid, James Sexton, Farzaneh Amani, Kainaz Patravala
Abstract:
Self-expansion is a procedure through which people expand the dimensions of their self-concept by incorporating novel content into their sense and experience of identity. Greater self-expansion predicts positive consequences for individuals and romantic relationships. The self-expansion questionnaire (SEQ) originally developed by Lewandowski & Aron (2002) assumes that self-expansion is constituted of key components from the self-expansion model. This study aimed to confirm the factor structure of SEQ and adapt the questions of the scale to the Iranian culture. The sample included 190 participants who responded to 14 items and were selected by simple random sampling. Using Amos-21 and SPSS-21, descriptive statistics, Pearson correlation and Confirmatory Factor Analysis (CFA) were calculated. Cronbach’s alpha coefficient for total SEQ items was 0.92. Results of CFA supported the factor structure SEQ [RMSEA=0.08, GFI=0.88 and CFI=0.92] that showed the model has a good fit and also all the items of SEQ, have a high correlation and have a direct and significant relationship. So, the SEQ demonstrated acceptable psychometric properties in Tehran University students. Looking forward, it would be interesting and exciting to see the implications of the scale as applied to romantic relationships.Keywords: validity, reliability, confirmatory factor analysis, self-expansion questionnaire
Procedia PDF Downloads 8214195 Traffic Safety and Risk Assessment Model by Analysis of Questionnaire Survey: A Case Study of S. G. Highway, Ahmedabad, India
Authors: Abhijitsinh Gohil, Kaushal Wadhvaniya, Kuldipsinh Jadeja
Abstract:
Road Safety is a multi-sectoral and multi-dimensional issue. An effective model can assess the risk associated with highway safety. A questionnaire survey is very essential to identify the events or activities which are causing unsafe condition for traffic on an urban highway. A questionnaire of standard questions including vehicular, human and infrastructure characteristics can be made. Responses from the age wise group of road users can be taken on field. Each question or an event holds a specific risk weightage, which contributes in creating an inappropriate and unsafe flow of traffic. The probability of occurrence of an event can be calculated from the data collected from the road users. Finally, the risk score can be calculated by considering the risk factor and the probability of occurrence of individual event and addition of all risk score for the individual event will give the total risk score of a particular road. Standards for risk score can be made and total risk score can be compared with the standards. Thus road can be categorized based on risk associated and traffic safety on it. With this model, one can assess the need for traffic safety improvement on a given road, and qualitative data can be analysed.Keywords: probability of occurrence, questionnaire, risk factor, risk score
Procedia PDF Downloads 33814194 An Examination of the Powers of the Executive to Continued Detention of Suspects in Disobedience to Court Orders
Authors: Chukwuemeka Castro Nwabuzor
Abstract:
The 2015 Administration of Criminal Justice Act in Nigeria clearly sets out conditions for bail for felonies, lesser offenses and capital offenses. Even where the conditions for bail are met, granting an application for bail is not automatic as it is subject to the discretion of the court. Where the court, however, grants bail to an accused, the detaining authority which usually is the executive arm of government is bound to comply with the order of the court. This paper discusses the constitutionality of the continued detention of criminal suspects in disobedience to an order of the court and in the absence of an appeal. Particularly, the paper looks at the rights to personal liberty, the dignity of the human person and also the presumption of innocence which remains one of the crucial pillars of our criminal jurisprudence. The paper analyses the reasons posed by the executive for the continued detention of a suspect including State security and security of the suspect and questions whether the reasons are reasonable justifiable in a constitutional democratic society and whether they breach the principles of separation of powers. The paper concludes that the continued detention criminal of suspects in disobedience to court orders constitutes contempt of court and dishonours the principles of separation of powers enshrined in the Nigerian Constitution. This paper makes a strong case for the donation of more enforceable powers to the judiciary particularly with regards to the granting of compensation orders against the executive and ensuring compliance by the executive to bail orders.Keywords: breach of fundamental rights, contempt of court, discretion of court, right to bail, separation of powers
Procedia PDF Downloads 16514193 Blockchain’s Feasibility in Military Data Networks
