Search results for: security measurement
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5356

Search results for: security measurement

4216 Design of an Instrumentation Setup and Data Acquisition System for a GAS Turbine Engine Using Suitable DAQ Software

Authors: Syed Nauman Bin Asghar Bukhari, Mohtashim Mansoor, Mohammad Nouman

Abstract:

Engine test-Bed system is a fundamental tool to measure dynamic parameters, economic performance, and reliability of an aircraft Engine, and its automation and accuracy directly influences the precision of acquired and analysed data. In this paper, we present the design of digital Data Acquisition (DAQ) system for a vintage aircraft engine test bed that lacks the capability of displaying all the analyzed parameters at one convenient location (one panel-one screen). Recording such measurements in the vintage test bed is not only time consuming but also prone to human errors. Digitizing such measurement system requires a Data Acquisition (DAQ) system capable of recording these parameters and displaying them on one screen-one panel monitor. The challenge in designing upgrade to the vintage systems arises with a need to build and integrate digital measurement system from scratch with a minimal budget and modifications to the existing vintage system. The proposed design not only displays all the key performance / maintenance parameters of the gas turbine engines for operator as well as quality inspector on separate screens but also records the data for further processing / archiving.

Keywords: Gas turbine engine, engine test cell, data acquisition, instrumentation

Procedia PDF Downloads 121
4215 Structural Stress of Hegemon’s Power Loss: A Pestle Analysis for Pacification and Security Policy Plan

Authors: Sehrish Qayyum

Abstract:

Active military power contention is shifting to economic and cyberwar to retain hegemony. Attuned Pestle analysis confirms that structural stress of hegemon’s power loss drives a containment approach towards caging actions. Ongoing diplomatic, asymmetric, proxy and direct wars are increasing stress hegemon’s power retention due to tangled military and economic alliances. It creates the condition of catalepsy with defective reflexive control which affects the core warfare operations. When one’s own power is doubted it gives power to one’s own doubt to ruin all planning either done with superlative cost-benefit analysis. Strategically calculated estimation of Hegemon’s power game since the early WWI to WWII, WWII-to Cold War and then to the current era in three chronological periods exposits that Thucydides’s trap became the reason for war broke out. Thirst for power is the demise of imagination and cooperation for better sense to prevail instead it drives ashes to dust. Pestle analysis is a wide array of evaluation from political and economic to legal dimensions of the state matters. It helps to develop the Pacification and Security Policy Plan (PSPP) to avoid hegemon’s structural stress of power loss in fact, in turn, creates an alliance with maximum amicable outputs. PSPP may serve to regulate and pause the hurricane of power clashes. PSPP along with a strategic work plan is based on Pestle analysis to deal with any conceivable war condition and approach for saving international peace. Getting tangled into self-imposed epistemic dilemmas results in regret that becomes the only option of performance. It is a generic application of probability tests to find the best possible options and conditions to develop PSPP for any adversity possible so far. Innovation in expertise begets innovation in planning and action-plan to serve as a rheostat approach to deal with any plausible power clash.

Keywords: alliance, hegemon, pestle analysis, pacification and security policy plan, security

Procedia PDF Downloads 103
4214 Self-Serving or Self-Effacing: An Analysis of the Zimbabwe-United Kingdom Diaspora`S Role in Human Rights Advocacy

Authors: J.T. Chivanga

Abstract:

This paper conceptualizes the significance of human rights activism by the Zimbabwean diaspora in the United Kingdom by analyzing how the diaspora advocates for the promotion of the rights of the people in Zimbabwe. It critiques the strategic essentialism theory that is used by the government of Zimbabwe as a basis to discredit the work of transnational advocacy groups. The research advances this position by articulating that the diaspora does not falsify nor simplify them to garner external support on the human rights situation in Zimbabwe. It establishes and shows the significance of transnational advocacy by articulating how the Zimbabwean diaspora addresses and brings to the attention of the international community human rights violations in Zimbabwe that would otherwise not have seen the light of day due to the absence of a conducive environment in that country that stifles the organization of protests under repressive laws such as the public order and security act of 2009.

Keywords: strategic essentialism, transnational advocacy, public order and security act, Zimbabwe diaspora

Procedia PDF Downloads 238
4213 Variance-Aware Routing and Authentication Scheme for Harvesting Data in Cloud-Centric Wireless Sensor Networks

Authors: Olakanmi Oladayo Olufemi, Bamifewe Olusegun James, Badmus Yaya Opeyemi, Adegoke Kayode

Abstract:

The wireless sensor network (WSN) has made a significant contribution to the emergence of various intelligent services or cloud-based applications. Most of the time, these data are stored on a cloud platform for efficient management and sharing among different services or users. However, the sensitivity of the data makes them prone to various confidentiality and performance-related attacks during and after harvesting. Various security schemes have been developed to ensure the integrity and confidentiality of the WSNs' data. However, their specificity towards particular attacks and the resource constraint and heterogeneity of WSNs make most of these schemes imperfect. In this paper, we propose a secure variance-aware routing and authentication scheme with two-tier verification to collect, share, and manage WSN data. The scheme is capable of classifying WSN into different subnets, detecting any attempt of wormhole and black hole attack during harvesting, and enforcing access control on the harvested data stored in the cloud. The results of the analysis showed that the proposed scheme has more security functionalities than other related schemes, solves most of the WSNs and cloud security issues, prevents wormhole and black hole attacks, identifies the attackers during data harvesting, and enforces access control on the harvested data stored in the cloud at low computational, storage, and communication overheads.

