Search results for: communication with physical layer security
12817 A Decision-Support Tool for Humanitarian Distribution Planners in the Face of Congestion at Security Checkpoints: A Real-World Case Study
Authors: Mohanad Rezeq, Tarik Aouam, Frederik Gailly
Abstract:
In times of armed conflicts, various security checkpoints are placed by authorities to control the flow of merchandise into and within areas of conflict. The flow of humanitarian trucks that is added to the regular flow of commercial trucks, together with the complex security procedures, creates congestion and long waiting times at the security checkpoints. This causes distribution costs to increase and shortages of relief aid to the affected people to occur. Our research proposes a decision-support tool to assist planners and policymakers in building efficient plans for the distribution of relief aid, taking into account congestion at security checkpoints. The proposed tool is built around a multi-item humanitarian distribution planning model based on multi-phase design science methodology that has as its objective to minimize distribution and back ordering costs subject to capacity constraints that reflect congestion effects using nonlinear clearing functions. Using the 2014 Gaza War as a case study, we illustrate the application of the proposed tool, model the underlying relief-aid humanitarian supply chain, estimate clearing functions at different security checkpoints, and conduct computational experiments. The decision support tool generated a shipment plan that was compared to two benchmarks in terms of total distribution cost, average lead time and work in progress (WIP) at security checkpoints, and average inventory and backorders at distribution centers. The first benchmark is the shipment plan generated by the fixed capacity model, and the second is the actual shipment plan implemented by the planners during the armed conflict. According to our findings, modeling and optimizing supply chain flows reduce total distribution costs, average truck wait times at security checkpoints, and average backorders when compared to the executed plan and the fixed-capacity model. Finally, scenario analysis concludes that increasing capacity at security checkpoints can lower total operations costs by reducing the average lead time.Keywords: humanitarian distribution planning, relief-aid distribution, congestion, clearing functions
Procedia PDF Downloads 7412816 The Influence of the Geogrid Layers on the Bearing Capacity of Layered Soils
Authors: S. A. Naeini, H. R. Rahmani, M. Hossein Zade
Abstract:
Many classical bearing capacity theories assume that the natural soil's layers are homogenous for determining the bearing capacity of the soil. But, in many practical projects, we encounter multi-layer soils. Geosynthetic as reinforcement materials have been extensively used in the construction of various structures. In this paper, numerical analysis of the Plate Load Test (PLT) using of ABAQUS software in double-layered soils with different thicknesses of sandy and gravelly layers reinforced with geogrid was considered. The PLT is one of the common filed methods to calculate parameters such as soil bearing capacity, the evaluation of the compressibility and the determination of the Subgrade Reaction module. In fact, the influence of the geogrid layers on the bearing capacity of the layered soils is investigated. Finally, the most appropriate mode for the distance and number of reinforcement layers is determined. Results show that using three layers of geogrid with a distance of 0.3 times the width of the loading plate has the highest efficiency in bearing capacity of double-layer (sand and gravel) soils. Also, the significant increase in bearing capacity between unreinforced and reinforced soil with three layers of geogrid is caused by the condition that the upper layer (gravel) thickness is equal to the loading plate width.Keywords: bearing capacity, reinforcement, geogrid, plate load test, layered soils
Procedia PDF Downloads 16112815 CyberSecurity Malaysia: Towards Becoming a National Certification Body for Information Security Management Systems Internal Auditors
Authors: M. S. Razana, Z. W. Shafiuddin
Abstract:
Internal auditing is one of the most important activities for organizations that implement information security management systems (ISMS). The purpose of internal audits is to ensure the ISMS implementation is in accordance to the ISO/IEC 27001 standard and the organization’s own requirements for its ISMS. Competent internal auditors are the main element that contributes to the effectiveness of internal auditing activities. To realize this need, CyberSecurity Malaysia is now in the process of becoming a certification body that certifies ISMS internal auditors. The certification scheme will assess the competence of internal auditors in generic knowledge and skills in management systems, and also in ISMS-specific knowledge and skills. The certification assessment is based on the ISO/IEC 19011 Guidelines for auditing management systems, ISO/IEC 27007 Guidelines for information security management systems auditing and ISO/IEC 27001 Information security management systems requirements. The certification scheme complies with the ISO/IEC 17024 General requirements for bodies operating certification systems of persons. Candidates who pass the exam will be certified as an ISMS Internal Auditor, whose competency will be evaluated every three years.Keywords: ISMS internal audit, ISMS internal auditor, ISO/IEC 17024, competence, certification
