Search results for: physical security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8529

Search results for: physical security

7509 Childhood Obesity: Future Direction and Education Priorities

Authors: Zahra Ranjbar

Abstract:

Interpretive structural modeling (ISM) is a well-established methodology for identifying relationships among specific variables, which define a problem or an issue. In this study most important variables that have critical role in children obesity problem were introduce by ISM questionnaire technique and their relationships were determine. Our findings suggested that sedentary activities are top level variables and school teachers and administrators, public education and scientific collaborations are bottom level variables in children obesity problem. Control of dietary, Physical education program, parents, government and motivation strategies variables are depend to other variables. They are very sensitive to external variables. Also, physical education program, parents, government, motivation, school teachers and administrators, public education and collaboration variables have strong driving power. They are linkage factors; it means that they can be effective on children obesity problem directly.

Keywords: ISM, variable, obesity, physical education, children

Procedia PDF Downloads 456
7508 Mechanical and Physical Properties of Various Types of Dental Floss

Authors: Supanitayanon Lalita, Dechkunakorn Surachai, Anuwongnukroh Niwat, Srikhirin Toemsak, Roongrujimek Pitchaya, Tua-Ngam Peerapong

Abstract:

Objective: To compare maximum load, percentage of elongation, physical characteristics of 4 types of dental floss: (1) Thai Silk Floss (silk, waxed), (2) Oral B® Essential Floss (nylon, waxed), (3) Experimental Floss Xu (nylon, unwaxed), (4) Experimental Floss Xw (nylon, waxed). Materials & method: Four types of floss were tested (n=30) with a Universal Testing Machine (Instron®). Each sample (30 cm long, 5 cm segment) was fixed, and pulled apart with load cell of 100 N and a test speed of 100 mm/min. Physical characteristics were investigated by digital microscope under 2.5×10 magnification, and scanning electron microscope under 1×100 and 5×100 magnification. The size of the filaments was measured in micron (μm) and the fineness were measured in Denier. Statistical analysis: For mechanical properties, the maximum load and the percentage of elongation were presented as mean ± SD. The distribution of the data was calculated by the Kolmogorov-Smirnov test. One-way ANOVA and multiple comparison (Tukey HSD) were used to analyze the differences among the groups with the level of a statistical difference at p < 0.05. Results: The maximum load of Floss Xu, Floss Xw, Oral B and Thai Silk were 47.39, 46.46, 25.38, and 23.70 N, respectively. The percentage of elongation of Oral B, Floss Xw, Floss Xu and Thai Silk were 72.43, 44.62, 31.25, and 16.44%, respectively. All 4 types of dental floss showed statistically differences in both the maximum load and percentage of elongation at p < 0.05, except for maximum load between Floss Xw and Floss Xu that showed no statistically significant difference. Physical characteristics of Thai silk revealed the most disintegrated, the smallest, and the least fine filaments. Conclusion: Floss Xu had the highest maximum load. Oral B had the highest percentage of elongation. Wax coating on Floss X increased the elongation but had no significant effect on the maximum load. The physical characteristics of Thai Silk resulted in the lowest mechanical properties values.

Keywords: dental floss, maximum load, mechanical property, percentage of elongation, physical property

Procedia PDF Downloads 278
7507 Bitcoin, Blockchain and Smart Contract: Attacks and Mitigations

Authors: Mohamed Rasslan, Doaa Abdelrahman, Mahmoud M. Nasreldin, Ghada Farouk, Heba K. Aslan

Abstract:

Blockchain is a distributed database that endorses transparency while bitcoin is a decentralized cryptocurrency (electronic cash) that endorses anonymity and is powered by blockchain technology. Smart contracts are programs that are stored on a blockchain. Smart contracts are executed when predetermined conditions are fulfilled. Smart contracts automate the agreement execution in order to make sure that all participants immediate-synchronism of the outcome-certainty, without any intermediary's involvement or time loss. Currently, the Bitcoin market worth billions of dollars. Bitcoin could be transferred from one purchaser to another without the need for an intermediary bank. Network nodes through cryptography verify bitcoin transactions, which are registered in a public-book called “blockchain”. Bitcoin could be replaced by other coins, merchandise, and services. Rapid growing of the bitcoin market-value, encourages its counterparts to make use of its weaknesses and exploit vulnerabilities for profit. Moreover, it motivates scientists to define known vulnerabilities, offer countermeasures, and predict future threats. In his paper, we study blockchain technology and bitcoin from the attacker’s point of view. Furthermore, mitigations for the attacks are suggested, and contemporary security solutions are discussed. Finally, research methods that achieve strict security and privacy protocol are elaborated.