Authors: Brenden M. Shutt, Lubjana Beshaj, Paul L. Goethals, Ambrose Kam
Abstract:
Communication security is of particular interest to military data networks. A relatively novel approach to network security is blockchain, a cryptographically secured distribution ledger with a decentralized consensus mechanism for data transaction processing. Recent advances in blockchain technology have proposed new techniques for both data validation and trust management, as well as different frameworks for managing dataflow. The purpose of this work is to test the feasibility of different blockchain architectures as applied to military command and control networks. Various architectures are tested through discrete-event simulation and the feasibility is determined based upon a blockchain design’s ability to maintain long-term stable performance at industry standards of throughput, network latency, and security. This work proposes a consortium blockchain architecture with a computationally inexpensive consensus mechanism, one that leverages a Proof-of-Identity (PoI) concept and a reputation management mechanism.Keywords: blockchain, consensus mechanism, discrete-event simulation, fog computing
Procedia PDF Downloads 13814192 The New Approach to Airport Emergency Plans
Authors: Jakub Kraus, Vladimír Plos, Peter Vittek
Abstract:
This article deals with a new approach to the airport emergency plans, which are the basic documents and manuals for dealing with events with impact on safety or security. The article describes the identified parts in which the current airport emergency plans do not fulfill their role and which should therefore be considered in the creation of corrective measures. All these issues have been identified at airports in the Czech Republic and confirmed at airports in neighboring countries.Keywords: airport emergency plan, aviation safety, aviation security, comprehensive management system
Procedia PDF Downloads 51114191 How Manufacturing Firm Manages Information Security: Need Pull and Technology Push Perspective
Authors: Geuna Kim, Sanghyun Kim
Abstract:
This study investigates various factors that may influence the ISM process, including the organization’s internal needs and external pressure, and examines the role of regulatory pressure in ISM development and performance. The 105 sets of data collected in a survey were tested against the research model using SEM. The results indicate that NP and TP had positive effects on the ISM process, except for perceived benefits. Regulatory pressure had a positive effect on the relationship between ISM awareness and ISM development and performance.Keywords: information security management, need pull, technology push, regulatory pressure
Procedia PDF Downloads 29714190 A Study on the Iterative Scheme for Stratified Shields Gamma Ray Buildup Factor Using Layer-Splitting Technique in Double-Layer Shield
Authors: Sari F. Alkhatib, Chang Je Park, Gyuhong Roh, Daeseong Jo
Abstract:
The iterative scheme which is used to treat buildup factors for stratified shields of three-layers or more is being investigated here using the layer-splitting technique. The second layer in a double-layer shield was split into two equivalent layers and the scheme was implemented on the new 'three-layer' shield configuration. The results of such manipulation for water-lead and water-iron shields combinations are presented here for 1 MeV photons. It was found that splitting the second layer introduces some deviation on the overall buildup factor. This expected deviation appeared to be higher in the case of low Z layer followed by high Z. However, the iterative scheme showed a great consistency and strong coherence with the introduced changes.Keywords: build-up factor, iterative scheme, stratified shields, radiation protection
Procedia PDF Downloads 57614189 The Internet of Things Ecosystem: Survey of the Current Landscape, Identity Relationship Management, Multifactor Authentication Mechanisms, and Underlying Protocols
Authors: Nazli W. Hardy
Abstract:
A critical component in the Internet of Things (IoT) ecosystem is the need for secure and appropriate transmission, processing, and storage of the data. Our current forms of authentication, and identity and access management do not suffice because they are not designed to service cohesive, integrated, interconnected devices, and service applications. The seemingly endless opportunities of IoT are in fact circumscribed on multiple levels by concerns such as trust, privacy, security, loss of control, and related issues. This paper considers multi-factor authentication (MFA) mechanisms and cohesive identity relationship management (IRM) standards. It also surveys messaging protocols that are appropriate for the IoT ecosystem.Keywords: identity relation management, multifactor authentication, protocols, survey of internet of things ecosystem