Procedia PDF Downloads 22612814 An Effective and Efficient Web Platform for Monitoring, Control, and Management of Drones Supported by a Microservices Approach
Authors: Jorge R. Santos, Pedro Sebastiao
Abstract:
In recent years there has been a great growth in the use of drones, being used in several areas such as security, agriculture, or research. The existence of some systems that allow the remote control of drones is a reality; however, these systems are quite simple and directed to specific functionality. This paper proposes the development of a web platform made in Vue.js and Node.js to control, manage, and monitor drones in real time. Using a microservice architecture, the proposed project will be able to integrate algorithms that allow the optimization of processes. Communication with remote devices is suggested via HTTP through 3G, 4G, and 5G networks and can be done in real time or by scheduling routes. This paper addresses the case of forest fires as one of the services that could be included in a system similar to the one presented. The results obtained with the elaboration of this project were a success. The communication between the web platform and drones allowed its remote control and monitoring. The incorporation of the fire detection algorithm in the platform proved possible a real time analysis of the images captured by the drone without human intervention. The proposed system has proved to be an asset to the use of drones in fire detection. The architecture of the application developed allows other algorithms to be implemented, obtaining a more complex application with clear expansion.Keywords: drone control, microservices, node.js, unmanned aerial vehicles, vue.js
Procedia PDF Downloads 12812813 The Impact of Community Settlement on Leisure Time Use and Body Composition in Determining Physical Lifestyles among Women
Authors: Mawarni Mohamed, Sharifah Shahira A. Hamid
Abstract:
Leisure time is an important component to offset the sedentary lifestyle of the people. Women tend to benefit from leisure activities not only to reduce stress but also to provide opportunities for well-being and self-satisfaction. This study was conducted to investigate body composition and leisure time use among women in Selangor from the influences of community settlement. A total of 419 women aged 18-65 years were selected to participate in this study. Descriptive statistics, t-test and ANOVA were used to analyze the level of physical activity and the relationship between leisure-time use and body composition were made to analyze the physical lifestyles. The results showed that women with normal body composition seem to be involved in more passive activities than women with less weight gain and obesity. Thus, the study recommended that the government and other health and recreational agencies should develop more places and activities suitable for leisure preference for women in their community settlement so they become more interested to engage in more active recreational and physical activities.Keywords: body composition, community settlement, leisure time, physical lifestyles
Procedia PDF Downloads 44512812 Unsteady Natural Convection in a Square Cavity Partially Filled with Porous Media Using a Thermal Non-Equilibrium Model
Authors: Ammar Alsabery, Habibis Saleh, Norazam Arbin, Ishak Hashim
Abstract:
Unsteady natural convection and heat transfer in a square cavity partially filled with porous media using a thermal non-equilibrium model is studied in this paper. The left vertical wall is maintained at a constant hot temperature and the right vertical wall is maintained at a constant cold temperature, while the horizontal walls are adiabatic. The governing equations are obtained by applying the Darcy model and Boussinesq approximation. COMSOL's finite element method is used to solve the non-dimensional governing equations together with specified boundary conditions. The governing parameters of this study are the Rayleigh number, the modified thermal conductivity ratio, the inter-phase heat transfer coefficien and the time independent. The results presented for values of the governing parameters in terms of streamlines in both fluid/porous layer, isotherms of fluid and solid porous layer, isotherms of fluid layer, and average Nusselt number.Keywords: unsteady natural convection, thermal non-equilibrium model, Darcy model
Procedia PDF Downloads 36912811 Solvent-Free Conductive Coatings Containing Chemically Coupled Particles for Functional Textiles
Authors: Jagadeshvaran P. L., Kamlesh Panwar, Indumathi Ramakrishnan, Suryasarathi Bose
Abstract:
The surge in the usage of wireless electronics and communication devices has engendered a different form of pollution, viz. the electromagnetic (EM) pollution and yet another serious issue, electromagnetic interference (EMI). There is a legitimate need to develop strategies and materials to combat this issue, otherwise leading to dreadful consequences. Functional textiles have emerged as the modern materials to help attenuate EM waves due to the numerous advantages – flexibility being the most important. In addition to this, there is an inherent advantage of multiple interfaces in coated fabrics that can engender significant attenuation. Herein we report a coating having multifunctional properties – capable of blocking both UV and EM radiation (predominantly of the microwave frequencies) with flame-retarding properties. The layer described here comprises iron titanate(FT) synthesized from its sustainable precursor – ilmenite sand and carbon nanotubes (CNT) dispersed in waterborne polyurethane. It is worth noting that FT's use as a multifunctional material is being reported for the first time. It was observed that a single layer of coated fabric shows EMI shielding effectiveness of -40 dB translating to 99.99% attenuation and similarly a UV blocking of 99.99% in the wavelength ranging from 200-400 nm. The microwave shielding properties of the fabric were demonstrated using a Bluetooth module – where the coated fabric was able to block the incoming Bluetooth signals to the module from a mobile phone. Besides, the coated fabrics exhibited phenomenal enhancement in thermal stability - a five percent increase in the limiting oxygen index (LOI) was observed upon the application of the coating. Such exceptional properties complement cotton fabrics' existing utility, thereby extending their use to specialty applications.Keywords: multifunctional coatings, EMI shielding, UV blocking, iron titanate, CNT, waterborne polyurethane, cotton fabrics
Procedia PDF Downloads 10312810 A Potential Spin-orbit Torque Device Using the Tri-layer Structure
Authors: Chih-Wei Cheng, Wei-Jen Chan, Yu-Han Huang, Yi-Tsung Lin, Yen-Wei Huang, Min-Cheng Chen, Shou-Zen Chang, G. Chern, Yuan-Chieh Tseng
Abstract:
How to develop spin-orbit-torque (SOT) devices with the virtues of field-free, perpendicular magnetic anisotropy (PMA), and low switching current is one of the many challenges in spintronics today. We propose a CoFeB/Ta/CoFeB tri-layer antiferromagnetic SOT device that could meet the above requirements. The device’s PMA was developed by adopting CoFeB–MgO interface. The key to the success of this structure is to ensure that (i)changes of the inter-layer coupling(IEC) and CoFeB anisotropy can occur simultaneously; (ii) one of the CoFeB needs to have a slightly tilted moment in the beginning. When sufficient current is given, the SHEreverses the already-tiltedCoFeB, and the other CoFeB can be reversed simultaneously by the IEC with the field-free nature. Adjusting the thickness of Ta can modify the coupling state to reduce the switching current while the field-free nature was preserved. Micromagnetic simulation suggests that the Néel orange peel effect (NOPE) is non-negligible due to interface roughness and coupling effect in the presence of perpendicular anisotropy. Fortunately, the Néel field induced by the NOPE appears to favor the field-free reversal.Keywords: CoFeB, spin-orbit torque, antiferromagnetic, MRAM, trilayer
Procedia PDF Downloads 9912809 The Ontological Memory in Bergson as a Conceptual Tool for the Analysis of the Digital Conjuncture
Authors: Douglas Rossi Ramos
Abstract:
The current digital conjuncture, called by some authors as 'Internet of Things' (IoT), 'Web 2.0' or even 'Web 3.0', consists of a network that encompasses any communication of objects and entities, such as data, information, technologies, and people. At this juncture, especially characterized by an "object socialization," communication can no longer be represented as a simple informational flow of messages from a sender, crossing a channel or medium, reaching a receiver. The idea of communication must, therefore, be thought of more broadly in which it is possible to analyze the process communicative from interactions between humans and nonhumans. To think about this complexity, a communicative process that encompasses both humans and other beings or entities communicating (objects and things), it is necessary to constitute a new epistemology of communication to rethink concepts and notions commonly attributed to humans such as 'memory.' This research aims to contribute to this epistemological constitution from the discussion about the notion of memory according to the complex ontology of Henri Bergson. Among the results (the notion of memory in Bergson presents itself as a conceptual tool for the analysis of posthumanism and the anthropomorphic conjuncture of the new advent of digital), there was the need to think about an ontological memory, analyzed as a being itself (being itself of memory), as a strategy for understanding the forms of interaction and communication that constitute the new digital conjuncture, in which communicating beings or entities tend to interact with each other. Rethinking the idea of communication beyond the dimension of transmission in informative sequences paves the way for an ecological perspective of the digital dwelling condition.Keywords: communication, digital, Henri Bergson, memory
Procedia PDF Downloads 14512808 Awareness and Perception of Food Safety, Nutrition and Food Security among Omani Women
Authors: Abeer Al Kalbani
Abstract:
Oman is a sub-tropical country with limited water resources, harsh weather and limited soil fertility, constraining food production. Therefore, it largely depends on international markets to assure supply of food. In the light of these circumstances, food security in Oman is defined as the ability of the country to grant the staple food needs of people (e.g. rice, wheat, lentil, sugar, dates, dairy products, fish and plant or vegetable oils). It also involves exporting local goods with high production rates to exchange them with required food products. This concept of food security includes the availability of food through production and/or importing, stability of the market prices during all circumstances, and the ability of people to meet their needs within their income capabilities. As a result, most of the food security work is focused on availability and access dimensions of the issue. Not much research is focused on the utilization aspect of food security in Oman. Although women play a vital role in food security, there is limited research on women’s role in food security neither in Oman nor in neighboring Gulf countries. Women play an important role not only by carrying the responsibility of feeding their families but also by setting the consumption model for the household. Therefore, the research aims to contribute to the work done on food security in Oman and similar regions of the world by studying the role women play at the utilization level. Methods used in this research include Qualitative unstructured interviews, focus groups, survey questionnaire and an experimental study. Based on the FAO definition of food security, it consists of availability, access, utilization and sustainability. Results from a pilot study conducted for this research on two groups of women in Oman; urban and rural women, showed that women in Oman are responsible for achieving these four pillars at the household level. Moreover, awareness of women increased as their educational level increased. Urban women showed more awareness and openness to adopt healthier and proper food related choices than rural women. Urban women seem also more open than rural women to new ideas and concepts and ways to healthier food. However, both urban and rural women claim that no training and educational programs are available for them and awareness of food security in general remains relatively low in both groups. In the light of these findings, this research attempts to further investigate the social beliefs, practices and attitudes women adopt in relation to food purchase, storage, preparation and consumption as considered as important parts of the food system. It also seeks to examine the effect of educational training programs and media on the level of women awareness on the issue.Keywords: food security, household food security, utilization, role of women
Procedia PDF Downloads 39412807 A Study of Recent Contribution on Simulation Tools for Network-on-Chip
Authors: Muthana Saleh Alalaki, Michael Opoku Agyeman
Abstract:
The growth in the number of Intellectual Properties (IPs) or the number of cores on the same chip becomes a critical issue in System-on-Chip (SoC) due to the intra-communication problem between the chip elements. As a result, Network-on-Chip (NoC) has emerged as a system architecture to overcome intra-communication issues. This paper presents a study of recent contributions on simulation tools for NoC. Furthermore, an overview of NoC is covered as well as a comparison between some NoC simulators to help facilitate research in on-chip communication.Keywords: WiNoC, simulation tool, network-on-chip, SoC
Procedia PDF Downloads 48612806 Problems Arising in Visual Perception: A Philosophical and Epistemological Analysis
Authors: K. A.Tharanga, K. H. H. Damayanthi
Abstract:
Perception is an epistemological concept discussed in Philosophy. Perception, in other word, vision, is one of the ways that human beings get empirical knowledge after five senses. However, we face innumerable problems when achieving knowledge from perception, and therefore the knowledge gained through perception is uncertain. what we see in the external world is not real. These are the major issues that we face when receiving knowledge through perception. Sometimes there is no physical existence of what we really see. In such cases, the perception is relative. The following frames will be taken into consideration when perception is analyzed illusions and delusions, the figure of a physical object, appearance and the reality of a physical object, time factor, and colour of a physical object. seeing and knowing become vary according to the above conceptual frames. We cannot come to a proper conclusion of what we see in the empirical world. Because the things that we see are not really there. Hence the scientific knowledge which is gained from observation is doubtful. All the factors discussed in science remain in the physical world. There is a leap from ones existence to the existence of a world outside his/her mind. Indeed, one can suppose that what he/she takes to be real is just a massive deception. However, depending on the above facts, if someone begins to doubt about the whole world, it is unavoidable to become his/her view a scepticism or nihilism. This is a certain reality.Keywords: empirical, perception, sceptisism, nihilism
Procedia PDF Downloads 12712805 Relationship of Internal Communication Channels Effecting to Job Satisfaction of Company Employees: in Rayong Province
Authors: Nititorn Ounpipat
Abstract:
The objective of this study was to find the relationship between internal communication and job satisfaction, and to find out the best communication channel to contact employees for a quality working within the operation or organizational rules. The sample size of 100% who were working as a shop floor level employee in the company. The study used the quantitative research method by distributing a structured questionnaire to collect data from 150 employees as the sample size. Inferential statistics and forward multiple regression analysis were used to analyze the results of this research. The result shows that communication channel correlated with job satisfaction. Each channel has a correlation with the satisfaction of working with the Department Board Information and All Employee / Weekly Meeting Relevance high. Since there is a correlation coefficient equal. 851 and. 840, respectively. Company Board Information, Memo, Letter, Leader, Supervisor, Friends and Email Relevance moderate as well.Keywords: internal communication channels, job satisfaction, personal feedback, Rayong province
Procedia PDF Downloads 21712804 Optimization of Thermopile Sensor Performance of Polycrystalline Silicon Film
Authors: Li Long, Thomas Ortlepp
Abstract:
A theoretical model for the optimization of thermopile sensor performance is developed for thermoelectric-based infrared radiation detection. It is shown that the performance of polycrystalline silicon film thermopile sensor can be optimized according to the thermoelectric quality factor, sensor layer structure factor, and sensor layout geometrical form factor. Based on the properties of electrons, phonons, grain boundaries, and their interactions, the thermoelectric quality factor of polycrystalline silicon is analyzed with the relaxation time approximation of the Boltzmann transport equation. The model includes the effect of grain structure, grain boundary trap properties, and doping concentration. The layer structure factor is analyzed with respect to the infrared absorption coefficient. The optimization of layout design is characterized by the form factor, which is calculated for different sensor designs. A double-layer polycrystalline silicon thermopile infrared sensor on a suspended membrane has been designed and fabricated with a CMOS-compatible process. The theoretical approach is confirmed by measurement results.Keywords: polycrystalline silicon, relaxation time approximation, specific detectivity, thermal conductivity, thermopile infrared sensor
Procedia PDF Downloads 11912803 Performance Evaluation of Distributed and Co-Located MIMO LTE Physical Layer Using Wireless Open-Access Research Platform
Authors: Ishak Suleiman, Ahmad Kamsani Samingan, Yeoh Chun Yeow, Abdul Aziz Bin Abdul Rahman
Abstract:
In this paper, we evaluate the benefits of distributed 4x4 MIMO LTE downlink systems compared to that of the co-located 4x4 MIMO LTE downlink system. The performance evaluation was carried out experimentally by using Wireless Open-Access Research Platform (WARP), where the comparison between the 4x4 MIMO LTE transmission downlink system in distributed and co-located techniques was examined. The measured Error Vector Magnitude (EVM) results showed that the distributed technique achieved better system performance compared to the co-located arrangement.Keywords: multiple-input-multiple-output (MIMO), distributed MIMO, co-located MIMO, LTE
Procedia PDF Downloads 40912802 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism
Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun
Abstract:
The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorismKeywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution
Procedia PDF Downloads 8512801 Hands-off Parking: Deep Learning Gesture-based System for Individuals with Mobility Needs
Authors: Javier Romera, Alberto Justo, Ignacio Fidalgo, Joshue Perez, Javier Araluce
Abstract:
Nowadays, individuals with mobility needs face a significant challenge when docking vehicles. In many cases, after parking, they encounter insufficient space to exit, leading to two undesired outcomes: either avoiding parking in that spot or settling for improperly placed vehicles. To address this issue, the following paper presents a parking control system employing gestural teleoperation. The system comprises three main phases: capturing body markers, interpreting gestures, and transmitting orders to the vehicle. The initial phase is centered around the MediaPipe framework, a versatile tool optimized for real-time gesture recognition. MediaPipe excels at detecting and tracing body markers, with a special emphasis on hand gestures. Hands detection is done by generating 21 reference points for each hand. Subsequently, after data capture, the project employs the MultiPerceptron Layer (MPL) for indepth gesture classification. This tandem of MediaPipe's extraction prowess and MPL's analytical capability ensures that human gestures are translated into actionable commands with high precision. Furthermore, the system has been trained and validated within a built-in dataset. To prove the domain adaptation, a framework based on the Robot Operating System (ROS), as a communication backbone, alongside CARLA Simulator, is used. Following successful simulations, the system is transitioned to a real-world platform, marking a significant milestone in the project. This real vehicle implementation verifies the practicality and efficiency of the system beyond theoretical constructs.Keywords: gesture detection, mediapipe, multiperceptron layer, robot operating system