Keywords: Cryptocurrencies, Blockchain, Bitcoin, Smart Contracts, Peer-to-Peer Network, Security Issues, Privacy Techniques

Procedia PDF Downloads 82
7506 Biochar and Food Security in Central Uganda

Authors: Nataliya Apanovich, Mark Wright

Abstract:

Uganda is among the poorest but fastest growing populations in the world. Its annual population growth of 3% puts additional stress through land fragmentation, agricultural intensification, and deforestation on already highly weathered tropical (Ferralsol) soils. All of these factors lead to decreased agricultural yields and consequently diminished food security. The central region of Uganda, Buganda Kingdom, is especially vulnerable in terms of food security as its high population density coupled with mismanagement of natural resources led to gradual loss of its soil and even changes in microclimate. These changes are negatively affecting livelihoods of smallholder farmers who comprise 80% of all population in Uganda. This research focuses on biochar for soil remediation in Masaka District, Uganda. If produced on a small scale from locally sourced materials, biochar can increase the quality of soil in a cost and time effective manner. To assess biochar potential, 151 smallholder farmers were interviewed on the types of crops grown, agricultural residues produced and their use, as well as on attitudes towards biochar use and its production on a small scale. The interviews were conducted in 7 sub-counties, 32 parishes, and 92 villages. The total farmland covered by the study was 606.2 kilometers. Additional information on the state of agricultural development and environmental degradation in the district was solicited from four local government officials via informal interviews. This project has been conducted in collaboration with the international agricultural research institution, Makerere University in Kampala, Uganda. The results of this research can have implications on the way farmers perceive the value of their agricultural residues and what they decide to do with them. The underlying objective is to help smallholders in degraded soils increase their agricultural yields through the use of biochar without diverting the already established uses of agricultural residues to a new soil management practice.

Keywords: agricultural residues, biochar, central Uganda, food security, soil erosion, soil remediation

Procedia PDF Downloads 284
7505 Machine Learning Approach for Stress Detection Using Wireless Physical Activity Tracker

Authors: B. Padmaja, V. V. Rama Prasad, K. V. N. Sunitha, E. Krishna Rao Patro

Abstract:

Stress is a psychological condition that reduces the quality of sleep and affects every facet of life. Constant exposure to stress is detrimental not only for mind but also body. Nevertheless, to cope with stress, one should first identify it. This paper provides an effective method for the cognitive stress level detection by using data provided from a physical activity tracker device Fitbit. This device gathers people’s daily activities of food, weight, sleep, heart rate, and physical activities. In this paper, four major stressors like physical activities, sleep patterns, working hours and change in heart rate are used to assess the stress levels of individuals. The main motive of this system is to use machine learning approach in stress detection with the help of Smartphone sensor technology. Individually, the effect of each stressor is evaluated using logistic regression and then combined model is built and assessed using variants of ordinal logistic regression models like logit, probit and complementary log-log. Then the quality of each model is evaluated using Akaike Information Criterion (AIC) and probit is assessed as the more suitable model for our dataset. This system is experimented and evaluated in a real time environment by taking data from adults working in IT and other sectors in India. The novelty of this work lies in the fact that stress detection system should be less invasive as possible for the users.

Keywords: physical activity tracker, sleep pattern, working hours, heart rate, smartphone sensor

Procedia PDF Downloads 256
7504 Physico-Mechanical Properties of Wood-Plastic Composites Produced from Polyethylene Terephthalate Plastic Bottle Wastes and Sawdust of Three Tropical Hardwood Species

Authors: Amos Olajide Oluyege, Akpanobong Akpan Ekong, Emmanuel Uchechukwu Opara, Sunday Adeniyi Adedutan, Joseph Adeola Fuwape, Olawale John Olukunle

Abstract:

This study was carried out to evaluate the influence of wood species and wood plastic ratio on the physical and mechanical properties of wood plastic composites (WPCs) produced from polyethylene terephthalate (PET) plastic bottle wastes and sawdust from three hardwood species, namely, Terminalia superba, Gmelina arborea, and Ceiba pentandra. The experimental WPCs were prepared from sawdust particle size classes of ≤ 0.5, 0.5 – 1.0, and 1.0 – 2.0 mm at wood/plastic ratios of 40:60, 50:50 and 60:40 (percentage by weight). The WPCs for each study variable combination were prepared in 3 replicates and laid out in a randomized complete block design (RCBD). The physical properties investigated water absorption (WA), linear expansion (LE) and thickness swelling (TS) while the mechanical properties evaluated were Modulus of Elasticity (MOE) and Modulus of Rupture (MOR). The mean values for WA, LE and TS ranged from 1.07 to 34.04, 0.11 to 1.76 and 0.11 to 4.05 %, respectively. The mean values of the three physical properties increased with decrease in wood plastic ratio. Wood plastic ratio of 40:60 at each particle size class generally resulted in the lowest values while wood plastic ratio of 60:40 had the highest values for each of the three species. For each of the physical properties, T. superba had the least mean values followed by G. arborea, while the highest values were observed C. pentandra. The mean values for MOE and MOR ranged from 458.17 to 1875.67 and 2.64 to 18.39 N/mm2, respectively. The mean values of the two mechanical properties decreased with increase in wood plastic ratio. Wood plastic ratio of 40:60 at each wood particle size class generally had the highest values while wood plastic ratio of 60:40 had the least values for each of the three species. For each of the mechanical properties, C. pentandra had the highest mean values followed by G. arborea, while the least values were observed T. superba. There were improvements in both the physical and mechanical properties due to decrease in sawdust particle size class with the particle size class of ≤ 0.5 mm giving the best result. The results of the Analysis of variance revealed significant (P < 0.05) effects of the three study variables – wood species, sawdust particle size class and wood/plastic ratio on all the physical and mechanical properties of the WPCs. It can be concluded from the results of this study that wood plastic composites from sawdust particle size ≤ 0.5 and PET plastic bottle wastes with acceptable physical and mechanical properties are better produced using 40:60 wood/plastic ratio, and that at this ratio, all the three species are suitable for the production of wood plastic composites.

