Search results for: security mechanism
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5640

Search results for: security mechanism

4650 Nutritional Potential and Traditional Uses of High Altitude Wild Edible Plants in Eastern Himalayas, India

Authors: Hui Tag, Jambey Tsering, Pallabi Kalita Hui, Baikuntha Jyoti Gogoi, Vijay Veer

Abstract:

The food security issues and its relevance in High Mountain regions of the world have been often neglected. Wild edible plants have been playing a major role in livelihood security among the tribal Communities of East Himalayan Region of the world since time immemorial. The Eastern Himalayan Region of India is one of the mega diverse regions of world and rated as top 12th Global Biodiversity Hotspots by IUCN and recognized as one of the 200 significant eco-regions of the Globe. The region supports one of the world’s richest alpine floras and about one-third of them are endemic to the region. There are at least 7,500 flowering plants, 700 orchids, 58 bamboo species, 64 citrus species, 28 conifers, 500 mosses, 700 ferns and 728 lichens. The region is the home of more than three hundred different ethnic communities having diverse knowledge on traditional uses of flora and fauna as food, medicine and beverages. Monpa, Memba and Khamba are among the local communities residing in high altitude region of Eastern Himalaya with rich traditional knowledge related to utilization of wild edible plants. The Monpas, Memba and Khamba are the followers Mahayana sect of Himalayan Buddhism and they are mostly agrarian by primary occupation and also heavily relaying on wild edible plants for their livelihood security during famine since millennia. In the present study, we have reported traditional uses of 40 wild edible plant species and out of which 6 species were analysed at biochemical level for nutrients contents and free radical scavenging activities. The results have shown significant free radical scavenging (antioxidant) activity and nutritional potential of the selected 6 wild edible plants used by the local communities of Eastern Himalayan Region of India.

Keywords: East Himalaya, local community, wild edible plants, nutrition, food security

Procedia PDF Downloads 244
4649 Desire as Psychological Case against Nihilism and a Clear Mechanism as Evidence for Moral Realism

Authors: Paul Pistone

Abstract:

Nihilism claims that there are no actual intrinsic goods. Desire, however, directly contradicts this claim. To desire, something is more than to be motivated to bring about the desired ends. It is more than to take pleasure in it, seeming that one has obtained her desired end. Desire is, further, more than believing that something is good. Desire is the perception that something is good for the self. In this paper, it is argued that desire is an agent-relative value seeming. This implies that there are intrinsic values. It will be argued that: (1) there are intrinsic values related to life and flourishing, (2) that it is metaphysically impossible that there are no intrinsic values, (3) that desire is our psychological mechanism which enables us to perceive a state of affairs or event as an agent-relative good, and (4) while we can be wrong about the large scale object of desire (i.e., the instrumental desire) we cannot be wrong about what is at the root of our desire (i.e., the intrinsic desire). The method of this paper will be to examine the claims of nihilism and moral realism in recent literature, present a case for moral realism, discuss a few theories of desire, connect moral realism to an evaluative perceptual model of desire, and conclude that not only is this the best theory of desire but that this psychological faculty offers a clear counterexample to nihilism.

Keywords: desire, moral realism, nihilism, perception

Procedia PDF Downloads 112
4648 The Psychological Effect of Emotional Demands and Discrimination, and the Role of Job Resources among Asian Immigrant Microbusiness Owners

Authors: Il-Ho Kim, Samuel Noh, Kwame McKenzie, Cyu-Chul Choi

Abstract:

Many members of immigrant minorities choose to operate microbusinesses that involve emotionally taxing interactions with customers and discriminatory exposures in the workplace. This study investigated the psychological risks of emotional demands and discrimination as well as the buffering roles of two types of job resources (job autonomy and job security) among immigrant microbusiness owners (MBOs). Data were derived from a cross-sectional survey of 550 Korean immigrant MBOs, aged 30 to 70, living in Toronto and its surrounding areas. Face-to-face interviews were conducted between March and November 2013. Results showed that emotional suppression and discrimination were positively associated with depressive symptoms. However, the direct effect of positive emotional demands was insignificant. For job resources, the beneficial effect of job security on depressive symptom was apparent, but the effect of job autonomy was trivial. Regarding the moderating effect, job security buffered the psychological harm of both emotional suppression and workplace discrimination. Although job autonomy buffered the link between discrimination and depressive symptoms, the buffering effect of job autonomy on the emotional suppression-depression link was insignificant. This study’s finding implies that emotional demands and workplace discrimination seem to be important factors in contributing to occupational psychological problems, but the psychological impact can differ according to the types of emotional demands and job resources among immigrant MBOs.

Keywords: immigrant microbusiness owners, emotional demands, discrimination, job resources, depression

Procedia PDF Downloads 204
4647 A Structured Mechanism for Identifying Political Influencers on Social Media Platforms Top 10 Saudi Political Twitter Users

Authors: Ahmad Alsolami, Darren Mundy, Manuel Hernandez-Perez

Abstract:

Social media networks, such as Twitter, offer the perfect opportunity to either positively or negatively affect political attitudes on large audiences. A most important factor contributing to this effect is the existence of influential users, who have developed a reputation for their awareness and experience on specific subjects. Therefore, knowledge of the mechanisms to identify influential users on social media is vital for understanding their effect on their audience. The concept of the influential user is based on the pioneering work of Katz and Lazarsfeld (1959), who created the concept of opinion leaders' to indicate that ideas first flow from mass media to opinion leaders and then to the rest of the population. Hence, the objective of this research was to provide reliable and accurate structural mechanisms to identify influential users, which could be applied to different platforms, places, and subjects. Twitter was selected as the platform of interest, and Saudi Arabia as the context for the investigation. These were selected because Saudi Arabia has a large number of Twitter users, some of whom are considerably active in setting agendas and disseminating ideas. The study considered the scientific methods that have been used to identify public opinion leaders before, utilizing metrics software on Twitter. The key findings propose multiple novel metrics to compare Twitter influencers, including the number of followers, social authority and the use of political hashtags, and four secondary filtering measures. Thus, using ratio and percentage calculations to classify the most influential users, Twitter accounts were filtered, analyzed and included. The structured approach is used as a mechanism to explore the top ten influencers on Twitter from the political domain in Saudi Arabia.