Procedia PDF Downloads 35414188 Changing the Dynamics of the Regional Water Security in the Mekong River Basin: An Explorative Study Understanding the Cooperation and Conflict from Critical Hydropolitical Perspective
Authors: Richard Grünwald, Wenling Wang, Yan Feng
Abstract:
The presented paper explores the changing dynamics of regional water security in the Mekong River Basin and examines the contemporary water-related challenges from a critical hydropolitical perspective. By drawing on the Lancang-Mekong Cooperation and Conflict Database (LMCCD) recording more than 3000 water-related events within the basin in the last 30 years, we identified several trends changing the dynamics of the regional water security in the Mekong River Basin. Firstly, there is growing politicization of water that is no longer interpreted as abundant. While some scientists blame the rapid basin development, particularly in upstream countries, other researchers consider climate change and cumulative environmental impacts of various water projects as the main culprit for changing the water flow. Secondly, there is an increasing securitization of large-scale hydropower dams with questionable outcomes. Despite hydropower dams raise many controversies, many riparian states push the development at all cost. Such water security dilemma can be especially traced to Laos and Cambodia, which highly invest in the hydropower sector even at the expense of the local environment and good relations with neighbouring countries situated lower on the river. Thirdly, there is a lack of accountable transboundary water governance that will effectively face a looming water crisis. To date, most of the existing cooperation mechanisms are undermined by the geopolitical interests of foreign donors and increasing mistrust to scientific approaches dealing with water insecurity. Our findings are beneficial for the policy-makers and other water experts who want to grasp the broader hydropolitical context in the Mekong River Basin and better understand the new water security threats, including misinterpretation of the hydrological data and legitimization of the pro-development narratives.Keywords: critical hydropolitics, mekong river, politicization of science, water governance, water security
Procedia PDF Downloads 21314187 Proposal of Optimality Evaluation for Quantum Secure Communication Protocols by Taking the Average of the Main Protocol Parameters: Efficiency, Security and Practicality
Authors: Georgi Bebrov, Rozalina Dimova
Abstract:
In the field of quantum secure communication, there is no evaluation that characterizes quantum secure communication (QSC) protocols in a complete, general manner. The current paper addresses the problem concerning the lack of such an evaluation for QSC protocols by introducing an optimality evaluation, which is expressed as the average over the three main parameters of QSC protocols: efficiency, security, and practicality. For the efficiency evaluation, the common expression of this parameter is used, which incorporates all the classical and quantum resources (bits and qubits) utilized for transferring a certain amount of information (bits) in a secure manner. By using criteria approach whether or not certain criteria are met, an expression for the practicality evaluation is presented, which accounts for the complexity of the QSC practical realization. Based on the error rates that the common quantum attacks (Measurement and resend, Intercept and resend, probe attack, and entanglement swapping attack) induce, the security evaluation for a QSC protocol is proposed as the minimum function taken over the error rates of the mentioned quantum attacks. For the sake of clarity, an example is presented in order to show how the optimality is calculated.Keywords: quantum cryptography, quantum secure communcation, quantum secure direct communcation security, quantum secure direct communcation efficiency, quantum secure direct communcation practicality
Procedia PDF Downloads 18414186 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble
Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi
Abstract:
Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble
Procedia PDF Downloads 22114185 The Role of Human Beings as Caliphs in Preserving Nature
Authors: Firdaus Khairi Abdul Kadir, Nazihah Rusli, Noor Aisyah Abdul Aziz
Abstract:
Islam is a comprehensive religion encompassing all aspects of society’s life such as social, economic, political, cultural and environmental. The environment is part of the manifestation of God’s greatness which has pearls of wisdom, bestowed upon human beings to make them realize that everything is in the hands of God (Allah SWT). However, the equilibrium of nature could be disturbed from the excessive exploitation by humans’ hands. As a caliph on this earth, it is the responsibility of human beings to look after the environment proactively. Besides, Islam calls for the execution of accountable development and respecting the principles of sustainability. Therefore, this study focuses on the role of human beings as caliphs on this earth who are responsible for nature and their acts in conserving and preserving the environment based on the approach of religious education. This study also used the research method of the survey library.Keywords: environment, human beings, caliph, tauhid, Allah SWT