Keywords: polyethylene terephthalate plastic bottle wastes, wood plastic composite, physical properties, mechanical properties

Procedia PDF Downloads 201
7503 Wavelet Based Advanced Encryption Standard Algorithm for Image Encryption

Authors: Ajish Sreedharan

Abstract:

With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. As encryption process is applied to the whole image in AES ,it is difficult to improve the efficiency. In this paper, wavelet decomposition is used to concentrate the main information of image to the low frequency part. Then, AES encryption is applied to the low frequency part. The high frequency parts are XORed with the encrypted low frequency part and a wavelet reconstruction is applied. Theoretical analysis and experimental results show that the proposed algorithm has high efficiency, and satisfied security suits for image data transmission.

Keywords: discrete wavelet transforms, AES, dynamic SBox

Procedia PDF Downloads 432
7502 A Low Cost and Reconfigurable Experimental Platform for Engineering Lab Education

Authors: S. S. Kenny Lee, C. C. Kong, S. K. Ting

Abstract:

Teaching engineering lab provides opportunity for students to practice theories learned through physical experiment in the laboratory. However, building laboratories to accommodate increased number of students are expensive, making it impossible for an educational institution to afford the high expenses. In this paper, we develop a low cost and remote platform to aid teaching undergraduate students. The platform is constructed where the real experiment setting up in laboratory can be reconfigure and accessed remotely, the aim is to increase student’s desire to learn at which they can interact with the physical experiment using network enabled devices at anywhere in the campus. The platform is constructed with Raspberry Pi as a main control board that provides communication between computer interfaces to the actual experiment preset in the laboratory. The interface allows real-time remote viewing and triggering the physical experiment in the laboratory and also provides instructions and learning guide about the experimental.

Keywords: engineering lab, low cost, network, remote platform, reconfigure, real-time

Procedia PDF Downloads 308
7501 The Relationship between Osteoporosis-Related Knowledge and Physical Activity among Women Age over 50 Years

Authors: P. Tardi, B. Szilagyi, A. Makai, P. Acs, M. Hock, M. Jaromi

Abstract:

Osteoporosis is becoming a major public health problem, particularly in postmenopausal women, as the incidence of this disease is getting higher. Nowadays, one of the most common chronic musculoskeletal diseases is osteoporosis. Osteoporosis-related knowledge is an important contributor to prevent or to treat osteoporosis. The most important strategies to prevent or treat the disease are increasing the level of physical activity at all ages, cessation of smoking, reduction of alcohol consumption, adequate dietary calcium, and vitamin D intake. The aim of the study was to measure the osteoporosis-related knowledge and physical activity among women age over 50 years. For the measurements, we used the osteoporosis questionnaire (OPQ) to examine the disease-specific knowledge and the global physical activity questionnaire (GPAQ) to measure the quantity and quality of the physical activity. The OPQ is a self-administered 20-item questionnaire with five categories: general information, risk factors, investigations, consequences, and treatment. There are four choices per question (one of them is the 'I do not know'). The filler gets +1 for a good answer, -1 point for a bad answer, and 0 for 'I do not know' answer. We contacted with 326 women (63.08 ± 9.36 year) to fill out the questionnaires. Descriptive analysis was carried out, and we calculated Spearman's correlation coefficient to examine the relationship between the variables. Data were entered into Microsoft Excel, and all statistical analyses were performed using SPSS (Version 24). The participants of the study (n=326) reached 8.76 ± 6.94 points on OPQ. Significant (p < 0.001) differences were found in the results of OPQ according to the highest level of education. It was observed that the score of the participants with osteoporosis (10.07 ± 6.82 points) was significantly (p=0.003) higher than participants without osteoporosis (9.38 ± 6.66 points) and the score of those women (6.49 ± 6.97 points) who did not know that osteoporosis exists in their case. The GPAQ results showed the sample physical activity in the dimensions of vigorous work (479.86 ± 684.02 min/week); moderate work (678.16 ± 804.5 min/week); travel (262.83 ± 380.27 min/week); vigorous recreation (77.71 ± 123.46 min/week); moderate recreation (115.15 ± 154.82 min/week) and total weekly physical activity (1645.99 ± 1432.88 min/week). Significant correlations were found between the osteoporosis-related knowledge and the physical activity in travel (R=0.21; p < 0.001), vigorous recreation (R=0.35; p < 0.001), moderate recreation (R=0.35; p < 0.001), total vigorous minutes/week (R=0.15; p=0.001) and total moderate minutes/week (R=0.13; p=0.04) dimensions. According to the results that were achieved, the highest level of education significantly determines osteoporosis-related knowledge. Physical activity is an important contributor to prevent or to treat osteoporosis, and it showed a significant correlation with osteoporosis-related knowledge. Based on the results, the development of osteoporosis-related knowledge may help to improve the level of physical activity, especially recreation. Acknowledgment: Supported by the ÚNKP-20-1 New National Excellence Program of The Ministry for Innovation and Technology from the Source of the National Research, Development and Innovation Fund.

