Search results for: security critical application
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14806

Search results for: security critical application

13786 A Comparative Study between Japan and the European Union on Software Vulnerability Public Policies

Authors: Stefano Fantin

Abstract:

The present analysis outcomes from the research undertaken in the course of the European-funded project EUNITY, which targets the gaps in research and development on cybersecurity and privacy between Europe and Japan. Under these auspices, the research presents a study on the policy approach of Japan, the EU and a number of Member States of the Union with regard to the handling and discovery of software vulnerabilities, with the aim of identifying methodological differences and similarities. This research builds upon a functional comparative analysis of both public policies and legal instruments from the identified jurisdictions. The result of this analysis is based on semi-structured interviews with EUNITY partners, as well as by the participation of the researcher to a recent report from the Center for EU Policy Study on software vulnerability. The European Union presents a rather fragmented legal framework on software vulnerabilities. The presence of a number of different legislations at the EU level (including Network and Information Security Directive, Critical Infrastructure Directive, Directive on the Attacks at Information Systems and the Proposal for a Cybersecurity Act) with no clear focus on such a subject makes it difficult for both national governments and end-users (software owners, researchers and private citizens) to gain a clear understanding of the Union’s approach. Additionally, the current data protection reform package (general data protection regulation), seems to create legal uncertainty around security research. To date, at the member states level, a few efforts towards transparent practices have been made, namely by the Netherlands, France, and Latvia. This research will explain what policy approach such countries have taken. Japan has started implementing a coordinated vulnerability disclosure policy in 2004. To date, two amendments can be registered on the framework (2014 and 2017). The framework is furthermore complemented by a series of instruments allowing researchers to disclose responsibly any new discovery. However, the policy has started to lose its efficiency due to a significant increase in reports made to the authority in charge. To conclude, the research conducted reveals two asymmetric policy approaches, time-wise and content-wise. The analysis therein will, therefore, conclude with a series of policy recommendations based on the lessons learned from both regions, towards a common approach to the security of European and Japanese markets, industries and citizens.

Keywords: cybersecurity, vulnerability, European Union, Japan

Procedia PDF Downloads 139
13785 Seismic Fragility of Base-Isolated Multi-Story Piping System in Critical Facilities

Authors: Bu Seog Ju, Ho Young Son, Yong Hee Ryu

Abstract:

This study is focused on the evaluation of seismic fragility of multi-story piping system installed in critical structures, isolated with triple friction pendulum bearing. The concept of this study is to isolate the critical building structure as well as nonstructural component, especially piping system in order to mitigate the earthquake damage and achieve the reliable seismic design. Then, the building system and multi-story piping system was modeled in OpenSees. In particular, the triple friction pendulum isolator was accounted for the vertical and horizontal coupling behavior in the building system subjected to seismic ground motions. Consequently, in order to generate the seismic fragility of base-isolated multi-story piping system, 21 selected seismic ground motions were carried out, by using Monte Carlo Simulation accounted for the uncertainties in demand. Finally, the system-level fragility curves corresponding to the limit state of the piping system was conducted at each T-joint system, which was commonly failure points in piping systems during and after an earthquake. Additionally, the system-level fragilities were performed to the first floor and second floor level in critical structures.

Keywords: fragility, friction pendulum bearing, nonstructural component, seismic

Procedia PDF Downloads 134
13784 Design and Implementation of a Nano-Power Wireless Sensor Device for Smart Home Security

Authors: Chia-Chi Chang

Abstract:

Most battery-driven wireless sensor devices will enter in sleep mode as soon as possible to extend the overall lifetime of a sensor network. It is necessary to turn off unnecessary radio and peripheral functions, especially the radio unit always consumes more energy than other components during wireless communication. The microcontroller is the most important part of the wireless sensor device. It is responsible for the manipulation of sensing data and communication protocols. The microcontroller always has different sleep modes, each with a different level of energy usage. The deeper the sleep, the lower the energy consumption. Most wireless sensor devices can only enter the sleep mode: the external low-frequency oscillator is still running to wake up the sleeping microcontroller when the sleep timer expires. In this paper, our sensor device can enter the extended sleep mode: none of the oscillator is running and the wireless sensor device has the nanoampere consumption and self-awaking ability. Finally, these wireless sensor devices were deployed in a smart home security network.

Keywords: wireless sensor network, battery-driven, sleep mode, home security

Procedia PDF Downloads 289
13783 Trace Network: A Probabilistic Relevant Pattern Recognition Approach to Attribution Trace Analysis

Authors: Jian Xu, Xiaochun Yun, Yongzheng Zhang, Yafei Sang, Zhenyu Cheng

Abstract:

Network attack prevention is a critical research area of information security. Network attack would be oppressed if attribution techniques are capable to trace back to the attackers after the hacking event. Therefore attributing these attacks to a particular identification becomes one of the important tasks when analysts attempt to differentiate and profile the attacker behind a piece of attack trace. To assist analysts in expose attackers behind the scenes, this paper researches on the connections between attribution traces and proposes probabilistic relevance based attribution patterns. This method facilitates the evaluation of the plausibility relevance between different traceable identifications. Furthermore, through analyzing the connections among traces, it could confirm the existence probability of a certain organization as well as discover its affinitive partners by the means of drawing relevance matrix from attribution traces.