Procedia PDF Downloads 12914184 Design an Assessment Model of Research and Development Capabilities with the New Product Development Approach: A Case Study of Iran Khodro Company
Authors: Hamid Hanifi, Adel Azar, Alireza Booshehri
Abstract:
In order to know about the capability level of R & D units in automotive industry, it is essential that organizations always compare themselves with standard level and higher than themselves so that to be improved continuously. In this research, with respect to the importance of this issue, we have tried to present an assessment model for R & D capabilities having reviewed on new products development in automotive industry of Iran. Iran Khodro Company was selected for the case study. To this purpose, first, having a review on the literature, about 200 indicators effective in R & D capabilities and new products development were extracted. Then, of these numbers, 29 indicators which were more important were selected by industry and academia experts and the questionnaire was distributed among statistical population. Statistical population was consisted of 410 individuals in Iran Khodro Company. We used the 410 questionnaires for exploratory factor analysis and then used the data of 308 questionnaires from the same population randomly for confirmatory factor analysis. The results of exploratory factor analysis led to categorization of dimensions in 9 secondary dimensions. Naming the dimensions was done according to a literature review and the professors’ opinion. Using structural equation modeling and AMOS software, confirmatory factor analysis was conducted and ultimate model with 9 secondary dimensions was confirmed. Meanwhile, 9 secondary dimensions of this research are as follows: 1) Research and design capability, 2) Customer and market capability, 3) Technology capability, 4) Financial resources capability, 5) Organizational chart, 6) Intellectual capital capability, 7) NPD process capability, 8) Managerial capability and 9) Strategy capability.Keywords: research and development, new products development, structural equations, exploratory factor analysis, confirmatory factor analysis
Procedia PDF Downloads 33914183 Investigating the Encouraging Factors for Scholarly Works Contribution towards Institutional Repository: A Case Study at a Malaysian University
Authors: Mohd Rashid bin Ab Hamid, Noor Azura binti Omar, Zainol Bin Mustafa
Abstract:
Purpose: The aim of this paper is to study the encouraging factors for scholarly works contribution towards among academicians at Malaysian university. Methods: This paper uses questionnaire for data collection on the respondents’ perceptional level on the institutional repository efforts in one of the university under study. Several encouraging factors have been identified and to be measured using descriptive statistics. The factors are related to content contribution, i.e. personal factor, professional factor, organizational factor and technological factor. Findings: The study found that all these four encouraging factors did have a relation to the contribution of scholarly works in the university by the academician. Research Limitations: This study used a case study and generalization to all Malaysian universities should be well taken care of. Practical implications: The library at the university should look into these four encouraging factors in order to enhance the contribution from academician towards the repository. Originality/value: This research paper provides basic information for the knowledge management officers in the university by endeavouring more efforts in order to attract more contributions.Keywords: institutional repository, information retrieval, information storage and retrieval
Procedia PDF Downloads 56114182 Cyber Supply Chain Resilient: Enhancing Security through Leadership to Protect National Security
Authors: Katie Wood
Abstract:
Cyber criminals are constantly on the lookout for new opportunities to exploit organisation and cause destruction. This could lead to significant cause of economic loss for organisations in the form of destruction in finances, reputation and even the overall survival of the organization. Additionally, this leads to serious consequences on national security. The threat of possible cyber attacks places further pressure on organisations to ensure they are secure, at a time where international scale cyber attacks have occurred in a range of sectors. Stakeholders are wanting confidence that their data is protected. This is only achievable if a business fosters a resilient supply chain strategy which is implemented throughout its supply chain by having a strong cyber leadership