Search results for: security test institutionalization
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11927

Search results for: security test institutionalization

10817 Diagnostics of Subclinical Mastitis in Dairy Cows

Authors: G. Tanbayeva, Z. Myrzabekov, O. Tagayev, B. Barakhov, M. Tokayeva

Abstract:

Mastitis is widely spread among dairy cows bringing large economic damage resulting in decreased milk yield, deterioration of the milk quality, gastrointestinal tract disorders among young animals, culling of breeding stock, and expenses for sick animal treatment. Up-to-date and accurate diagnostics of subclinical (latent) mastitis in dairy cows has huge practical and economical significance. The aim of the research was to develop a new optimal alternative rapid method for the diagnosis of subclinical mastitis in cows. The study was performed in the laboratory of the Hygiene and Sanitation of Kazakh National Agrarian University. The first stage was to evaluate the different percentages of “Promastit” preparation. It showed that the best diagnostics capacity had 10% dilution. The second stage was to compare “Promastit” with some of the domestic and foreign analogues “Somatic-Test” (Denmark), “MastTest” (Russia), “Mastidin” (Ukraine), “Diagmast” (Kazakhstan). The observation was carried out on 520 dairy cows with subclinical mastitis on farms of Almaty region of Kazakhstan. The effectiveness was checked by milk sedimentation test. Our research tends to show that the diagnostic test "Promastitis" revealed subclinical mastitis in 193 out of 520 lactating cows (37.1% of those examined). At the same time, in the case of using other diagnostic tests, the given index was as follows: 35.5% (mastidin), 34.4% (masttest-AF), 33.8% (somatic-test Ecotest), 30.7% (diagmast).

Keywords: dairy cows, diagnostics, subclinical mastitis, test Promastit

Procedia PDF Downloads 356
10816 Comparison of Visual Field Tests in Glaucoma Patients with a Central Visual Field Defect

Authors: Hye-Young Shin, Hae-Young Lopilly Park, Chan Kee Park

Abstract:

We compared the 24-2 and 10-2 visual fields (VFs) and investigate the degree of discrepancy between the two tests in glaucomatous eyes with central VF defects. In all, 99 eyes of 99 glaucoma patients who underwent both the 24-2 VF and 10-2 VF tests within 6 months were enrolled retrospectively. Glaucomatous eyes involving a central VF defect were divided into three groups based on the average total deviation (TD) of 12 central points in the 24-2 VF test (N = 33, in each group): group 1 (tercile with the highest TD), group 2 (intermediate TD), and group 3 (lowest TD). The TD difference was calculated by subtracting the average TD of the 10-2 VF test from the average TD of 12 central points in the 24-2 VF test. The absolute central TD difference in each quadrant was defined as the absolute value of the TD value obtained by subtracting the average TD of four central points in the 10-2 VF test from the innermost TD in the 24-2 VF test in each quadrant. The TD differences differed significantly between group 3 and groups 1 and 2 (P < 0.001). In the superonasal quadrant, the absolute central TD difference was significantly greater in group 2 than in group 1 (P < 0.05). In the superotemporal quadrant, the absolute central TD difference was significantly greater in group 3 than in groups 1 and 2 (P < 0.001). Our results indicate that the results of VF tests for different VFs can be inconsistent, depending on the degree of central defects and the VF quadrant.

Keywords: central visual field defect, glaucoma, 10-2 visual field, 24-2 visual field

Procedia PDF Downloads 176
10815 Mechanical Properties of Ancient Timber Structure Based on the Non Destructive Test Method: A Study to Feiyun Building, Shanxi, China

Authors: Annisa Dewanti Putri, Wang Juan, Y. Qing Shan

Abstract:

The structural assessment is one of a crucial part for ancient timber structure, in which this phase will be the reference for the maintenance and preservation phase. The mechanical properties of a structure are one of an important component of the structural assessment of building. Feiyun as one of the particular preserved building in China will become one of the Pioneer of Timber Structure Building Assessment. The 3-storey building which is located in Shanxi Province consists of complex ancient timber structure. Due to condition and preservation purpose, assessments (visual inspections, Non-Destructive Test and a Semi Non-Destructive test) were conducted. The stress wave measurement, moisture content analyzer, and the micro-drilling resistance meter data will overview the prediction of Mechanical Properties. As a result, the mechanical properties can be used for the next phase as reference for structural damage solutions.

Keywords: ancient structure, mechanical properties, non destructive test, stress wave, structural assessment, timber structure

Procedia PDF Downloads 474
10814 Landmines and the Postcolonial Security Discourse in Zimbabwe

Authors: Fradreck Jockonia Mujuru

Abstract:

The effects of landmine residues from the Zimbabwean liberation war are persisting. Landmines are violently maiming and killing people and animals, causing certain areas inaccessible for agriculture and habitation, instilling fear, and even inducing forced migration. A significant gap in landmines literature is that they are mainly treated as a humanitarian issue and less scholarly. This paper engaged in theorising landmines using postcolonial literature as an epistemology. The results exhibit three issues. One, postcolonial literature provides a timeframe, a process, a space, and an attitude towards modernity on the inquiry of landmines. Two, landmines are understood in the context of war and were further decolonised to pick unique principles studied. Lastly, some of the unique principles found in landmines after decolonising are their ability to provide surveillance, repression and violent fate to all who cross the set boundaries. Therefore, theorising landmines can also be pushed further to be understood through repression. This article concluded that landmines can be theorised outside mainstream International Relations theories using postcolonial literature.