Keywords: osteoporosis, osteoporosis-related knowledge, physical activity, prevention

Procedia PDF Downloads 112
7500 Investigating Relationship between Body Size and Physical Fitness Factors among University Students

Authors: Allahyar Arabmomeni, Hojjatollah Alaei

Abstract:

Background: The objectives of this study was to investigate effect of anthropometric variables and body composition on physical capabilities among male and female students. Materials and Methods: The study had a descriptive correlation method. The statistical population consisted of all students of Islamic Azad University, Khomeinishahr Branch, from 2011 to 2013, which was about 7000 students. The statistical sample included 300 male and 300 female students who were randomly selected from among university students in proportion to frequency of students in each faculty. Descriptive statistical methods, t-test and Pearson correlation coefficient were used for data analysis. Results: Results of this research showed that body size of male students in the studied variables was more than that of female students (p<0.05). Moreover, there was significant difference between all the variables based on significance level of the table. Also, the results taken from the Pearson correlation of this study's variables showed a positive relationship between height and leg and hand length and sit-up, full-ups bar and vertical jump tests (p<0/01). Besides, there was a positive correlation between hand length, sit-up, full-ups bar and vertical jump tests. As far as tests of length of legs and vertical jump were concerned, a highly positive correlation was observed between them. Additionally, results of this study indicated a significant correlation at alpha level of 0.05 between age and height of the students; but, there was a negative correlation between age, sit-up and 1600-m tests (p<0.05). Conclusion: The results of this study indicated a relationship between size of weight, height, length of hands and legs and some physical fitness tests. Therefore, it is required to consider anthropometric factors in addition to gender and age while preparing norms of physical fitness since variables of height and length of hands also affect physical fitness evaluation.

Keywords: anthropometric variables, physical fitness factors, students, body composition

Procedia PDF Downloads 392
7499 Radio Based Location Detection

Authors: M. Pallikonda Rajasekaran, J. Joshapath, Abhishek Prasad Shaw

Abstract:

Various techniques has been employed to find location such as GPS, GLONASS, Galileo, and Beidou (compass). This paper currently deals with finding location using the existing FM signals that operates between 88-108 MHz. The location can be determined based on the received signal strength of nearby existing FM stations by mapping the signal strength values using trilateration concept. Thus providing security to users data and maintains eco-friendly environment at zero installation cost as this technology already existing FM stations operating in commercial FM band 88-108 MHZ. Along with the signal strength based trilateration it also finds azimuthal angle of the transmitter by employing directional antenna like Yagi-Uda antenna at the receiver side.

Keywords: location, existing FM signals, received signal strength, trilateration, security, eco-friendly, direction, privacy, zero installation cost

Procedia PDF Downloads 519
7498 A Watermarking Signature Scheme with Hidden Watermarks and Constraint Functions in the Symmetric Key Setting

Authors: Yanmin Zhao, Siu Ming Yiu

Abstract:

To claim the ownership for an executable program is a non-trivial task. An emerging direction is to add a watermark to the program such that the watermarked program preserves the original program’s functionality and removing the watermark would heavily destroy the functionality of the watermarked program. In this paper, the first watermarking signature scheme with the watermark and the constraint function hidden in the symmetric key setting is constructed. The scheme uses well-known techniques of lattice trapdoors and a lattice evaluation. The watermarking signature scheme is unforgeable under the Short Integer Solution (SIS) assumption and satisfies other security requirements such as the unremovability security property.

Keywords: short integer solution (SIS) problem, symmetric-key setting, watermarking schemes, watermarked signatures

Procedia PDF Downloads 133
7497 Delineation of Soil Physical Properties Using Electrical Conductivity, Case Study: Volcanic Soil Simulation Model

Authors: Twin Aji Kusumagiani, Eleonora Agustine, Dini Fitriani

Abstract:

The value changes of soil physical properties in the agricultural area are giving impacts on soil fertility. This can be caused by excessive usage of inorganic fertilizers and imbalances on organic fertilization. Soil physical parameters that can be measured include soil electrical conductivity, water content volume, soil porosity, dielectric permittivity, etc. This study used the electrical conductivity and volume water content as the measured physical parameters. The study was conducted on volcanic soil obtained from agricultural land conditioned with NPK fertilizer and salt in a certain amount. The dimension of the conditioned soil being used is 1 x 1 x 0.5 meters. By using this method, we can delineate the soil electrical conductivity value of land due to changes in the provision of inorganic NPK fertilizer and the salinity in the soil. Zone with the additional 1 kg of salt has the dimension of 60 cm in width, 20 cm in depth and 1 cm in thickness while zone with the additional of 10 kg NPK fertilizer has the dimensions of 70 cm in width, 20 cm in depth and 3 cm in thickness. This salt addition resulted in EC values changes from the original condition. Changes of the EC value tend to occur at a depth of 20 to 40 cm on the line 1B at 9:45 dS/cm and line 1C of 9.35 dS/cm and tend to have the direction to the Northeast.