Keywords: data block, heterogeneous IoT network, data harvesting, wormhole attack, blackhole attack access control

Procedia PDF Downloads 75
4212 Implementation of Dozer Push Measurement under Payment Mechanism in Mining Operation

Authors: Anshar Ajatasatru

Abstract:

The decline of coal prices over past years have been significantly increasing the awareness of effective mining operation. A viable step must be undertaken in becoming more cost competitive while striving for best mining practice especially at Melak Coal Mine in East Kalimantan, Indonesia. This paper aims to show how effective dozer push measurement method can be implemented as it is controlled by contract rate on the unit basis of USD ($) per bcm. The method emerges from an idea of daily dozer push activity that continually shifts the overburden until final target design by mine planning. Volume calculation is then performed by calculating volume of each time overburden is removed within determined distance using cut and fill method from a high precision GNSS system which is applied into dozer as a guidance to ensure the optimum result of overburden removal. Accumulation of daily to weekly dozer push volume is found 95 bcm which is multiplied by average sell rate of $ 0,95, thus the amount monthly revenue is $ 90,25. Furthermore, the payment mechanism is then based on push distance and push grade. The push distance interval will determine the rates that vary from $ 0,9 - $ 2,69 per bcm and are influenced by certain push slope grade from -25% until +25%. The amount payable rates for dozer push operation shall be specifically following currency adjustment and is to be added to the monthly overburden volume claim, therefore, the sell rate of overburden volume per bcm may fluctuate depends on the real time exchange rate of Jakarta Interbank Spot Dollar Rate (JISDOR). The result indicates that dozer push measurement can be one of the surface mining alternative since it has enabled to refine method of work, operating cost and productivity improvement apart from exposing risk of low rented equipment performance. In addition, payment mechanism of contract rate by dozer push operation scheduling will ultimately deliver clients by almost 45% cost reduction in the form of low and consistent cost.

Keywords: contract rate, cut-fill method, dozer push, overburden volume

Procedia PDF Downloads 313
4211 Optic Nerve Sheath Measurement in Children with Head Trauma

Authors: Sabiha Sahin, Kursad Bora Carman, Coskun Yarar

Abstract:

Introduction: Measuring the diameter of the optic nerve sheath is a noninvasive and easy to use imaging technique to predict intracranial pressure in children and adults. The aim was to measure the diameter of the optic nerve sheath in pediatric head trauma. Methods: The study group consisted of 40 children with healthy and 40 patients with head trauma. Transorbital sonographic measurement of the optic nerve sheath diameter was performed. Conclusion: The mean diameters of the optic nerve sheath of right and left eyes were 0.408 ± 0.064 mm and 0.417 ± 0.065 mm, respectively, in the trauma group. These results were higher in patients than in control group. There was a negative correlation between optic nerve sheath diameters and Glasgow Coma Scales in patients with head trauma (p < 0.05). There was a positive correlation between optic nerve sheath diameters and positive CT findings, systolic blood pressure in patients with head trauma. The clinical status of the patients at admission, blood pH and lactate level were related to the optic nerve sheath diameter. Conclusion: Measuring the diameter of the optic nerve sheath is not an invasive technique and can be easily used to predict increased intracranial pressure and to prevent secondary brain injury.

Keywords: head trauma, intracranial pressure, optic nerve, sonography

Procedia PDF Downloads 152
4210 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks

Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas

Abstract:

Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.

Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model

Procedia PDF Downloads 51
4209 Implementation of a Virtual Testbed for Secure IoT Firmware Update Using Blockchain

Authors: Tarun Chand, Michael Jurczyk

Abstract:

With the increasing need and popularity of IoT devices and how integrated they are becoming in our daily lives and industries, these devices make for a very lucrative target for malicious actors. And since these devices have such limited resources, the implementation of robust security features is a tradeoff to be made for the actual functionality the device was intended for. This makes them an easy target with high returns. Several frameworks for the secure firmware update of these devices have been recently proposed in the literature. They focus on methods such as blockchains and distributed file systems to secure firmware updates, but do not go into the details of the actual implementation of these frameworks and the lower-level interactions among these methods used. This work integrates some of these security measures into one overall framework and details the actual lower-level implementation of this framework in a virtual dockerized testbed running on AWS.