Keywords: twitter, influencers, structured mechanism, Saudi Arabia

Procedia PDF Downloads 123
4646 The Impact of Malicious Attacks on the Performance of Routing Protocols in Mobile Ad-Hoc Networks

Authors: Habib Gorine, Rabia Saleh

Abstract:

Mobile Ad-Hoc Networks are the special type of wireless networks which share common security requirements with other networks such as confidentiality, integrity, authentication, and availability, which need to be addressed in order to secure data transfer through the network. Their routing protocols are vulnerable to various malicious attacks which could have a devastating consequence on data security. In this paper, three types of attacks such as selfish, gray hole, and black hole attacks have been applied to the two most important routing protocols in MANET named dynamic source routing and ad-hoc on demand distance vector in order to analyse and compare the impact of these attacks on the Network performance in terms of throughput, average delay, packet loss, and consumption of energy using NS2 simulator.

Keywords: MANET, wireless networks, routing protocols, malicious attacks, wireless networks simulation

Procedia PDF Downloads 299
4645 A Risk-Based Comprehensive Framework for the Assessment of the Security of Multi-Modal Transport Systems

Authors: Mireille Elhajj, Washington Ochieng, Deeph Chana

Abstract:

The challenges of the rapid growth in the demand for transport has traditionally been seen within the context of the problems of congestion, air quality, climate change, safety, and affordability. However, there are increasing threats including those related to crime such as cyber-attacks that threaten the security of the transport of people and goods. To the best of the authors’ knowledge, this paper presents for the first time, a comprehensive framework for the assessment of the current and future security issues of multi-modal transport systems. The approach or method proposed is based on a structured framework starting with a detailed specification of the transport asset map (transport system architecture), followed by the identification of vulnerabilities. The asset map and vulnerabilities are used to identify the various approaches for exploitation of the vulnerabilities, leading to the creation of a set of threat scenarios. The threat scenarios are then transformed into risks and their categories, and include insights for their mitigation. The consideration of the mitigation space is holistic and includes the formulation of appropriate policies and tactics and/or technical interventions. The quality of the framework is ensured through a structured and logical process that identifies the stakeholders, reviews the relevant documents including policies and identifies gaps, incorporates targeted surveys to augment the reviews, and uses subject matter experts for validation. The approach to categorising security risks is an extension of the current methods that are typically employed. Specifically, the partitioning of risks into either physical or cyber categories is too limited for developing mitigation policies and tactics/interventions for transport systems where an interplay between physical and cyber processes is very often the norm. This interplay is rapidly taking on increasing significance for security as the emergence of cyber-physical technologies, are shaping the future of all transport modes. Examples include: Connected Autonomous Vehicles (CAVs) in road transport; the European Rail Traffic Management System (ERTMS) in rail transport; Automatic Identification System (AIS) in maritime transport; advanced Communications, Navigation and Surveillance (CNS) technologies in air transport; and the Internet of Things (IoT). The framework adopts a risk categorisation scheme that considers risks as falling within the following threat→impact relationships: Physical→Physical, Cyber→Cyber, Cyber→Physical, and Physical→Cyber). Thus the framework enables a more complete risk picture to be developed for today’s transport systems and, more importantly, is readily extendable to account for emerging trends in the sector that will define future transport systems. The framework facilitates the audit and retro-fitting of mitigations in current transport operations and the analysis of security management options for the next generation of Transport enabling strategic aspirations such as systems with security-by-design and co-design of safety and security to be achieved. An initial application of the framework to transport systems has shown that intra-modal consideration of security measures is sub-optimal and that a holistic and multi-modal approach that also addresses the intersections/transition points of such networks is required as their vulnerability is high. This is in-line with traveler-centric transport service provision, widely accepted as the future of mobility services. In summary, a risk-based framework is proposed for use by the stakeholders to comprehensively and holistically assess the security of transport systems. It requires a detailed understanding of the transport architecture to enable a detailed vulnerabilities analysis to be undertaken, creates threat scenarios and transforms them into risks which form the basis for the formulation of interventions.

Keywords: mitigations, risk, transport, security, vulnerabilities

Procedia PDF Downloads 145
4644 Assessment Power and Oscillation Damping Using the POD Controller and Proposed FOD Controller

Authors: Tohid Rahimi, Yahya Naderi, Babak Yousefi, Seyed Hossein Hoseini

Abstract:

Today’s modern interconnected power system is highly complex in nature. In this, one of the most important requirements during the operation of the electric power system is the reliability and security. Power and frequency oscillation damping mechanism improve the reliability. Because of power system stabilizer (PSS) low speed response against of major fault such as three phase short circuit, FACTs devise that can control the network condition in very fast time, are becoming popular. However, FACTs capability can be seen in a major fault present when nonlinear models of FACTs devise and power system equipment are applied. To realize this aim, the model of multi-machine power system with FACTs controller is developed in MATLAB/SIMULINK using Sim Power System (SPS) blockiest. Among the FACTs device, Static synchronous series compensator (SSSC) due to high speed changes its reactance characteristic inductive to capacitive, is effective power flow controller. Tuning process of controller parameter can be performed using different method. However, Genetic Algorithm (GA) ability tends to use it in controller parameter tuning process. In this paper, firstly POD controller is used to power oscillation damping. But in this station, frequency oscillation dos not has proper damping situation. Therefore, FOD controller that is tuned using GA is using that cause to damp out frequency oscillation properly and power oscillation damping has suitable situation.

