Search results for: security test institutionalization
10756 Fast Fourier Transform-Based Steganalysis of Covert Communications over Streaming Media
Authors: Jinghui Peng, Shanyu Tang, Jia Li
Abstract:
Steganalysis seeks to detect the presence of secret data embedded in cover objects, and there is an imminent demand to detect hidden messages in streaming media. This paper shows how a steganalysis algorithm based on Fast Fourier Transform (FFT) can be used to detect the existence of secret data embedded in streaming media. The proposed algorithm uses machine parameter characteristics and a network sniffer to determine whether the Internet traffic contains streaming channels. The detected streaming data is then transferred from the time domain to the frequency domain through FFT. The distributions of power spectra in the frequency domain between original VoIP streams and stego VoIP streams are compared in turn using t-test, achieving the p-value of 7.5686E-176 which is below the threshold. The results indicate that the proposed FFT-based steganalysis algorithm is effective in detecting the secret data embedded in VoIP streaming media.Keywords: steganalysis, security, Fast Fourier Transform, streaming media
Procedia PDF Downloads 14810755 Hand Motion and Gesture Control of Laboratory Test Equipment Using the Leap Motion Controller
Authors: Ian A. Grout
Abstract:
In this paper, the design and development of a system to provide hand motion and gesture control of laboratory test equipment is considered and discussed. The Leap Motion controller is used to provide an input to control a laboratory power supply as part of an electronic circuit experiment. By suitable hand motions and gestures, control of the power supply is provided remotely and without the need to physically touch the equipment used. As such, it provides an alternative manner in which to control electronic equipment via a PC and is considered here within the field of human computer interaction (HCI).Keywords: control, hand gesture, human computer interaction, test equipment
Procedia PDF Downloads 31610754 Assessment of Analytical Equations for the Derivation of Young’s Modulus of Bonded Rubber Materials
Authors: Z. N. Haji, S. O. Oyadiji, H. Samami, O. Farrell
Abstract:
The prediction of the vibration response of rubber products by analytical or numerical method depends mainly on the predefined intrinsic material properties such as Young’s modulus, damping factor and Poisson’s ratio. Such intrinsic properties are determined experimentally by subjecting a bonded rubber sample to compression tests. The compression tests on such a sample yield an apparent Young’s modulus which is greater in magnitude than the intrinsic Young’s modulus of the rubber. As a result, many analytical equations have been developed to determine Young’s modulus from an apparent Young’s modulus of bonded rubber materials. In this work, the applicability of some of these analytical equations is assessed via experimental testing. The assessment is based on testing of vulcanized nitrile butadiene rubber (NBR70) samples using tensile test and compression test methods. The analytical equations are used to determine the intrinsic Young’s modulus from the apparent modulus that is derived from the compression test data of the bonded rubber samples. Then, these Young’s moduli are compared with the actual Young’s modulus that is derived from the tensile test data. The results show significant discrepancy between the Young’s modulus derived using the analytical equations and the actual Young’s modulus.Keywords: bonded rubber, quasi-static test, shape factor, apparent Young’s modulus
Procedia PDF Downloads 17310753 Climate Smart Agriculture: Nano Technology in Solar Drying
Authors: Figen Kadirgan, M. A. Neset Kadirgan, Gokcen A. Ciftcioglu
Abstract:
Addressing food security and climate change challenges have to be done in an integrated manner. To increase food production and to reduce emissions intensity, thus contributing to mitigate climate change, food systems have to be more efficient in the use of resources. To ensure food security and adapt to climate change they have to become more resilient. The changes required in agricultural and food systems will require the creation of supporting institutions and enterprises to provide services and inputs to smallholders, fishermen and pastoralists, and transform and commercialize their production more efficiently. Thus there is continously growing need to switch to green economy where simultaneously causes reduction in carbon emissions and pollution, enhances energy and resource-use efficiency; and prevents the loss of biodiversity and ecosystem services. Smart Agriculture takes into account the four dimensions of food security, availability, accessibility, utilization, and stability. It is well known that, the increase in world population will strengthen the population-food imbalance. The emphasis on reduction of food losses makes a point on production, on farmers, on increasing productivity and income ensuring food security. Where also small farmers enhance their income and stabilize their budget. The use of solar drying for agricultural, marine or meat products is very important for preservation. Traditional sun drying is a relatively slow process where poor food quality is seen due to an infestation of insects, enzymatic reactions, microorganism growth and micotoxin development. In contrast, solar drying has a sound solution to all these negative effects of natural drying and artificial mechanical drying. The technical directions in the development of solar drying systems for agricultural products are compact collector design with high efficiency and low cost. In this study, using solar selective surface produced in Selektif Teknoloji Co. Inc. Ltd., solar dryers with high efficiency will be developed and a feasibility study will be realized.Keywords: energy, renewable energy, solar collector, solar drying
