Search results for: IoT security architecture
3197 SiamMask++: More Accurate Object Tracking through Layer Wise Aggregation in Visual Object Tracking
Authors: Hyunbin Choi, Jihyeon Noh, Changwon Lim
Abstract:
In this paper, we propose SiamMask++, an architecture that performs layer-wise aggregation and depth-wise cross-correlation and introduce multi-RPN module and multi-MASK module to improve EAO (Expected Average Overlap), a representative performance evaluation metric for Visual Object Tracking (VOT) challenge. The proposed architecture, SiamMask++, has two versions, namely, bi_SiamMask++, which satisfies the real time (56fps) on systems equipped with GPUs (Titan XP), and rf_SiamMask++, which combines mask refinement modules for EAO improvements. Tests are performed on VOT2016, VOT2018 and VOT2019, the representative datasets of Visual Object Tracking tasks labeled as rotated bounding boxes. SiamMask++ perform better than SiamMask on all the three datasets tested. SiamMask++ is achieved performance of 62.6% accuracy, 26.2% robustness and 39.8% EAO, especially on the VOT2018 dataset. Compared to SiamMask, this is an improvement of 4.18%, 37.17%, 23.99%, respectively. In addition, we do an experimental in-depth analysis of how much the introduction of features and multi modules extracted from the backbone affects the performance of our model in the VOT task.Keywords: visual object tracking, video, deep learning, layer wise aggregation, Siamese network
Procedia PDF Downloads 1563196 Assessing Creative Agents: Engagement in Addressing Sustainability Challenges and Alignment with New European Bauhaus Principles
Authors: Chema Segovia, Pau Díaz-Solano, Tony Ramos Murphy
Abstract:
The PALIMPSEST project, funded by Horizon 2020 and associated with the New European Bauhaus, aims to revitalize sustainability practices in heritage landscapes through co-creation processes led by creative agents. Specifically, PALIMPSEST focuses on the pivotal roles of architecture, design, and art in addressing sustainability challenges. The project aims to demonstrate that these creative disciplines can generate a distinctive kind of value while addressing environmental needs, enhancing societal engagement, supporting foresighting activities, and increasing awareness. In the summer of 2023, Palimpsest launched an open call to select the teams that will lead the development of three creativity-based sustainability processes in three different pilot cities: Jerez de la Frontera (Spain), Lodz (Poland), and Milan (Italy). The call received 141 applications. Through a survey conducted among the candidates and an in-depth analysis of their proposals, we assessed the level of engagement that European creative agents have in tackling sustainability challenges, as well as their alignment with the principles advocated by the New European Bauhaus.Keywords: arts, architecture, co-creation, design, new European Bauhaus, sustainability
Procedia PDF Downloads 803195 Resilient Environments vs. Resilient Architects: Creativity, Practice and Education
Authors: Y. Perera, M. Pathiraja
Abstract:
Within the paradigm of 'Resilient Built-environments,' in order for architecture to be resilient, 'Resilience' should be identified as an essential component of the architect’s notion of creativity. In much simpler terms, 'Resilient Built-Environment' should necessarily be a by-product of the 'Resilient Architect.' The inherent influence of individualistic notions of creativity upon the practice had intensified the dichotomy between theory and practice unless the notion of 'Resilience' is identified as an integral component of the architect’s notion of creativity. Analysing the architectural position is an ideal way of understanding the architect’s notion of creativity, therefore, in exploring the notion of 'Resilience' and the 'Resilient Architect' within the Sri Lankan platform, the architectural positions of two renowned architects; Geoffrey Bawa and Valentine Gunasekara were explored and analysed. The architectural positions of both the architects asserted specific rules and methodologies adopted within the process of problem solving that had subsequently led to a traceable language / pattern within their architecture. The dominance of such rules within the practice could be detrimental to adaptation of theories / notions, such as 'Resilience' and the formation of the 'Resilient Architect', unless methodologies itself are flexible, robust, despite rigidity, or else the notion of 'Resilience' exist in the form of a methodological rule.Keywords: architectural position, creativity, education, practice, resilience, theory
Procedia PDF Downloads 3153194 SISSLE in Consensus-Based Ripple: Some Improvements in Speed, Security, Last Mile Connectivity and Ease of Use
Authors: Mayank Mundhra, Chester Rebeiro
Abstract:
Cryptocurrencies are rapidly finding wide application in areas such as Real Time Gross Settlements and Payments Systems. Ripple is a cryptocurrency that has gained prominence with banks and payment providers. It solves the Byzantine General’s Problem with its Ripple Protocol Consensus Algorithm (RPCA), where each server maintains a list of servers, called Unique Node List (UNL) that represents the network for the server, and will not collectively defraud it. The server believes that the network has come to a consensus when members of the UNL come to a consensus on a transaction. In this paper we improve Ripple to achieve better speed, security, last mile connectivity and ease of use. We implement guidelines and automated systems for building and maintaining UNLs for resilience, robustness, improved security, and efficient information propagation. We enhance the system so as to ensure that each server receives information from across the whole network rather than just from the UNL members. We also introduce the paradigm of UNL overlap as a function of information propagation and the trust a server assigns to its own UNL. Our design not only reduces vulnerabilities such as eclipse attacks, but also makes it easier to identify malicious behaviour and entities attempting to fraudulently Double Spend or stall the system. We provide experimental evidence of the benefits of our approach over the current Ripple scheme. We observe ≥ 4.97x and 98.22x in speedup and success rate for information propagation respectively, and ≥ 3.16x and 51.70x in speedup and success rate in consensus.Keywords: Ripple, Kelips, unique node list, consensus, information propagation
