Search results for: granularity issue
2391 Psychology of Terrorism: Psychology of War
Authors: Saeed Wahass
Abstract:
Terrorism is a universal phenomenon. It is an enemy to the world and humanity, representing the most essential challenges facing developing and developed societies of the world. Terrorism is traumatically a major cause for death and disability. Developing societies are catastrophically suffering more in comparing to developed ones. Importantly, the terrorism may have been emigrated from developing societies; therefore, it cannot be appropriately explained/understood elsewhere. Developing societies have attempts for solutions. These attempts may have contributed somehow to either overcoming temporally terrorism or at least waterless its fountains. It appears these attempts are fallen on personal experiences/local endeavours related to the nature of those societies and cultures. The missing issue is the involvement of the applications of psychological theories for understanding terrorism as a phenomenon. However, terrorism is behaviour, like other behaviours, it can be explained, analysed and predicted while psychology is involved as the science of behaviour and mental process. Later than, solutions whatever they are (intervention/prevention) have to be born from the womb of psychological theories explaining/understanding terrorism. This paper is an endeavour to shed light on psychological theories which may present an explanation for terrorism, as a behavioural phenomenon, looking for the effective evidence-based interventions/prevention. An emphasis will be on the experiences of developing countries which may have made/incubated terrorism.Keywords: psychology, terrorism, humanity, developing societies
Procedia PDF Downloads 5202390 A Phishing Email Detection Approach Using Machine Learning Techniques
Authors: Kenneth Fon Mbah, Arash Habibi Lashkari, Ali A. Ghorbani
Abstract:
Phishing e-mails are a security issue that not only annoys online users, but has also resulted in significant financial losses for businesses. Phishing advertisements and pornographic e-mails are difficult to detect as attackers have been becoming increasingly intelligent and professional. Attackers track users and adjust their attacks based on users’ attractions and hot topics that can be extracted from community news and journals. This research focuses on deceptive Phishing attacks and their variants such as attacks through advertisements and pornographic e-mails. We propose a framework called Phishing Alerting System (PHAS) to accurately classify e-mails as Phishing, advertisements or as pornographic. PHAS has the ability to detect and alert users for all types of deceptive e-mails to help users in decision making. A well-known email dataset has been used for these experiments and based on previously extracted features, 93.11% detection accuracy is obtainable by using J48 and KNN machine learning techniques. Our proposed framework achieved approximately the same accuracy as the benchmark while using this dataset.Keywords: phishing e-mail, phishing detection, anti phishing, alarm system, machine learning
Procedia PDF Downloads 3362389 Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing
Authors: H. Parveen Begam, M. A. Maluk Mohamed
Abstract:
Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC.Keywords: grid computing, privacy, anonymity, onion routing, ECC, RSA
Procedia PDF Downloads 3962388 The Usefulness of Financial Certification in Taiwan
Authors: Chih-Mei Wang, Jon-Chao Hong, Jian-Hong Ye, Jing-Yun Fan, Chiao-Fei Lin
Abstract:
The value of a certificate is to implement the criteria for evaluating work ability. Some professional certificates may make people feel good, but they are not useful in the workplace. To address this issue, this study is based on the expectancy-value model to take financial certificates as an example to explore how participants perceived the value of obtaining certification related to their usage perception of career promotion and salary increase. A total of 339 valid samples were subjected to confirmatory factor analysis and structural equation modeling; the results showed that the number of professional certificates was not significantly correlated with career promotion, but the number of professional certificates is negatively related to salary and benefits (S&B), while career promotion and S&B were positively related to job performance. The results show that the number of professional certificates does not play a significant role in the expectancy-value model. Therefore, professional certifications related to a basic level of finance was not expected to obtain in Taiwan's financial industry, and it is important to study the usefulness of some other certificates in other competitive industry.Keywords: career promotion, certificate, compensation and benefits, goal-directed behaviors, Job performance
Procedia PDF Downloads 1912387 Presenting a Model for Predicting the State of Being Accident-Prone of Passages According to Neural Network and Spatial Data Analysis
Authors: Hamd Rezaeifar, Hamid Reza Sahriari
Abstract:
Accidents are considered to be one of the challenges of modern life. Due to the fact that the victims of this problem and also internal transportations are getting increased day by day in Iran, studying effective factors of accidents and identifying suitable models and parameters about this issue are absolutely essential. The main purpose of this research has been studying the factors and spatial data affecting accidents of Mashhad during 2007- 2008. In this paper it has been attempted to – through matching spatial layers on each other and finally by elaborating them with the place of accident – at the first step by adding landmarks of the accident and through adding especial fields regarding the existence or non-existence of effective phenomenon on accident, existing information banks of the accidents be completed and in the next step by means of data mining tools and analyzing by neural network, the relationship between these data be evaluated and a logical model be designed for predicting accident-prone spots with minimum error. The model of this article has a very accurate prediction in low-accident spots; yet it has more errors in accident-prone regions due to lack of primary data.Keywords: accident, data mining, neural network, GIS
Procedia PDF Downloads 452386 Time Overrun in Pre-Construction Planning Phase of Construction Projects
Authors: Hafiz Usama Imad, Muhammad Akram Akhund, Tauha Hussain Ali, Ali Raza Khoso, Fida Hussain Siddiqui
Abstract:
Construction industry plays a significant role in fulfilling the major requirements of the human being. It is one of the major constituents of every developed country. Although the construction industry of both the developing and developed countries encompasses a major part of the economy, and millions of rupees are utilized every year on various kinds of construction projects. But, this industry is facing numerous hurdles in terms of its budget and timely completion. Construction projects generally consist of several phases like planning, designing, execution, and finishing. This research study aims to determine the significant factors of time overrun in pre-construction planning (PCP) phase of construction projects in Pakistan. Questionnaires were distributed by various means and responses of respondents were compiled and collected data were then analyzed through a statistical technique using SPSS version 24. Major causes of time overrun in pre-construction planning phase; which is an extremely important phase of construction projects, were revealed. The research conclusion will provide a pathway for stakeholders to pay attention to the mentioned causes to overcome the major issue of time overrun.Keywords: construction industry, Pakistan, pre-construction planning phase, time overrun
Procedia PDF Downloads 2532385 Barriers towards Effective Participation in Physically Oriented Leisure Time Activities: A Case Study of Federal College of Education, Pankshin Plateau State, Nigeria
Authors: Mulak Moses Yokdi
Abstract:
Correct use of leisure time has suffered neglect in our society and the people ignorantly think that the trend does not matter. The researcher felt concerned about the issue and went on to find out why using FCE, Pankshin workers as a case study. Four hypotheses were used, considering such variables as leadership, traditional activities, stress due to work pressure and time constraint. The participants selected for the study were one hundred and ten members of FCE, Pankshin staff. A self-developed questionnaire was the instrument used. Chi-square (x2) was employed to test the hypotheses at P = 0.005; df = 3. The statistics of percentages was also used to describe the situation as implicated by the data. The results showed that all hypotheses were significant (P = 0.05). It was concluded that the four variables were impediments to effective participation in physically oriented leisure time activities among the FCE, Staff. Based on the findings, it was recommended that the FCE should get good leadership, create good awareness for people to understand why they should be effectively involved in physically oriented leisure time activities.Keywords: barriers, effective participation, leisure time, physically oriented, work pressure, time constraint
Procedia PDF Downloads 3672384 Ceramic Membrane Filtration Technologies for Oilfield Produced Water Treatment
Authors: Mehrdad Ebrahimi, Oliver Schmitz, Axel Schmidt, Peter Czermak
Abstract:
“Produced water” (PW) is any fossil water that is brought to the surface along with crude oil or natural gas. By far, PW is the largest waste stream by volume associated with oil and gas production operations. Due to the increasing volume of waste all over the world in the current decade, the outcome and effect of discharging PW on the environment has lately become a significant issue of environmental concerns. Therefore, there is a need for new technologies for PW treatment due to increase focus on water conservation and environmental regulation. The use of membrane processes for treatment of PW has several advantages over many of the traditional separation techniques. In oilfield produced water treatment with ceramic membranes, process efficiency is characterized by the specific permeate flux and by the oil separation performance. Apart from the membrane properties, the permeate flux during filtration of oily wastewaters is known to be strongly dependent on the constituents of the feed solution, as well as on process conditions, e.g. trans-membrane pressure (TMP) and cross-flow velocity (CFV). The research project presented in these report describes the application of different ceramic membrane filtration technologies for the efficient treatment of oil-field produced water and different model oily solutions.Keywords: ceramic membrane, membrane fouling, oil rejection, produced water treatment
Procedia PDF Downloads 1802383 Global Position of Gender Equality in India: A Comparative Study