Procedia PDF Downloads 22510752 Research on Fuzzy Test Framework Based on Concolic Execution
Authors: Xiong Xie, Yuhang Chen
Abstract:
Vulnerability discovery technology is a significant field of the current. In this paper, a fuzzy framework based on concolic execution has been proposed. Fuzzy test and symbolic execution are widely used in the field of vulnerability discovery technology. But each of them has its own advantages and disadvantages. During the path generation stage, path traversal algorithm based on generation is used to get more accurate path. During the constraint solving stage, dynamic concolic execution is used to avoid the path explosion. If there is external call, the concolic based on function summary is used. Experiments show that the framework can effectively improve the ability of triggering vulnerabilities and code coverage.Keywords: concolic execution, constraint solving, fuzzy test, vulnerability discovery
Procedia PDF Downloads 22910751 The Effectiveness of Metaphor Therapy on Depression among Female Students
Authors: Marzieh Talebzadeh Shoushtari
Abstract:
The present study aimed to determine the effectiveness of Metaphor therapy on depression among female students. The sample included 60 female students with depression symptoms selected by simple sampling and randomly divided into two equal groups (experimental and control groups). Beck Depression Inventory was used to measure the variables. This was an experimental study with a pre-test/post-test design with control group. Eight metaphor therapy sessions were held for the experimental group. A post-test was administered to both groups. Data were analyzed using multivariate analysis of covariance (MANCOVA). Results showed that the Metaphor therapy decreased depression in the experimental group compared to the control group.Keywords: metaphor therapy, depression, female, students
Procedia PDF Downloads 45410750 Integrated Farming Barns as a Strategy for National Food Security
Authors: Ilma Ulfatul Janah, Ibnu Rizky Briwantara, Muhammad Afif
Abstract:
The agricultural sector is one of the sectors that contribute to national development. The benefit of the agricultural sector can be felt directly by the majority of Indonesian people. Indonesia is one of the agricultural countries and most of the people working in the agricultural sector. Hence, the agricultural sector’s become the second sector which has contributed greatly to the growth of Gross Domestic Product (GDP) after the manufacture sector. Based on the National Medium Term Development Plan (RPJMN) from 2015 to 2019, one of the targets to be achieved by the Indonesian government is rice’s self-sufficient. Rice is the main food commodities which as most people in Indonesia, and it is making Indonesian government attempt self-sufficient in rice. Indonesia as an agricultural country becomes one of the countries that have a lower percentage of food security than other ASEAN countries. Rice self-sufficiency can be created through agricultural productivity and the availability of a market for the output. There are some problems still to be faced by the farmers such as farmer exchange rate is low. The low exchange rate of farmers showed that the level of the welfare’s Indonesian farmers is still low. The aims of this paper are to resolve problems related to food security and improve the welfare of the national rice farmers. The method by using materials obtained from the analysis of secondary data with the descriptive approach and conceptual framework. Integrated Farmers barn raising rice production is integrated and managed by the government coupled with the implementation of technology in the form of systems connected and accessible to farmers, namely 'SIBUNGTAN'.Keywords: agriculture, self-sufficiency, technology, productivity
Procedia PDF Downloads 25310749 Identifying the Phases of Indian Agriculture Towards Desertification: An Introspect of Karnataka State, India
Authors: Arun Das
Abstract:
Indian agriculture is acclaimed from the dates of Indus civilization (2500 BC). Since this time until the day, there were tremendous expansion in terms of space and technology has taken place. Abrupt growth in technology took place past one and half century. Consequent to this development, the land which was brought under agriculture in the initial stages of introducing agriculture for the first time, that land is not possessing the same physical condition. Either it has lost the productive capacity or modified into semi agriculture land. On the grounds of its capacity and interwoven characteristics seven phases of agriculture scenario has been identified. Most of the land is on the march of desertification. Identifying the stages and the phase of the agriculture scenario is most relevant from the point of view of food security at regional, national and at global level. Secondly decisive measure can put back the degenerating environmental condition into arrest. GIS and Remote sensing applications have been used to identify the phases of agriculture.Keywords: agriculture phases, desertification, deforestation, foods security, transmigration
Procedia PDF Downloads 43310748 Adherence Induced Formwork Removal in Small-Scale Pull-Off Tensile Tests
Authors: Nicolas Spitz, Nicolas Coniglio, Mohamed El Mansori, Alex Montagne, Sabeur Mezghani
Abstract:
Nowadays buildings' construction is performed by pouring concrete into molds referred to as formworks that are usually prefabricated metallic modules. Defects such as stripping may possibly form during the removal of the formwork if the interfacial bonding between the concrete and the formwork is high. A new pull-off tensile test was developed in our laboratory to simulate small-scale formwork removals. The concrete-to-formwork adherence force was measured on bare and coated formworks with different surface signatures. The used concrete was a mixture largely used on building sites and contains CEM I Portland cement and calcareous filler. The concrete surface appearance and the type of failures at the concrete-formwork interface have been investigated. The originality of this near-to-surface test was to compare the laboratory-measured adherence forces to the on-site observations. Based upon the small-scale laboratory test results, functional formwork specifications with low adherence to concrete was proposed in terms of superficial signature characteristics.Keywords: concrete-formwork adherence, interfacial bonding, skin formwork functionality, small-scale pull-off tensile test
Procedia PDF Downloads 24710747 A Multilevel Authentication Protocol: MAP in VANET for Human Safety
Authors: N. Meddeb, A. M. Makhlouf, M. A. Ben Ayed
Abstract:
Due to the real-time requirement of message in Vehicular Ad hoc NETworks (VANET), it is necessary to authenticate vehicles to achieve security, efficiency, and conditional privacy-preserving. Privacy is of utmost relevance in VANETs. For this reason, we have proposed a new protocol called ‘Multilevel Authentication Protocol’ (MAP) that considers different vehicle categories. The proposed protocol is based on our Multilevel Authentication protocol for Vehicular networks (MAVnet). But the MAP leads to human safety, where the priority is given to the ambulance vehicles. For evaluation, we used the Java language to develop a demo application and deployed it on the Network Security Simulation (Nessi2). Compared with existing authentication protocols, MAP markedly enhance the communication overhead and decreases the delay of exchanging messages while preserving conditional privacy.Keywords: Vehicular Ad hoc NETworks (VANET), vehicle categories, safety, databases, privacy, authentication, throughput, delay
Procedia PDF Downloads 29910746 A Critical Discourse Analysis: Embedded Inequalities in the UK Disability Social Security System
Authors: Cara Williams
Abstract:
In 2006, the UK Labour government published a Green Paper introducing Employment and Support Allowance (ESA) as a replacement for Incapacity Benefit (IB), as well as a new Work Capability Assessment (WCA); signalling a controversial political and economic shift in disability welfare policy. In 2016, the Conservative government published Improving Lives: The Work, Health, and Disability Green Paper, as part of their social reform agenda, evidently to address the ‘injustice’ of the ‘disability employment gap’. This paper contextualises ESA in the wider ideology and rhetoric of ‘welfare to work’, ‘dependency’ and ‘responsibility’. Using the British ‘social model of disability’ as a theoretical framework, the study engages in a critical discourse analysis of these two Green Papers. By uncovering the medicalised conceptions embedded in the texts, the analysis has revealed ESA is linked with late capitalisms concern with the ‘disability category’.Keywords: disability, employment, social security, welfare
Procedia PDF Downloads 16810745 Happiness of Undergraduate Nursing Students, College of Nursing, Ratchaburi, Thailand
Authors: Paveenapat Nithitantiwat, Kwanjai Pataipakaipet
Abstract:
The purpose of this research was to study the happiness level of nursing students, Boromarajonani College of nursing, Ratchaburi, Thailand. A purposive sampling of 652 first to four-year nursing students was used. This research is descriptive research. The instruments were questionnaires that developed by the researcher. It included the demographic data and nursing student’s perception about healthcare, safety, life security, family, proud of oneself, education and activities, dormitories and environment in college, and how to improve their happiness. Frequencies, percentage, mean, and T-test is used to analysis the data. The results of the research have shown that family and moral value was an important thing in nursing student’s life. In addition, the mean of the happiness level was a high level. The first year nursing students had the higher mean score of the happiness level than the fourth year, second year, and the third year, respectively. Therefore, nursing students would realize that the important things in their life are family and Buddhism’s teaching. In addition, dharma is guideline how to be both academic achievements and successful in life.Keywords: happiness, nursing students, nursing students’ perceptions, bachelor program
Procedia PDF Downloads 32810744 Internal Displacement in Iraq due to ISIS Occupation and Its Effects on Human Security and Coexistence
Authors: Feisal Khudher Mahmood, Abdul Samad Rahman Sultan
Abstract:
Iraq had been a diverse society with races, cultures and religions that peacefully coexistence. The phenomenon of internal displacement occurred after April 2003, because of political instability as will as the deterioration of the political and security situation as a result of United States of America occupation. Biggest internal displacement have occurred (and keep happening) since 10th of June 2014 due to rise of Islamic State of Iraq and Syria (ISIS) and it’s occupation of one third of country territories. This crisis effected directly 3,275,000 people and reflected negatively on the social fabric of Iraq community and led to waves of sectorial violence that swept the country. Internal displaced communities are vulnerable, especially under non functional and weak government, that led to lose of essential human rights and dignity. Using Geographic Information System (GIS) and Geospatial Techniques, two types of internal displacement have been found; voluntary and forced. Both types of displacement are highly influenced by location, race and religion. The main challenge for Iraqi government and NGOs will be after defeating ISIS. Helping the displaced to resettle within their community and to re-establish the coexistence. By spatial-statical analysis hot spots of future conflicts among displaced community have been highlighted. This will help the government to tackle future conflicts before they occur. Also, it will be the base for social conflict early warning system.Keywords: internal displacement, Iraq, ISIS, human security, human rights, GIS, spatial-statical analysis