Procedia PDF Downloads 8512800 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network
Authors: Muhammad R. Ahmed, Mohammed Aseeri
Abstract:
Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.Keywords: internal attack, wireless sensor network, network security, entropy
Procedia PDF Downloads 44512799 Customer Satisfaction for Integrated Marketing Communication in Department Store Chiang Mai Province
Authors: Teerapong Chaisen, Pornpan Puttaraksa, Chayanit Chitchai, Peeraya Somsak, Rinyaphat Kecharananta
Abstract:
This paper aims to study integrated marketing communication (IMC) of department store in Chiang Mai with the object to understand how department stores manage communication in order to inform customer and how customers react to the received information. We study the example of 300 customers both Thai and foreigners who received the given information from the department stores and the reactions of these customers. This paper shows Central festival is the top destination to visit for Thai customers. On the other hand, Central Plaza is favored by foreign customers. However, all department stores need to use more IMC to make awareness for customer.Keywords: integrated marketing communication, satisfaction, department store, consumer
Procedia PDF Downloads 30712798 Sustainable Food Systems and the Importance of Food Safety in Ensuring Sustainability
Authors: Özlem Turan, Şule Turhan
Abstract:
About 1 billion people in the world are suffering from hunger. Approximately 1.3 billion tons of produced food is wasted each year as well. While the waste of industrialized countries is 670 million tons per year, the waste per year in developing countries is estimated as 630 million tons. When evaluated in this respect, the importance of sustainability and food security can be seen clearly. Food safety is defined as taking the necessary measures and eliminating all risk arising from food. The goal of sustainable food security is, protection of consumer health, development of safe food and beverages trade nationally and internationally and to ensure reliable fair trade schemes. In this study, this study will focus on sustainable food systems and food security, by examining the food wastage and losses from environmental and economic point of views and the precautions that need to be taken will be discussed.Keywords: food, food safety, food systems, sustainability
Procedia PDF Downloads 37312797 Preparation and Characterizations of Natural Material Based Ceramic Membranes
Authors: In-Hyuck Song, Jang-Hoon Ha
Abstract:
Recently, porous ceramic membranes have attracted great interest due to their outstanding thermal and chemical stability. In this paper, we report the results of our efforts to determine whether we could prepare a diatomite-kaolin composite coating to be deposited over a sintered diatomite support layer that could reduce the largest pore size of the sintered diatomite membrane while retaining an acceptable level of permeability. We determined under what conditions such a composite coating over a support layer could be prepared without the generation of micro-cracks during drying and sintering. The pore characteristics of the sintered diatomite membranes were studied by scanning electron microscopy and capillary flow porosimetry.Keywords: ceramic membrane, diatomite, water treatment, sintering
Procedia PDF Downloads 50212796 Screening of Commonly Used Reinforcement Materials for Tomb Murals
Authors: Liping Qiu, Xiaofeng Zhang
Abstract:
In its long history, precious tomb murals suffered from various diseases due to natural and man-made destruction. The key to how to protect tomb murals is how to strengthen and protect the tomb murals. In order to maximize the life of the tomb murals, the artistic, historic, and scientific values of the tomb murals can be continued. In this paper, four kinds of traditional reinforcement materials (silicone acrylic lotion, pure acrylic lotion, polyvinyl acetate lotion, and B72) are selected to reinforce the ground support layer of tomb murals, and the reinforcement effect of each reinforcement material on the ground support layer of murals is compared and analyzed, and the best protection material is obtained.Keywords: mural, destruction cycle, reinforcement material, disease
Procedia PDF Downloads 11212795 Physical Physics: Enhancing the Learning Experience for Undergraduate Game Development Students
Authors: Y. Kavanagh, N. O'Hara, R. Palmer, P. Lowe, D. Rafferty
Abstract:
Physical Physics is a physics education methodology for games programfmes that integrates physical activity with movement tracking and modelling. It significantly enhances the learning experience and it is effective in illustrating how physics is core in games design and programming, while allowing students to be active participants and take ownership of the learning process. It has been successfully piloted with undergraduate students studying Games Development.Keywords: activity, enhanced learning, game development, physics
Procedia PDF Downloads 27812794 Money Laundering and Financing of Terrorism
Authors: Covadonga Mallada Fernández