culture. This paper will discuss the essential role and need for organisations to adopt a cyber leadership culture and direction to learn about own internal processes to ensure mitigating systemic vulnerability of its supply chains. This paper outlines that to protect national security there is an urgent need for cyber awareness culture change. This is required in all organisations, regardless of their sector or size, to implementation throughout the whole supplier chain to support and protect economic prosperity to make the UK more resilient to cyber-attacks. Through businesses understanding the supply chain and risk management cycle of their own operates has to be the starting point to ensure effective cyber migration strategies.Keywords: cyber leadership, cyber migration strategies, resilient supply chain strategy, cybersecurity
Procedia PDF Downloads 24214181 Enhancing Sustainable Stingless Beekeeping Production through Technology Transfer and Human Resource Development in Relationship with Extension Agents Work Performance among Malaysian Beekeepers
Authors: Ibrahim Aliyu Isah, Mohd Mansor Ismail, Salim Hassan, Norsida Man, Oluwatoyin Olagunju
Abstract:
Stingless beekeeping is not only a profitable activity for Malaysian beekeepers but also for the Malaysian economy. However, natural honey has faced some difficulties, which resulted in low production due to a lack of information on improved technology as well as the capacity and potential building of stingless beekeeping farmers, which depend mostly on information received from the extension agents. Hence, it is the responsibility of the extension agents to give useful information on the available technology and develop the capacity of the farmers to make the right decision that will improve their level of production. This study assessed how technology transfer and human resource development skills influence the work performance of the extension agents toward sustainable beekeeping production among beekeepers. The study sought to establish the role of relevant technology transfer and human resource development skills in effective performance. The research design was a descriptive and quantitative survey of stingless beekeepers on technology transfer and human resource development by the extension agent. Data was obtained from 54 beekeeping farmers and was analyzed using descriptive and inferential statistics. The results revealed that technology skill, technology dissemination skill, technology evaluation skill, Decision-making process skill, Leadership development skill and work performance were rated moderate by stingless beekeeping farmers, while Social skill was rated high. A significant and positive correlation (P<0.01) existed between all variables and performance. Regression results showed that leadership development skills, Decision-making process skills, and social skills are significant (P=.05), while technology skills, technology dissemination skills, and technology evaluation skills are not significant. The highest contributing factor is social skill (β=.446). Beekeeping is a profitable project in Malaysia and can be sustained if the extension services and programs are well carried out by competent extension agents and relevant agricultural government agencies.Keywords: beekeeping, extension agents, human resource development, sustainable, technology transfer, work performance
Procedia PDF Downloads 6314180 Economic Growth and Total Factor Productivity by the Use of Rail Way Transport in the City of Medellín - Colombia in the Period 2012-2016
Authors: Mauricio Molina
Abstract:
The present research project aims to determine whether it is possible to have a statement, allowing you to have an economic model to establish clearly if the population that uses the rail system underground in the city of Medellin with an increase in productivity total factor. The present project aims to concentrate on the surroundings to the system underground for a period of 60 months in the city of Medellin. According to the review bibliographic is can establish that in it most of them cases, the cities that have with systems of transport rail are more productive. And should to its time present is an analysis that may lead to determine if effectively the use of the transport railway improves the productivity of a city and its inhabitants.Keywords: economic growth, mobility urban, total factor productivity, rail transport
Procedia PDF Downloads 28714179 Impairments Correction of Six-Port Based Millimeter-Wave Radar
Authors: Dan Ohev Zion, Alon Cohen
Abstract:
In recent years, the presence of short-range millimeter-wave radar in civil application has increased significantly. Autonomous driving, security, 3D imaging and high data rate communication systems are a few examples. The next challenge is the integration inside small form-factor devices, such as smartphones (e.g. gesture recognition). The main challenge is implementation of a truly low-power, low-complexity high-resolution radar. The most popular approach is the Frequency Modulated Continuous Wave (FMCW) radar, with an analog multiplication front-end. In this paper, we present an approach for adaptive estimation and correction of impairments of such front-end, specifically implemented using the Six-Port Device (SPD) as the multiplier element. The proposed algorithm was simulated and implemented on a 60 GHz radar lab prototype.Keywords: radar, FMCW Radar, IQ mismatch, six port
Procedia PDF Downloads 15214178 Optimization of the Control Scheme for Human Extremity Exoskeleton
Authors: Yang Li, Xiaorong Guan, Cheng Xu
Abstract:
In order to design a suitable control scheme for human extremity exoskeleton, the interaction force control scheme with traditional PI controller was presented, and the simulation study of the electromechanical system of the human extremity exoskeleton was carried out by using a MATLAB/Simulink module. By analyzing the simulation calculation results, it was shown that the traditional PI controller is not very suitable for every movement speed of human body. So, at last the fuzzy self-adaptive PI controller was presented to solve this problem. Eventually, the superiority and feasibility of the fuzzy self-adaptive PI controller was proved by the simulation results and experimental results.Keywords: human extremity exoskeleton, interaction force control scheme, simulation study, fuzzy self-adaptive pi controller, man-machine coordinated walking, bear payload
Procedia PDF Downloads 36214177 Feeding Habits and Condition Factor of Oreochromis niloticus in Lake Alau, Northeastern Nigeria
Authors: Zahra Ali Lawan, Ali Abdulhakim
Abstract:
The stomach contents of 100 Oreochromis niloticus, sampled between April and August, 2011 in Alau Lake, northeastern Nigeria, were examined. Herbs and algae were the main contents representing 40.15%, 23.36% followed by some mud / sand components, insect parts and fish remains representing 14.60%, 13.87% and 8.03% respectively. Oreochromis niloticus was affirmed as an herbivore and a benthic feeder due to the presence of both herbs and mud/sand among its stomach content. The mean stomach fullness percentage was 70.94% and stomach emptiness was 29.06%. The average condition factor of the fishes was 1.69 with the best conditions recorded in the dry months of April and May at 1.74 and 1.94 respectively. The general trend in the condition factor for this species in this study is that relatively higher condition factors were recorded for relatively higher lengths.Keywords: stomach contents, oreochromis niloticus, herbivores, Lake Alau
Procedia PDF Downloads 38914176 Energy Security and Sustainable Development: Challenges and Prospects
Authors: Abhimanyu Behera
Abstract:
Over the past few years, energy security and sustainable development have moved rapidly into the global agenda. There are two main reasons: first, the impact of high and often volatile energy prices; second, concerns over environmental sustainability particularly about the global climate. Both issues are critically important in which impressive economic growth has boosted the demand for energy and put corresponding strains on the environment. Energy security is a broad concept that focuses on energy availability and pricing. Specifically, it refers to the ability of the energy supply system i.e. suppliers, transporters, distributors and regulatory, financial and R&D institutions to deliver the amount of competitively priced energy that customers demand, within accepted standards of reliability, timeliness, quality, safety. Traditionally, energy security has been defined in the context of the geopolitical risks to external oil supplies but today it is encompassing all energy forms, all the external and internal links bringing the energy to the final consumer, and all the many ways energy supplies can be disrupted including equipment malfunctions, system design flaws, operator errors, malicious computer activities, deficient market and regulatory frameworks, corporate financial problems, labour actions, severe weather and natural events, aggressive acts (e.g. war, terrorism and sabotage), and geopolitical disruptions. In practice, the most challenging disruptions are those linked to: 1) extreme weather events; 2) mismatched electricity supply and demand; 3) regulatory failures; and 4) concentration of oil and gas resources in certain regions of the world. However, insecure energy supplies inhibit development by raising energy costs and imposing expensive cuts in services when disruptions actually occur. The energy supply sector can best advance sustainable development by producing and delivering secure and environmentally-friendly sources of energy and by increasing the efficiency of energy use. With this objective, this paper seeks to highlight the significance of energy security and sustainable development in today’s world. Moreover, it critically overhauls the major challenges towards sustainability of energy security and what are the major policies are taken to overcome these challenges by Government is lucidly explicated in this paper.Keywords: energy, policies, security, sustainability