Procedia PDF Downloads 52610743 Management and Agreement Protocol in Computer Security
Authors: Abdulameer K. Hussain
Abstract:
When dealing with a cryptographic system we note that there are many activities performed by parties of this cryptographic system and the most prominent of these activities is the process of agreement between the parties involved in the cryptographic system on how to deal and perform the cryptographic system tasks to be more secure, more confident and reliable. The most common agreement among parties is a key agreement and other types of agreements. Despite the fact that there is an attempt from some quarters to find other effective agreement methods but these methods are limited to the traditional agreements. This paper presents different parameters to perform more effectively the task of the agreement, including the key alternative, the agreement on the encryption method used and the agreement to prevent the denial of the services. To manage and achieve these goals, this method proposes the existence of an control and monitoring entity to manage these agreements by collecting different statistical information of the opinions of the authorized parties in the cryptographic system. These statistics help this entity to take the proper decision about the agreement factors. This entity is called Agreement Manager (AM).Keywords: agreement parameters, key agreement, key exchange, security management
Procedia PDF Downloads 42310742 A Verification Intellectual Property for Multi-Flow Rate Control on Any Single Flow Bus Functional Model
Authors: Pawamana Ramachandra, Jitesh Gupta, Saranga P. Pogula
Abstract:
In verification of high volume and complex packet processing IPs, finer control of flow management aspects (for example, rate, bits/sec etc.) per flow class (or a virtual channel or a software thread) is needed. When any Software/Universal Verification Methodology (UVM) thread arbitration is left to the simulator (e.g., Verilog Compiler Simulator (VCS) or Incisive Enterprise Simulator core simulation engine (NCSIM)), it is hard to predict its pattern of resulting distribution of bandwidth by the simulator thread arbitration. In many cases, the patterns desired in a test scenario may not be accomplished as the simulator might give a different distribution than what was required. This can lead to missing multiple traffic scenarios, specifically deadlock and starvation related. We invented a component (namely Flow Manager Verification IP) to be intervening between the application (test case) and the protocol VIP (with UVM sequencer) to control the bandwidth per thread/virtual channel/flow. The Flow Manager has knobs visible to the UVM sequence/test to configure the required distribution of rate per thread/virtual channel/flow. This works seamlessly and produces rate stimuli to further harness the Design Under Test (DUT) with asymmetric inputs compared to the programmed bandwidth/Quality of Service (QoS) distributions in the Design Under Test.Keywords: flow manager, UVM sequencer, rated traffic generation, quality of service
Procedia PDF Downloads 10110741 Bending and Shear Characteristics of Hollowcore Slab with Polystyrene Forms
Authors: Kang Kun Lee
Abstract:
New I-slab system with polystyrene forms and precast concrete deck is proposed to reduce the construction period and the self-weight of the slab. This paper presents experimental works on the bending and shear of the I-slabs. Five specimens were tested. The main parameters of experiments are diameters of the holes made by polystyrene form and the thickness of slab. Structural performance of I-slab is evaluated on the basis of failure mode, load-displacement curve, and ultimate strengths. Based on the test results, it is found that the critical punching shear sections are changed as the test variables are different, hence resulting in the varied punching shear strengths. Test results indicate that the developed I-slab is very effective to increase the strength due to self-weight reduction.Keywords: hollowcore slab, section force-deformation response, precast concrete deck
Procedia PDF Downloads 39010740 The Internationalization of Capital Market Influencing Debt Sustainability's Impact on the Growth of the Nigerian Economy
Authors: Godwin Chigozie Okpara, Eugine Iheanacho
Abstract:
The paper set out to assess the sustainability of debt in the Nigerian economy. Precisely, it sought to determine the level of debt sustainability and its impact on the growth of the economy; whether internationalization of capital market has positively influenced debt sustainability’s impact on economic growth; and to ascertain the direction of causality between external debt sustainability and the growth of GDP. In the light of these objectives, ratio analysis was employed for the determination of debt sustainability. Our findings revealed that the periods 1986 – 1994 and 1999 – 2004 were periods of severe unsustainable borrowing. The unit root test showed that the variables of the growth model were integrated of order one, I(1) and the cointegration test provided evidence for long run stability. Considering the dawn of internationalization of capital market, the researcher employed the structural break approach using Chow Breakpoint test on the vector error correction model (VECM). The result of VECM showed that debt sustainability, measured by debt to GDP ratio exerts negative and significant impact on the growth of the economy while debt burden measured by debt-export ratio and debt service export ratio are negative though insignificant on the growth of GDP. The Cho test result indicated that internationalization of capital market has no significant effect on the debt overhang impact on the growth of the Economy. The granger causality test indicates a feedback effect from economic growth to debt sustainability growth indicators. On the bases of these findings, the researchers made some necessary recommendations which if followed religiously will go a long way to ameliorating debt burdens and engendering economic growth.Keywords: debt sustainability, internalization, capital market, cointegration, chow test