Authors: Mangesh Govindrao Acharya
Abstract:
It’s a matter of regret that rule began by causing social divisions in slave India. Even after independence, gender inequality persisted in Indian society; however, as social consciousness, awareness of governance, and political participation increased, this disparity gradually decreased. Technological advancement played an important role in awakening women. Today, a large number of women are able to address their problems in relevant places. The sense of honour for women in the family has also increased. Education, health, and food are indispensable for a strong society. Society's attitude towards the education of women and girls has become positive. Today, women have set their records in many important places. Women still face many challenges. Health awareness among rural women is a big challenge. Equality between men and women is the biggest social reform campaign implemented in our country. It has been going on endlessly for years, but the expected success does not seem to have been achieved. On the contrary, the issue of equality between men and women keeps coming before society in a new form. An attempt has been made in the present research essay to give an account of India's performance in this regard at the global level.Keywords: gender sensitization, gender equality, women's dignity, women's safety
Procedia PDF Downloads 1352382 Convex Restrictions for Outage Constrained MU-MISO Downlink under Imperfect Channel State Information
Authors: A. Preetha Priyadharshini, S. B. M. Priya
Abstract:
In this paper, we consider the MU-MISO downlink scenario, under imperfect channel state information (CSI). The main issue in imperfect CSI is to keep the probability of each user achievable outage rate below the given threshold level. Such a rate outage constraints present significant and analytical challenges. There are many probabilistic methods are used to minimize the transmit optimization problem under imperfect CSI. Here, decomposition based large deviation inequality and Bernstein type inequality convex restriction methods are used to perform the optimization problem under imperfect CSI. These methods are used for achieving improved output quality and lower complexity. They provide a safe tractable approximation of the original rate outage constraints. Based on these method implementations, performance has been evaluated in the terms of feasible rate and average transmission power. The simulation results are shown that all the two methods offer significantly improved outage quality and lower computational complexity.Keywords: imperfect channel state information, outage probability, multiuser- multi input single output, channel state information
Procedia PDF Downloads 8122381 Review of Urbanization Pattern in Kabul City
Authors: Muhammad Hanif Amiri, Edris Sadeqy, Ahmad Freed Osman
Abstract:
International Conference on Architectural Engineering and Skyscraper (ICAES 2016) on January 18 - 19, 2016 is aimed to exchange new ideas and application experiences face to face, to establish business or research relations and to find global partners for future collaboration. Therefore, we are very keen to participate and share our issues in order to get valuable feedbacks of the conference participants. Urbanization is a controversial issue all around the world. Substandard and unplanned urbanization has many implications on a social, cultural and economic situation of population life. Unplanned and illegal construction has become a critical issue in Afghanistan particularly Kabul city. In addition, lack of municipal bylaws, poor municipal governance, lack of development policies and strategies, budget limitation, low professional capacity of ainvolved private sector in development and poor coordination among stakeholders are the other factors which made the problem more complicated. The main purpose of this research paper is to review urbanization pattern of Kabul city and find out the improvement solutions and to evaluate the increasing of population density which caused vast illegal and unplanned development which finally converts the Kabul city to a slam area as the whole. The Kabul city Master Plan was reviewed in the year 1978 and revised for the planned 2million population. In 2001, the interim administration took place and the city became influx of returnees from neighbor countries and other provinces of Afghanistan mostly for the purpose of employment opportunities, security and better quality of life, therefore, Kabul faced with strange population growth. According to Central Statistics Organization of Afghanistan population of Kabul has been estimated approx. 5 million (2015), however a new Master Plan has been prepared in 2009, but the existing challenges have not been dissolved yet. On the other hand, 70% of Kabul population is living in unplanned (slam) area and facing the shortage of drinking water, inexistence of sewerage and drainage network, inexistence of proper management system for solid waste collection, lack of public transportation and traffic management, environmental degradation and the shortage of social infrastructure. Although there are many problems in Kabul city, but still the development of 22 townships are in progress which caused the great attraction of population. The research is completed with a detailed analysis on four main issues such as elimination of duplicated administrations, Development of regions, Rehabilitation and improvement of infrastructure, and prevention of new townships establishment in Kabul Central Core in order to mitigate the problems and constraints which are the foundation and principal to find the point of departure for an objective based future development of Kabul city. The closure has been defined to reflect the stage-wise development in light of prepared policy and strategies, development of a procedure for the improvement of infrastructure, conducting a preliminary EIA, defining scope of stakeholder’s contribution and preparation of project list for initial development. In conclusion this paper will help the transformation of Kabul city.Keywords: development of regions, illegal construction, population density, urbanization pattern