Keywords: power oscillation damping (POD), frequency oscillation damping (FOD), Static synchronous series compensator (SSSC), Genetic Algorithm (GA)

Procedia PDF Downloads 463
4643 Landmines and the Postcolonial Security Discourse in Zimbabwe

Authors: Fradreck Jockonia Mujuru

Abstract:

The effects of landmine residues from the Zimbabwean liberation war are persisting. Landmines are violently maiming and killing people and animals, causing certain areas inaccessible for agriculture and habitation, instilling fear, and even inducing forced migration. A significant gap in landmines literature is that they are mainly treated as a humanitarian issue and less scholarly. This paper engaged in theorising landmines using postcolonial literature as an epistemology. The results exhibit three issues. One, postcolonial literature provides a timeframe, a process, a space, and an attitude towards modernity on the inquiry of landmines. Two, landmines are understood in the context of war and were further decolonised to pick unique principles studied. Lastly, some of the unique principles found in landmines after decolonising are their ability to provide surveillance, repression and violent fate to all who cross the set boundaries. Therefore, theorising landmines can also be pushed further to be understood through repression. This article concluded that landmines can be theorised outside mainstream International Relations theories using postcolonial literature.

Keywords: landmines, postcolonial, repression, security, violence

Procedia PDF Downloads 58
4642 Taxonomy of Threats and Vulnerabilities in Smart Grid Networks

Authors: Faisal Al Yahmadi, Muhammad R. Ahmed

Abstract:

Electric power is a fundamental necessity in the 21st century. Consequently, any break in electric power is probably going to affect the general activity. To make the power supply smooth and efficient, a smart grid network is introduced which uses communication technology. In any communication network, security is essential. It has been observed from several recent incidents that adversary causes an interruption to the operation of networks. In order to resolve the issues, it is vital to understand the threats and vulnerabilities associated with the smart grid networks. In this paper, we have investigated the threats and vulnerabilities in Smart Grid Networks (SGN) and the few solutions in the literature. Proposed solutions showed developments in electricity theft countermeasures, Denial of services attacks (DoS) and malicious injection attacks detection model, as well as malicious nodes detection using watchdog like techniques and other solutions.

Keywords: smart grid network, security, threats, vulnerabilities

Procedia PDF Downloads 121
4641 The Response of Adaptive Mechanism of Fluorescent Proteins from Coral Species and Target Cell Properties on Signalling Capacity as Biosensor

Authors: Elif Tugce Aksun Tumerkan

Abstract:

Fluorescent proteins (FPs) have become very popular since green fluorescent protein discovered from crystal jellyfish. It is known that Anthozoa species have a wide range of chromophore organisms, and the initial crystal structure for non-fluorescent chromophores obtained from the reef-building coral has been determined. There are also differently coloured pigments in non-bioluminescent Anthozoa zooxanthellate and azooxanthellate which are frequently members of the GFP-like protein family. The development of fluorescent proteins (FPs) and their applications is an outstanding example of basic science leading to practical biotechnological and medical applications. Fluorescent proteins have several applications in science and are used as important indicators in molecular biology and cell-based research. With rising interest in cell biology, FPs have used as biosensor indicators and probes in pharmacology and cell biology. Using fluorescent proteins in genetically encoded metabolite sensors has many advantages than chemical probes for metabolites such as easily introduced into any cell or organism in any sub-cellular localization and giving chance to fixing to fluoresce of different colours or characteristics. There are different factors effects to signalling mechanism when they used as a biosensor. While there are wide ranges of research have been done on the significance and applications of fluorescent proteins, the cell signalling response of FPs and target cell are less well understood. In this study, it was aimed to clarify the response of adaptive mechanisms of coral species such as pH, temperature and symbiotic relationship and target cells properties on the signalling capacity. Corals are a rich natural source of fluorescent proteins that change with environmental conditions such as light, heat stress and injury. Adaptation mechanism of coral species to these types of environmental variations is important factor due to FPs properties have affected by this mechanism. Since fluorescent proteins obtained from nature, their own ecological property like the symbiotic relationship is observed very commonly in coral species and living conditions have the impact on FPs efficiency. Target cell properties also have an effect on signalling and visualization. The dynamicity of detector that used for reading fluorescence and the level of background fluorescence are key parameters for the quality of the fluorescent signal. Among the factors, it can be concluded that coral species adaptive characteristics have the strongest effect on FPs signalling capacity.

Keywords: biosensor, cell biology, environmental conditions, fluorescent protein, sea anemone

Procedia PDF Downloads 154
4640 Adult Attachment Security as a Predictor of Career Decision-Making Self-Efficacy among College Students in the United States

Authors: Mai Kaneda, Sarah Feeney

Abstract:

This study examined the association between adult attachment security and career decision-making self-efficacy (CDMSE) among college students in the United States. Previous studies show that attachment security is associated with levels of CDMSE among college students. Given that a majority of studies examining career development variables have used parental attachment measures, this study adds to understanding of this phenomenon by utilizing a broader measure of attachment. The participants included 269 college students (76% female) between the ages of 19-29. An anonymous survey was distributed online via social media as well as in hard copy format in classrooms. Multiple regression analyses were conducted to determine the relationship between anxious and avoidant attachment and CDMSE. Results revealed anxious attachment was a significant predictor of CDMSE (B = -.13, p = .01), such that greater anxiety in attachment was associated with lower levels of CDMSE. When accounting for anxious attachment, avoidant attachment was no longer significant as a predictor of CDMSE (B = -.12, p = .10). The variance in college CDMSE explained by the model was 7%, F(2,267) = 9.51, p < .001. Results for anxious attachment are consistent with existing literature that finds insecure attachment to be related to lower levels of CDMSE, however the non-significant results for avoidant attachment as a predictor of CDMSE suggest not all types of attachment insecurity are equally related to CDMSE. Future research is needed to explore the nature of the relationship between different dimensions of attachment insecurity and CDMSE.