Procedia PDF Downloads 38814175 Improvement in Quality-Factor Superconducting Co-Planer Waveguide Resonators by Passivation Air-Interfaces Using Self-Assembled Monolayers
Authors: Saleem Rao, Mohammed Al-Ghadeer, Archan Banerjee, Hossein Fariborzi
Abstract:
Materials imperfection, particularly two-level-system (TLS) defects in planer superconducting quantum circuits, contributes significantly to decoherence, ultimately limiting the performance of quantum computation and sensing. Oxides at air interfaces are among the host of TLS, and different material has been used to reduce TLS losses. Passivation with an inorganic layer is not an option to reduce these interface oxides; however, they can be etched away, but their regrowth remains a problem. Here, we report the chemisorption of molecular self-assembled monolayers (SAMs) at air interfaces of superconducting co-planer waveguide (CPW) resonators that suppress the regrowth of oxides and also modify the dielectric constant of the interface. With SAMs, we observed sustained order of magnitude improvement in quality factor -better than oxide etched interfaces. Quality factor measurements at millikelvin temperature and at single photon, XPS data, and TEM images of SAM passivated air interface sustenance our claim. Compatibility of SAM with micro-/nano-fabrication processes opens new ways to improve the coherence time in cQED.Keywords: superconducting circuits, quality-factor, self-assembled monolayer, coherence
Procedia PDF Downloads 8314174 Preferred Character Size for Oblique Angles
Authors: Photjanat Phimnom, Haruetai Lohasiriwat
Abstract:
In today’s world, the LED display has been used for presenting visual information under various circumstances. Such information is an important intermediary in the human information processing. Researchers have been investigated diverse factors that influence this process effectiveness. The letter size is undoubtedly one major factor that has been tested and recommended by many standards and guidelines. However, viewing information on the display from direct perpendicular position is a typical assumption whereas many actual events are required viewing from the angles. This current research aims to study the effect of oblique viewing angle and viewing distance on ability to recognize alphabet, number, and English word. The total of ten participants was volunteered to our 3 x 4 x 4 within subject study. Independent variables include three distance levels (2, 6, and 12 m), four oblique angle (0, 45, 60, 75 degree), and four target types (alphabet, number, short words, and long words). Following the method of constant stimuli we found that the larger oblique angle, ranging from 0 to 75 degree from the line of sight, results in significant higher legibility threshold or larger font size required (p-value < 0.05). Viewing distance factor also shows to have significant effect on the threshold (p-value < 0.05). However, the effect from distance factor is expected to be confounded by the quality of the screen we used in our experiment. Lastly, our results show that single alphabet as well as single number are recognized at significant lower threshold (smaller font size) as compared to both short and long words (p-value < 0.05). Therefore, it is recommended that when designs information to be presented on LED display, understanding of all possible ranges of oblique angle should be taken into account in order to specify the preferred letter size. Additionally, the recommendation of letter size for 100 % readability in our tested conditions is provided in the paper.Keywords: letter size, oblique angle, viewing distance, legibility threshold
Procedia PDF Downloads 39414173 Classification of IoT Traffic Security Attacks Using Deep Learning
Authors: Anum Ali, Kashaf ad Dooja, Asif Saleem
Abstract:
The future smart cities trend will be towards Internet of Things (IoT); IoT creates dynamic connections in a ubiquitous manner. Smart cities offer ease and flexibility for daily life matters. By using small devices that are connected to cloud servers based on IoT, network traffic between these devices is growing exponentially, whose security is a concerned issue, since ratio of cyber attack may make the network traffic vulnerable. This paper discusses the latest machine learning approaches in related work further to tackle the increasing rate of cyber attacks, machine learning algorithm is applied to IoT-based network traffic data. The proposed algorithm train itself on data and identify different sections of devices interaction by using supervised learning which is considered as a classifier related to a specific IoT device class. The simulation results clearly identify the attacks and produce fewer false detections.Keywords: IoT, traffic security, deep learning, classification