Keywords: landmines, postcolonial, repression, security, violence

Procedia PDF Downloads 76
10813 Taxonomy of Threats and Vulnerabilities in Smart Grid Networks

Authors: Faisal Al Yahmadi, Muhammad R. Ahmed

Abstract:

Electric power is a fundamental necessity in the 21st century. Consequently, any break in electric power is probably going to affect the general activity. To make the power supply smooth and efficient, a smart grid network is introduced which uses communication technology. In any communication network, security is essential. It has been observed from several recent incidents that adversary causes an interruption to the operation of networks. In order to resolve the issues, it is vital to understand the threats and vulnerabilities associated with the smart grid networks. In this paper, we have investigated the threats and vulnerabilities in Smart Grid Networks (SGN) and the few solutions in the literature. Proposed solutions showed developments in electricity theft countermeasures, Denial of services attacks (DoS) and malicious injection attacks detection model, as well as malicious nodes detection using watchdog like techniques and other solutions.

Keywords: smart grid network, security, threats, vulnerabilities

Procedia PDF Downloads 141
10812 Investigating the Efficacy of HIV/AIDS Psycho-Education and Behavioural Skills Training in Reducing Sexual Risk Behaviours in a Trucking Population in Nigeria

Authors: Abiodun Musbau Lawal, Benjamin Oladapo Olley

Abstract:

Long Distance Truck Drivers (LDTDs) have been found to be a high-risk group in the spread of HIV/AIDS globally; perhaps, due to their high Sexual Risk Behaviours (SRBs). Interventions for reducing SRBs in trucking population have not been fully exploited. A quasi-experimental control group pretest-posttest design was used to assess the efficacy of psycho-education and behavioural skills training in reducing SRBs among LDTDs. Sixteen drivers rivers were randomly assigned into either experimental or control groups using balloting technique. A questionnaire was used as an instrument for data collection. Repeated measures t-test and independent t-test were used to test hypotheses. The intervention had a significant effect on the SRBs among LDTDs at post-test(t{7}=6.01, p<.01) and at followup (t{7}=6.42, p<.01). No significant difference in sexual risk behaviour of LDTDs at post-test and at follow-up stage. Similarly, intervention had significant effects on sexual risk behaviour at post-test (t {14}=- 4.69, p<.05) and at follow-up (t {14}= -9.56, p < .05) respectively. At post-test and follow-up stages, drivers in experimental group reported reduced SRBs than those in the control group. Drivers in an experimental group reported lower sexual risk behaviour a week after intervention as well as at three months follow-up than those in the control group. It is concluded that HIV/AIDS preventive intervention that provides the necessary informational and behavioural skills content can significantly impact long distance truck drivers sexual risk behaviours.

Keywords: HIV/AIDS interventions, long distance truck drivers, Nigeria, sexual risk behaviours

Procedia PDF Downloads 476
10811 Adult Attachment Security as a Predictor of Career Decision-Making Self-Efficacy among College Students in the United States

Authors: Mai Kaneda, Sarah Feeney

Abstract:

This study examined the association between adult attachment security and career decision-making self-efficacy (CDMSE) among college students in the United States. Previous studies show that attachment security is associated with levels of CDMSE among college students. Given that a majority of studies examining career development variables have used parental attachment measures, this study adds to understanding of this phenomenon by utilizing a broader measure of attachment. The participants included 269 college students (76% female) between the ages of 19-29. An anonymous survey was distributed online via social media as well as in hard copy format in classrooms. Multiple regression analyses were conducted to determine the relationship between anxious and avoidant attachment and CDMSE. Results revealed anxious attachment was a significant predictor of CDMSE (B = -.13, p = .01), such that greater anxiety in attachment was associated with lower levels of CDMSE. When accounting for anxious attachment, avoidant attachment was no longer significant as a predictor of CDMSE (B = -.12, p = .10). The variance in college CDMSE explained by the model was 7%, F(2,267) = 9.51, p < .001. Results for anxious attachment are consistent with existing literature that finds insecure attachment to be related to lower levels of CDMSE, however the non-significant results for avoidant attachment as a predictor of CDMSE suggest not all types of attachment insecurity are equally related to CDMSE. Future research is needed to explore the nature of the relationship between different dimensions of attachment insecurity and CDMSE.