Keywords: blockchain, Ethereum, Geth, IPFS, secure IoT-firmware update, virtual testbed development

Procedia PDF Downloads 61
4208 The Potential of Small-Scale Urban Food Growing to Supplement Households’ Diets and Provide Health and Wellbeing Benefits

Authors: Bethany Leake, Samantha Caton, Paul Norman, Jill Edmondson

Abstract:

With the majority of the UK population residing in urban areas and with the pressures both environmentally and socially on rural agriculture, the role of urban food production, particularly urban horticulture (UH), is increasingly important in the future of UK food security. UH has the potential to provide an important contribution to urban diets and to provide additional benefits to human health and well-being. While allotments are the traditional focus of UH and play an important role, as access to this type of land is limited and unequal across cities, other forms of UH space, such as domestic growing, will need to be utilized to provide a significant contribution to urban diets. It is theorized that this smaller scale of growing may also be a more accessible way of engaging novice growers in UH. A collaborative research project, Urban Harvest, was designed between the University of Sheffield and Sheffield-based food organizations, which aimed to engage inexperienced gardeners in UH by providing them with home food-growing kits (Grow-Kits). Grow-Kits were provided to 189 participants across Sheffield in 2022, 48% of whom had never grown food before. Data collected through surveys and interviews will help us to evaluate the effect of small-scale food growing on health and wellbeing and the potential of this type of scheme to encourage future UH engagement. This data and increasing evidence on the co-benefits of UH have important implications not only for local food security but also for urban health inequalities and the potential use of this activity for preventative healthcare.

Keywords: urban horticulture, health and wellbeing, food security, nutrition

Procedia PDF Downloads 72
4207 Investigation of Ignition Delay for Low Molecular Hydrocarbon Fuel and Oxygen Mixture behind the Reflected Shock

Authors: K. R. Guna, Aldin Justin Sundararaj, B. C. Pillai, A. N. Subash

Abstract:

A systematic study has been made for ignition delay times measurement behind a reflected shock wave for the low molecular weight hydrocarbon fuel in argon simulated gas mixtures. The low molecular hydrocarbon fuel–oxygen was diluted with argon for desired concentration is taken for the study. The suitability of the shock tube for measuring the ignition delay time is demonstrated by measuring the ignition delay for the liquefied petroleum gas for equivalence ratios (ф=0.5 & 1) in the temperature range 1150-1650 K. The pressure range was fixed from 5-15 bar. The ignition delay was measured by recording the ignition-induced pressure jump and emission from CH radical simultaneously. From conducting experiments, it was found that the ignition delay time for liquefied petroleum gas reduces with increase in temperature. The shock tube was calibrated for ethane-oxygen gas mixture and the results obtained from this study is compared with the earlier reported values and found to be comparably well suited for the measurement of ignition delay times. The above work was carried out using the shock tube facility at propulsion and high enthalpy laboratory, Karunya University.

Keywords: ignition delay, LPG, reflected shock, shock wave

Procedia PDF Downloads 250
4206 Influence of Driving Speed on Bearing Capacity Measurement of Intra-Urban Roads with the Traffic Speed Deflectometer(Tsd)

Authors: Pahirangan Sivapatham, Barbara Esser, Andreas Grimmel

Abstract:

In times of limited public funds and, in particular, an increased social, environmental awareness, as well as the limited availability of construction materials, sustainable and resource-saving pavement management system, is becoming more and more important. Therefore, the knowledge about the condition of the structural substances, particularly bearing capacity and its consideration while planning the maintenance measures of the subordinate network, i.e., state and municipal roads unavoidable. According to the experience, the recommended ride speed of the Traffic Speed Deflectometer (TSD) shall be higher than 40 km/h. Holding of this speed on the intra-urban roads is nearly not possible because of intersections and traffic lights as well as the speed limit. A sufficient background of experience for the evaluation of bearing capacity measurements with TSD in the range of lower speeds is not available yet. The aim of this study is to determine the possible lowest ride speed of the TSD while the bearing capacity measurement on the intra-urban roads. The manufacturer of the TSD used in this study states that the measurements can be conducted at a ride speed of higher than 5 km/h. It is well known that with decreasing ride speed, the viscous fractions in the response of the asphalt pavement increase. This must be taken into account when evaluating the bearing capacity data. In the scope of this study, several measurements were carried out at different speeds between 10 km/h and 60 km/h on the selected intra-urban roads with Pavement-Scanner of the University of Wuppertal, which is equipped with TSD. Pavement-Scanner is able to continuously determine the deflections of asphalt roads in flowing traffic at speeds of up to 80 km/h. The raw data is then aggregated to 10 m mean values so that, as a rule, a bearing capacity characteristic value can be determined for each 10 m road section. By means of analysing of obtained test results, the quality and validity of the determined data rate subject to the riding speed of TSD have been determined. Moreover, the data and pictures of the additional measuring systems of Pavement-Scanners such as High-Speed Road Monitor, Ground Penetration Radar and front cameras can be used to determine and eliminate irregularities in the pavement, which could influence the bearing capacity.