Procedia PDF Downloads 43710739 Switched Uses of a Bidirectional Microphone as a Microphone and Sensors with High Gain and Wide Frequency Range
Authors: Toru Shionoya, Yosuke Kurihara, Takashi Kaburagi, Kajiro Watanabe
Abstract:
Mass-produced bidirectional microphones have attractive characteristics. They work as a microphone as well as a sensor with high gain over a wide frequency range; they are also highly reliable and economical. We present novel multiple functional uses of the microphones. A mathematical model for explaining the high-pass-filtering characteristics of bidirectional microphones was presented. Based on the model, the characteristics of the microphone were investigated, and a novel use for the microphone as a sensor with a wide frequency range was presented. In this study, applications for using the microphone as a security sensor and a human biosensor were introduced. The mathematical model was validated through experiments, and the feasibility of the abovementioned applications for security monitoring and the biosignal monitoring were examined through experiments.Keywords: bidirectional microphone, low-frequency, mathematical model, frequency response
Procedia PDF Downloads 54610738 Politics of Violence and Terrorism in the Nigeria Democracy and Its Implications on National Peace and Security
Authors: Felix O. Akinboyewa
Abstract:
To say that Nigeria is faced with the problem of domestic terrorism is to say the obvious. The spate of political assassination during the fourth republic (1999-2010) is representative of what has become a growing trend. In this research, an attempt was made to examine the problems of political assassination within the context of significant categories of domestic-related terrorism in Nigeria Democracy. The central questions are: What exactly are the nature of political violence and terrorist act in the Nigeria nascent democracy? Was there any factor responsible for the politics of violence and terrorist act in the Nigeria democracy? What implications can the political violence and terrorist act have on democratic consolidation, national peace, and security? What solutions can be proffered to eradicate terrorist act and political violence in the Nigeria democracy? The study adopted a descriptive survey design which falls within the empirical research methodology. The sample size of the study consisted of 220 subjects randomly selected. The main instruments used were questionnaire and interview schedule. Data generated from the study were analyzed using descriptive statistics such as percentage and tables. The research findings showed that unemployed youths and the members of Nigeria Union of Road Transport Workers (NURTW) were the major actors in political violence in Nigeria. They have access to weapons and ammunitions which they use to terrorize the populace. The research showed that factors responsible for the political violence and terrorism in Nigeria are: poor electoral administration; election rigging; poor security system; religious and ethnic sentiment; problems of poverty and unemployment; over-exuberance and low level of education. The study also showed that electoral violence affects smooth running democracy in Nigeria. On the measures to be taken to eradicate political violence and terrorism in Nigeria, the research showed that provision of employment opportunities would go a long way to solving the problem. Civil society as an important institution can help to reduce incidence of political violence in Nigeria. Also, government has greater role to play. The study concludes that adherence to the proffered suggestions would reduce the level of political violence and terrorist act in Nigeria.Keywords: consolidation, democracy, peace, security, terrorism, violence
Procedia PDF Downloads 12410737 Perceived Risks in Business-to-Consumer Online Contracts: An Empirical Study in Saudi Arabia
Authors: Shaya Alshahrani
Abstract:
Perceived risks play a major role in consumer intentions, behaviors, attitudes, and decisions about online shopping in the KSA. This paper investigates the influence of six perceived risk dimensions on Saudi consumers: product risk, information risk, financial risk, privacy and security risk, delivery risk, and terms and conditions risk empirically. To ensure the success of this study, a random survey was distributed to reflect the consumers’ perceived risk and to enable the generalization of the results. Data were collected from 323 respondents in the Kingdom of Saudi Arabia (KSA): 50 who had never shopped online and 273 who had done so. The results indicated that all six risks influenced the respondents’ perceptions of online shopping. The non-online shoppers perceived financial and delivery risks as the most significant barriers to online shopping. This was followed closely by performance, information, and privacy and security risks. Terms and conditions were perceived as less significant. The online consumers considered delivery and performance risks to be the most significant influences on internet shopping. This was followed closely by information and terms and conditions. Financial and privacy and security risks were perceived as less significant. This paper argues that introducing adequate legal solutions to addressing related problems arising from this study is an urgent need. This may enhance consumer trust in the KSA online market, increase consumers’ intentions regarding online shopping, and improve consumer protection.Keywords: perceived risk, online contracts, Saudi Arabia, consumer protection