Keywords: attachment, career decision-making, college students, self-efficacy

Procedia PDF Downloads 221
10810 Engaging the Terrorism Problematique in Africa: Discursive and Non-Discursive Approaches to Counter Terrorism

Authors: Cecil Blake, Tolu Kayode-Adedeji, Innocent Chiluwa, Charles Iruonagbe

Abstract:

National, regional and international security threats have dominated the twenty-first century thus far. Insurgencies that utilize “terrorism” as their primary strategy pose the most serious threat to global security. States in turn adopt terrorist strategies to resist and even defeat insurgents who invoke the legitimacy of statehood to justify their action. In short, the era is dominated by the use of terror tactics by state and non-state actors. Globally, there is a powerful network of groups involved in insurgencies using Islam as the bastion for their cause. In Africa, there are Boko Haram, Al Shabaab and Al Qaeda in the Maghreb representing Islamic groups utilizing terror strategies and tactics to prosecute their wars. The task at hand is to discover and to use multiple ways of handling the present security threats, including novel approaches to policy formulation, implementation, monitoring and evaluation that would pay significant attention to the important role of culture and communication strategies germane for discursive means of conflict resolution. In other to achieve this, the proposed research would address inter alia, root causes of insurgences that predicate their mission on Islamic tenets particularly in Africa; discursive and non-discursive counter-terrorism approaches fashioned by African governments, continental supra-national and regional organizations, recruitment strategies by major non-sate actors in Africa that rely solely on terrorist strategies and tactics and sources of finances for the groups under study. A major anticipated outcome of this research is a contribution to answers that would lead to the much needed stability required for development in African countries experiencing insurgencies carried out by the use of patterned terror strategies and tactics. The nature of the research requires the use of triangulation as the methodological tool.

Keywords: counter-terrorism, discourse, Nigeria, security, terrorism

Procedia PDF Downloads 486
10809 Reliability and Validity for Measurement of Body Composition: A Field Method

Authors: Ahmad Hashim, Zarizi Ab Rahman

Abstract:

Measurement of body composition via a field method has the most popular instruments which are used to estimate the percentage of body fat. Among the instruments used are the Body Mass Index, Bio Impedance Analysis and Skinfold Test. All three of these instruments do not involve high costs, do not require high technical skills, are mobile, save time, and are suitable for use in large populations. Because all three instruments can estimate the percentage of body fat, but it is important to identify the most appropriate instruments and have high reliability. Hence, this study was conducted to determine the reliability and convergent validity of the instruments. A total of 40 students, males and females aged between 13 and 14 years participated in this study. The study found that the test retest and Pearson correlation coefficient of reliability for the three instruments is very high, r = .99. While the inter class reliability also are at high level with r = .99 for Body Mass Index and Bio Impedance Analysis, r = .96 for Skin fold test. Intra class reliability coefficient for these three instruments is too high for Body Mass Index r = .99, Bio Impedance Analysis r = .97, and Skin fold Test r = .90. However, Standard Error of Measurement value for all three instruments indicates the Body Mass Index is the most appropriate instrument with a mean value of .000672 compared with other instruments. The findings show that the Body Mass Index is an instrument which is the most accurate and reliable in estimating body fat percentage for the population studied.

Keywords: reliability, validity, body mass index, bio impedance analysis and skinfold test

Procedia PDF Downloads 337
10808 Gestational Diabetes Mellitus (GDM) Knowledge Levels of Pregnant Women with GDM and Affecting Factors

Authors: Nuran Nur Aypar, Merlinda Alus Tokat

Abstract:

The aim of the study is to determine the knowledge level of pregnant women with Gestational Diabetes Mellitus (GDM) about the disease and affecting factors. The data of this descriptive study were collected from 184 pregnant women who were followed up in Dokuz Eylul University Hospital (n=34), Izmir Ege Maternity Hospital, Gynecology Training and Research Hospital (n=133), and Egepol Private Hospital (n=17). Data collection forms were prepared by the researcher according to the literature. ANOVA test, Kruskal Wallis test, Mann-Whitney U test, Student’s t-test, and Pearson correlation test were used for statistical analyses. Average GDM knowledge score of pregnant women was 40.10±19.56. The GDM knowledge scores were affected by factors such as age, educational level, working status, income status, educational level of the spouse, and the GDM background. It has been shown in our study that the GDM knowledge scores were negatively affected by factors such as young age, low educational level, low-income level, unemployment, having a spouse with low educational level, the absence of the GDM story. It has been identified that 86.4% of the pregnant women were trained about GDM. The education provided in the antenatal period significantly increased GDM knowledge scores of pregnant women (p=0.000, U=515.0). It has been determined that GDM knowledge of the pregnant women with GDM is affected by various factors. These factors must be considered in order to determine new strategies.

Keywords: affecting factors, gestational diabetes mellitus (GDM), knowledge level, nursing, pregnancy

Procedia PDF Downloads 342
10807 Understanding Everyday Insecurities Emerging from Fragmented Territorial Control in Post-Accord Colombia

Authors: Clara Voyvodic

Abstract:

Transitions from conflict to peace are by no means smooth nor linear, particularly from the perspective of those living through them. Over the last few decades, the changing focus in peacebuilding studies has come to appreciate the everyday experience of communities and how that provides a lens through which the relative success or efficacy of these transitions can be understood. In particular, the demobilization of a significant conflict actor is not without consequences, not just for the macro-view of state stabilization and peace, but for the communities who find themselves without a clear authority of territorial control. In Colombia, the demobilization and disarmament of the FARC guerilla group provided a brief respite to the conflict and a major political win for President Manuel Santos. However, this victory has proven short-lived. Drawing from extensive field research in Colombia within the last year, including interviews with local communities and actors operating in these regions, field observations, and other primary resources, this paper examines the post-accord transitions in Colombia and the everyday security experiences of local communities in regions formerly controlled by the FARC. In order to do so, the research focused on a semi-ethnographic approach in the northern region of the department of Antioquia and the coastal area of the border department of Nariño that documented how individuals within these marginalized communities have come to understand and negotiate their security in the years following the accord and the demobilization of the FARC. This presentation will argue that the removal of the FARC as an informal governance actor opened a space for multiple actors to attempt to control the same territory, including the state. This shift has had a clear impact on the everyday security experiences of the local communities. With an exploration of the dynamics of local governance and its impact on lived security experiences, this research seeks to demonstrate how distinct patterns of armed group behavior are emerging not only from a vacuum of control left by the FARC but from an increase in state presence that nonetheless remains inconsistent and unpersuasive as a monopoly of force in the region. The increased multiplicity of actors, particularly the state, has meant that the normal (informal) rules for communities to navigate these territories are no longer in play as the identities, actions, and intentions of different competing groups have become frustratingly opaque. This research provides a prescient analysis on how the shifting dynamics of territorial control in a post-peace accord landscape produce uncertain realities that affect the daily lives of the local communities and endanger the long-term prospect of human-centered security.

Keywords: armed actors, conflict transitions, informal governance, post-accord, security experiences

Procedia PDF Downloads 132
10806 Testing of Protective Coatings on Automotive Steel, a Correlation Between Salt Spray, Electrochemical Impedance Spectroscopy, and Linear Polarization Resistance Test

Authors: Dhanashree Aole, V. Hariharan, Swati Surushe

Abstract:

Corrosion can cause serious and expensive damage to the automobile components. Various proven techniques for controlling and preventing corrosion depend on the specific material to be protected. Electrochemical Impedance Spectroscopy (EIS) and salt spray tests are commonly used to assess the corrosion degradation mechanism of coatings on metallic surfaces. While, the only test which monitors the corrosion rate in real time is known as Linear Polarisation Resistance (LPR). In this study, electrochemical tests (EIS & LPR) and spray test are reviewed to assess the corrosion resistance and durability of different coatings. The main objective of this study is to correlate the test results obtained using linear polarization resistance (LPR) and Electrochemical Impedance Spectroscopy (EIS) with the results obtained using standard salt spray test. Another objective of this work is to evaluate the performance of various coating systems- CED, Epoxy, Powder coating, Autophoretic, and Zn-trivalent coating for vehicle underbody application. The corrosion resistance coating are assessed. From this study, a promising correlation between different corrosion testing techniques is noted. The most profound observation is that electrochemical tests gives quick estimation of corrosion resistance and can detect the degradation of coatings well before visible signs of damage appear. Furthermore, the corrosion resistances and salt spray life of the coatings investigated were found to be according to the order as follows- CED> powder coating > Autophoretic > epoxy coating > Zn- Trivalent plating.

Keywords: Linear Polarization Resistance (LPR), Electrochemical Impedance Spectroscopy (EIS), salt spray test, sacrificial and barrier coatings

Procedia PDF Downloads 527
10805 Effect of Progressive Type-I Right Censoring on Bayesian Statistical Inference of Simple Step–Stress Acceleration Life Testing Plan under Weibull Life Distribution

Authors: Saleem Z. Ramadan

Abstract:

This paper discusses the effects of using progressive Type-I right censoring on the design of the Simple Step Accelerated Life testing using Bayesian approach for Weibull life products under the assumption of cumulative exposure model. The optimization criterion used in this paper is to minimize the expected pre-posterior variance of the PTH percentile time of failures. The model variables are the stress changing time and the stress value for the first step. A comparison between the conventional and the progressive Type-I right censoring is provided. The results have shown that the progressive Type-I right censoring reduces the cost of testing on the expense of the test precision when the sample size is small. Moreover, the results have shown that using strong priors or large sample size reduces the sensitivity of the test precision to the censoring proportion. Hence, the progressive Type-I right censoring is recommended in these cases as progressive Type-I right censoring reduces the cost of the test and doesn't affect the precision of the test a lot. Moreover, the results have shown that using direct or indirect priors affects the precision of the test.

Keywords: reliability, accelerated life testing, cumulative exposure model, Bayesian estimation, progressive type-I censoring, Weibull distribution

Procedia PDF Downloads 507
10804 Tribological Study of TiC Powder Cladding on 6061 Aluminum Alloy

Authors: Yuan-Ching Lin, Sin-Yu Chen, Pei-Yu Wu

Abstract:

This study reports the improvement in the wear performance of A6061 aluminum alloy clad with mixed powders of titanium carbide (TiC), copper (Cu) and aluminum (Al) using the gas tungsten arc welding (GTAW) method. The wear performance of the A6061 clad layers was evaluated by performing pin-on-disc mode wear test. Experimental results clearly indicate an enhancement in the hardness of the clad layer by about two times that of the A6061 substrate without cladding. Wear test demonstrated a significant improvement in the wear performance of the clad layer when compared with the A6061 substrate without cladding. Moreover, the interface between the clad layer and the A6061 substrate exhibited superior metallurgical bonding. Due to this bonding, the clad layer did not spall during the wear test; as such, massive wear loss was prevented. Additionally, massive oxidized particulate debris was generated on the worn surface during the wear test; this resulted in three-body abrasive wear and reduced the wear behavior of the clad surface.