Keywords: attribution trace, probabilistic relevance, network attack, attacker identification

Procedia PDF Downloads 347
13782 User Authentication Using Graphical Password with Sound Signature

Authors: Devi Srinivas, K. Sindhuja

Abstract:

This paper presents architecture to improve surveillance applications based on the usage of the service oriented paradigm, with smart phones as user terminals, allowing application dynamic composition and increasing the flexibility of the system. According to the result of moving object detection research on video sequences, the movement of the people is tracked using video surveillance. The moving object is identified using the image subtraction method. The background image is subtracted from the foreground image, from that the moving object is derived. So the Background subtraction algorithm and the threshold value is calculated to find the moving image by using background subtraction algorithm the moving frame is identified. Then, by the threshold value the movement of the frame is identified and tracked. Hence, the movement of the object is identified accurately. This paper deals with low-cost intelligent mobile phone-based wireless video surveillance solution using moving object recognition technology. The proposed solution can be useful in various security systems and environmental surveillance. The fundamental rule of moving object detecting is given in the paper, then, a self-adaptive background representation that can update automatically and timely to adapt to the slow and slight changes of normal surroundings is detailed. While the subtraction of the present captured image and the background reaches a certain threshold, a moving object is measured to be in the current view, and the mobile phone will automatically notify the central control unit or the user through SMS (Short Message System). The main advantage of this system is when an unknown image is captured by the system it will alert the user automatically by sending an SMS to user’s mobile.

Keywords: security, graphical password, persuasive cued click points

Procedia PDF Downloads 521
13781 A Multi-Science Study of Modern Synergetic War and Its Information Security Component

Authors: Alexander G. Yushchenko

Abstract:

From a multi-science point of view, we analyze threats to security resulting from globalization of international information space and information and communication aggression of Russia. A definition of Ruschism is formulated as an ideology supporting aggressive actions of modern Russia against the Euro-Atlantic community. Stages of the hybrid war Russia is leading against Ukraine are described, including the elements of subversive activity of the special services, the activation of the military phase and the gradual shift of the focus of confrontation to the realm of information and communication technologies. We reveal an emergence of a threat for democratic states resulting from the destabilizing impact of a target state’s mass media and social networks being exploited by Russian secret services under freedom-of-speech disguise. Thus, we underline the vulnerability of cyber- and information security of the network society in regard of hybrid war. We propose to define the latter a synergetic war. Our analysis is supported with a long-term qualitative monitoring of representation of top state officials on popular TV channels and Facebook. From the memetics point of view, we have detected a destructive psycho-information technology used by the Kremlin, a kind of information catastrophe, the essence of which is explained in detail. In the conclusion, a comprehensive plan for information protection of the public consciousness and mentality of Euro-Atlantic citizens from the aggression of the enemy is proposed.

Keywords: cyber and information security, hybrid war, psycho-information technology, synergetic war, Ruschism

Procedia PDF Downloads 118
13780 Impact of Ethiopia's Productive Safety Net Program on Household Dietary Diversity and Child Nutrition in Rural Ethiopia

Authors: Tagel Gebrehiwot, Carolina Castilla

Abstract:

Food insecurity and child malnutrition are among the most critical issues in Ethiopia. Accordingly, different reform programs have been carried to improve household food security. The Food Security Program (FSP) (among others) was introduced to combat the persistent food insecurity problem in the country. The FSP combines a safety net component called the Productive Safety Net Program (PSNP) started in 2005. The goal of PSNP is to offer multi-annual transfers, such as food, cash or a combination of both to chronically food insecure households to break the cycle of food aid. Food or cash transfers are the main elements of PSNP. The case for cash transfers builds on the Sen’s analysis of ‘entitlement to food’, where he argues that restoring access to food by improving demand is a more effective and sustainable response to food insecurity than food aid. Cash-based schemes offer a greater choice of use of the transfer and can allow a greater diversity of food choice. It has been proven that dietary diversity is positively associated with the key pillars of food security. Thus, dietary diversity is considered as a measure of household’s capacity to access a variety of food groups. Studies of dietary diversity among Ethiopian rural households are somewhat rare and there is still a dearth of evidence on the impact of PSNP on household dietary diversity. In this paper, we examine the impact of the Ethiopia’s PSNP on household dietary diversity and child nutrition using panel household surveys. We employed different methodologies for identification. We exploit the exogenous increase in kebeles’ PSNP budget to identify the effect of the change in the amount of money households received in transfers between 2012 and 2014 on the change in dietary diversity. We use three different approaches to identify this effect: two-stage least squares, reduced form IV, and generalized propensity score matching using a continuous treatment. The results indicate the increase in PSNP transfers between 2012 and 2014 had no effect on household dietary diversity. Estimates for different household dietary indicators reveal that the effect of the change in the cash transfer received by the household is statistically and economically insignificant. This finding is robust to different identification strategies and the inclusion of control variables that determine eligibility to become a PSNP beneficiary. To identify the effect of PSNP participation on children height-for-age and stunting we use a difference-in-difference approach. We use children between 2 and 5 in 2012 as a baseline because by then they have achieved long-term failure to grow. The treatment group comprises children ages 2 to 5 in 2014 in PSNP participant households. While changes in height-for-age take time, two years of additional transfers among children who were not born or under the age of 2-3 in 2012 have the potential to make a considerable impact on reducing the prevalence of stunting. The results indicate that participation in PSNP had no effect on child nutrition measured as height-for-age or probability of beings stunted, suggesting that PSNP should be designed in a more nutrition-sensitive way.