Keywords: attachment, career decision-making, college students, self-efficacy

Procedia PDF Downloads 204
4639 The Prediction Mechanism of M. cajuputi Extract from Lampung-Indonesia, as an Anti-Inflammatory Agent for COVID-19 by NFκβ Pathway

Authors: Agustyas Tjiptaningrum, Intanri Kurniati, Fadilah Fadilah, Linda Erlina, Tiwuk Susantiningsih

Abstract:

Coronavirus disease-19 (COVID-19) is still one of the health problems. It can be a severe condition that is caused by a cytokine storm. In a cytokine storm, several proinflammatory cytokines are released massively. It destroys epithelial cells, and subsequently, it can cause death. The anti-inflammatory agent can be used to decrease the number of severe Covid-19 conditions. Melaleuca cajuputi is a plant that has antiviral, antibiotic, antioxidant, and anti-inflammatory activities. This study was carried out to analyze the prediction mechanism of the M. cajuputi extract from Lampung, Indonesia, as an anti-inflammatory agent for COVID-19. This study constructed a database of protein host target that was involved in the inflammation process of COVID-19 using data retrieval from GeneCards with the keyword “SARS-CoV2”, “inflammation,” “cytokine storm,” and “acute respiratory distress syndrome.” Subsequent protein-protein interaction was generated by using Cytoscape version 3.9.1. It can predict the significant target protein. Then the analysis of the Gene Ontology (GO) and KEGG pathways was conducted to generate the genes and components that play a role in COVID-19. The result of this study was 30 nodes representing significant proteins, namely NF-κβ, IL-6, IL-6R, IL-2RA, IL-2, IFN2, C3, TRAF6, IFNAR1, and DOX58. From the KEGG pathway, we obtained the result that NF-κβ has a role in the production of proinflammatory cytokines, which play a role in the COVID-19 cytokine storm. It is an important factor for macrophage transcription; therefore, it will induce inflammatory gene expression that encodes proinflammatory cytokines such as IL-6, TNF-α, and IL-1β. In conclusion, the blocking of NF-κβ is the prediction mechanism of the M. cajuputi extract as an anti-inflammation agent for COVID-19.

Keywords: antiinflammation, COVID-19, cytokine storm, NF-κβ, M. cajuputi

Procedia PDF Downloads 70
4638 Engaging the Terrorism Problematique in Africa: Discursive and Non-Discursive Approaches to Counter Terrorism

Authors: Cecil Blake, Tolu Kayode-Adedeji, Innocent Chiluwa, Charles Iruonagbe

Abstract:

National, regional and international security threats have dominated the twenty-first century thus far. Insurgencies that utilize “terrorism” as their primary strategy pose the most serious threat to global security. States in turn adopt terrorist strategies to resist and even defeat insurgents who invoke the legitimacy of statehood to justify their action. In short, the era is dominated by the use of terror tactics by state and non-state actors. Globally, there is a powerful network of groups involved in insurgencies using Islam as the bastion for their cause. In Africa, there are Boko Haram, Al Shabaab and Al Qaeda in the Maghreb representing Islamic groups utilizing terror strategies and tactics to prosecute their wars. The task at hand is to discover and to use multiple ways of handling the present security threats, including novel approaches to policy formulation, implementation, monitoring and evaluation that would pay significant attention to the important role of culture and communication strategies germane for discursive means of conflict resolution. In other to achieve this, the proposed research would address inter alia, root causes of insurgences that predicate their mission on Islamic tenets particularly in Africa; discursive and non-discursive counter-terrorism approaches fashioned by African governments, continental supra-national and regional organizations, recruitment strategies by major non-sate actors in Africa that rely solely on terrorist strategies and tactics and sources of finances for the groups under study. A major anticipated outcome of this research is a contribution to answers that would lead to the much needed stability required for development in African countries experiencing insurgencies carried out by the use of patterned terror strategies and tactics. The nature of the research requires the use of triangulation as the methodological tool.

Keywords: counter-terrorism, discourse, Nigeria, security, terrorism

Procedia PDF Downloads 471
4637 Understanding Everyday Insecurities Emerging from Fragmented Territorial Control in Post-Accord Colombia

Authors: Clara Voyvodic

Abstract:

Transitions from conflict to peace are by no means smooth nor linear, particularly from the perspective of those living through them. Over the last few decades, the changing focus in peacebuilding studies has come to appreciate the everyday experience of communities and how that provides a lens through which the relative success or efficacy of these transitions can be understood. In particular, the demobilization of a significant conflict actor is not without consequences, not just for the macro-view of state stabilization and peace, but for the communities who find themselves without a clear authority of territorial control. In Colombia, the demobilization and disarmament of the FARC guerilla group provided a brief respite to the conflict and a major political win for President Manuel Santos. However, this victory has proven short-lived. Drawing from extensive field research in Colombia within the last year, including interviews with local communities and actors operating in these regions, field observations, and other primary resources, this paper examines the post-accord transitions in Colombia and the everyday security experiences of local communities in regions formerly controlled by the FARC. In order to do so, the research focused on a semi-ethnographic approach in the northern region of the department of Antioquia and the coastal area of the border department of Nariño that documented how individuals within these marginalized communities have come to understand and negotiate their security in the years following the accord and the demobilization of the FARC. This presentation will argue that the removal of the FARC as an informal governance actor opened a space for multiple actors to attempt to control the same territory, including the state. This shift has had a clear impact on the everyday security experiences of the local communities. With an exploration of the dynamics of local governance and its impact on lived security experiences, this research seeks to demonstrate how distinct patterns of armed group behavior are emerging not only from a vacuum of control left by the FARC but from an increase in state presence that nonetheless remains inconsistent and unpersuasive as a monopoly of force in the region. The increased multiplicity of actors, particularly the state, has meant that the normal (informal) rules for communities to navigate these territories are no longer in play as the identities, actions, and intentions of different competing groups have become frustratingly opaque. This research provides a prescient analysis on how the shifting dynamics of territorial control in a post-peace accord landscape produce uncertain realities that affect the daily lives of the local communities and endanger the long-term prospect of human-centered security.