Keywords: bearing capacity measurement, traffic speed deflectometer, inter-urban roads, Pavement-Scanner, structural substance

Procedia PDF Downloads 233
4205 Risk Measurement and Management Strategies in Poultry Farm Enterprises in Imo State, Nigeria

Authors: Donatus Otuiheoma Ohajianya, Augusta Onyekachi Unamba

Abstract:

This study analyzed risk among poultry farm enterprises in Imo State of Nigeria. Specifically, it examined sources of risks, the major risks associated with poultry farm enterprise, and the risk-reducing strategies among the poultry farm enterprises in the study area. Primary data collected in 2015 with validated questionnaire from 120 proportionately and randomly selected poultry farm enterprises were used for the study. The data were analyzed with descriptive statistics and W-Statistic that was validated with Pearson Criterion (X2). The results showed that major risk sources affecting poultry farm enterprises were production, marketing, financial and political in that order. The results found a W-Statistic value of 0.789, which was verified by Pearson Criterion to obtain X2-Calculated value of 4.65 which is lower that X2-Critical value of 11.07 at 5% significant level. The risk-reducing strategies were found to be diversification, savings, co-operative marketing, borrowing, and insurance. It was recommended that government and donor agencies should make policies aimed at encouraging poultry farm enterprises adopt the highlighted risk-reducing strategies in risk management to improve their productivity and farm income.

Keywords: risk, measurement, management, poultry farm, Imo State

Procedia PDF Downloads 299
4204 Judicial Review of Indonesia's Position as the First Archipelagic State to implement the Traffic Separation Scheme to Establish Maritime Safety and Security

Authors: Rosmini Yanti, Safira Aviolita, Marsetio

Abstract:

Indonesia has several straits that are very important as a shipping lane, including the Sunda Strait and the Lombok Strait, which are the part of the Indonesian Archipelagic Sea Lane (IASL). An increase in traffic on the Marine Archipelago makes the task of monitoring sea routes increasingly difficult. Indonesia has proposed the establishment of a Traffic Separation Scheme (TSS) in the Sunda Strait and the Lombok Strait and the country now has the right to be able to conceptualize the TSS as well as the obligation to regulate it. Indonesia has the right to maintain national safety and sovereignty. In setting the TSS, Indonesia needs to issue national regulations that are in accordance with international law and the general provisions of the IMO (International Maritime Organization) can then be used as guidelines for maritime safety and security in the Sunda Strait and the Lombok Strait. The research method used is a qualitative method with the concept of linguistic and visual data collection. The source of the data is the analysis of documents and regulations. The results show that the determination of TSS was justified by International Law, in accordance with article 22, article 41, and article 53 of the United Nations Convention on the Law of the Sea (UNCLOS) 1982. The determination of TSS by the Indonesian government would be in accordance with COLREG (International Convention on Preventing Collisions at Sea) 10, which has been designed to follow IASL. Thus, TSS can provide a function as a safety and monitoring medium to minimize ship accidents or collisions, including the warship and aircraft of other countries that cross the IASL.

Keywords: archipelago state, maritime law, maritime security, traffic separation scheme

Procedia PDF Downloads 126
4203 CFD Simulation and Investigation of Critical Two-Phase Flow Rate in Wellhead Choke

Authors: Alireza Rafie Boldaji, Ahmad Saboonchi

Abstract:

Chokes are commonly used in oil and gas production systems. A choke is a restriction basically designed to control flow rates of oil and gas wells, to prevent the downstream disturbances from propagating upstream (critical flow), and to protect the surface equipment facilities against slugging at high flowing pressures. There are different methods to calculate the multiphase flow rate, one of the multiphase flow measurement methods is the separation and measurement by on¬e-phaseFlow meter, another common method is the use of movable separator, their operations are very labor-intensive and costly. The current method used is based on the flow differential pressure on both sides of choke. Three groups of correlations describing two-phase flow through wellhead chokes were examined. The first group involved simple empirical equations similar to those of Gilbert, the second group comprised derived equations of two-phase flow incorporating PVT properties, and third group is computational method. In the article we calculate the flow of oil and gas through choke with simulation of this two phase flow bye computational fluid dynamic method, we use Ansys- fluent for this simulation and finally compared results of computational simulation whit empirical equations, the results show good agreement between experimental and numerical results.

Keywords: CFD, two-phase, choke, critical

Procedia PDF Downloads 274
4202 A Customize Battery Management Approach for Satellite

Authors: Muhammad Affan, Muhammad Ilyas Raza, Muhammad Harris Hashmi

Abstract:

This work is attributed to the battery management unit design of student Satellites under Pakistan National Student Satellite Program (PNSSP). The aim has been to design a customized, low-cost, efficient, reliable and less-complex battery management scheme for the Satellite. Nowadays, Lithium Ion (Li-ion) batteries have become the de-facto standard for remote applications, especially for satellites. Li-ion cells are selected for secondary storage. The design also addresses Li-ion safety requirements by monitoring, balancing and protecting cells for safe and prolonged operation. Accurate voltage measurement of individual cells was the main challenge because all the actions triggered were based on the digital voltage measurement. For this purpose, a resistive-divider network is used to maintain simplicity and cost-effectiveness. To cater the problem of insufficient i/o pins on microcontroller, fast multiplexers and de-multiplexers were used. The discrepancy inherited in the given design is the dissipation of heat due to the dissipative resistors. However, it is still considered to be the optimum adoption, considering the simple and cost-effective nature of the passive balancing technique. Furthermore, it is a completely unique solution, customized to meet specific requirements. However, there is still an option for a more advanced and expensive design.