Keywords: EC, electrical conductivity, VWC, volume water content, NPK fertilizer, salt, volcanic soil

Procedia PDF Downloads 312
7496 Development of an Indigenous Motorized Planter for the Sustainable Production of Grain Crops in Nigeria

Authors: Babatunde Oluwamayokun Soyoye

Abstract:

This technology, whose development revolves round culture, tradition, and prevailing needs of the people, is seen as a solution in promoting development in poor rural communities in many parts of Nigeria. The research was based on one of the food security agenda of the Federal Government of Nigeria by developing a motorized multi-grain crop planter suitable for planting operations in tropical soils. The ergonomic design is tailored towards the ease of planting operations for would-be users, improve crop yields and profitability by minimizing the cost of production. Some properties of the grain crops were determined and were used to develop and assemble the locally-made motorized planter. These properties were used in establishing the design criteria of various components of the planter. The geometric mean diameter of the maize, cowpea, groundnut, and soybean were 8.26 mm, 8.72 mm, 9.51 mm and 6.52 mm respectively, with respective groove depths of 8 mm, 7 mm, 9 mm and 6 mm. The results obtained from the evaluation of the planter confirmed that the planter has a uniform discharge and application rates. The field capacity of the planter was determined to be 0.187 ha/h. Also, the average performance efficiency of the planter was 95.5%, with the average discharge and application rates of 7.86 kg/h and 42.1 kg/ha, respectively. The motorized multi-grain planter can be used in increasing food production, reduce time, cost of production, and can become a major tool to fast-track the food security agenda of the government of Nigeria.

Keywords: design and fabrication, food security, grain crop, motorized planter

Procedia PDF Downloads 137
7495 Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure

Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh

Abstract:

Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.

Keywords: anonymity, authentication, Internet of Things, lightweight, un-traceability

Procedia PDF Downloads 293
7494 The Effect of Training Program by Using Especial Strength on the Performance Skills of Hockey Players

Authors: Wesam El Bana

Abstract:

The current research aimed at designing a training program for improving specific muscular strength through using the especial strength and identifying its effects on the performance level skills of hockey players. The researcher used the quasi-experimental approach (two – group design) with pre- and post-measurements. Sample: (n= 35) was purposefully chosen from sharkia sports club. Five hockey player were excluded due to their non-punctuality. The rest were divided into two equal groups (experimental and control). The researcher concluded the following: The traditional training program had a positive effect on improving the physical variables under investigation as it led to increasing the improvement percentages of the physical variables and the performance level skills of the control group between the pre- and post-measurement. The recommended training program had a positive effect on improving the physical variables under investigation as it led to increasing the improvement percentages of the physical variable and the performance level skills of the experimental group between the pre- and post-measurements. Exercises using the especial strength training had a positive effect on the post-measurement of the experimental group.

Keywords: hockey, especial strength, performance skills

Procedia PDF Downloads 241
7493 Effect of Endurance Exercise Training on Blood Pressure in Elderly Female Patients with Hypertension

Authors: Elham Ahmadi

Abstract:

This study is conducted with the aim of investigating the effect of moderate physical activity (60% of maximal heart rate-MHR) on blood pressure in an elderly female with hypertension. Hypertension is considered a modifiable risk factor for cardiovascular disease through physical activity. The purpose and significance of this study were to investigate the role of exercise as an alternative therapy since some patients exhibit sensitivity/intolerance to some drugs. Initially, 65 hypertensive females (average age = 49.7 years) (systolic blood pressure, SBP >140 mmHg and/or diastolic blood pressure, DBP>85 mmHg) and 25 hypertensive females as a control group (average age = 50.3 years and systolic blood pressure, SBP >140 mmHg and/or diastolic blood pressure, DBP>85 mmHg) were selected. The subjects were divided based on their age, duration of disease, physical activity, and drug consumption. Then, blood pressure and heart rate (HR) were measured in all of the patients using a sphygmomanometer (pre-test). The exercise sessions consisted of warm-up, aerobic activity, and cooling down (total duration of 20 minutes for the first session up to 55 minutes in the last session). At the end of the 12th session (mid-test) and final session (24th session), blood pressure was measured for the last time (post-test). The control group was without any exercise during the study. The results were analyzed using a t-test. Our results indicated that moderate physical activity was effective in lowering blood pressure by 6.4/5.6–mm Hg for SBP and 2.4/4.3mm Hg for DBP in hypertensive patients, irrespective of age, duration of disease, and drug consumption ( P<.005). The control group indicates no changes in BP. Physical activity programs with moderate intensity (approximately at 60% MHR), three days per week, can be used not only as a preventive measure for diastolic hypertension (DBP>90 mmHg high blood pressure) but also as an alternative to drug therapy in the treatment of hypertension, as well.