Keywords: armed actors, conflict transitions, informal governance, post-accord, security experiences

Procedia PDF Downloads 118
4636 Advanced Deployable/Retractable Solar Panel System for Satellite Applications

Authors: Zane Brough, Claudio Paoloni

Abstract:

Modern low earth orbit (LEO) satellites that require multi-mission flexibility are highly likely to be repositioned between different operational orbits. While executing this process the satellite may experience high levels of vibration and environmental hazards, exposing the deployed solar panel to dangerous stress levels, fatigue and space debris, hence it is desirable to retract the solar array before satellite repositioning to avoid damage or failure. Furthermore, to accommodate for today's technological world, the power demand of a modern LEO satellite is rapidly increasing, which consequently provides pressure upon the design of the satellites solar array system to conform to the strict volume and mass limitations. A novel concept of deployable/retractable hybrid solar array system, aimed to provide a greater power to volume ratio while dramatically reducing the disadvantages of system mass and cost is proposed. Taking advantage of the new lightweight technology in solar panels, a mechanical system composed of both rigid and flexible solar panels arranged within a petal formation is proposed to yield a stowed to deployment area ratio up to at least 1:7, which improves the power density dramatically. The system consists of five subsystems, the outer ones based on a novel eight-petal configuration that provides a large surface and supports the flexible solar panels. A single cable and spool based hinge mechanism were designed to synchronously deploy/retract the panels in a safe, simple and efficient manner while the mass compared to the previous systems is considerably reduced. The relevant challenge to assure a smooth movement is resolved by a proper minimization of the gearing system and the use of a micro-controller system. A prototype was designed by 3D simulators and successfully constructed and tested. Further design works are in progress to implement an epicyclical gear hinge mechanism, which will further reduce the volume, mass and complexity of the system significantly. The proposed system due to an effective and reliable mechanism provides a large active surface, whilst being very compact. It could be extremely advantageous for use as ground portable solar panel system.

Keywords: mechatronic engineering, satellite, solar panel, deployable/retractable mechanism

Procedia PDF Downloads 360
4635 Business-to-Business Deals Based on a Co-Utile Collaboration Mechanism: Designing Trust Company of the Future

Authors: Riccardo Bonazzi, Michaël Poli, Abeba Nigussie Turi

Abstract:

This paper presents an applied research of a new module for the financial administration and management industry, Personalizable and Automated Checklists Integrator, Overseeing Legal Investigations (PACIOLI). It aims at designing the business model of the trust company of the future. By identifying the key stakeholders, we draw a general business process design of the industry. The business model focuses on disintermediating the traditional form of business through the new technological solutions of a software company based in Switzerland and hence creating a new interactive platform. The key stakeholders of this interactive platform are identified as IT experts, legal experts, and the New Edge Trust Company (NATC). The mechanism we design and propose has a great importance in improving the efficiency of the financial business administration and management industry, and it also helps to foster the provision of high value added services in the sector.

Keywords: new edge trust company, business model design, automated checklists, financial technology

Procedia PDF Downloads 352
4634 An Analytical Approach to Assess and Compare the Vulnerability Risk of Operating Systems

Authors: Pubudu K. Hitigala Kaluarachchilage, Champike Attanayake, Sasith Rajasooriya, Chris P. Tsokos

Abstract:

Operating system (OS) security is a key component of computer security. Assessing and improving OSs strength to resist against vulnerabilities and attacks is a mandatory requirement given the rate of new vulnerabilities discovered and attacks occurring. Frequency and the number of different kinds of vulnerabilities found in an OS can be considered an index of its information security level. In the present study five mostly used OSs, Microsoft Windows (windows 7, windows 8 and windows 10), Apple’s Mac and Linux are assessed for their discovered vulnerabilities and the risk associated with each. Each discovered and reported vulnerability has an exploitability score assigned in CVSS score of the national vulnerability database. In this study the risk from vulnerabilities in each of the five Operating Systems is compared. Risk Indexes used are developed based on the Markov model to evaluate the risk of each vulnerability. Statistical methodology and underlying mathematical approach is described. Initially, parametric procedures are conducted and measured. There were, however, violations of some statistical assumptions observed. Therefore the need for non-parametric approaches was recognized. 6838 vulnerabilities recorded were considered in the analysis. According to the risk associated with all the vulnerabilities considered, it was found that there is a statistically significant difference among average risk levels for some operating systems, indicating that according to our method some operating systems have been more risk vulnerable than others given the assumptions and limitations. Relevant test results revealing a statistically significant difference in the Risk levels of different OSs are presented.