Keywords: continuous treatment, dietary diversity, impact, nutrition security

Procedia PDF Downloads 313
13779 Connecting Critical Macro-Finance to Theories of Capitalism

Authors: Vithul Kalki

Abstract:

The mainstream political economy failed to explain the nature and causes of systemic failures and thus to compare and comprehend how contemporary capitalist systems work. An alternative research framework of Critical Macro-Finance (CMF) is an attempt to collaborate political theory with post-Keynesian economics with an objective to find answers to unresolved questions that emerged since the international financial crisis and repeated failures of capital systems. This unorthodox approach brings out four main propositions, namely : (a) that the adoption of American financial practices has anchored financial globalization in market-based finance; (b) that global finance is a set of interconnected, hierarchical balance sheets, increasingly subject to time-critical liquidity; (c) that credit creation in market-based finance involves new forms of money; and (d) that market-based finance structurally requires a de-risking state capable both of protecting systemic liabilities and creating new investment opportunities. The ongoing discussion of CMF literature is yet to be tested or even fully framed. This qualitative paper will critically examine the CMF framework and will engage in discussions aiming to connect the CMF with theories of capitalism in a wider context to bring a holistic approach for analyzing contemporary financial capitalism.

Keywords: critical macro-finance, capitalism, financial system, comparative political economy

Procedia PDF Downloads 165
13778 Effect of Internal Control Weaknesses and Audit Opinion to the Findings of State Losses

Authors: Wiji Wijaya

Abstract:

The aim of this research is to examine the effect of internal control weaknesses and audit opinion on the state’s loss findings of audit compliance to the regulation in public sector. The samples of this research consisted of 175 local government financial statements in the area of Central Java Province at 2009 until 2013. Area sampling design was used to select the financial statements. This study using quantitative descriptive statistical analysis and regression was run for data analysis and hypothesis examination. Result of this study indicated that internal control weaknesses and audit opinion contributes a positive influence which is significant to the state’s loss findings of audit compliance to the regulation. The internal control weaknesses that affect the state's loss finding are weakness control system of accounting and reporting with the value of the critical ratio 0.010 p 2.613 ; weakness budget execution control system with critical ratio value of 3.421 p 0.001 and weaknesses internal control structure with critical ratio value of 2.246 p 0.026 . While the audit opinion with a critical ratio value of 4.401 p 0.000. The implications of this research so that policy makers at the local government should give more attention to the implementation and improvement of internal control system.

Keywords: audit compliance findings, state’s loss, audit opinion, internal control, local government

Procedia PDF Downloads 363
13777 Effect of Fluidized Granular Activated Carbon for the Mitigation of Membrane Fouling in Wastewater Treatment

Authors: Jingwei Wang, Anthony G. Fane, Jia Wei Chew

Abstract:

The use of fluidized Granular Activated Carbon (GAC) as a means of mitigation membrane fouling in membrane bioreactors (MBRs) has received much attention in recent years, especially in anaerobic fluidized bed membrane bioreactors (AFMBRs). It has been affirmed that the unsteady-state tangential shear conferred by GAC fluidization on membrane surface suppressed the extent of membrane fouling with energy consumption much lower than that of bubbling (i.e., air sparging). In a previous work, the hydrodynamics of the fluidized GAC particles were correlated with membrane fouling mitigation effectiveness. Results verified that the momentum transfer from particle to membrane held a key in fouling mitigation. The goal of the current work is to understand the effect of fluidized GAC on membrane critical flux. Membrane critical flux values were measured by a vertical Direct Observation Through the Membrane (DOTM) setup. The polystyrene particles (known as latex particles) with the particle size of 5 µm were used as model foulant thus to give the number of the foulant on the membrane surface. Our results shed light on the positive effect of fluidized GAC enhancing the critical membrane flux by an order-of-magnitude as compared to that of liquid shear alone. Membrane fouling mitigation was benefitted by the increasing of power input.

Keywords: membrane fouling mitigation, liquid-solid fluidization, critical flux, energy input

Procedia PDF Downloads 388
13776 A Quick Method for Seismic Vulnerability Evaluation of Offshore Structures by Static and Dynamic Nonlinear Analyses

Authors: Somayyeh Karimiyan

Abstract:

To evaluate the seismic vulnerability of vital offshore structures with the highest possible precision, Nonlinear Time History Analyses (NLTHA), is the most reliable method. However, since it is very time-consuming, a quick procedure is greatly desired. This paper presents a quick method by combining the Push Over Analysis (POA) and the NLTHA. The POA is preformed first to recognize the more critical members, and then the NLTHA is performed to evaluate more precisely the critical members’ vulnerability. The proposed method has been applied to jacket type structure. Results show that combining POA and NLTHA is a reliable seismic evaluation method, and also that none of the earthquake characteristics alone, can be a dominant factor in vulnerability evaluation.