Keywords: endurance exercise, elderly female, hypertension, physical activity

Procedia PDF Downloads 97
7492 Percentage Change in the Selected Skinfold Measurements of Male Students of University of Delhi Due to Progressive and Constant Load of Physical Training

Authors: Seema Kaushik

Abstract:

Skinfold measurements provide considerably meaningful and consistent information about subcutaneous fat and its distribution. Physical activities in the form of conditioning and/or training leads to various structural, functional and mechanical changes and numerous training programmes exist for the improvement of physical fitness, however, most of the studies are conducted on foreign soil with foreign population as sample, which may/may not be applicable to the Indian conditions. Moreover, there is not even a single training/ conditioning programme that caters to the need of male students of University of Delhi with regard to various skinfold thickness measurements. Hence, the present study aimed at studying the effect of progressive and constant load training on selected skinfold measurements of male students of University of Delhi in form of percentage change. The sample size for the study was 90 having three groups of male; 30 samples in each group (mean age = 20.04±0.49 years). The variables included triceps, sub-scapular, supra-iliac and calf skinfolds. The experimental design adopted for the study was multi-group repeated measure design. Three different groups were measured four times repeatedly at an interval of 6 weeks, on completion of each of the three meso-cycles. Standard landmarks and protocols were followed to measure the selected variables. Mean, standard deviation and percentage were computed to analyze the data statistically. The study concluded that both the progressive and constant load of physical training bring changes in the skinfold thickness measurements of male students of University of Delhi.

Keywords: constant load, progressive load, physical training, skinfold measurements

Procedia PDF Downloads 322
7491 Digital Immunity System for Healthcare Data Security

Authors: Nihar Bheda

Abstract:

Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.

Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology

Procedia PDF Downloads 67
7490 Secure Network Coding-Based Named Data Network Mutual Anonymity Transfer Protocol

Authors: Tao Feng, Fei Xing, Ye Lu, Jun Li Fang

Abstract:

NDN is a kind of future Internet architecture. Due to the NDN design introduces four privacy challenges,Many research institutions began to care about the privacy issues of naming data network(NDN).In this paper, we are in view of the major NDN’s privacy issues to investigate privacy protection,then put forwards more effectively anonymous transfer policy for NDN.Firstly,based on mutual anonymity communication for MP2P networks,we propose NDN mutual anonymity protocol.Secondly,we add interest package authentication mechanism in the protocol and encrypt the coding coefficient, security of this protocol is improved by this way.Finally, we proof the proposed anonymous transfer protocol security and anonymity.

Keywords: NDN, mutual anonymity, anonymous routing, network coding, authentication mechanism

Procedia PDF Downloads 451
7489 The EU’s Role in Exporting Digital Privacy and Security Standards: A Legal Framework for Global Normative Diffusion

Authors: Yuval Reinfeld

Abstract:

This paper explores the European Union’s expanding influence as a global regulatory power, particularly in the realms of legal, security, and privacy challenges within the digital landscape. As digital regulation becomes increasingly vital, the EU has positioned itself as a leading exporter of privacy and cybersecurity standards through landmark frameworks like the General Data Protection Regulation (GDPR), the Artificial Intelligence Act (AIA), and the Digital Services Act (DSA). These regulations have set global benchmarks, extending their influence well beyond Europe’s borders by shaping legal frameworks in third countries and guiding the development of global digital governance. Central to this regulatory diffusion is the European Court of Justice (CJEU), whose rulings consistently reinforce and extend the reach of EU standards on an international scale. Through mechanisms such as trade agreements, adequacy decisions, and multilateral cooperation, the EU has constructed a regulatory ecosystem that other jurisdictions increasingly adopt. This paper investigates key CJEU cases to illustrate how the EU’s legal instruments in privacy, security, and AI contribute to its role as a global standard-setter. By examining the intersection of digital governance, international law, and normative power, this research provides a thorough analysis of the EU’s regulatory impact on global privacy, cybersecurity, and AI frameworks.

Keywords: digital privacy, cybersecurity, GDPR, European Union Law, artificial intelligence, global normative power

Procedia PDF Downloads 24
7488 Consumer Protection Law For Users Mobile Commerce as a Global Effort to Improve Business in Indonesia

Authors: Rina Arum Prastyanti

Abstract:

Information technology has changed the ways of transacting and enabling new opportunities in business transactions. Problems to be faced by consumers M Commerce, among others, the consumer will have difficulty accessing the full information about the products on offer and the forms of transactions given the small screen and limited storage capacity, the need to protect children from various forms of excess supply and usage as well as errors in access and disseminate personal data, not to mention the more complex problems as well as problems agreements, dispute resolution that can protect consumers and assurance of security of personal data. It is no less important is the risk of payment and personal information of payment dal am also an important issue that should be on the swatch solution. The purpose of this study is 1) to describe the phenomenon of the use of Mobile Commerce in Indonesia. 2) To determine the form of legal protection for the consumer use of Mobile Commerce. 3) To get the right type of law so as to provide legal protection for consumers Mobile Commerce users. This research is a descriptive qualitative research. Primary and secondary data sources. This research is a normative law. Engineering conducted engineering research library collection or library research. The analysis technique used is deductive analysis techniques. Growing mobile technology and more affordable prices as well as low rates of provider competition also affects the increasing number of mobile users, Indonesia is placed into 4 HP users in the world, the number of mobile phones in Indonesia is estimated at around 250.1 million telephones with a population of 237 556. 363. Indonesian form of legal protection in the use of mobile commerce still a part of the Law No. 11 of 2008 on Information and Electronic Transactions and until now there is no rule of law that specifically regulates mobile commerce. Legal protection model that can be applied to protect consumers of mobile commerce users ensuring that consumers get information about potential security and privacy challenges they may face in m commerce and measures that can be used to limit the risk. Encourage the development of security measures and built security features. To encourage mobile operators to implement data security policies and measures to prevent unauthorized transactions. Provide appropriate methods both time and effectiveness of redress when consumers suffer financial loss.