Keywords: GTAW、A6061 aluminum alloy, 、surface modification, tribological study, TiC powder cladding

Procedia PDF Downloads 463
10803 A Future Technology: Solar Winged Autonomous Underwater Vehicle Design

Authors: Mohammad Moonesun

Abstract:

One of the most important future technologies is related to solar Autonomous Underwater Vehicles (AUVs). In this technical paper, some aspects of solar winged AUV design are mentioned. The case study is for Arya project. The submarine movement cyclograms, weight quotas for internal equipment, hydrodynamic test results are mentioned, and some other technical notes are discussed here. The main body is the SUBOFF type and has two hydroplanes on the both sides of the body with the NACA0015 cross section. On these two hydroplanes, two 50-W photovoltaic panel will be mounted. Four small hydroplanes with the same cross section of the NACA0015 are arranged at the stern of the body at a 90° angle to each other. This test is performed in National Iranian Marine Laboratory with the length of 402 m.

Keywords: AUV, solar, model test, hydrodynamic resistance

Procedia PDF Downloads 131
10802 An Optimal Steganalysis Based Approach for Embedding Information in Image Cover Media with Security

Authors: Ahlem Fatnassi, Hamza Gharsellaoui, Sadok Bouamama

Abstract:

This paper deals with the study of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover media to obtain the stego media in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image stego media against the corresponding cover media and understand the process of embedding the information and its detection. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganalysis algorithms.

Keywords: optimization, heuristics and metaheuristics algorithms, embedded systems, low-power consumption, steganalysis heuristic approach

Procedia PDF Downloads 292
10801 Cyber Attacks Management in IoT Networks Using Deep Learning and Edge Computing

Authors: Asmaa El Harat, Toumi Hicham, Youssef Baddi

Abstract:

This survey delves into the complex realm of Internet of Things (IoT) security, highlighting the urgent need for effective cybersecurity measures as IoT devices become increasingly common. It explores a wide array of cyber threats targeting IoT devices and focuses on mitigating these attacks through the combined use of deep learning and machine learning algorithms, as well as edge and cloud computing paradigms. The survey starts with an overview of the IoT landscape and the various types of attacks that IoT devices face. It then reviews key machine learning and deep learning algorithms employed in IoT cybersecurity, providing a detailed comparison to assist in selecting the most suitable algorithms. Finally, the survey provides valuable insights for cybersecurity professionals and researchers aiming to enhance security in the intricate world of IoT.

Keywords: internet of things (IoT), cybersecurity, machine learning, deep learning

Procedia PDF Downloads 35
10800 Correlation Test of Psychomotor Vigilance Test Fatigue Scores on Sleep Quality at Home in Oil and Gas Tanker Driver: A Diagnostic Study

Authors: Pandega Gama Mahardika, Muhammad Rifki Al Iksan, Datuk Fachrul Razy

Abstract:

Oil And Gas Tanker Driver is a high-risk jobdesc. drivers drive with sleep circadian rhythm disturbances. Therefore, FAMOUS (Fatigue Management Online Ultimate System) conducted a diagnostic test on the effectiveness and accuracy of the Psychomotor vigilance test (PVT) in the field to capture the fatigue level of Oil And Gas Tanker Driver. Fatigue examination with the PVP method for 3 minutes using the Pertamina FAMOUS system (Fatigue Management Online Ultimate System). The research sample was Oil And Gas Tanker Driver Elnusa petrofin drivers as many as 2205 people. PVT is categorical data that states a driver has a low or high fatigue level. The quality of sleep at home was recorded by filling in a score of 1 = not well, 2 = not well, 3 = well, per person. A total of 1852 (84%) driver had a low fatigue level, while 353 (16%) driver had a high fatigue level. Poor sleep quality was experienced by 68 (79%) driver who had a high fatigue level. Oil And Gas Tanker Driver who slept soundly at home as many as 1804 (87%) had a low fatigue level. The correlation coefficient of sleep quality home and fatigue level is significant because it shows a probability value of 0.00 (p <5%). Fatigue level can be diagnosed through examining sleep quality, using FAMOUS Program for occupational medicine, particularly in the oil and gas sector.