Keywords: satellite, battery module, passive balancing, dissipative

Procedia PDF Downloads 135
4201 Traditional Values and Their Adaptation in Social Housing Design: Towards a New Typology and Establishment of 'Airhouse' Standard in Malaysia

Authors: Mohd Firrdhaus Mohd Sahabuddin, Cristina Gonzalez-Longo

Abstract:

Large migration from rural areas to urban areas like Kuala Lumpur has led to some implications for economic, social and cultural development. This high population has placed enormous demand on the existing housing stocks, especially for low-income groups. However, some issues arise, one of which is overheated indoor air temperature. This problem contributes to the high-energy usage that forces huge sums of money to be spent on cooling the house by using mechanical equipment. Therefore, this study focuses on thermal comfort in social housing, and incorporates traditional values into its design to achieve a certain measurement of natural ventilation in a house. From the study, the carbon emission and energy consumption for an air-conditioned house is 67%, 66% higher than a naturally ventilated house. Therefore, this research has come up with a new typology design, which has a large exposed wall area and full-length openings on the opposite walls to increase cross ventilation. At the end of this research, the measurement of thermal comfort for a naturally ventilated building called ‘AirHouse’ has been identified.

Keywords: tropical architecture, natural ventilation, passive design, AirHouse, social housing design

Procedia PDF Downloads 672
4200 Social Media Factor in Security Environment

Authors: Cetin Arslan, Senol Tayan

Abstract:

Social media is one of the most important and effective means of social interaction among people in which they create, share and exchange their ideas via photos, videos or voice messages. Although there are lots of communication tools, social media sites are the most prominent ones that allows the users articulate themselves in a matter of seconds all around the world with almost any expenses and thus, they became very popular and widespread after its emergence. As the usage of social media increases, it becomes an effective instrument in social matters. While it is possible to use social media to emphasize basic human rights and protest some failures of any government as in “Arab Spring”, it is also possible to spread propaganda and misinformation just to cause long lasting insurgency, upheaval, turmoil or disorder as an instrument of intervention to internal affairs and state sovereignty by some hostile groups or countries. It is certain that “social media” has positive effects on democracies letting people have chance to express themselves and to organize, but it is also obvious that the misuse of it, is very common that even a five-minute-long video can cause to wage a campaign against a country. Although it looks anti-democratic, when you consider the catastrophic effects of misuse of social media, it is a kind of area that serious precautions are to be taken without limiting democratic rights while allowing constant and perpetual share but preventing the criminal events. This article begins with the current developments in social media and gives some examples on misuse of it. Second part tries to put emphasize on the legal basis that can prevent criminal activities and the upheavals and insurgencies against state security. Last part makes comparison between democratic countries and international organizations’’ actions against such activities and proposes some further actions that are compatible with democratic norms.

Keywords: democracy, disorder, security, Social Media

Procedia PDF Downloads 364
4199 Crack Initiation Assessment during Fracture of Heat Treated Duplex Stainless Steels

Authors: Faraj Ahmed E. Alhegagi, Anagia M. Khamkam Mohamed, Bassam F. Alhajaji

Abstract:

Duplex stainless steels (DSS) are widely employed in industry for apparatus working with sea water in petroleum, refineries and in chemical plants. Fracture of DSS takes place by cleavage of the ferrite phase and the austenite phase ductile tear off. Pop-in is an important feature takes place during fracture of DSS. The procedure of Pop-ins assessment plays an important role in fracture toughness studies. In present work, Zeron100 DSS specimens were heat treated at different temperatures, cooled and pulled to failure to assess the pop-ins criterion in crack initiation prediction. The outcome results were compared to the British Standard (BS 7448) and the ASTEM standard (E1290) for Crack-Tip Opening Displacement (CTOD) fracture toughness measurement. Pop-in took place during specimens loading specially for those specimens heat treated at higher temperatures. The standard BS7448 was followed to check specimen validity for fractured toughness assessment by direct determination of KIC. In most cases, specimens were invalid for KIC measurement. The two procedures were equivalent only when single pop-ins were assessed. A considerable contrast in fracture toughness value between was observed where multiple pop-ins were assessed.