Keywords: mobile commerce, legal protection, consumer, effectiveness

Procedia PDF Downloads 364
7487 A User Identification Technique to Access Big Data Using Cloud Services

Authors: A. R. Manu, V. K. Agrawal, K. N. Balasubramanya Murthy

Abstract:

Authentication is required in stored database systems so that only authorized users can access the data and related cloud infrastructures. This paper proposes an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. The proposed technique is likely to be more robust as the probability of breaking the password is extremely low. This framework uses a multi-modal biometric approach and SMS to enforce additional security measures with the conventional Login/password system. The robustness of the technique is demonstrated mathematically using a statistical analysis. This work presents the authentication system along with the user authentication architecture diagram, activity diagrams, data flow diagrams, sequence diagrams, and algorithms.

Keywords: design, implementation algorithms, performance, biometric approach

Procedia PDF Downloads 476
7486 [Keynote Talk]: Pragmatic Leadership in School Organization and Research in Physical Education Professional Development

Authors: Ellie Abdi

Abstract:

This paper is a review of a recently published book (April 2018) by Dr. Ellie Abdi. The book divides into two sections of 1) leadership in school organization and 2) pragmatic research in physical education professional development. The first part of the book explores school organizational development in terms of 1) communication development, 2) community development, and 3) decision making development. It concludes to acknowledge that decision making is the heart of educational management. This is while communication and community are essential to the development of the school organization. The role of a leader in a professional learning community (PLC) is acknowledged with the organizational development plan and moves onto 5 overall objectives of a professional development plan. It clarifies that professional learning community (PLC) benefits both students and professionals in education. Furthermore, professional development needs to be involved in opportunities to value diversity and foundations of learning, in addition to search for veteran teachers who offer a rich combination of experience and perspective. School educational platform in terms of teacher training in physical education is discussed in the second part. The book reviews that well-designed programs are powerful and constructive ways to identify the strength and weaknesses of teachers. Post-positivism, constructivism, advocacy/participatory, and pragmatism in teacher education are also disclosed. The book specifically unfolds pragmatic research in professional development of physical education. It provides researchers, doctoral, and masters level students with defined examples. In summary, the book shows how appropriate it is when many different traditions are displayed in a pragmatic way, following the stages of research from development to dissemination.

Keywords: leadership, physical education, pragmatic, professional development

Procedia PDF Downloads 162
7485 High Speed Rail vs. Other Factors Affecting the Tourism Market in Italy

Authors: F. Pagliara, F. Mauriello

Abstract:

The objective of this paper is to investigate the relationship between the increase of accessibility brought by high speed rail (HSR) systems and the tourism market in Italy. The impacts of HSR projects on tourism can be quantified in different ways. In this manuscript, an empirical analysis has been carried out with the aid of a dataset containing information both on tourism and transport for 99 Italian provinces during the 2006-2016 period. Panel data regression models have been considered, since they allow modelling a wide variety of correlation patterns. Results show that HSR has an impact on the choice of a given destination for Italian tourists while the presence of a second level hub mainly affects foreign tourists. Attraction variables are also significant for both categories and the variables concerning security, such as number of crimes registered in a given destination, have a negative impact on the choice of a destination.

Keywords: tourists, overnights, high speed rail, attractions, security

Procedia PDF Downloads 155
7484 Reliable and Error-Free Transmission through Multimode Polymer Optical Fibers in House Networks

Authors: Tariq Ahamad, Mohammed S. Al-Kahtani, Taisir Eldos

Abstract:

Optical communications technology has made enormous and steady progress for several decades, providing the key resource in our increasingly information-driven society and economy. Much of this progress has been in finding innovative ways to increase the data carrying capacity of a single optical fiber. In this research article we have explored basic issues in terms of security and reliability for secure and reliable information transfer through the fiber infrastructure. Conspicuously, one potentially enormous source of improvement has however been left untapped in these systems: fibers can easily support hundreds of spatial modes, but today’s commercial systems (single-mode or multi-mode) make no attempt to use these as parallel channels for independent signals. Bandwidth, performance, reliability, cost efficiency, resiliency, redundancy, and security are some of the demands placed on telecommunications today. Since its initial development, fiber optic systems have had the advantage of most of these requirements over copper-based and wireless telecommunications solutions. The largest obstacle preventing most businesses from implementing fiber optic systems was cost. With the recent advancements in fiber optic technology and the ever-growing demand for more bandwidth, the cost of installing and maintaining fiber optic systems has been reduced dramatically. With so many advantages, including cost efficiency, there will continue to be an increase of fiber optic systems replacing copper-based communications. This will also lead to an increase in the expertise and the technology needed to tap into fiber optic networks by intruders. As ever before, all technologies have been subject to hacking and criminal manipulation, fiber optics is no exception. Researching fiber optic security vulnerabilities suggests that not everyone who is responsible for their networks security is aware of the different methods that intruders use to hack virtually undetected into fiber optic cables. With millions of miles of fiber optic cables stretching across the globe and carrying information including but certainly not limited to government, military, and personal information, such as, medical records, banking information, driving records, and credit card information; being aware of fiber optic security vulnerabilities is essential and critical. Many articles and research still suggest that fiber optics is expensive, impractical and hard to tap. Others argue that it is not only easily done, but also inexpensive. This paper will briefly discuss the history of fiber optics, explain the basics of fiber optic technologies and then discuss the vulnerabilities in fiber optic systems and how they can be better protected. Knowing the security risks and knowing the options available may save a company a lot embarrassment, time, and most importantly money.