Keywords: psychomotor vigilance test, fatigue, sleep, oil and gas tanker driver drivers, pertamina FAMOUS

Procedia PDF Downloads 93
10799 On Hyperbolic Gompertz Growth Model (HGGM)

Authors: S. O. Oyamakin, A. U. Chukwu,

Abstract:

We proposed a Hyperbolic Gompertz Growth Model (HGGM), which was developed by introducing a stabilizing parameter called θ using hyperbolic sine function into the classical gompertz growth equation. The resulting integral solution obtained deterministically was reprogrammed into a statistical model and used in modeling the height and diameter of Pines (Pinus caribaea). Its ability in model prediction was compared with the classical gompertz growth model, an approach which mimicked the natural variability of height/diameter increment with respect to age and therefore provides a more realistic height/diameter predictions using goodness of fit tests and model selection criteria. The Kolmogorov-Smirnov test and Shapiro-Wilk test was also used to test the compliance of the error term to normality assumptions while using testing the independence of the error term using the runs test. The mean function of top height/Dbh over age using the two models under study predicted closely the observed values of top height/Dbh in the hyperbolic gompertz growth models better than the source model (classical gompertz growth model) while the results of R2, Adj. R2, MSE, and AIC confirmed the predictive power of the Hyperbolic Monomolecular growth models over its source model.

Keywords: height, Dbh, forest, Pinus caribaea, hyperbolic, gompertz

Procedia PDF Downloads 443
10798 Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking

Authors: Modesta E. Ezema, Chikwendu V. Alabekee, Victoria N. Ishiwu, Ifeyinwa NwosuArize, Chinedu I. Nwoye

Abstract:

The advent of wireless networking in computing technology cannot be overemphasized, it opened up easy accessibility to information resources, networking made easier and brought internet accessibility to our doorsteps, but despite all these, some mishap came in with it that is causing mayhem in today ‘s overall information security. The cyber criminals will always compromise the integrity of a message that is not encrypted or that is encrypted with a weak algorithm.In other to correct the mayhem, this study focuses on cryptosystem and cryptography. This ensures end to end crypt messaging. The study of various cryptographic algorithms, as well as the techniques and applications of the cryptography for efficiency, were all considered in the work., present and future applications of cryptography were dealt with as well as Quantum Cryptography was exposed as the current and the future area in the development of cryptography. An empirical study was conducted to collect data from network users.

Keywords: algorithm, cryptography, cryptosystem, network

Procedia PDF Downloads 349
10797 Analyzing the Effect of Multilingualism, Language 1, and Language 2 on Reading Comprehension

Authors: Judith Hanke

Abstract:

Due to the increase of students with reading difficulties, digital reading support with diagnostics was developed to foster the individual student's reading comprehension. The digital reading support focused on the reading comprehension of elementary school students. The digital reading packages consist of literary texts with aligned reading exercises. The number of students with German as a second language is growing in Germany. Students with multilingualism, language 1, and language 2 learn German together in school. The research's focus is on determining whether and to what extent multilingualism, language 1, and language 2 affect reading comprehension. For the methodology, an ABA design was selected for the intervention study to examine the reading support. The study was expedited from April 2023 until July 2023 and collected quantitative data of individuals, groups, and classes. It comprised a survey group (N = 58) and a control group (N = 53). The quantitative data was collected from 3 classes of 3 teachers and 47 students for all three test times. To show differences between the groups, a standardized reading comprehension test was used for the three test times, pretest, posttest, and follow-up. The standardized test consists of three subtests regarding word comprehension, sentence comprehension, and text comprehension. The main findings include that students who spoke German as their first language had the best test scores. Interestingly, students with a different language had better testing scores than students with German as the first language and (an) other language/s. Also, the students with another language outperformed the native language speakers in one of the subtests of the post-testing. The variables of spoken language at home and German as a second language were also examined and correlated with the test results. One significant correlation was found between spoken language at home and the text comprehension test of the pretesting. Additionally, the variable German as a second language had multiple significant correlations in the pretest, posttest and follow-up. The study's significance is to understand the influence of several languages, language 1, and language 2, on reading comprehension.

Keywords: multilingualism, language 1, language 2, reading comprehension, second language

Procedia PDF Downloads 33
10796 Blockchain Technology for Secure and Transparent Oil and Gas Supply Chain Management

Authors: Gaurav Kumar Sinha

Abstract:

The oil and gas industry, characterized by its complex and global supply chains, faces significant challenges in ensuring security, transparency, and efficiency. Blockchain technology, with its decentralized and immutable ledger, offers a transformative solution to these issues. This paper explores the application of blockchain technology in the oil and gas supply chain, highlighting its potential to enhance data security, improve transparency, and streamline operations. By leveraging smart contracts, blockchain can automate and secure transactions, reducing the risk of fraud and errors. Additionally, the integration of blockchain with IoT devices enables real-time tracking and monitoring of assets, ensuring data accuracy and integrity throughout the supply chain. Case studies and pilot projects within the industry demonstrate the practical benefits and challenges of implementing blockchain solutions. The findings suggest that blockchain technology can significantly improve trust and collaboration among supply chain participants, ultimately leading to more efficient and resilient operations. This study provides valuable insights for industry stakeholders considering the adoption of blockchain technology to address their supply chain management challenges.

Keywords: blockchain technology, oil and gas supply chain, data security, transparency, smart contracts, IoT integration, real-time tracking, asset monitoring, fraud reduction, supply chain efficiency, data integrity, case studies, industry implementation, trust, collaboration.