Keywords: fracture toughness, stainless steels, pop ins, crack assessment

Procedia PDF Downloads 121
4198 A Critical Review of Mechanization in Rice Farming in Indonesia

Authors: K. Suheiti, P. Soni, Yardha

Abstract:

Challenges ahead of Indonesian agricultural development include increasing rural welfare, food needs, and the provision of employment through resource optimization that are laid out in agribusiness system. The agricultural system also responsive to the changing strategic environment. However, mounting pressure of population increase and changes in land-uses, require intensive use of agricultural land with modern agricultural machinery. Similarly, environmentally friendly technologies should continue to be developed in an effort to build and develop a good farming practice model. This paper explains the development of agricultural mechanization in Indonesia, particularly on rice production. The method of the research was analyze secondary data, tabulation and interpretation. The result showed, there was a variety of tools and agricultural machinery that have been produced and used by farmers to support national food security. The role of mechanization was needed to support national rice production and food security achievement.

Keywords: farming, Indonesia, mechanization, rice

Procedia PDF Downloads 490
4197 Estimating X-Ray Spectra for Digital Mammography by Using the Expectation Maximization Algorithm: A Monte Carlo Simulation Study

Authors: Chieh-Chun Chang, Cheng-Ting Shih, Yan-Lin Liu, Shu-Jun Chang, Jay Wu

Abstract:

With the widespread use of digital mammography (DM), radiation dose evaluation of breasts has become important. X-ray spectra are one of the key factors that influence the absorbed dose of glandular tissue. In this study, we estimated the X-ray spectrum of DM using the expectation maximization (EM) algorithm with the transmission measurement data. The interpolating polynomial model proposed by Boone was applied to generate the initial guess of the DM spectrum with the target/filter combination of Mo/Mo and the tube voltage of 26 kVp. The Monte Carlo N-particle code (MCNP5) was used to tally the transmission data through aluminum sheets of 0.2 to 3 mm. The X-ray spectrum was reconstructed by using the EM algorithm iteratively. The influence of the initial guess for EM reconstruction was evaluated. The percentage error of the average energy between the reference spectrum inputted for Monte Carlo simulation and the spectrum estimated by the EM algorithm was -0.14%. The normalized root mean square error (NRMSE) and the normalized root max square error (NRMaSE) between both spectra were 0.6% and 2.3%, respectively. We conclude that the EM algorithm with transmission measurement data is a convenient and useful tool for estimating x-ray spectra for DM in clinical practice.

Keywords: digital mammography, expectation maximization algorithm, X-Ray spectrum, X-Ray

Procedia PDF Downloads 726
4196 AI-Powered Models for Real-Time Fraud Detection in Financial Transactions to Improve Financial Security

Authors: Shanshan Zhu, Mohammad Nasim

Abstract:

Financial fraud continues to be a major threat to financial institutions across the world, causing colossal money losses and undermining public trust. Fraud prevention techniques, based on hard rules, have become ineffective due to evolving patterns of fraud in recent times. Against such a background, the present study probes into distinct methodologies that exploit emergent AI-driven techniques to further strengthen fraud detection. We would like to compare the performance of generative adversarial networks and graph neural networks with other popular techniques, like gradient boosting, random forests, and neural networks. To this end, we would recommend integrating all these state-of-the-art models into one robust, flexible, and smart system for real-time anomaly and fraud detection. To overcome the challenge, we designed synthetic data and then conducted pattern recognition and unsupervised and supervised learning analyses on the transaction data to identify which activities were fishy. With the use of actual financial statistics, we compare the performance of our model in accuracy, speed, and adaptability versus conventional models. The results of this study illustrate a strong signal and need to integrate state-of-the-art, AI-driven fraud detection solutions into frameworks that are highly relevant to the financial domain. It alerts one to the great urgency that banks and related financial institutions must rapidly implement these most advanced technologies to continue to have a high level of security.

Keywords: AI-driven fraud detection, financial security, machine learning, anomaly detection, real-time fraud detection

Procedia PDF Downloads 30
4195 Internet of Things Networks: Denial of Service Detection in Constrained Application Protocol Using Machine Learning Algorithm

Authors: Adamu Abdullahi, On Francisca, Saidu Isah Rambo, G. N. Obunadike, D. T. Chinyio

Abstract:

The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years, the security of these devices is vulnerable to attacks, disrupting their functioning. This research aims to tackle this issue by applying mixed methods of qualitative and quantitative for feature selection, extraction, and cluster algorithms to detect DoS attacks in the Constrained Application Protocol (CoAP) using the Machine Learning Algorithm (MLA). The main objective of the research is to enhance the security scheme for CoAP in the IoT environment by analyzing the nature of DoS attacks and identifying a new set of features for detecting them in the IoT network environment. The aim is to demonstrate the effectiveness of the MLA in detecting DoS attacks and compare it with conventional intrusion detection systems for securing the CoAP in the IoT environment. Findings: The research identifies the appropriate node to detect DoS attacks in the IoT network environment and demonstrates how to detect the attacks through the MLA. The accuracy detection in both classification and network simulation environments shows that the k-means algorithm scored the highest percentage in the training and testing of the evaluation. The network simulation platform also achieved the highest percentage of 99.93% in overall accuracy. This work reviews conventional intrusion detection systems for securing the CoAP in the IoT environment. The DoS security issues associated with the CoAP are discussed.