Keywords: cybersecurity, Markov chain, non-parametric analysis, vulnerability, operating system

Procedia PDF Downloads 172
4633 Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking

Authors: Modesta E. Ezema, Chikwendu V. Alabekee, Victoria N. Ishiwu, Ifeyinwa NwosuArize, Chinedu I. Nwoye

Abstract:

The advent of wireless networking in computing technology cannot be overemphasized, it opened up easy accessibility to information resources, networking made easier and brought internet accessibility to our doorsteps, but despite all these, some mishap came in with it that is causing mayhem in today ‘s overall information security. The cyber criminals will always compromise the integrity of a message that is not encrypted or that is encrypted with a weak algorithm.In other to correct the mayhem, this study focuses on cryptosystem and cryptography. This ensures end to end crypt messaging. The study of various cryptographic algorithms, as well as the techniques and applications of the cryptography for efficiency, were all considered in the work., present and future applications of cryptography were dealt with as well as Quantum Cryptography was exposed as the current and the future area in the development of cryptography. An empirical study was conducted to collect data from network users.

Keywords: algorithm, cryptography, cryptosystem, network

Procedia PDF Downloads 329
4632 Blockchain Technology for Secure and Transparent Oil and Gas Supply Chain Management

Authors: Gaurav Kumar Sinha

Abstract:

The oil and gas industry, characterized by its complex and global supply chains, faces significant challenges in ensuring security, transparency, and efficiency. Blockchain technology, with its decentralized and immutable ledger, offers a transformative solution to these issues. This paper explores the application of blockchain technology in the oil and gas supply chain, highlighting its potential to enhance data security, improve transparency, and streamline operations. By leveraging smart contracts, blockchain can automate and secure transactions, reducing the risk of fraud and errors. Additionally, the integration of blockchain with IoT devices enables real-time tracking and monitoring of assets, ensuring data accuracy and integrity throughout the supply chain. Case studies and pilot projects within the industry demonstrate the practical benefits and challenges of implementing blockchain solutions. The findings suggest that blockchain technology can significantly improve trust and collaboration among supply chain participants, ultimately leading to more efficient and resilient operations. This study provides valuable insights for industry stakeholders considering the adoption of blockchain technology to address their supply chain management challenges.

Keywords: blockchain technology, oil and gas supply chain, data security, transparency, smart contracts, IoT integration, real-time tracking, asset monitoring, fraud reduction, supply chain efficiency, data integrity, case studies, industry implementation, trust, collaboration.

Procedia PDF Downloads 19
4631 Raman Spectroscopic of Cardioprotective Mechanism During the Metabolic Inhibition of Heart Cells

Authors: A. Almohammedi, A. J. Hudson, N. M. Storey

Abstract:

Following ischaemia/reperfusion injury, as in a myocardial infraction, cardiac myocytes undergo oxidative stress which leads to several potential outcomes including; necrotic or apoptotic cell death or dysregulated calcium homeostasis or disruption of the electron transport chain. Several studies have shown that nitric oxide donors protect cardiomyocytes against ischemia and reperfusion. However until present, the mechanism of cardioprotective effect of nitric oxide donor in isolated ventricular cardiomyocytes is not fully understood and has not been investigated before using Raman spectroscopy. For these reasons, the aim of this study was to develop a novel technique, pre-resonance Raman spectroscopy, to investigate the mechanism of cardioprotective effect of nitric oxide donor in isolated ventricular cardiomyocytes exposed to metabolic inhibition and re-energisation. The results demonstrated the first time that Raman microspectroscopy technique has the capability to monitor the metabolic inhibition of cardiomyocytes and to monitor the effectiveness of cardioprotection by nitric oxide donor prior to metabolic inhibition of cardiomyocytes. Metabolic inhibition and reenergisation were used in this study to mimic the low and high oxygen levels experienced by cells during ischaemic and reperfusion treatments. A laser wavelength of 488 nm used in this study has been found to provide the most sensitive means of observe the cellular mechanisms of myoglobin during nitric oxide donor preconditioning, metabolic inhibition and re-energisation and did not cause any damage to the cells. The data also highlight the considerably different cellular responses to metabolic inhibition to ischaemia. Moreover, the data has been shown the relationship between the release of myoglobin and chemical ischemia where that the release of myoglobin from the cell only occurred if a cell did not recover contractility.

Keywords: ex vivo biospectroscopy, Raman spectroscopy, biophotonics, cardiomyocytes, ischaemia / reperfusion injury, cardioprotection, nitric oxide donor

Procedia PDF Downloads 336
4630 Development of Surface Modification Technology for Control Element Drive Mechanism Nozzle and Fatigue Enhancement of Ni-Based Alloys

Authors: Auezhan Amanov, Inho Cho, Young-Sik Pyun

Abstract:

Control element drive mechanism (CEDM) nozzle is manufactured as welded on the reactor vessel and currently uses Alloy 690 material. The top of the reactor is equipped with about 100 CEDM nozzles with an internal diameter of about 70 mm. Relatively large Inlet/Outlet nozzles are equipped with two outlet nozzles and four inlet nozzles on the reactor wall. The inner diameter of the nozzle is vulnerable to stress corrosion cracking (SCC), and in order to solve this problem, an ultrasonic nanocrystal surface modification (UNSM) treatment is performed on the inner diameter of the nozzle and the weld surface. The ultimate goal is to improve the service life of parts by applying compressive residual stress and suppressing primary water stress corrosion cracking (PWSCC). The main purpose is to design and fabricate a UNSM treatment device for the internal diameter processing of CEDM nozzles and inlet/outlet nozzles. In order to develop the system, the basic technology such as the development of UNSM tooling is developed and the mechanical properties and fatigue performance of before and after UNSM treatment of reactor nozzle material made of Ni-based alloys using the specimen are compared and evaluated. The inner diameter of the nozzle was treated by a newly developed UNSM treatment under the optimized treatment parameters. It was found that the mechanical properties and fatigue performance of nozzle were improved in comparison with the untreated nozzle, which may be attributed to the increase in hardness, induced compressive residual stress.