Keywords: jacket structure, seismic evaluation, push-over and nonlinear time history analyses, critical members

Procedia PDF Downloads 269
13775 Safe Disposal of Processed Industrial Biomass as Alternative Organic Manure in Agriculture

Authors: V. P. Ramani, K. P. Patel, S. B. Patel

Abstract:

It is necessary to dispose of generated industrial wastes in the proper way to overcome the further pollution for a safe environment. Waste can be used in agriculture for good quality higher food production. In order to evaluate the effect and rate of processed industrial biomass on yield, contents, uptake and soil status in maize, a field experiment was conducted during 2009 - 2011 at Anand on loamy sand soil for two years. The treatments of different levels of NPK i.e. 100% RD, 75% RD and 50% RD were kept to study the possibility of reduction in fertilizer application with the use of processed biomass (BM) in different proportion with FYM. (Where, RD= Recommended dose, FYM= Farm Yard Manure, BM= Processed Biomass.) The significantly highest grain yield of maize was recorded under the treatment of 75% NPK + BM application @ 10t ha-1. The higher (10t ha-1) and lower (5t ha-1) application rate of BM with full dose of NPK was found beneficial being at par with the treatment 75% NPK along with BM application @ 10t ha-1. There is saving of 25% recommended dose of NPK when combined with BM application @ 10.0t ha-1 or 50% saving of organics when applied with full dose (100%) of NPK. The highest straw yield (7734 kg ha-1) of maize on pooled basis was observed under the treatment of recommended dose of NPK along with FYM application at 7.5t ha-1 coupled with BM application at 2.5t ha-1. It was also observed that highest straw yield was at par under all the treatments except control and application of 100% recommended dose of NPK coupled with BM application at 7.5t ha-1. The Fe content of maize straw were found altered significantly due to different treatments on pooled basis and it was noticed that biomass application at 7.5t ha-1 along with recommended dose of NPK showed significant enhancement in Fe content of straw over other treatments. Among heavy metals, Co, Pb and Cr contents of grain were found significantly altered due to application of different treatments variably during the pooled. While, Ni content of maize grain was not altered significantly due to application of different organics. However, at higher rate of BM application i.e. of 10t ha-1, there was slight increase in heavy metal content of grain/ straw as well as DTPA heavy metals in soil; although the increase was not alarming Thus, the overall results indicated that the application of BM at 5t ha-1 along with full dose of NPK is beneficial to get higher yield of maize without affecting soil / plant health adversely. It also indicated that the 5t BM ha-1 could be utilized in place of 10t FYM ha-1 where FYM availability is scarce. The 10t BM ha-1 helps to reduce a load of chemical fertilizer up to 25 percent in agriculture. The lower use of agro-chemicals always favors safe environment. However, the continuous use of biomass needs periodical monitoring to check any buildup of heavy metals in soil/ plant over the years.

Keywords: alternate use of industrial waste, heavy metals, maize, processed industrial biomass

Procedia PDF Downloads 304
13774 Sustainable Agriculture in Nigeria: Integrating Energy Efficiency and Renewables

Authors: Vicx Farm

Abstract:

This paper examines the critical role of energy efficiency management and renewable energy in fostering sustainable agricultural practices in Nigeria. With the growing concerns over energy security, environmental degradation, and climate change, there is an urgent need to transition towards more sustainable energy sources and practices in the agricultural sector. Nigeria, being a significant player in the global agricultural market, stands to benefit immensely from integrating energy efficiency measures and renewable energy solutions into its agricultural activities. This paper discusses the current energy challenges facing Nigerian agriculture, explores the potential benefits of energy efficiency and renewable energy adoption, and proposes strategies for effective implementation. The paper concludes with recommendations for policymakers, stakeholders, and practitioners to accelerate the adoption of energy-efficient and renewable energy technologies in Nigerian agriculture, thereby promoting sustainable development and resilience in the sector.

Keywords: energy, agriculture, sustainability, power

Procedia PDF Downloads 47
13773 Analytical Formulae for the Approach Velocity Head Coefficient

Authors: Abdulrahman Abdulrahman

Abstract:

Critical depth meters, such as abroad crested weir, Venture Flume and combined control flume are standard devices for measuring flow in open channels. The discharge relation for these devices cannot be solved directly, but it needs iteration process to account for the approach velocity head. In this paper, analytical solution was developed to calculate the discharge in a combined critical depth-meter namely, a hump combined with lateral contraction in rectangular channel with subcritical approach flow including energy losses. Also analytical formulae were derived for approach velocity head coefficient for different types of critical depth meters. The solution was derived by solving a standard cubic equation considering energy loss on the base of trigonometric identity. The advantage of this technique is to avoid iteration process adopted in measuring flow by these devices. Numerical examples are chosen for demonstration of the proposed solution.