Keywords: algorithm, CoAP, DoS, IoT, machine learning

Procedia PDF Downloads 76
4194 The Effect of Female Access to Healthcare and Educational Attainment on Nigerian Agricultural Productivity Level

Authors: Esther M. Folarin, Evans Osabuohien, Ademola Onabote

Abstract:

Agriculture constitutes an important part of development and poverty mitigation in lower-middle-income countries, like Nigeria. The level of agricultural productivity in the Nigerian economy in line with the level of demand necessary to meet the desired expectation of the Nigerian populace is threatening to meeting the standard of the United Nations (UN) Sustainable Development Goals (SDGs); This includes the SDG-2 (achieve food security through agricultural productivity). The overall objective of the study is to reveal the performance of the interaction variable in the model among other factors that help in the achievement of greater Nigerian agricultural productivity. The study makes use of Wave 4 (2018/2019) of the Living Standard Measurement Studies, Integrated Survey on Agriculture (LSMS-ISA). Qualitative analysis of the information was also used to provide complimentary answers to the quantitative analysis done in the study. The study employed human capital theory and Grossman’s theory of health Demand in explaining the relationships that exist between the variables within the model of the study. The study engages the Instrumental Variable Regression technique in achieving the broad objectives among other techniques for the other specific objectives. The estimation results show that there exists a positive relationship between female healthcare and the level of female agricultural productivity in Nigeria. In conclusion, the study emphasises the need for more provision and empowerment for greater female access to healthcare and educational attainment levels that aids higher female agricultural productivity and consequently an improvement in the total agricultural productivity of the Nigerian economy.

Keywords: agricultural productivity, education, female, healthcare, investment

Procedia PDF Downloads 78
4193 Impacts of Sociological Dynamics on Entomophagy Practice and Food Security in Nigeria

Authors: O. B. Oriolowo, O. J. John

Abstract:

Empirical findings have shown insects to be nutritious and good source of food for man. However, human food preferences are not only determined by nutritional values of food consumed but, more importantly, by sociology and economic pressure. This study examined the interrelation between science and sociology in sustaining the acceptance of entomophagy among college students to combat food insecurity. A twenty items five Likert scale, College Students Entomophagy Questionnaire (CSEQ), was used to elucidate information from the respondents. The reliability coefficient was obtained to be 0.91 using Spearman-Brown Prophecy formula. Three research questions and three hypotheses were raised. Also, quantitative nutritional analysis of few insects and some established conventional protein sources were undertaking in order to compare their nutritional status. The data collected were analyzed using descriptive statistics of percentages and inferential statistics of correlation and Analysis of Variance (ANOVA). The results obtained showed that entomophagy has cultural heritage among different tribes in Nigeria and is an acceptable practice; it cuts across every social stratum and is practiced among both major religions. Moreover, insects compared favourably in term of nutrient contents when compared with the conventional animal protein sources analyzed. However, there is a gradual decline in the practice of entomophagy among students, which may be attributed to the influence of western civilization. This study, therefore, recommended an intensification of research and enlightenment of people on the usefulness of entomophagy so as to preserve its cultural heritage as well as boost human food security.

Keywords: entomophagy, food security, malnutrition, poverty alleviation, sociology

Procedia PDF Downloads 117
4192 New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities

Authors: Mehmet Kargaci

Abstract:

Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented.

Keywords: cyber war, cyber threats, cyber operation capabilities, operation planning

Procedia PDF Downloads 332
4191 Resilient Security System with Toll Free Call Services: Case Study of Adama City

Authors: Shanko Chura Aredo, Hailu Jeldie Wodajo, Muktar Jeylan, Kedir Ilka, Abdulnasir Husein

Abstract:

Toll-free numbers are calling numbers that have unique three or four digit numbers and that don’t require payment from phone lines in order to be called. With the help of these numbers, callers can connect with nearby organizations and/or people without incurring far-reaching fees. Calls to assistance centers are especially popular from toll-free phones. In the past, toll-free services have offered prospective clients and other parties a simple and cost-free means of getting in touch with enterprises. Nevertheless, unless they have an ”unlimited calling” plan, wireless subscribers will be billed for the airtime minutes used during a toll-free call. In Adama, the second largest city in Ethiopia, a call center has been installed as part of smart security system and serving since January 2023 for collection of complaints from different community levels. The call center is situated at the mayor office and has 11 active workers, 4 of these working the night time and the remaining during day time. The information reported in the form of complaints from individuals and groups are illegal constructions, illegal trade, income concealment or hiding, giving and receiving bribe, informing new faces of suspected enemies and exposing individual or group conflicts. This technology has been found to bring a significant outcome in minimizing illegal acts, public safety threats and service delivery problems.