Procedia PDF Downloads 1443193 A Unified Deep Framework for Joint 3d Pose Estimation and Action Recognition from a Single Color Camera
Authors: Huy Hieu Pham, Houssam Salmane, Louahdi Khoudour, Alain Crouzil, Pablo Zegers, Sergio Velastin
Abstract:
We present a deep learning-based multitask framework for joint 3D human pose estimation and action recognition from color video sequences. Our approach proceeds along two stages. In the first, we run a real-time 2D pose detector to determine the precise pixel location of important key points of the body. A two-stream neural network is then designed and trained to map detected 2D keypoints into 3D poses. In the second, we deploy the Efficient Neural Architecture Search (ENAS) algorithm to find an optimal network architecture that is used for modeling the Spatio-temporal evolution of the estimated 3D poses via an image-based intermediate representation and performing action recognition. Experiments on Human3.6M, Microsoft Research Redmond (MSR) Action3D, and Stony Brook University (SBU) Kinect Interaction datasets verify the effectiveness of the proposed method on the targeted tasks. Moreover, we show that our method requires a low computational budget for training and inference.Keywords: human action recognition, pose estimation, D-CNN, deep learning
Procedia PDF Downloads 1433192 Quantum Inspired Security on a Mobile Phone
Authors: Yu Qin, Wanjiaman Li
Abstract:
The widespread use of mobile electronic devices increases the complexities of mobile security. This thesis aims to provide a secure communication environment for smartphone users. Some research proves that the one-time pad is one of the securest encryption methods, and that the key distribution problem can be solved by using the QKD (quantum key distribution). The objective of this project is to design an Android APP (application) to exchange several random keys between mobile phones. Inspired by QKD, the developed APP uses the quick response (QR) code as a carrier to dispatch large amounts of one-time keys. After evaluating the performance of APP, it allows the mobile phone to capture and decode 1800 bytes of random data in 600ms. The continuous scanning mode of APP is designed to improve the overall transmission performance and user experience, and the maximum transmission rate of this mode is around 2200 bytes/s. The omnidirectional readability and error correction capability of QR code gives it a better real-life application, and the features of adequate storage capacity and quick response optimize overall transmission efficiency. The security of this APP is guaranteed since QR code is exchanged face-to-face, eliminating the risk of being eavesdropped. Also, the id of QR code is the only message that would be transmitted through the whole communication. The experimental results show this project can achieve superior transmission performance, and the correlation between the transmission rate of the system and several parameters, such as the QR code size, has been analyzed. In addition, some existing technologies and the main findings in the context of the project are summarized and critically compared in detail.Keywords: one-time pad, QKD (quantum key distribution), QR code, application
Procedia PDF Downloads 1453191 A Web Service-Based Framework for Mining E-Learning Data
Authors: Felermino D. M. A. Ali, S. C. Ng
Abstract:
E-learning is an evolutionary form of distance learning and has become better over time as new technologies emerged. Today, efforts are still being made to embrace E-learning systems with emerging technologies in order to make them better. Among these advancements, Educational Data Mining (EDM) is one that is gaining a huge and increasing popularity due to its wide application for improving the teaching-learning process in online practices. However, even though EDM promises to bring many benefits to educational industry in general and E-learning environments in particular, its principal drawback is the lack of easy to use tools. The current EDM tools usually require users to have some additional technical expertise to effectively perform EDM tasks. Thus, in response to these limitations, this study intends to design and implement an EDM application framework which aims at automating and simplify the development of EDM in E-learning environment. The application framework introduces a Service-Oriented Architecture (SOA) that hides the complexity of technical details and enables users to perform EDM in an automated fashion. The framework was designed based on abstraction, extensibility, and interoperability principles. The framework implementation was made up of three major modules. The first module provides an abstraction for data gathering, which was done by extending Moodle LMS (Learning Management System) source code. The second module provides data mining methods and techniques as services; it was done by converting Weka API into a set of Web services. The third module acts as an intermediary between the first two modules, it contains a user-friendly interface that allows dynamically locating data provider services, and running knowledge discovery tasks on data mining services. An experiment was conducted to evaluate the overhead of the proposed framework through a combination of simulation and implementation. The experiments have shown that the overhead introduced by the SOA mechanism is relatively small, therefore, it has been concluded that a service-oriented architecture can be effectively used to facilitate educational data mining in E-learning environments.Keywords: educational data mining, e-learning, distributed data mining, moodle, service-oriented architecture, Weka
Procedia PDF Downloads 2353190 The Balancing Act: India and Maldives in the Quest for Regional Prosperity
Authors: Arya S. S.