Abstract:
Economic development and globalization of international markets have created a favourable atmosphere for the emergence of new forms of crime such as money laundering or financing of terrorism, which may contribute to destabilized and damage economic systems. In particular, money laundering have acquired great importance since the 11S attacks, what has caused on the one hand, the establishment and development of preventive measures and, on the other hand, a progressive hardening of penal measures. Since then, the regulations imposed to fight against money laundering have been viewed as key components also in the fight against terrorist financing. Terrorism, at the beginning, was a “national” crime connected with internal problems of the State (for instance the RAF in Germany or ETA in Spain) but in the last 20 years has started to be an international problem that is connected with the defence and security of the States. Therefore, the new strategic concept for the defense and security of NATO has a comprehensive list of security threats to the Alliance, such as terrorism, international instability, money laundering or attacks on cyberspace, among others. With this new concept, money laundering and terrorism has become a priority in the national defense. In this work we will analyze the methods to combat these new threats to the national security. We will study the preventive legislations to combat money laundering and financing of terrorism, the UIF that exchange information between States, and the hawala-Banking.Keywords: control of financial flows, money laundering, terrorism, financing of terrorism
Procedia PDF Downloads 44312793 A Review of Material and Methods Used in Liner Layers in Various Landfills
Authors: S. Taghvamanesh
Abstract:
Modern landfills are highly engineered containment systems that are designed to reduce the environmental and human health impacts of solid waste (trash). In modern landfills, waste is contained by a liner system. The primary goal of the liner system is to isolate the landfill contents from the environment, thereby protecting the soil and groundwater from pollution caused by the leachate of a landfill. Landfill leachate is the most serious threat to groundwater. Therefore, it is necessary to design a system that prevents the penetration of this dangerous substance into the environment. These layers are made up of two basic elements: clay and geosynthetics. Hydraulic conductivity and flexibility are two desirable properties of these materials. There are three different types of liner systems that will be discussed in this paper. According to available data, the current article analyzed materials and methods for constructing liner layers made of distinct leachates, including various harmful components and heavy metals from all around the world. Also, this study attempted to gather data on leachates for each of the sites discussed. In conclusion, every landfill requires a specific type of liner, which depends on the type of leachate that it produces daily. It should also be emphasized that, based on available data, this article focused on the number of landfills that each country or continent possesses.Keywords: landfill, liner layer, impervious layer, barrier layer
Procedia PDF Downloads 6612792 Pilot Directional Protection Scheme Using Wireless Communication
Authors: Nitish Sharma, G. G. Karady
Abstract:
This paper presents a scheme for the protection of loop system from all type of faults using the direction of fault current. The presence of distributed generation in today’s system increases the complexity of fault detection as the power flow is bidirectional. Hence, protection scheme specific to this purpose needs to be developed. This paper shows a fast protection scheme using communication which can be fiber optic or wireless. In this paper, the possibility of wireless communication for protection is studied to exchange the information between the relays. The negative sequence and positive sequence directional elements are used to determine the direction of fault current. A PSCAD simulation is presented and validated using commercial SEL relays.Keywords: smart grid protection, pilot protection, power system simulation, wireless communication
Procedia PDF Downloads 62812791 Gender Identity: Omani College Students Negotiate Their Cultural Expectations
Authors: Mohammed Alkharusi
Abstract:
This study addresses issues of gender identity faced by female and male Omani students studying at educational higher institutions. The study interviewed 16 male and female students to understand how cultural expectations of gender influence these students’ communication, and as a result how these students negotiate their gender identity to facilitate communication practices (or not) with the opposite sex. The context, focus, and theoretical underpinnings of the study are presented. Given that the researcher is also an Omani Arab, methodological and ethical challenges (e.g., recruiting and engaging with participants, and conducting semi-structured face-to-face interviews) will be discussed reflexively. The analysis found that students continued to following cultural expectations. They kept minimum interaction with the opposite sex that was illustrated by preferring to work with the same sex in group assignments only, avoiding sitting alone with the opposite sex, and not participating in academic activities. In the social context, the students started negotiating their gender identity and adopted communication practices that facilitated their social communication with the opposite sex. For example, they accepted to work with the opposite sex in different social mixed activities. In conclusion, students desired to maintain their cultural expectations but adopted certain communication practices to interact with the opposite sex.Keywords: communication, cultural expectations, gender, identity, negotiation