Procedia PDF Downloads 3192380 A Two Level Load Balancing Approach for Cloud Environment
Authors: Anurag Jain, Rajneesh Kumar
Abstract:
Cloud computing is the outcome of rapid growth of internet. Due to elastic nature of cloud computing and unpredictable behavior of user, load balancing is the major issue in cloud computing paradigm. An efficient load balancing technique can improve the performance in terms of efficient resource utilization and higher customer satisfaction. Load balancing can be implemented through task scheduling, resource allocation and task migration. Various parameters to analyze the performance of load balancing approach are response time, cost, data processing time and throughput. This paper demonstrates a two level load balancer approach by combining join idle queue and join shortest queue approach. Authors have used cloud analyst simulator to test proposed two level load balancer approach. The results are analyzed and compared with the existing algorithms and as observed, proposed work is one step ahead of existing techniques.Keywords: cloud analyst, cloud computing, join idle queue, join shortest queue, load balancing, task scheduling
Procedia PDF Downloads 4312379 Woman: Her Identity and Strive for Existence Reflected English Literature
Authors: Diksha Kadam
Abstract:
The study of images of women in literature and women writers has been a significant area of concern for the last four decades because it is as ‘the study of signification and meaning production’ play a vital role in shaping the perceptions and consciousness of various segment of society in relation to the lives, roles, problems and experiences of different categories of women as women and as autonomous citizen of society. In the history of worlds English literature the status of women and representation of her in the writings is an issue of discussion always. The essence of her existence in the literature is felt; the ecstasy of her feelings is always seen. The literature is full of facts and figures. She is one of them. Her contribution to the literature is undoubtedly a beginning of a new era. Multiple challenges and multiple identities as represented in majority of the literary texts and in real provide much hope and assurance to the new generation of mothers and daughters in the direction of transformation of the individual and collective consciousness of society paving way for the emergence of an actually empowered new woman. This paper will focus on some of the prominent Indian and American women writers in English literature and the various dimensions of her image through some of the prominent works. This attempt of mine will be merely a salute to those women who have struggled to prove their identity as one of the members of society.Keywords: role of women’s writing, new era, contribution to the literature, consciousness, existence
Procedia PDF Downloads 4002378 Parameter Selection for Computationally Efficient Use of the Bfvrns Fully Homomorphic Encryption Scheme
Authors: Cavidan Yakupoglu, Kurt Rohloff
Abstract:
In this study, we aim to provide a novel parameter selection model for the BFVrns scheme, which is one of the prominent FHE schemes. Parameter selection in lattice-based FHE schemes is a practical challenges for experts or non-experts. Towards a solution to this problem, we introduce a hybrid principles-based approach that combines theoretical with experimental analyses. To begin, we use regression analysis to examine the parameters on the performance and security. The fact that the FHE parameters induce different behaviors on performance, security and Ciphertext Expansion Factor (CEF) that makes the process of parameter selection more challenging. To address this issue, We use a multi-objective optimization algorithm to select the optimum parameter set for performance, CEF and security at the same time. As a result of this optimization, we get an improved parameter set for better performance at a given security level by ensuring correctness and security against lattice attacks by providing at least 128-bit security. Our result enables average ~ 5x smaller CEF and mostly better performance in comparison to the parameter sets given in [1]. This approach can be considered a semiautomated parameter selection. These studies are conducted using the PALISADE homomorphic encryption library, which is a well-known HE library. The abstract goes here.Keywords: lattice cryptography, fully homomorphic encryption, parameter selection, LWE, RLWE
Procedia PDF Downloads 1522377 Renewable Energy and Energy Security in Malaysia: A Quantitative Analysis
Authors: Endang Jati Mat Sahid, Hussain Ali Bekhet
Abstract:
Robust economic growth, increasing population, and personal consumption are the main drivers for the rapid increase of energy demand in Malaysia. Increasing demand has compounded the issue of national energy security due to over-dependence on fossil fuel, depleting indigenous domestic conventional energy resources which in turns has increased the country’s energy import dependence. In order to improve its energy security, Malaysia has seriously embarked on a renewable energy journey. Many initiatives on renewable energy have been introduced in the past decade. These strategies have resulted in the exploding growth of renewable energy deployment in Malaysia. Therefore, this study investigated the impact of renewable energy deployment on energy security. Secondary data was used to calculate the energy security indicators. The study also compared the results of applying different energy security indicators namely availability, applicability, affordability and acceptability dimension of energy resources. The evaluation shows that Malaysia will experience slight improvement in availability and acceptability dimension of energy security. This study suggests that energy security level could be further enhanced by efficient utilization of energy, reducing carbon content of energy and facilitating low-carbon industries.Keywords: energy policy, energy security, Malaysia, renewable energy
Procedia PDF Downloads 2432376 Using Trip Planners in Developing Proper Transportation Behavior
Authors: Grzegorz Sierpiński, Ireneusz Celiński, Marcin Staniek
Abstract:
The article discusses multi modal mobility in contemporary societies as a main planning and organization issue in the functioning of administrative bodies, a problem which really exists in the space of contemporary cities in terms of shaping modern transport systems. The article presents classification of available resources and initiatives undertaken for developing multi modal mobility. Solutions can be divided into three groups of measures–physical measures in the form of changes of the transport network infrastructure, organizational ones (including transport policy) and information measures. The latter ones include in particular direct support for people travelling in the transport network by providing information about ways of using available means of transport. A special measure contributing to this end is a trip planner. The article compares several selected planners. It includes a short description of the Green Travelling Project, which aims at developing a planner supporting environmentally friendly solutions in terms of transport network operation. The article summarizes preliminary findings of the project.Keywords: mobility, modal split, multimodal trip, multimodal platforms, sustainable transport
Procedia PDF Downloads 4102375 A Deep Learning-Based Pedestrian Trajectory Prediction Algorithm
Authors: Haozhe Xiang
Abstract:
With the rise of the Internet of Things era, intelligent products are gradually integrating into people's lives. Pedestrian trajectory prediction has become a key issue, which is crucial for the motion path planning of intelligent agents such as autonomous vehicles, robots, and drones. In the current technological context, deep learning technology is becoming increasingly sophisticated and gradually replacing traditional models. The pedestrian trajectory prediction algorithm combining neural networks and attention mechanisms has significantly improved prediction accuracy. Based on in-depth research on deep learning and pedestrian trajectory prediction algorithms, this article focuses on physical environment modeling and learning of historical trajectory time dependence. At the same time, social interaction between pedestrians and scene interaction between pedestrians and the environment were handled. An improved pedestrian trajectory prediction algorithm is proposed by analyzing the existing model architecture. With the help of these improvements, acceptable predicted trajectories were successfully obtained. Experiments on public datasets have demonstrated the algorithm's effectiveness and achieved acceptable results.Keywords: deep learning, graph convolutional network, attention mechanism, LSTM
Procedia PDF Downloads 692374 Production of Keratinase and Its Insilico Characterization
Authors: Akshita Bhardwaj
Abstract:
Keratinase is an enzyme obtained from extracellular sources that is involved in biodegradation of keratin. It is a member of a group of proteases that can break down keratin into amino acids. Keratinases are produced only in the presence of substrate that contain keratin. It attacked the disulfide bond of substrate and involve in keratin degradation. Human hair, feathers, animal hard tissues, horns, claws, and hooves all contain keratin.. It exists in two form alpha keratin (found in soft tissues) and beta keratin (found in hard tissue). By taking part in the degradation of keratin, keratinases derived from microbial sources, often referred to as microbial keratinases, are important in the process of turning wastes containing keratin into products with added value. Chicken feathers contain high level of keratin protein content than other sources and became a suitable protein source. Keratinase production occurs at near alkaline pH and thermophilic temperatures. The bioprocessing of keratinous waste benefits greatly from the use of keratinases. Additionally, it lessens the issue caused by poultry excrement. The use of feather meal, along with keratinase, improves the digestion of proteins and amino acids.Keywords: mili litre (ml), micro litre (Ul), TCA - trichloroacetic acid, OD - optical density