Keywords: control element drive mechanism nozzle, fatigue, Ni-based alloy, ultrasonic nanocrystal surface modification, UNSM

Procedia PDF Downloads 94
4629 SISSLE in Consensus-Based Ripple: Some Improvements in Speed, Security, Last Mile Connectivity and Ease of Use

Authors: Mayank Mundhra, Chester Rebeiro

Abstract:

Cryptocurrencies are rapidly finding wide application in areas such as Real Time Gross Settlements and Payments Systems. Ripple is a cryptocurrency that has gained prominence with banks and payment providers. It solves the Byzantine General’s Problem with its Ripple Protocol Consensus Algorithm (RPCA), where each server maintains a list of servers, called Unique Node List (UNL) that represents the network for the server, and will not collectively defraud it. The server believes that the network has come to a consensus when members of the UNL come to a consensus on a transaction. In this paper we improve Ripple to achieve better speed, security, last mile connectivity and ease of use. We implement guidelines and automated systems for building and maintaining UNLs for resilience, robustness, improved security, and efficient information propagation. We enhance the system so as to ensure that each server receives information from across the whole network rather than just from the UNL members. We also introduce the paradigm of UNL overlap as a function of information propagation and the trust a server assigns to its own UNL. Our design not only reduces vulnerabilities such as eclipse attacks, but also makes it easier to identify malicious behaviour and entities attempting to fraudulently Double Spend or stall the system. We provide experimental evidence of the benefits of our approach over the current Ripple scheme. We observe ≥ 4.97x and 98.22x in speedup and success rate for information propagation respectively, and ≥ 3.16x and 51.70x in speedup and success rate in consensus.

Keywords: Ripple, Kelips, unique node list, consensus, information propagation

Procedia PDF Downloads 129
4628 Quantum Inspired Security on a Mobile Phone

Authors: Yu Qin, Wanjiaman Li

Abstract:

The widespread use of mobile electronic devices increases the complexities of mobile security. This thesis aims to provide a secure communication environment for smartphone users. Some research proves that the one-time pad is one of the securest encryption methods, and that the key distribution problem can be solved by using the QKD (quantum key distribution). The objective of this project is to design an Android APP (application) to exchange several random keys between mobile phones. Inspired by QKD, the developed APP uses the quick response (QR) code as a carrier to dispatch large amounts of one-time keys. After evaluating the performance of APP, it allows the mobile phone to capture and decode 1800 bytes of random data in 600ms. The continuous scanning mode of APP is designed to improve the overall transmission performance and user experience, and the maximum transmission rate of this mode is around 2200 bytes/s. The omnidirectional readability and error correction capability of QR code gives it a better real-life application, and the features of adequate storage capacity and quick response optimize overall transmission efficiency. The security of this APP is guaranteed since QR code is exchanged face-to-face, eliminating the risk of being eavesdropped. Also, the id of QR code is the only message that would be transmitted through the whole communication. The experimental results show this project can achieve superior transmission performance, and the correlation between the transmission rate of the system and several parameters, such as the QR code size, has been analyzed. In addition, some existing technologies and the main findings in the context of the project are summarized and critically compared in detail.

Keywords: one-time pad, QKD (quantum key distribution), QR code, application

Procedia PDF Downloads 134
4627 Research on Models and Selection of Entry Strategies for Catering Industry Based on the Evolutionary Game Theory

Authors: Jianxin Zhu, Na Liu

Abstract:

Entry strategies play a vital role in the development of new enterprises in the catering industry. Different entry strategies will have different effects on the development of new enterprise. Based on the research of scholars at home and abroad, and combining the characteristics of the catering industry, the entry strategies are divided into low-price entry strategies and high-quality entry strategies. Facing the entry of new enterprise, the strategies of incumbent enterprises are divided into response strategies and non-response strategies. This paper uses evolutionary game theory to study the strategic interaction mechanism between incumbent companies and new enterprises. When different initial values and parameter values are set, which strategy will the two-game subjects choose, respectively? Using matlab2016 for numerical simulation, the results show that the choice of strategies for new enterprise and incumbent enterprise is influenced by more than one factor, and the system has different evolution trends under different circumstances. When the parameters were set, the choice of two subjects' strategies mainly depends on the net profit between the strategies.

Keywords: catering industry, entry strategy, evolutionary game, strategic interaction mechanism

Procedia PDF Downloads 112
4626 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security

Authors: D. Pugazhenthi, B. Sree Vidya

Abstract:

Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.

Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification

Procedia PDF Downloads 242
4625 Low Energy Mechanism in Pelvic Trauma at Elderly

Authors: Ravid Yinon

Abstract:

Introduction: Pelvic trauma causes high mortality, particularly among the elderly population. Pelvic injury ranges from low-energy incidents such as falls to high-energy trauma like motor vehicle accidents. The mortality rate among high-energy trauma patients is higher, as can be expected. The elderly population is more vulnerable to pelvic trauma even at low energy mechanisms due to the fragility and diminished physiological reserve of these patients. The aim of this study is to examine whether there is a higher long-term mortality in pelvic injuries in the elderly from the low-energy mechanism than those injured in high energy. Methods: A retrospective cohort study was conducted in a level 1 trauma center with injured patients aged 65 years and over with pelvic trauma. The patients were divided into two groups of low and high-energy mechanisms of injury. Multivariate analysis was conducted to characterize the differences between the groups. Results: There were 585 consecutive injured patients over the age of 65 with a documented pelvic injury who were treated at the primary trauma center between 2008-2020. The injured in the high energy group were younger (mean HE- 75.18, LE-80.73), with fewer comorbidities (mean 0.78 comorbidities at HE and 1.28 at LE), more men (52.6% at HE and 27.4% at LE), were consumed more treatments facilities such as angioembolization, ICU admission, emergency surgeries and blood products transfusion and higher mortality rate at admission (HE- 19/133, 14.28%, LE- 10/452, 2.21%) compared to the low energy group. However, in a long-term follow-up of one year after the injury, mortality in the low-energy group was significantly higher (HE- 14/114, 12.28%, LE- 155/442, 35.06%). Discussion: Although it can be expected that in the mechanism of high energy, the mortality rate in the long term would be higher, it was found that mortality at the low energy patient was higher. Apparently, low-energy pelvic injury in geriatric patients is a measure of frailty in these patients, causes injury to more frail and morbid patients, and is a predictor of mortality in this population in the long term. Conclusion: The long-term follow-up of injured elderly with pelvic trauma should be more intense, and the healthcare provider should put more emphasis on the rehabilitation of these special patient populations in an attempt to prevent long-term mortality.