Procedia PDF Downloads 14910736 Implementation and Performance Analysis of Data Encryption Standard and RSA Algorithm with Image Steganography and Audio Steganography
Authors: S. C. Sharma, Ankit Gambhir, Rajeev Arya
Abstract:
In today’s era data security is an important concern and most demanding issues because it is essential for people using online banking, e-shopping, reservations etc. The two major techniques that are used for secure communication are Cryptography and Steganography. Cryptographic algorithms scramble the data so that intruder will not able to retrieve it; however steganography covers that data in some cover file so that presence of communication is hidden. This paper presents the implementation of Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) Algorithm with Image and Audio Steganography and Data Encryption Standard (DES) Algorithm with Image and Audio Steganography. The coding for both the algorithms have been done using MATLAB and its observed that these techniques performed better than individual techniques. The risk of unauthorized access is alleviated up to a certain extent by using these techniques. These techniques could be used in Banks, RAW agencies etc, where highly confidential data is transferred. Finally, the comparisons of such two techniques are also given in tabular forms.Keywords: audio steganography, data security, DES, image steganography, intruder, RSA, steganography
Procedia PDF Downloads 29110735 Organization’s Ethics, Job Performance Satisfaction and Effects on Employees’ Engagement and Commitment
Authors: Anunya Thanasrisuebwong
Abstract:
This research paper aimed to find out how was the ethical climate in an organization and job performance satisfaction of employees affected employees’ engagement and commitment by using the case study of PTT Exploration and Production Public Company Limited, Thailand. The population of this research was 4,383 Thai employees of PTTEP, Thailand. From a total of 420 questionnaires sent out, 345 respondents replied. The statistics utilized was mean score and Multiple Regression Analysis. The findings revealed that the respondents had opinion towards ethical climate of their organization, job performance satisfaction and organization engagement and commitment at a high level. The test of hypothesis disclosed the determinant attributes of job performance satisfaction that affected the respondents’ overall level of organization engagement and commitment. The set of these determinant attributes consisted of employees’ responsibilities for duties, organization’s policies and practice, relationship with organization’s commanders, work security and stability, job description, career path and relationship with colleagues. These variables were able to predict the employees’ organization engagement and commitment at 50.6 percent.Keywords: ethical climate in organization, job performance satisfaction, organization engagement, commitment
Procedia PDF Downloads 28910734 Long-Run Relationship among Tehran Stock Exchange and the GCC Countries Financial Markets, Before and After 2007/2008 Financial Crisis
Authors: Mohammad Hossein Ranjbar, Mahdi Bagheri, B. Shivaraj
Abstract:
This study attempts to investigate the relationship between stock market of Iran and GCC countries stock exchanges. Eight markets were included: the stock market of Iran, Kuwait, Bahrain, Qatar, Saudi Arabia, Dubai, Abu Dhabi and Oman. Daily country market indices were collected from January 2005 to December 2010. The potential time-varying behaviors of long-run stock market relationship among selected markets are tested applying correlation test, Augmented Dick Fuller test (ADF), Bilateral and Multilateral Cointegration (Johansen), and the Granger Causality test. The findings suggest that stock market of Iran is negatively correlated with most of the selected markets in the whole duration. But contemporaneous correlations among the eight selected markets are increased positively in period of financial crises. Bilateral Cointegration between selected markets suggests that there is no integration between Tehran stock exchange and other selected markets. Among other markets, except the stock market of Dubai and Abu Dhabi as a one pair, are not cointegrated in whole, but in duration of financial crises integration between selected markets are increased. Finally, investigation of the casual relationship among eight financial markets suggests there are unidirectional and bidirectional causal relationship among some of stock market indices.Keywords: financial crises, Middle East, stock market integration, Granger Causality test, ARDL test
Procedia PDF Downloads 39710733 Evaluating the Effect of Nursing Ethics Education on Nursing Students' Sensitivity and Moral Judgments
Authors: Hsiao Lu Lee
Abstract:
This study was based Quasi-experimental design. The study explored the relationships of nursing ethics education, nursing students’ moral sensitivity and moral judgments in Taiwan. A total of 242 nursing students (NS) participated the study.The proposed teaching nursing ethics from 2 to 16 weeks. Three questionnaires were adopted in this study. First, Demographic of nursing students questionnaire; Second, the questionnaire is Taiwan’s Moral Sensitivity Questionnaire for Student Nurses (TMMSQ-SN); Third, Defining Issues Test (DIT). The pre-test data were collected during the first week, and the post-test data was collected during the 17ᵗʰ week of the semester. The purpose of the study is explored evaluating the effect of nursing ethics education on nursing students’ moral sensitivity and moral judgments. The results of the study showed that moral sensitivities and moral judgments have been significantly improved after 16 weeks (Pair-t=--11.10***; Pair-t=-7.393***). Moral sensitivities and moral judgments were significant in the pretest. There was a negative correlation, but there was no correlation between moral sensitivity and moral judgments in the post-test. There was a significant correlation between the moral judgments (DIT)and the hours of work and other ethical courses (r=.28**; r=.015*). Nursing ethics education is necessary for nursing students in Taiwan. The nursing ethics courses are necessary to improve nursing students’ moral sensitivity and moral judgment (DIT).Keywords: defining issues test, moral judgments, moral sensitivity, nursing ethics education, nursing students
Procedia PDF Downloads 27710732 The Use of Rice Husk Ash as a Stabilizing Agent in Lateritic Clay Soil
Authors: J. O. Akinyele, R. W. Salim, K. O. Oikelome, O. T. Olateju
Abstract:
Rice Husk (RH) is the major byproduct in the processing of paddy rice. The management of this waste has become a big challenge to some of the rice producers, some of these wastes are left in open dumps while some are burn in the open space, and these two actions have been contributing to environmental pollution. This study evaluates an alternative waste management of this agricultural product for use as a civil engineering material. The RH was burn in a controlled environment to form Rice Husk Ash (RHA). The RHA was mix with lateritic clay at 0, 2, 4, 6, 8, and 10% proportion by weight. Chemical test was conducted on the open burn and controlled burn RHA with the lateritic clay. Physical test such as particle size distribution, Atterberg limits test, and density test were carried out on the mix material. The chemical composition obtained for the RHA showed that the total percentage compositions of Fe2O3, SiO2 and Al2O3 were found to be above 70% (class “F” pozzolan) which qualifies it as a very good pozzolan. The coefficient of uniformity (Cu) was 8 and coefficient of curvature (Cc) was 2 for the soil sample. The Plasticity Index (PI) for the 0, 2, 4, 6, 8. 10% was 21.0, 18.8, 16.7, 14.4, 12.4 and 10.7 respectively. The work concluded that RHA can be effectively used in hydraulic barriers and as a stabilizing agent in soil stabilization.Keywords: rice husk ash, pozzolans, paddy rice, lateritic clay
Procedia PDF Downloads 32610731 Genotypic Variation in the Germination Performance and Seed Vigor of Safflower (Carthamus tinctorius L.)
Authors: Mehmet Demir Kaya, Engin Gökhan Kulan, Onur İleri, Süleyman Avcı
Abstract:
Due to variation in seed size, shape and oil content of safflower cultivars, germination and emergence performance have been severely influenced by seed characteristics. This study aimed to determine genotypic variation among safflower genotypes for one thousand seed weight, oil content, germination and seed vigor using electrical conductivity (EC) and cold test. In the study, safflower lines ES37-5, ES38-4, ES43-11, ES55-14 and ES58-11 which were developed by single seed selection method, and Dinçer and Remzibey-05 were used as standard varieties. The genotypes were grown under rainfed conditions in Eskişehir, Turkey with four replications. The seeds of each genotype were subjected to standard germination and emergence test at 25°C for 10 days with four replications and 50 seeds per replicate. Electrical conductivity test was performed at 25°C for 24 h to assess the seed vigor. Also, cold test were applied to each safflower genotype at 10°C for 4 days and 25°C for 6 days. Results showed that oil content of the safflower genotypes were different. The highest oil content was determined in ES43-11 with 36.6% while the lowest was 25.9% in ES38-4. Higher germination and emergence rate were obtained from ES55-14 with 96.5% and 73.0%, respectively. There was no significant difference among the safflower genotypes for EC values. Cold test showed that ES43-11 and ES55-14 gave the maximum germination percentages. It was concluded that genotypic factors except for soil and climatic conditions play an important role for determining seed vigor because safflower genotypes grown at the same condition produced various seed vigor values.Keywords: Carthamus tinctorius L., germination, emergence, cold test, electrical conductivity
Procedia PDF Downloads 37010730 Correlation of Spirometry with Six Minute Walk Test and Grading of Dyspnoea in COPD Patients
Authors: Anand K. Patel
Abstract:
Background: Patients with COPD have decreased pulmonary functions, which in turn reflect on their day-to-day activities. Objectives: To assess the correlation between functional vital capacity (FVC) and forced expiratory volume in one second (FEV1) with 6 minutes walk test (6MWT). To correlate the Borg rating for perceived exertion scale (Borg scale) and Modified medical research council (MMRC) dyspnea scale with the 6MWT, FVC and FEV1. Method: In this prospective study total 72 patients with COPD diagnosed by the GOLD guidelines were enrolled after taking written consent. They were first asked to rate physical exertion on the Borg scale as well as the modified medical research council dyspnea scale and then were subjected to perform pre and post bronchodilator spirometry followed by 6 minute walk test. The findings were correlated by calculating the Pearson coefficient for each set and obtaining the p-values, with a p < 0.05 being clinically significant. Result: There was a significant correlation between spirometry and 6MWT suggesting that patients with lower measurements were unable to walk for longer distances. However, FVC had the stronger correlation than FEV1. MMRC scale had a stronger correlation with 6MWT as compared to the Borg scale. Conclusion: The study suggests that 6MWT is a better test for monitoring the patients of COPD. In spirometry, FVC should be used in monitoring patients with COPD, instead of FEV1. MMRC scale shows a stronger correlation than the Borg scale, and we should use it more often.Keywords: spirometry, 6 minute walk test, MMRC, Borg scale