Procedia PDF Downloads 752373 Potential Enhancement of Arsenic Removal Filter Commonly Used in South Asia: A Review
Authors: Sarthak Karki, Haribansha Timalsina
Abstract:
Kanchan Arsenic Filter is an economical low cost and termed the most efficient arsenic removal filter system in South Asian countries such as Nepal. But when the effluent quality was evaluated, it was seen to possess a lower removal rate of arsenite species. In addition to that, greater pathogenic growth and loss in overall efficacy with time due to precipitation of iron sulphates were the further complications. This brings the health issue on the front line as millions of people rely on groundwater sources for general water necessities. With this paper, we analyzed the mechanisms and changes in the efficiency of the extant filter system when integrated with activated laterite and hair column beds, plus an additional charcoal layer for inhibiting pathogen colonies. Hair column have rich keratin protein that binds with arsenic species, and similarly, raw laterite has huge deposits of iron and aluminum, all of these factors helping to remove heavy metal contaminants from water sources. Further study on the commercialized mass production of the new proposed filter and versatility analysis is required.Keywords: laterite, charcoal, arsenic removal, hair column
Procedia PDF Downloads 872372 The Success and Failure of the Solicitor General When the U.S. Government Appears as a Direct Party before the U.S. Supreme Court
Authors: Joseph Ignagni, Rebecca Deen
Abstract:
This paper analyzes the extent to which the U.S. Supreme Court votes to support the position of the United States in cases where the government is a party to the litigation. This study considers the relationship between the Solicitor General’s Office and the U.S. Supreme Court. The Solicitor General has the unique position of being the representative of the Executive Branch and the U.S. government before the Supreme Court. While a great deal of research has looked at the Solicitor General’s success as a “friend of the court,” far less has considered this relationship when the U.S. is a direct party in the litigation. This paper investigates the success rate of the Solicitor General’s Office in these cases. We find that there is considerable variation in the U.S. government’s success rate before the Court depending on the issue, Supreme Court leadership, the ideological direction of the Court and whether the U.S. approached the Court as a petitioner or respondent. We conduct our analysis on the Court’s decisions from 1953-2009. This study adds to our understanding of checks and balances, separation of powers, and inter-institutional relationships between the branches of the federal government of the United States.Keywords: U.S. president, solicitor general, U.S. Supreme Court, separation of power, checks and balances
Procedia PDF Downloads 3592371 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing
Authors: Jaimin Patel
Abstract:
Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack
Procedia PDF Downloads 2782370 Public-Private Partnership Transportation Projects: An Exploratory Study in the US
Authors: Medya Fathi
Abstract:
When public transportation projects were delivered through design-bid-build and later design-build, governments found a serious issue: inadequate funding. With population growth, governments began to develop new arrangements in which the private sectors were involved to cut the financial burden. This arrangement, known as Public-Private Partnership (PPP), has its own risks; however, performance outputs can motivate or discourage its use. On top of such output's list are time and budget, which can be affected by the type of project delivery methods. Project completion within or ahead of schedule as well as within or under budget is among any owner’s objectives. With a higher application of PPP in the highway industry in the US and insufficient PPP research, the current study addresses the schedule and cost performance of PPP highway projects and determines which one outperforms the other. To meet this objective, after collecting performance data of all PPP projects, schedule growth and cost growth are calculated, and finally, statistical analysis is conducted to evaluate the PPP performance. The results and conclusions will be provided. This study can assist practitioners in applying PPP for transportation projects by showing its ability to save time and/or cost.Keywords: cost, delivery method, highway, public-private partnership, schedule, transportation
Procedia PDF Downloads 1752369 Multidisciplinary Approach to the Effects of Generator Exhaust Fumes on Air: Case Study of Onitsha
Authors: U. V. Okpala, C. C. Okpala
Abstract:
The effect of generator exhaust fumes on air, a case study of Onitsha was considered in this work. A sample of 400 respondents was randomly chosen in the study area based on the population. Questionnaire was designed and administered to inhabitants of the study area to enable the researchers ascertain information on the effect of generator exhaust fumes on air and possible remedies. The issue of the types of generators owned by residents, quantity of fuel products purchased per day and the number of years of generator ownership were discussed. The Pearson’s product moment analysis correlation and Chi-square test were applied in the hypothesis testing. The result shows that huge amount of effluents are discharged on the environment thereby polluting the air. This leads to radiative forcing, depletion of ozone layer and precipitation of acid rain. This has untold effect on the climate system. To ensure proper recovery, the study recommends that government makes available alternative energy sources in addition to the conventional power to save the environment; with this, waste becomes wealth towards a sustainable economy in Nigeria.Keywords: Onitsha, generator, fuel products, exhaust fumes and remedies, energy systems