Procedia PDF Downloads 37
10795 Antistress Effects of Hydrangeae Dulcis Folium on Net Handing Stress-Induced Anxiety-Like Behavior in Zebrafish: Possible Mechanism of Action of Adrenocorticotropin Hormone (ACTH) Receptor

Authors: Lee Seungheon, Kim Ba-Ro

Abstract:

In this study, the anti-stress effects of the ethanolic extract of Hydrangeae Dulcis Folium (EHDF) were investigated. To determine the effects of EHDF on physical stress, changes in the whole-body cortisol level and behaviour were monitored in zebrafish. To induce physical stress, we used the net handling stress (NHS). Fish were treated with EHDF for 6 min before they were exposed to stress, and the fish were either evaluated via behavioural tests, including a novel tank test and an open field test or sacrificed to collect body fluid from the whole body. The results indicate that increased anxiety-like behaviours in the novel tank test and open field test under stress were recovered by treatment with EHDF at 5, 10 and 20 mg/L (P < 0.05). Moreover, compared with the normal group, which was not treated with NHS, the whole-body cortisol level was significantly increased by treatment with NHS in the control group. Compared with the control group, pre-treatment with EHDF at concentrations of 5, 10 and 20 mg/L for 6 min significantly prevented the increase in the whole-body cortisol level induced by NHS (P < 0.05). In addition, adrenocorticotropin hormone (ACTH) challenge studies showed that EHDF completely blocked the effects of ACTH (0.2 IU/g, IP) on cortisol secretion. These results suggest that EHDF may be a good anti-stress candidate and that its mechanism of action may be related to its positive effects on cortisol release.

Keywords: net handling stress, zebrafish, hydrangeae dulcis folium, whole-body cortisol, novel tank test, open field test

Procedia PDF Downloads 300
10794 SISSLE in Consensus-Based Ripple: Some Improvements in Speed, Security, Last Mile Connectivity and Ease of Use

Authors: Mayank Mundhra, Chester Rebeiro

Abstract:

Cryptocurrencies are rapidly finding wide application in areas such as Real Time Gross Settlements and Payments Systems. Ripple is a cryptocurrency that has gained prominence with banks and payment providers. It solves the Byzantine General’s Problem with its Ripple Protocol Consensus Algorithm (RPCA), where each server maintains a list of servers, called Unique Node List (UNL) that represents the network for the server, and will not collectively defraud it. The server believes that the network has come to a consensus when members of the UNL come to a consensus on a transaction. In this paper we improve Ripple to achieve better speed, security, last mile connectivity and ease of use. We implement guidelines and automated systems for building and maintaining UNLs for resilience, robustness, improved security, and efficient information propagation. We enhance the system so as to ensure that each server receives information from across the whole network rather than just from the UNL members. We also introduce the paradigm of UNL overlap as a function of information propagation and the trust a server assigns to its own UNL. Our design not only reduces vulnerabilities such as eclipse attacks, but also makes it easier to identify malicious behaviour and entities attempting to fraudulently Double Spend or stall the system. We provide experimental evidence of the benefits of our approach over the current Ripple scheme. We observe ≥ 4.97x and 98.22x in speedup and success rate for information propagation respectively, and ≥ 3.16x and 51.70x in speedup and success rate in consensus.

Keywords: Ripple, Kelips, unique node list, consensus, information propagation

Procedia PDF Downloads 148
10793 Quantum Inspired Security on a Mobile Phone

Authors: Yu Qin, Wanjiaman Li

Abstract:

The widespread use of mobile electronic devices increases the complexities of mobile security. This thesis aims to provide a secure communication environment for smartphone users. Some research proves that the one-time pad is one of the securest encryption methods, and that the key distribution problem can be solved by using the QKD (quantum key distribution). The objective of this project is to design an Android APP (application) to exchange several random keys between mobile phones. Inspired by QKD, the developed APP uses the quick response (QR) code as a carrier to dispatch large amounts of one-time keys. After evaluating the performance of APP, it allows the mobile phone to capture and decode 1800 bytes of random data in 600ms. The continuous scanning mode of APP is designed to improve the overall transmission performance and user experience, and the maximum transmission rate of this mode is around 2200 bytes/s. The omnidirectional readability and error correction capability of QR code gives it a better real-life application, and the features of adequate storage capacity and quick response optimize overall transmission efficiency. The security of this APP is guaranteed since QR code is exchanged face-to-face, eliminating the risk of being eavesdropped. Also, the id of QR code is the only message that would be transmitted through the whole communication. The experimental results show this project can achieve superior transmission performance, and the correlation between the transmission rate of the system and several parameters, such as the QR code size, has been analyzed. In addition, some existing technologies and the main findings in the context of the project are summarized and critically compared in detail.

Keywords: one-time pad, QKD (quantum key distribution), QR code, application

Procedia PDF Downloads 146
10792 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security

Authors: D. Pugazhenthi, B. Sree Vidya

Abstract:

Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.

Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification

Procedia PDF Downloads 260
10791 A Proposed Program for Developing Some Concepts to the Nursery Children in Egypt Using Artistic Activities

Authors: Ebtehag Tolba, Ahmed Mousa, Mohamed Abd El-Salam

Abstract:

The study presents a proposed program for nursery school children in Egypt. The program consists of a collection of artistic activities and aims to develop the language, mathematical, and artistic skills of preschool children. Furthermore, the researcher has presented a questionnaire to experts about the link between the target group and the content. Finally, the proposed program was applied to group of 30 children. In addition, the researcher has prepared another questionnaire for measuring the effect of the program. This questionnaire was used as a pre-test and post-test, and at the end of the study, a significant difference was determined in favour of the post-test results.

Keywords: developing, concepts, nursery, children, artistic activities

Procedia PDF Downloads 265
10790 The Balancing Act: India and Maldives in the Quest for Regional Prosperity

Authors: Arya S. S.

Abstract:

India is one of the powerful country in the world .India and Maldives having common interests in regional security and economic growth, this relationship has seen substantial change in recent years. This paper examines the complex dynamics of this bilateral relationship, emphasizing the careful balancing act that both countries perform in order to advance regional prosperity. It looks at historical connections, geopolitical factors, and current issues like economic cooperation, climate change, and marine security. The study highlights how India's involvement in the Maldives contributes to both bilateral ties and regional stability by examining important initiatives including trade agreements and infrastructure projects. It also discusses the effects of outside factors and the necessity for both nations to strategically manage their interests. In order to contribute to a more affluent and stable Indian Ocean area, this study ultimately seeks to shed light on how India and the Maldives may cooperate to promote sustainable development while tackling security issues. The India Maldives relation is very crucial in the regional stability of Indian ocean region. The initiatives like building infrastructure, giving financial support, and establishing the India-Maldives Friendship Bridge demonstrate India's dedication to Maldivian prosperity. In addition to boosting the Maldives' economy, these investments strengthen India's clout in the area, which is essential for preserving its maritime security interests in the face of growing Chinese dominance. Both India and China involved in a strategic tug of war in order to enhance their dominance in Maldives. There are difficulties with this collaboration including, political unrest in the Maldives has occasionally resulted in changes to foreign policy, particularly under regimes that support stronger ties with China. India has expressed concern about losing strategic footholds in the Indian Ocean as a result of China's extension of influence through debt diplomacy and infrastructure projects. India must therefore strike a balance between advancing its objectives and upholding Maldivian sovereignty as well as the goals of its people and government. In summary, the partnership between India and the Maldives is a complex balancing act that is marked by cultural links, security cooperation, and economic dependency. Both countries must negotiate the complexity of international relations as they work for regional prosperity, especially in light of both internal and external factors. India and the Maldives can strengthen their positions as key actors in the changing dynamics of the Indian Ocean by promoting cooperation and communication. This would not only protect their particular interests but also help create a stable and prosperous South Asian region.

Keywords: regional security, balancing act, debt trap diplomacy, strategic tug of war

Procedia PDF Downloads 19
10789 Comparing Two Interventions for Teaching Math to Pre-School Students with Autism

Authors: Hui Fang Huang Su, Jia Borror

Abstract:

This study compared two interventions for teaching math to preschool-aged students with autism spectrum disorder (ASD). The first is considered the business as usual (BAU) intervention, which uses the Strategies for Teaching Based on Autism Research (STAR) curriculum and discrete trial teaching as the instructional methodology. The second is the Math is Not Difficult (Project MIND) activity-embedded, naturalistic intervention. These interventions were randomly assigned to four preschool students with ASD classrooms and implemented over three months for Project Mind. We used measurement gained during the same three months for the STAR intervention. In addition, we used A quasi-experimental, pre-test/post-test design to compare the effectiveness of these two interventions in building mathematical knowledge and skills. The pre-post measures include three standardized instruments: the Test of Early Math Ability-3, the Problem Solving and Calculation subtests of the Woodcock-Johnson Test of Achievement IV, and the Bracken Test of Basic Concepts-3 Receptive. The STAR curriculum-based assessment is administered to all Baudhuin students three times per year, and we used the results in this study. We anticipated that implementing these two approaches would improve the mathematical knowledge and skills of children with ASD. Still, it is crucial to see whether a behavioral or naturalistic teaching approach leads to more significant results.

Keywords: early learning, autism, math for pre-schoolers, special education, teaching strategies

Procedia PDF Downloads 165
10788 Testing of Small Local Zones by Means of Small Punch Test at Room and Creep Temperatures

Authors: Vaclav Mentl, Josef Volak

Abstract:

In many industrial applications, materials are subjected to degradation of mechanical properties as a result of real service conditions, temperature, cyclic loading, humidity or other corrosive media, irradiation, their combination etc. The assessment of the remaining lifetime of components and structures is commonly based on correlated procedures including numerous destructive, non-destructive and mathematical techniques that should guarantee reasonably precise assessment of the current damage extent of materials in question and the remaining lifetime evaluation of the component under consideration. The answers to demands of customers to extend the lifetime of existing components beyond their original design life must be based on detailed assessment of the current degradation extent, what can be rarely realised by means of traditional mechanical (standardised) tests that need relatively large volumes of representative material for the test specimen manufacturing. This fact accelerated the research of miniaturised test specimen that can be sampled non-invasively from the component.

Keywords: small punch test, correlation, creep, mechanical properties

Procedia PDF Downloads 275