Keywords: broad crested weir, combined control meter, control structures, critical flow, discharge measurement, flow control, hydraulic engineering, hydraulic structures, open channel flow

Procedia PDF Downloads 257
13772 Designing Roudbar Residential Complex Inspired by Anti-Seismic Technologies

Authors: Sara Hadad Dabaghi

Abstract:

Iran is among the first five earthquake prone regions of the world. During the past 90 years, more than 85 catastrophic earthquakes have happened in Iran, leaving approximately 120000 casualties. Therefore, it is necessary to apply modern anti-seismic technologies to the construction of building such earthquake prone zones. This is especially the case with the northern regions of this country where the existence Khazar and Alborz Faults necessitate the observation of building construction security. Thus, the goal of this research is to solve this problem and to design earthquake resistant buildings. The present study is descriptive-analytical carried out on a mixed method platform. The study focuses on designing Roudbar Residential Complex adopting an anti-seismic approach. It is a cross-sectional applied research since its findings could be used to solve the security problems of Roudbar building with respect to earthquakes of the regions. The causality relationship in this research could be formulated as follows: the novel anti-seismic technologies increase security and reduce damages caused by earthquakes.

Keywords: design, residential complex, inspiration, anti-seismic technology, Roudbar

Procedia PDF Downloads 273
13771 Application of Molecular Markers for Crop Improvement

Authors: Monisha Isaac

Abstract:

Use of molecular markers for selecting plants with desired traits has been started long back. Due to their heritable characteristics, they are useful for identification and characterization of specific genotypes. The study involves various types of molecular markers used to select multiple desired characters in plants, their properties, and advantages to improve crop productivity in adverse climatological conditions for the purpose of providing food security to fast-growing global population. The study shows that genetic similarities obtained from molecular markers provide more accurate information and the genetic diversity can be better estimated from the genetic relationship obtained from the dendrogram. The information obtained from markers assisted characterization is more suitable for the crops of economic importance like sugarcane.

Keywords: molecular markers, crop productivity, genetic diversity, genotype

Procedia PDF Downloads 490
13770 Critical Analysis of Heat Exchanger Cycle for its Maintainability Using Failure Modes and Effect Analysis and Pareto Analysis

Authors: Sayali Vyas, Atharva Desai, Shreyas Badave, Apurv Kulkarni, B. Rajiv

Abstract:

The Failure Modes and Effect Analysis (FMEA) is an efficient evaluation technique to identify potential failures in products, processes, and services. FMEA is designed to identify and prioritize failure modes. It proves to be a useful method for identifying and correcting possible failures at its earliest possible level so that one can avoid consequences of poor performance. In this paper, FMEA tool is used in detection of failures of various components of heat exchanger cycle and to identify critical failures of the components which may hamper the system’s performance. Further, a detailed Pareto analysis is done to find out the most critical components of the cycle, the causes of its failures, and possible recommended actions. This paper can be used as a checklist which will help in maintainability of the system.

Keywords: FMEA, heat exchanger cycle, Ishikawa diagram, pareto analysis, RPN (Risk Priority Number)

Procedia PDF Downloads 384
13769 A Mimetic Textuality in Robert Frost's 'Nothing Gold Can Stay'

Authors: Kurt S. Candilas

Abstract:

This study is a critical analysis of the work of Robert Frost, 'Nothing Gold Can Stay'. It subjects the literary piece into a qualitative analysis using the critical theory of mimesis. In effect, this study is proposed to find out and shed light on the mimetic feature of the poem’s textuality. Generally, it aims to analyze the poem’s deeper meaning in the context of the reality of life from birth to death. For the most part, this critical analysis discerns, investigates, and highlights the features which present the imitation of life in detail and from a deeper view. Based on the result of analysis, it shows that Frost has portrayed the cycle of life from birth to midst life as about proving oneself to others as far as achievements and accomplishments are concerned; secondly, at some point of one’s life, successes and achievements are just one’s perfect signature of living. As Frost discloses his poem, his message of the reality of life from birth to death is clear enough, that nothing is going to last forever.

Keywords: Nothing Gold Can Stay, mimesis, birth, death

Procedia PDF Downloads 451
13768 Cloud Computing: Major Issues and Solutions

Authors: S. Adhirai Subramaniyam, Paramjit Singh

Abstract:

This paper presents major issues in cloud computing. The paper describes different cloud computing deployment models and cloud service models available in the field of cloud computing. The paper then concentrates on various issues in the field. The issues such as cloud compatibility, compliance of the cloud, standardizing cloud technology, monitoring while on the cloud and cloud security are described. The paper suggests solutions for these issues and concludes that hybrid cloud infrastructure is a real boon for organizations.

Keywords: cloud, cloud computing, mobile cloud computing, private cloud, public cloud, hybrid cloud, SAAS, PAAS, IAAS, cloud security

Procedia PDF Downloads 323
13767 Improvements of the Difficulty in Hospital Acceptance at the Scene by the Introduction of Smartphone Application for Emergency-Medical-Service System: A Population-Based Before-And-After Observation Study in Osaka City, Japan

Authors: Yusuke Katayama, Tetsuhisa Kitamura, Kosuke Kiyohara, Sumito Hayashida, Taku Iwami, Takashi Kawamura, Takeshi Shimazu

Abstract:

Background: Recently, the number of ambulance dispatches has been increasing in Japan and it is, therefore, difficult to accept emergency patients to hospitals smoothly and appropriately because of the limited hospital capacity. To facilitate the request for patient transport by ambulances and hospital acceptance, the emergency information system using information technology has been built up and introduced in various communities. However, its effectiveness has not been insufficiently revealed in Japan. In 2013, we developed a smartphone application system that enables the emergency-medical-service (EMS) personnel to share information about on-scene ambulance and hospital situation. The aim of this study was to assess the introduction effect of this application for EMS system in Osaka City, Japan. Methods: This study was a retrospective study with population-based ambulance records of Osaka Municipal Fire Department. This study period was six years from January 1, 2010 to December 31, 2015. In this study, we enrolled emergency patients that on-scene EMS personnel conducted the hospital selection for them. The main endpoint was difficulty in hospital acceptance at the scene. The definition of difficulty in hospital acceptance at the scene was to make >=5 phone calls by EMS personnel at the scene to each hospital until a decision to transport was determined. The definition of the smartphone application group was emergency patients transported in the period of 2013-2015 after the introduction of this application, and we assessed the introduction effect of smartphone application with multivariable logistic regression model. Results: A total of 600,526 emergency patients for whom EMS personnel selected hospitals were eligible for our analysis. There were 300,131 smartphone application group (50.0%) in 2010-2012 and 300,395 non-smartphone application group (50.0%) in 2013-2015. The proportion of the difficulty in hospital acceptance was 14.2% (42,585/300,131) in the smartphone application group and 10.9% (32,819/300,395) in the non-smartphone application group, and the difficulty in hospital acceptance significantly decreased by the introduction of the smartphone application (adjusted odds ration; 0.730, 95% confidence interval; 0.718-0.741, P<0.001). Conclusions: Sharing information between ambulance and hospital by introducing smartphone application at the scene was associated with decreasing the difficulty in hospital acceptance. Our findings may be considerable useful for developing emergency medical information system with using IT in other areas of the world.

Keywords: difficulty in hospital acceptance, emergency medical service, infomation technology, smartphone application

Procedia PDF Downloads 257
13766 Exploration and Reform of Fundamentals of Program Design Based on Application Ability

Authors: Jiaqi Yin, Baofeng Liang

Abstract:

The rapid development in the fields of computer science and information technology presents new challenges and opportunities for foundational programming education. Traditional programming courses often focus heavily on theoretical knowledge while neglecting students’ practical programming and problem-solving abilities. This paper delves into the significance of programming education based on application abilities and provides a detailed explanation of a reform approach that incorporates project-driven teaching to nurture students with more comprehensive computer science skills.

Keywords: fundamentals of programming, application abilities, pedagogical reform, program design

Procedia PDF Downloads 50
13765 Enabling Cloud Adoption Based Secured Mobile Banking through Backend as a Service

Authors: P. S. Jagadeesh Kumar, S. Meenakshi Sundaram

Abstract:

With the increase of prevailing non-traditional rivalry, mobile banking experiences an ever changing commercial backdrop. Substantial customer demands have established to be more intricate as customers request more expediency and superintend over their banking services. To enterprise advance and modernization in mobile banking applications, it is gradually obligatory to deeply leapfrog the scuffle using business model transformation. The dramaturgical vicissitudes taking place in mobile banking entail advanced traditions to exploit security. By reforming and transforming older back office into integrated mobile banking applications, banks can engender a supple and nimble banking environment that can rapidly respond to new business requirements over cloud computing. Cloud computing is transfiguring ecosystems in numerous industries, and mobile banking is no exemption providing services innovation, greater flexibility to respond to improved security and enhanced business intelligence with less cost. Cloud technology offer secure deployment possibilities that can provision banks in developing new customer experiences, empower operative relationship and advance speed to efficient banking transaction. Cloud adoption is escalating quickly since it can be made secured for commercial mobile banking transaction through backend as a service in scrutinizing the security strategies of the cloud service provider along with the antiquity of transaction details and their security related practices.

Keywords: cloud adoption, backend as a service, business intelligence, secured mobile banking

Procedia PDF Downloads 239
13764 Additive Carbon Dots Nanocrystals for Enhancement of the Efficiency of Dye-Sensitized Solar Cell in Energy Applications Technology

Authors: Getachew Kuma Watiro

Abstract:

The need for solar energy is constantly increasing and it is widely available on the earth’s surface. Photovoltaic technology is one of the most capable of all viable energy technology and is seen as a promising approach to the control era as it is readily available and has zero carbon emissions. Inexpensive and versatile solar cells have achieved the conversion efficiency and long life of dye-sensitized solar cells, improving the conversion efficiency from the sun to electricity. DSSCs have received a lot of attention for Various potential commercial uses, such as mobile devices and portable electronic devices, as well as integrated solar cell modules. The systematic reviews were used to show the critical impact of additive C-dots in the Dye-Sensitized solar cell for energy application technology. This research focuses on the following methods to synthesize nanoparticles such as facile, polyol, calcination, and hydrothermal technique. In addition to these, there are additives C-dots by the Hydrothermal method. This study deals with the progressive development of DSSC in photovoltaic technology. The applications of single and heterojunction structure technology devices were used (ZnO, NiO, SnO2, and NiO/ZnO/N719) and applied some additives C-dots (ZnO/C-dots /N719, NiO/C-dots /N719, SnO2 /C-dots /N719 and NiO/ZnO/C-dots/N719) and the effects of C-dots were reviewed. More than all, the technology of DSSC with C-dots enhances efficiency. Finally, recommendations have been made for future research on the application of DSSC with the use of these additives.