Keywords: in-house networks, fiber optics, security risk, money

Procedia PDF Downloads 420
7483 Assessing Justice, Security and Human Rights Violations in Crisis Situations: The Case of Cameroon

Authors: Forbah Julius Ajamah

Abstract:

The protection of human rights and respect of the rule of law in Sub-Saharan African is a constant challenge due to ongoing and protracted conflict situations, political instability, shrinking democratic space and allegations of large-scale corruption in some countries. Conflict and/or crisis is most often resulting from constant violations of individual rights, with the risk increasing when many human rights are violated in a systematic or widespread fashion. Violations related to economic, social and cultural rights at times are as significant as violations of civil and political rights. Cameroon a country in Sub-Saharan African, for many years now has been confronted by numerous crises across different regions. Despite measures carried out, it has been reported that lesser and lesser attention has been placed on various conflict/crisis across Cameroon. To reach a common understanding of how both the economic, social and cultural rights has been violated and related impact on the quality of life, this paper evaluates justice, security and human rights violations in the present crisis situations. Without the prevention of human rights violations, wider conflict and/or crisis, will continue to have a negative impact in the lives of the inhabitants. This paper aims at providing evidence to support the fact that effective prevention requires early identification of risks that could allow for preventive and/or mitigatory measures to be designed and implemented.

Keywords: justice, security, human rights abuses, conflicts, crisis

Procedia PDF Downloads 85
7482 Modalmetric Fiber Sensor and Its Applications

Authors: M. Zyczkowski, P. Markowski, M. Karol

Abstract:

The team from IOE MUT is developing fiber optic sensors for the security systems for 15 years. The conclusions of the work indicate that these sensors are complicated. Moreover, these sensors are expensive to produce and require sophisticated signal processing methods.We present the results of the investigations of three different applications of the modalmetric sensor: • Protection of museum collections and heritage buildings, • Protection of fiber optic transmission lines, • Protection of objects of critical infrastructure. Each of the presented applications involves different requirements for the system. The results indicate that it is possible to developed a fiber optic sensor based on a single fiber. Modification of optoelectronic parts with a change of the length of the sensor and the method of reflections of propagating light at the end of the sensor allows to adjust the system to the specific application.

Keywords: modalmetric fiber optic sensor, security sensor, optoelectronic parts, signal processing

Procedia PDF Downloads 619
7481 Image Steganography Using Least Significant Bit Technique

Authors: Preeti Kumari, Ridhi Kapoor

Abstract:

 In any communication, security is the most important issue in today’s world. In this paper, steganography is the process of hiding the important data into other data, such as text, audio, video, and image. The interest in this topic is to provide availability, confidentiality, integrity, and authenticity of data. The steganographic technique that embeds hides content with unremarkable cover media so as not to provoke eavesdropper’s suspicion or third party and hackers. In which many applications of compression, encryption, decryption, and embedding methods are used for digital image steganography. Due to compression, the nose produces in the image. To sustain noise in the image, the LSB insertion technique is used. The performance of the proposed embedding system with respect to providing security to secret message and robustness is discussed. We also demonstrate the maximum steganography capacity and visual distortion.

Keywords: steganography, LSB, encoding, information hiding, color image

Procedia PDF Downloads 474
7480 Electronic Media and Physical Activity of Primary School Children

Authors: Srna Jenko Miholic, Marta Borovec, Josipa Persun

Abstract:

The constant expansion of technology has further accelerated the development of media and vice versa. Although its promotion includes all kinds of interesting and positive sides, the poor functioning of the media is still being researched and proven. Young people, as well as children from the earliest age, resort to the media the most, so it is necessary to defend the role of adults as it were parents, teachers, and environment against virtual co-educators such as the media. The research aim of this study was to determine the time consumption of using electronic media by primary school children as well as their involvement in certain physical activities. Furthermore, to determine what is happening when parents restrict their children's access to electronic media and encourage them to participate in alternative contents during their leisure time. Result reveals a higher percentage of parents restrict their children's access to electronic media and then encourage children to socialize with family and friends, spend time outdoors, engage in physical activity, read books or learn something unrelated to school content even though it would not be children's favorite activity. The results highlight the importance of parental control when it comes to children's use of electronic media and the positive effects that parental control has in terms of encouraging children to be useful, socially desirable, physically active, and healthy activities.

Keywords: elementary school, digital media, leisure time, parents, physical engagement

Procedia PDF Downloads 147