Procedia PDF Downloads 38112790 A Study on the Conspicuous Consumption, Involvement and Physical and Mental Health of Pet Owners
Authors: Chi-Yueh Hsu, Hsuan-Liang Hsu, Hsiu-Hui Chiang
Abstract:
This study is to explore the relationship between the conspicuous consumption, leisure involvement and physical and mental health, and to understand the prediction of conspicuous consumption and leisure involvement to physical and mental health. The data was collected and analysed by purposive sampling, and the research objects were the dog walkers in Taiwan area. A total of 300 questionnaires were issued and after shaving the invalid questionnaire, a total of 246 valid samples were collected, and the effective rate was 82%.. The data were analyzed by correlation analysis and multiple stepwise regression analysis. The results showed that there was a significant correlation between conspicuous consumption and leisure involvement, and the conspicuous consumption and leisure involvement of dog walkers have a significant impact on physical and mental health, especially in self-expression, attractiveness and centrality of leisure involvement have a significant impact on physical and mental health.Keywords: walking dog, attractiveness, self-expression, multiple stepwise regression analysis
Procedia PDF Downloads 24712789 Cooperative Robot Application in a Never Explored or an Abandoned Sub-Surface Mine
Authors: Michael K. O. Ayomoh, Oyindamola A. Omotuyi
Abstract:
Autonomous mobile robots deployed to explore or operate in a never explored or an abandoned sub-surface mine requires extreme effectiveness in coordination and communication. In a bid to transmit information from the depth of the mine to the external surface in real-time and amidst diverse physical, chemical and virtual impediments, the concept of unified cooperative robots is seen to be a proficient approach. This paper presents an effective [human → robot → task] coordination framework for effective exploration of an abandoned underground mine. The problem addressed in this research is basically the development of a globalized optimization model premised on time series differentiation and geometrical configurations for effective positioning of the two classes of robots in the cooperation namely the outermost stationary master (OSM) robots and the innermost dynamic task (IDT) robots for effective bi-directional signal transmission. In addition, the synchronization of a vision system and wireless communication system for both categories of robots, fiber optics system for the OSM robots in cases of highly sloppy or vertical mine channels and an autonomous battery recharging capability for the IDT robots further enhanced the proposed concept. The OSM robots are the master robots which are positioned at strategic locations starting from the mine open surface down to its base using a fiber-optic cable or a wireless communication medium all subject to the identified mine geometrical configuration. The OSM robots are usually stationary and function by coordinating the transmission of signals from the IDT robots at the base of the mine to the surface and in a reverse order based on human decisions at the surface control station. The proposed scheme also presents an optimized number of robots required to form the cooperation in a bid to reduce overall operational cost and system complexity.Keywords: sub-surface mine, wireless communication, outermost stationary master robots, inner-most dynamic robots, fiber optic
Procedia PDF Downloads 20412788 Comparison of Security Challenges and Issues of Mobile Computing and Internet of Things
Authors: Aabiah Nayeem, Fariha Shafiq, Mustabshra Aftab, Rabia Saman Pirzada, Samia Ghazala
Abstract:
In this modern era of technology, the concept of Internet of Things is very popular in every domain. It is a widely distributed system of things in which the data collected from sensory devices is transmitted, analyzed locally/collectively then broadcasted to network where action can be taken remotely via mobile/web apps. Today’s mobile computing is also gaining importance as the services are provided during mobility. Through mobile computing, data are transmitted via computer without physically connected to a fixed point. The challenge is to provide services with high speed and security. Also, the data gathered from the mobiles must be processed in a secured way. Mobile computing is strongly influenced by internet of things. In this paper, we have discussed security issues and challenges of internet of things and mobile computing and we have compared both of them on the basis of similarities and dissimilarities.Keywords: embedded computing, internet of things, mobile computing, wireless technologies
Procedia PDF Downloads 303