Procedia PDF Downloads 20210729 The Use of Spirulina during Aerobic Exercise on the Performance of Immune and Consumption Indicators (A Case Study: Young Men After Physical Training)
Authors: Vahab Behmanesh
Abstract:
One of the topics that has always attracted the attention of sports medicine and sports science experts is the positive or negative effect of sports activities on the functioning of the body's immune system. In the present research, a course of aerobic running with spirulina consumption has been studied on the maximum oxygen consumption and the performance of some indicators of the immune system of men who have trained after one session of physical activity. In this research, 50 trained students were studied randomly in four groups, spirulina- aerobic, spirulina, placebo- aerobic, and control. In order to test the research hypotheses, one-way statistical method of variance (ANOVA) was used considering the significance level of a=0.005 and post hoc test (LSD). A blood sample was taken from the participants in the first stage test in fasting and resting state immediately after Bruce's maximal test on the treadmill until complete relaxation was reached, and their Vo2max value was determined through the aforementioned test. The subjects of the spirulina-aerobic running and placebo-aerobic running groups took three 500 mg spirulina and 500 mg placebo pills a day for six weeks and ran three times a week for 30 minutes at the threshold of aerobic stimulation. The spirulina and placebo groups also consumed spirulina and placebo tablets in the above method for six weeks. Then they did the same first stage test as the second stage test. Blood samples were taken to measure the number of CD4+, CD8+, NK, and the ratio of CD4+ to CD8+ on four occasions before and after the first and second stage tests. The analysis of the findings showed that: aerobic running and spirulina supplement alone increase Vo2max. Aerobic running and consumption of spirulina increases Vo2max more than other groups (P<0.05), +CD4 and hemoglobin of the spirulina-aerobic running group was significantly different from other groups (P=0.002), +CD4 of the groups together There was no significant difference, NK increased in all groups, the ratio of CD4+ to CD8+ between the groups had a significant difference (P=0.002), the ratio of CD4+ to CD8+ in the spirulina- aerobic group was lower than the spirulina and placebo groups. All in all, it can be concluded that the supplement of spirulina and aerobic exercise may increase Vo2max and improve safety indicators.Keywords: spirulina (Q2), hemoglobin (Q3), aerobic exercise (Q3), residual activity (Q2), CD4+ to CD8+ ratio (Q3)
Procedia PDF Downloads 12310728 A Second Look at Gesture-Based Passwords: Usability and Vulnerability to Shoulder-Surfing Attacks
Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier
Abstract:
For security purposes, it is important to detect passwords entered by unauthorized users. With traditional alphanumeric passwords, if the content of a password is acquired and correctly entered by an intruder, it is impossible to differentiate the password entered by the intruder from those entered by the authorized user because the password entries contain precisely the same character set. However, no two entries for the gesture-based passwords, even those entered by the person who created the password, will be identical. There are always variations between entries, such as the shape and length of each stroke, the location of each stroke, and the speed of drawing. It is possible that passwords entered by the unauthorized user contain higher levels of variations when compared with those entered by the authorized user (the creator). The difference in the levels of variations may provide cues to detect unauthorized entries. To test this hypothesis, we designed an empirical study, collected and analyzed the data with the help of machine-learning algorithms. The results of the study are significant.Keywords: authentication, gesture-based passwords, shoulder-surfing attacks, usability
Procedia PDF Downloads 13910727 A Computational Study of the Effect of Intake Design on Volumetric Efficiency for Best Performance in Motorsport
Authors: Dominic Wentworth-Linton, Shian Gao
Abstract:
This project was aimed at investigating the effect of velocity stacks on the intakes of internal combustion engines for motorsport applications. The intake systems in motorsport are predominantly fuel injection with a plate mounted for the stacks. Using Computational Fluid Dynamics software, the relationship between the stack length and power and torque delivery across the engine’s rev range was investigated and the results were used to choose the best option for its intended motorsport discipline. The test results are expected to vary with engine geometry and its natural manufacturer characteristics. The test was also relevant in bridging between computational data and real simulation as the results show flow, pressure and velocity readings but the behaviour of the engine is inferred from the nature of each test. The results of the data analysis were tested in a real-life simulation on a dynamometer to prove the theory of stack length on power and torque delivery, which helps determine the most suitable stack for the Vauxhall engine for rallying in the Caribbean.Keywords: CFD simulation, Internal combustion engine, Intake system, Dynamometer test
Procedia PDF Downloads 285