Keywords: dye-sensitized solar cells, heterojunction’s structure, carbon dot, conversion efficiency

Procedia PDF Downloads 105
13763 A Fundamental Study for Real-Time Safety Evaluation System of Landing Pier Using FBG Sensor

Authors: Heungsu Lee, Youngseok Kim, Jonghwa Yi, Chul Park

Abstract:

A landing pier is subjected to safety assessment by visual inspection and design data, but it is difficult to check the damage in real-time. In this study, real - time damage detection and safety evaluation methods were studied. As a result of structural analysis of the arbitrary landing pier structure, the inflection point of deformation and moment occurred at 10%, 50%, and 90% of pile length. The critical value of Fiber Bragg Grating (FBG) sensor was set according to the safety factor, and the FBG sensor application method for real - time safety evaluation was derived.

Keywords: FBG sensor, harbor structure, maintenance, safety evaluation system

Procedia PDF Downloads 195
13762 A Machine Learning Decision Support Framework for Industrial Engineering Purposes

Authors: Anli Du Preez, James Bekker

Abstract:

Data is currently one of the most critical and influential emerging technologies. However, the true potential of data is yet to be exploited since, currently, about 1% of generated data are ever actually analyzed for value creation. There is a data gap where data is not explored due to the lack of data analytics infrastructure and the required data analytics skills. This study developed a decision support framework for data analytics by following Jabareen’s framework development methodology. The study focused on machine learning algorithms, which is a subset of data analytics. The developed framework is designed to assist data analysts with little experience, in choosing the appropriate machine learning algorithm given the purpose of their application.

Keywords: Data analytics, Industrial engineering, Machine learning, Value creation

Procedia PDF Downloads 152
13761 Trans-Boundary Water Disputes between India and Bangladesh and the Policy Responses

Authors: Aditaya Narayan Mishra

Abstract:

Unequal distribution of environmental resources as a possible cause of conflict has been the topic of substantial research, and these connections have ruled the post-Cold War attention in the discourse of environmental security. In this category, considerable concentration has been given to water resources, on account of their important standing for human existence. Thus, water is considered to be one of the most important non-conventional security issues. As per this consideration, the case of India-Bangladesh is one of the most critical examples of disputes over transboundary water sharing. The concern regarding sharing of trans-boundary rivers has been the main focus of Bangladesh and India‘s relationship for the last forty-five years. Both countries share fifty-four rivers, most of which have originated in the Himalayan range. The main causes for problems in the sharing of the waters of trans-boundary rivers between India and Bangladesh include the: Farakka Barrage, Teesta river sharing issue, River linking project and Tipaimukh Dam. The construction of Farakka barrage across the Ganga River was the beginning of water dispute. Attempts at unilateral exploitation of the trans-boundary water resources led to inter-state conflicts that spilled over into other areas of bilateral disputes between India and Bangladesh. Apart from Farakka, Barrage, the disputes over Teesta River sharing, River linking project and Tipaimukh Dam are also vital contents for the both countries bilateral diplomacy. Till date, India and Bangladesh have signed five treaties regarding water sharing. However, all these treaties have been rendered worthless due to mistrust and political upheaval in both countries. The current paper would address all these water sharing disputes between India and Bangladesh with focus on the various policy responses (both bilateral and multilateral initiatives) to deal with these water sharing disputes. It will try to analyze the previous agreements and their drawbacks and loopholes. In addition, it will mention the reasons for water sharing cooperation between India and Bangladesh.

Keywords: India and Bangladesh relations, water disputes, Teesta, river linking project, Tipaimukh Dam, Farakka, policy responses

Procedia PDF Downloads 213
13760 Mobile App Architecture in 2023: Build Your Own Mobile App

Authors: Mounir Filali

Abstract:

Companies use many innovative ways to reach their customers to stay ahead of the competition. Along with the growing demand for innovative business solutions is the demand for new technology. The most noticeable area of demand for business innovations is the mobile application industry. Recently, companies have recognized the growing need to integrate proprietary mobile applications into their suite of services; Companies have realized that developing mobile apps gives them a competitive edge. As a result, many have begun to rapidly develop mobile apps to stay ahead of the competition. Mobile application development helps companies meet the needs of their customers. Mobile apps also help businesses to take advantage of every potential opportunity to generate leads that convert into sales. Mobile app download growth statistics with the recent rise in demand for business-related mobile apps, there has been a similar rise in the range of mobile app solutions being offered. Today, companies can use the traditional route of the software development team to build their own mobile applications. However, there are also many platform-ready "low-code and no-code" mobile apps available to choose from. These mobile app development options have more streamlined business processes. This helps them be more responsive to their customers without having to be coding experts. Companies must have a basic understanding of mobile app architecture to attract and maintain the interest of mobile app users. Mobile application architecture refers to the buildings or structural systems and design elements that make up a mobile application. It also includes the technologies, processes, and components used during application development. The underlying foundation of all applications consists of all elements of the mobile application architecture, developing a good mobile app architecture requires proper planning and strategic design. The technology framework or platform on the back end and user-facing side of a mobile application is part of the mobile architecture of the application. In-application development Software programmers loosely refer to this set of mobile architecture systems and processes as the "technology stack".