Procedia PDF Downloads 15314172 Effect of TPA and HTLV-1 Tax on BRCA-1 and ERE Controlled Genes Expression
Authors: Azhar Jabareen, Mahmoud Huleihel
Abstract:
BRCA-1 is a multifunctional tumor suppressor, whose expression is activated by the estrogen (E2)-liganded ERα receptor. The activated ERα is a transcriptional factor which activates various genes either by direct binding to the DNA at E2-responsive elements (EREs) and indirectly associated with a range of alternative non-ERE elements. Interference with BRCA-1 expression and/or functions leads to high risk of breast or/and ovarian cancer. Our lab investigated the involvement of Human T-cell leukemia Virus Type 1 (HTLV-1) in breast cancer, since HTLV-1 Tax was found to strongly inhibit BRCA-1 expression. In addition, long exposure of 12-O-tetradecanoylphorbol-13-acetate (TPA), which is one of the stress-inducing agents activated the HTLV-1 promoter. So here the involvement of TPA in breast cancer had been examined by testing the effect of TPA on BRCA-1 and ERE expression. The results showed that TPA activated both BRCA-1 and ERE expression. In the 12 hours TPA activated the tow promoters more than others time, and after 24 hours the level of the tow promoters was decreased. Tax inhibited BRCA-1 expression but did not succeed to inhibit the effect of TPA. Then the activation of the two promoters was not through ERα pathway because TPA had no effect on ERα binding to the two promoters of the BRCA-1 and ERE. Also, the activation was not via nuclear factor kappa B (NF-κB) pathway because when the inhibitory of NF-κB had been added to the TPA, it still activated the tow promoters. However, it seems that 53BP1 may be involved in TPA activation of these promoters because ectopic high expression of 53BP1 significantly reduced the TPA activity. In addition, in the presence of Bisindolylmaleimide-I (BI)- the inhibitor of Protein Kinase C (PKC)- there was no activation for the two promoters, so the PKC is agonized BRCA-1 and ERE activation.Keywords: BRCA-1, ERE, HTLV-1, TPA
Procedia PDF Downloads 24814171 Information Technologies in Human Resources Management - Selected Examples
Authors: A. Karasek
Abstract:
Rapid growth of Information Technologies (IT) has had huge influence on enterprises, and it has contributed to its promotion and increasingly extensive use in enterprises. Information Technologies have to a large extent determined the processes taking place in a enterprise; what is more, IT development has brought the need to adopt a brand new approach to human resources management in an enterprise. The use of IT in Human Resource Management (HRM) is of high importance due to the growing role of information and information technologies. The aim of this paper is to evaluate the use of information technologies in human resources management in enterprises. These practices will be presented in the following areas: Recruitment and selection, development and training, employee assessment, motivation, talent management, personnel service. Results of conducted survey show diversity of solutions applied in particular areas of human resource management. In the future, further development in this area should be expected, as well as integration of individual HRM areas, growing mobile-enabled HR processes and their transfer into the cloud. Presented IT solutions applied in HRM are highly innovative, which is of great significance due to their possible implementation in other enterprises.Keywords: e-HR, human resources management, HRM practices, HRMS, information technologies
Procedia PDF Downloads 35114170 Discovering the Real Psyche of Human Beings
Authors: Sheetla Prasad
Abstract:
The objective of this study is ‘discovering the real psyche of human beings for prediction of mode, direction and strength of the potential of actions of the individual. The human face was taken as a source of central point to search for the route of real psyche. Analysis of the face architecture (shape and salient features of face) was done by three directional photographs ( 600 left and right and camera facing) of human beings. The shapes and features of the human face were scaled in 177 units on the basis of face–features locations (FFL). The mathematical analysis was done of FFLs by self developed and standardized formula. At this phase, 800 samples were taken from the population of students, teachers, advocates, administrative officers, and common persons. The finding shows that real psyche has two external rings (ER). These ER are itself generator of two independent psyches (manifested and manipulated). Prima-facie, it was proved that micro differences in FFLs have potential to predict the state of art of the human psyche. The potential of psyches was determined by the saving and distribution of mental energy. It was also mathematically proved.Keywords: face architecture, psyche, potential, face functional ratio, external rings
Procedia PDF Downloads 505