Procedia PDF Downloads 2142368 The Inter-Play Between Traditional Religion and Christianity in Eggon Landn Eggon Land
Authors: Akolo Ajige
Abstract:
Before the advent of Christianity in Eggon land, the Eggon people were adherents of Traditional Religion. The religion is traditional because it was the religion that they grew up in it. A religion that was practiced by their fore fathers, and it was handed over to them. Traditional Religion created in the Eggon people the spirit of communalism, brotherhood and the value for humanity. The advent of Christianity in the 19th Century in Eggon land, some of the adherents of Traditional Religion changed their religion affiliation to Christianity and let gone, of the Traditional Religion. There was a need for the adherents of these two religions (i.e. Christianity and ATR) to leave in peace with one another. Even though there means of worship varies; it was obvious that Christianity and Africa Traditional Religion leaved in harmony with one another. The obvious spread of Christianity in Eggon land can attest to the fact that Traditional Religion welcomed Christianity and gave it room to operate without any issue. The inter-play of Christianity and Traditional Religion of Eggon people is seen during the Ashimu festival where Christians come to watch, why during Christmas celebration, the Traditional Religious adherents also visit the Christians to celebrate with them. It is obvious that there an Inter-Play between Christianity and Traditional Religion in Eggon land. The peace enjoy by the people attest to the fact of religious harmony. A historical research method was adopted for this research work.Keywords: inter-play, traditional religion, christianity, eggon
Procedia PDF Downloads 502367 Prioritization of Customer Order Selection Factors by Utilizing Conjoint Analysis: A Case Study for a Structural Steel Firm
Authors: Burcu Akyildiz, Cigdem Kadaifci, Y. Ilker Topcu, Burc Ulengin
Abstract:
In today’s business environment, companies should make strategic decisions to gain sustainable competitive advantage. Order selection is a crucial issue among these decisions especially for steel production industry. When the companies allocate a high proportion of their design and production capacities to their ongoing projects, determining which customer order should be chosen among the potential orders without exceeding the remaining capacity is the major critical problem. In this study, it is aimed to identify and prioritize the evaluation factors for the customer order selection problem. Conjoint analysis is used to examine the importance level of each factor which is determined as the potential profit rate per unit of time, the compatibility of potential order with available capacity, the level of potential future order with higher profit, customer credit of future business opportunity, and the negotiability level of production schedule for the order.Keywords: conjoint analysis, order prioritization, profit management, structural steel firm
Procedia PDF Downloads 3842366 Prospects and Challenges of Enforcing Accountability and Transperancy for Good Governance: An Analysis of Nigeria’s Situation
Authors: Mahmoud Datti Yola
Abstract:
There is wider agreement among the scholars of political science and public administration that transparency and accountability constituted one of the most crucial ingredients of good governance. In addition democratic government is expected to be accountable and responsive to the wishes and aspirations of the people. In Nigeria, after more than fifteen years to the handover of power to the civilian administration, the leaders has not been at their best, as people’ expectations for nation building, socio-economic progress and better opportunities has been dashed by high level corruption, rising insecurity, absence of the rule of law and lack of transparency and accountability. The objective of this paper is to examine the prospects and challenges of transparency and accountability in Nigeria’s democratic governance. The study utilizes secondary data for this purpose. The study is of the view that the enormous task of dealing with the issue of corruption, insecurity and promotion of ethics and accountability in Nigeria lies not only in effective oversight of the executive by the legislative bodies, respect for the rule of law and an independent judiciary, but also in the ability of the citizens, civil society organizations and other associations to hold elected and appointed officials accountable.Keywords: good governance, transperancy, accountability, Nigeria
Procedia PDF Downloads 6072365 Correlation between Fuel Consumption and Voyage Related Ship Operational Energy Efficiency Measures: An Analysis from Noon Data
Authors: E. Bal Beşikçi, O. Arslan
Abstract:
Fuel saving has become one of the most important issue for shipping in terms of fuel economy and environmental impact. Lowering fuel consumption is possible for both new ships and existing ships through enhanced energy efficiency measures, technical and operational respectively. The limitations of applying technical measures due to the long payback duration raise the potential of operational changes for energy efficient ship operations. This study identifies operational energy efficiency measures related voyage performance management. We use ‘noon’ data to examine the correlation between fuel consumption and operational parameters- revolutions per minute (RPM), draft, trim, (beaufort number) BN and relative wind direction, which are used as measures of ship energy efficiency. The results of this study reveal that speed optimization is the most efficient method as fuel consumption depends heavily on RPM. In conclusion, this study will provide ship operators with the strategic approach for evaluating the priority of the operational energy efficiency measures against high fuel prices and carbon emissions.Keywords: ship, voyage related operational energy Efficiency measures, fuel consumption, pearson's correlation coefficient
Procedia PDF Downloads 6142364 Data Hiding by Vector Quantization in Color Image
Authors: Yung Gi Wu
Abstract:
With the growing of computer and network, digital data can be spread to anywhere in the world quickly. In addition, digital data can also be copied or tampered easily so that the security issue becomes an important topic in the protection of digital data. Digital watermark is a method to protect the ownership of digital data. Embedding the watermark will influence the quality certainly. In this paper, Vector Quantization (VQ) is used to embed the watermark into the image to fulfill the goal of data hiding. This kind of watermarking is invisible which means that the users will not conscious the existing of embedded watermark even though the embedded image has tiny difference compared to the original image. Meanwhile, VQ needs a lot of computation burden so that we adopt a fast VQ encoding scheme by partial distortion searching (PDS) and mean approximation scheme to speed up the data hiding process. The watermarks we hide to the image could be gray, bi-level and color images. Texts are also can be regarded as watermark to embed. In order to test the robustness of the system, we adopt Photoshop to fulfill sharpen, cropping and altering to check if the extracted watermark is still recognizable. Experimental results demonstrate that the proposed system can resist the above three kinds of tampering in general cases.Keywords: data hiding, vector quantization, watermark, color image
Procedia PDF Downloads 3632363 Reading Out of Curiosity: Making Undergraduates Competent in English
Authors: Ruwan Gunawardane
Abstract:
Second language teaching and learning is a complex process in which various factors are identified as having a negative impact on the competency in English among undergraduates of Sri Lanka. One such issue is the lack of intrinsic motivation among them to learn English despite the fact that they all know the importance of English. This study attempted to ascertain how the intrinsic motivation of undergraduates to learn English can be improved through reading out of curiosity. Humans are curious by nature, and cognitive psychology says that curiosity facilitates learning, memory, and motivation. The researcher carried out this study during the closure of universities due to the outbreak of the coronavirus through ‘Online Reading Café’, an online reading programme introduced by himself. He invited 1166 students of the Faculty of Science, University of Ruhuna, to read 50 articles taken from CNN and the BBC and posted at least two to three articles on the LMS of the faculty almost every day over a period of 23 days. The themes of the articles were based on the universe, exploration of planets, scientific experiments, evolution, etc., and the students were encouraged to collect as many words, phrases, and sentence structures as possible while reading and to form meaningful sentences using them. The data obtained through the students’ feedback was qualitatively analyzed. It was found that these undergraduates were interested in reading something out of curiosity, due to which intrinsic motivation is enhanced, and it facilitates competence in L2.Keywords: English, competence, reading, curiosity
Procedia PDF Downloads 1372362 Optimal Planning of Transmission Line Charging Mode During Black Start of a Hydroelectric Unit
Authors: Mohammad Reza Esmaili
Abstract:
After the occurrence of blackouts, the most important subject is how fast the electric service is restored. Power system restoration is an immensely complex issue and there should be a plan to be executed within the shortest time period. This plan has three main stages of black start, network reconfiguration and load restoration. In the black start stage, operators and experts may face several problems, for instance, the unsuccessful connection of the long high-voltage transmission line connected to the electrical source. In this situation, the generator may be tripped because of the unsuitable setting of its line charging mode or high absorbed reactive power. In order to solve this problem, the line charging process is defined as a nonlinear programming problem, and it is optimized by using GAMS software in this paper. The optimized process is performed on a grid that includes a 250 MW hydroelectric unit and a 400 KV transmission system. Simulations and field test results show the effectiveness of optimal planning.Keywords: power system restoration, black start, line charging mode, nonlinear programming
Procedia PDF Downloads 79