Keywords: smart, safety, crime, call center, security

Procedia PDF Downloads 51
4190 Analysis on the Building Energy Performance of a Retrofitted Residential Building with RETScreen Expert Software

Authors: Abdulhameed Babatunde Owolabi, Benyoh Emmanuel Kigha Nsafon, Jeung-Soo Huh

Abstract:

Energy efficiency measures for residential buildings in South Korea is a national issue because most of the apartments built in the last decades were constructed without proper energy efficiency measures making the energy performance of old buildings to be very poor when compared with new buildings. However, the adoption of advanced building technologies and regulatory building codes are effective energy efficiency strategies for new construction. There is a need to retrofits the existing building using energy conservation measures (ECMs) equipment’s in order to conserve energy and reduce GHGs emissions. To achieve this, the Institute for Global Climate Change and Energy (IGCCE), Kyungpook National University (KNU), Daegu, South Korea employed RETScreen Expert software to carry out measurement and verification (M&V) analysis on an existing building in Korea by using six years gas consumption data collected from Daesung Energy Co., Ltd in order to determine the building energy performance after the introduction of ECM. Through the M&V, energy efficiency is attained, and the resident doubt was reduced. From the analysis, a total of 657 Giga Joules (GJ) of liquefied natural gas (LNG) was consumed at the rate of 0.34 GJ/day having a peak in the year 2015, which cost the occupant the sum of $10,821.

Keywords: energy efficiency, measurement and verification, performance analysis, RETScreen experts

Procedia PDF Downloads 135
4189 An Attribute Based Access Control Model with POL Module for Dynamically Granting and Revoking Authorizations

Authors: Gang Liu, Huimin Song, Can Wang, Runnan Zhang, Lu Fang

Abstract:

Currently, resource sharing and system security are critical issues. This paper proposes a POL module composed of PRIV ILEGE attribute (PA), obligation and log which improves attribute based access control (ABAC) model in dynamically granting authorizations and revoking authorizations. The following describes the new model termed PABAC in terms of the POL module structure, attribute definitions, policy formulation and authorization architecture, which demonstrate the advantages of it. The POL module addresses the problems which are not predicted before and not described by access control policy. It can be one of the subject attributes or resource attributes according to the practical application, which enhances the flexibility of the model compared with ABAC. A scenario that illustrates how this model is applied to the real world is provided.

Keywords: access control, attribute based access control, granting authorizations, privilege, revoking authorizations, system security

Procedia PDF Downloads 356
4188 Efficient Internal Generator Based on Random Selection of an Elliptic Curve

Authors: Mustapha Benssalah, Mustapha Djeddou, Karim Drouiche

Abstract:

The random number generation (RNG) presents a significant importance for the security and the privacy of numerous applications, such as RFID technology and smart cards. Since, the quality of the generated bit sequences is paramount that a weak internal generator for example, can directly cause the entire application to be insecure, and thus it makes no sense to employ strong algorithms for the application. In this paper, we propose a new pseudo random number generator (PRNG), suitable for cryptosystems ECC-based, constructed by randomly selecting points from several elliptic curves randomly selected. The main contribution of this work is the increasing of the generator internal states by extending the set of its output realizations to several curves auto-selected. The quality and the statistical characteristics of the proposed PRNG are validated using the Chi-square goodness of fit test and the empirical Special Publication 800-22 statistical test suite issued by NIST.

Keywords: PRNG, security, cryptosystem, ECC

Procedia PDF Downloads 441
4187 Mitigating Denial of Service Attacks in Information Centric Networking

Authors: Bander Alzahrani

Abstract:

Information-centric networking (ICN) using architectures such as Publish-Subscribe Internet Routing Paradigm (PSIRP) is one of the promising candidates for a future Internet, has recently been under the spotlight by the research community to investigate the possibility of redesigning the current Internet architecture to solve many issues such as routing scalability, security, and quality of services issues.. The Bloom filter-based forwarding is a source-routing approach that is used in the PSIRP architecture. This mechanism is vulnerable to brute force attacks which may lead to denial-of-service (DoS) attacks. In this work, we present a new forwarding approach that keeps the advantages of Bloom filter-based forwarding while mitigates attacks on the forwarding mechanism. In practice, we introduce a special type of forwarding nodes called Edge-FW to be placed at the edge of the network. The role of these node is to add an extra security layer by validating and inspecting packets at the edge of the network against brute-force attacks and check whether the packet contains a legitimate forwarding identifier (FId) or not. We leverage Certificateless Aggregate Signature (CLAS) scheme with a small size of 64-bit which is used to sign the FId. Hence, this signature becomes bound to a specific FId. Therefore, malicious nodes that inject packets with random FIds will be easily detected and dropped at the Edge-FW node when the signature verification fails. Our preliminary security analysis suggests that with the proposed approach, the forwarding plane is able to resist attacks such as DoS with very high probability.

Keywords: bloom filter, certificateless aggregate signature, denial-of-service, information centric network

Procedia PDF Downloads 194