Keywords: mobile applications, development, architecture, technology

Procedia PDF Downloads 78
13759 Information Security Risk Management in IT-Based Process Virtualization: A Methodological Design Based on Action Research

Authors: Jefferson Camacho Mejía, Jenny Paola Forero Pachón, Luis Carlos Gómez Flórez

Abstract:

Action research is a qualitative research methodology, which leads the researcher to delve into the problems of a community in order to understand its needs in depth and finally, to propose actions that lead to a change of social paradigm. Although this methodology had its beginnings in the human sciences, it has attracted increasing interest and acceptance in the field of information systems research since the 1990s. The countless possibilities offered nowadays by the use of Information Technologies (IT) in the development of different socio-economic activities have meant a change of social paradigm and the emergence of the so-called information and knowledge society. According to this, governments, large corporations, small entrepreneurs and in general, organizations of all kinds are using IT to virtualize their processes, taking them from the physical environment to the digital environment. However, there is a potential risk for organizations related with exposing valuable information without an appropriate framework for protecting it. This paper shows progress in the development of a methodological design to manage the information security risks associated with the IT-based processes virtualization, by applying the principles of the action research methodology and it is the result of a systematic review of the scientific literature. This design consists of seven fundamental stages. These are distributed in the three stages described in the action research methodology: 1) Observe, 2) Analyze and 3) Take actions. Finally, this paper aims to offer an alternative tool to traditional information security management methodologies with a view to being applied specifically in the planning stage of IT-based process virtualization in order to foresee risks and to establish security controls before formulating IT solutions in any type of organization.

Keywords: action research, information security, information technology, methodological design, process virtualization, risk management

Procedia PDF Downloads 150
13758 An Introduction to Critical Chain Project Management Methodology

Authors: Ranjini Ramanath, Nanjunda P. Swamy

Abstract:

Construction has existed in our lives since time immemorial. However, unlike any other industry, construction projects have their own unique challenges – project type, purpose and end use of the project, geographical conditions, logistic arrangements, largely unorganized manpower and requirement of diverse skill sets, etc. These unique characteristics bring in their own level of risk and uncertainties to the project, which cause the project to deviate from its planned objectives of time, cost, quality, etc. over the many years, there have been significant developments in the way construction projects are conceptualized, planned, and managed. With the rapid increase in the population, increased rate of urbanization, there is a growing demand for infrastructure development, and it is required that the projects are delivered timely, and efficiently. In an age where ‘Time is Money,' implementation of new techniques of project management is required in leading to successful projects. This paper proposes a different approach to project management, which if applied in construction projects, can help in the accomplishment of the project objectives in a faster manner.

Keywords: critical chain project management methodology, critical chain, project management, construction management

Procedia PDF Downloads 406
13757 Application of Recycled Paper Mill Sludge on the Growth of Khaya Senegalensis and Its Effect on Soil Properties, Nutrients and Heavy Metals

Authors: A. Rosazlin Abdullah, I. Che Fauziah, K. Wan Rasidah, A. B. Rosenani

Abstract:

The paper industry performs an essential role in the global economy of the world. A study was conducted on the paper mill sludge that is applied on the Khaya senegalensis for 1 year planning period at University Agriculture Park, Puchong, Selangor, Malaysia to determine the growth of Khaya senegalensis, soil properties, nutrients concentrations and effects on the status of heavy metals. Paper Mill Sludge (PMS) and composted Recycled Paper Mill Sludge (RPMS) were used with different rates of nitrogen (0, 150, 300 and 600 kg ha-1) at the ratio of 1:1 (Recycled Paper Mill Sludge (RPMS) : Empty Fruit Brunch (EFB). The growth parameters were measured twice a month for 1 year. Plant nutrients and heavy metal uptake were determined. The paper mill sludge has the potential to be a supplementary N fertilizer as well as a soil amendment. The application of RPMS with N, significantly contributed to the improvement in plant growth parameters such as plant height (4.24 m), basal diameter (10.30 cm), total plant biomass and improved soil physical and chemical properties. The pH, EC, available P and total C in soil were varied among the treatments during the planting period. The treatments with raw and RPM compost had higher pH values than those applied with inorganic fertilizer and control. Nevertheless, there was no salinity problem recorded during the planting period and available P in soil treated with raw and RPMS compost was higher than the control plots that reflects the mineralization of organic P from the decomposition of pulp sludge. The weight of the free and occluded light fractions of carbon concentration was significantly higher in the soils treated with raw and RPMS compost. The application of raw and composted RPMS gave significantly higher concentration of the heavy metals, but the total concentrations of heavy metals in the soils were below the critical values. Hence, the paper mill sludge can be successfully used as soil amendment in acidic soil without any serious threat. The use of paper mill sludge for the soil fertility, shows improvement in land application signifies a unique opportunity to recycle sludge back to the land to alleviate the potential waste management problem.

Keywords: growth, heavy metals, nutrients uptake, production, waste management

Procedia PDF Downloads 352