Keywords: pelvic trauma, elderly trauma, high energy trauma, low energy trauma

Procedia PDF Downloads 35
4624 Piezoelectric Actuator for Controlling Robotics Organs

Authors: Lemoussi Somia, Ouali Mohammed, Zemirline Adel

Abstract:

In precision engineering, including precision positioning, micro-manipulation, robotic systems... a majority of these applications actuated by piezo stack used the compliant amplifier mechanism to amplifying motion and guiding it as needed utilize the flexibility of their components, in this paper, we present a novel approach introducing a symmetric structure comprising three stages, featuring rectangular flexure hinges with a compact size of 77mm×42mm×10mm. This design provides the capability for rotation, translation or a combination of both movements in both directions. The system allows for a displacement of 2107.5 μm when the input displacement of PZT is 50 μm while considering the material constraints of the aluminum alloy (7075 T6) which has a maximum admissible stress of 500 MPa However, our proposed design imposes additional constraints to ensure the stress remains below 361 MPa for optimal performance. These findings were obtained through finite element simulations conducted using ANSYS Workbench. Furthermore, our module facilitates precise control of various components within robotic systems, allowing for adjustable speeds based on specific requirements or desired outcomes.

Keywords: robotic, piezoelectric, compliant mechanism, flexure hinge

Procedia PDF Downloads 60
4623 Securitizing Terrorism: A Critical Appraisal of Pakistan’s Counter-Terrorism Approach

Authors: Bilal Zubair

Abstract:

In a constantly challenging internal security environment, Pakistan is making ways to improvise and respond to the new variations in the pervasive phenomenon of terrorism. The state’s endeavors towards securitizing terrorism as an existential threat are both extensive and intensive which have systematically incorporated both military and non-military means. Since 2007, the military has been conducting intermittent operations and by 2014 has successfully neutralized the terrorist ability to target vital security installations and security personal. The terrorists have responded by targeting communities which are soft targets and extremely vulnerable to organized assaults. Within this context, the study aims to explain the emerging trends of terrorism in Pakistan, which multi-layered and complex developments are having far-reaching implications for state and society. With a view to explore the underlining reasons, present trends and ensuing ramifications of the emerging trends in terrorism, this study would examine the following: First, the historical processes and development of Terrorism in Pakistan; secondly the processes of securitization which include political consensus, legal frameworks and military operations against the terrorist groups; thirdly , the socio-cultural dimensions and geopolitical influences on the transforming nature of sectarian terrorism. The study will also highlight the grey areas and weak links in the ongoing securitization process. Finally, the study will thoroughly explore the societal insecurity which is manifested in internal displacements, identity crisis and weakening the socio-political fabric of the state.

Keywords: counter-terrorism, terrorism, sectarianism, securitizing

Procedia PDF Downloads 284
4622 Keypoint Detection Method Based on Multi-Scale Feature Fusion of Attention Mechanism

Authors: Xiaoxiao Li, Shuangcheng Jia, Qian Li

Abstract:

Keypoint detection has always been a challenge in the field of image recognition. This paper proposes a novelty keypoint detection method which is called Multi-Scale Feature Fusion Convolutional Network with Attention (MFFCNA). We verified that the multi-scale features with the attention mechanism module have better feature expression capability. The feature fusion between different scales makes the information that the network model can express more abundant, and the network is easier to converge. On our self-made street sign corner dataset, we validate the MFFCNA model with an accuracy of 97.8% and a recall of 81%, which are 5 and 8 percentage points higher than the HRNet network, respectively. On the COCO dataset, the AP is 71.9%, and the AR is 75.3%, which are 3 points and 2 points higher than HRNet, respectively. Extensive experiments show that our method has a remarkable improvement in the keypoint recognition tasks, and the recognition effect is better than the existing methods. Moreover, our method can be applied not only to keypoint detection but also to image classification and semantic segmentation with good generality.

Keywords: keypoint detection, feature fusion, attention, semantic segmentation

Procedia PDF Downloads 104
4621 Occupational Safety Need Analysis for Turkey and Europe

Authors: Ismail Muratoglu, Ahmet Meyveci, Abdurrahman Tuncer, Erkan Demirci

Abstract:

This study is dedicated to the analysis of the problems of occupational safety in Turkey, Italy and Poland. The need analysis was applied to three different countries which are Turkey; 4, Poland; 1, Italy; 1 state. The number of the subjects is 891 in Turkey. The number of the subjects is 26 in Italy and the number of the subjects is 19 in Poland. The total number of samples of study is 936. Four different forms (Job Security Experts Form, Student Form, Teacher Form and Company Form) were applied. Results of experts of job security forms are rate of 7.1%. Then, the students’ forms are rate of 34.3%, teacher or instructor forms are rate of 9.9%. The last corporation forms are rate of 48.7%.

Keywords: Europe, need analysis, occupational safety, Turkey, vocational education

Procedia PDF Downloads 417