Abstract:
India is one of the powerful country in the world .India and Maldives having common interests in regional security and economic growth, this relationship has seen substantial change in recent years. This paper examines the complex dynamics of this bilateral relationship, emphasizing the careful balancing act that both countries perform in order to advance regional prosperity. It looks at historical connections, geopolitical factors, and current issues like economic cooperation, climate change, and marine security. The study highlights how India's involvement in the Maldives contributes to both bilateral ties and regional stability by examining important initiatives including trade agreements and infrastructure projects. It also discusses the effects of outside factors and the necessity for both nations to strategically manage their interests. In order to contribute to a more affluent and stable Indian Ocean area, this study ultimately seeks to shed light on how India and the Maldives may cooperate to promote sustainable development while tackling security issues. The India Maldives relation is very crucial in the regional stability of Indian ocean region. The initiatives like building infrastructure, giving financial support, and establishing the India-Maldives Friendship Bridge demonstrate India's dedication to Maldivian prosperity. In addition to boosting the Maldives' economy, these investments strengthen India's clout in the area, which is essential for preserving its maritime security interests in the face of growing Chinese dominance. Both India and China involved in a strategic tug of war in order to enhance their dominance in Maldives. There are difficulties with this collaboration including, political unrest in the Maldives has occasionally resulted in changes to foreign policy, particularly under regimes that support stronger ties with China. India has expressed concern about losing strategic footholds in the Indian Ocean as a result of China's extension of influence through debt diplomacy and infrastructure projects. India must therefore strike a balance between advancing its objectives and upholding Maldivian sovereignty as well as the goals of its people and government. In summary, the partnership between India and the Maldives is a complex balancing act that is marked by cultural links, security cooperation, and economic dependency. Both countries must negotiate the complexity of international relations as they work for regional prosperity, especially in light of both internal and external factors. India and the Maldives can strengthen their positions as key actors in the changing dynamics of the Indian Ocean by promoting cooperation and communication. This would not only protect their particular interests but also help create a stable and prosperous South Asian region.Keywords: regional security, balancing act, debt trap diplomacy, strategic tug of war
Procedia PDF Downloads 143189 mm-Wave Wearable Edge Computing Module Hosted by Printed Ridge Gap Waveguide Structures: A Physical Layer Study
Authors: Matthew Kostawich, Mohammed Elmorsy, Mohamed Sayed Sifat, Shoukry Shams, Mahmoud Elsaadany
Abstract:
6G communication systems represent the nominal future extension of current wireless technology, where its impact is extended to touch upon all human activities, including medical, security, and entertainment applications. As a result, human needs are allocated among the highest priority aspects of the system design and requirements. 6G communications is expected to replace all the current video conferencing with interactive virtual reality meetings involving high data-rate transmission merged with massive distributed computing resources. In addition, the current expansion of IoT applications must be mitigated with significant network changes to provide a reasonable Quality of Service (QoS). This directly implies a high demand for Human-Computer Interaction (HCI) through mobile computing modules in future wireless communication systems. This article proposes the utilization of a Printed Ridge Gap Waveguide (PRGW) to host the wearable nodes. To the best of our knowledge, we propose for the first time a physical layer analysis within the context of a complete architecture. A thorough study is provided on the impact of the distortion of the guiding structure on the overall system performance. The proposed structure shows small latency and small losses, highlighting its compatibility with future applications.Keywords: ridge gap waveguide, edge computing module, 6G, multimedia IoT applications
Procedia PDF Downloads 703188 Securitizing Terrorism: A Critical Appraisal of Pakistan’s Counter-Terrorism Approach
Authors: Bilal Zubair
Abstract:
In a constantly challenging internal security environment, Pakistan is making ways to improvise and respond to the new variations in the pervasive phenomenon of terrorism. The state’s endeavors towards securitizing terrorism as an existential threat are both extensive and intensive which have systematically incorporated both military and non-military means. Since 2007, the military has been conducting intermittent operations and by 2014 has successfully neutralized the terrorist ability to target vital security installations and security personal. The terrorists have responded by targeting communities which are soft targets and extremely vulnerable to organized assaults. Within this context, the study aims to explain the emerging trends of terrorism in Pakistan, which multi-layered and complex developments are having far-reaching implications for state and society. With a view to explore the underlining reasons, present trends and ensuing ramifications of the emerging trends in terrorism, this study would examine the following: First, the historical processes and development of Terrorism in Pakistan; secondly the processes of securitization which include political consensus, legal frameworks and military operations against the terrorist groups; thirdly , the socio-cultural dimensions and geopolitical influences on the transforming nature of sectarian terrorism. The study will also highlight the grey areas and weak links in the ongoing securitization process. Finally, the study will thoroughly explore the societal insecurity which is manifested in internal displacements, identity crisis and weakening the socio-political fabric of the state.Keywords: counter-terrorism, terrorism, sectarianism, securitizing
Procedia PDF Downloads 2973187 Occupational Safety Need Analysis for Turkey and Europe
Authors: Ismail Muratoglu, Ahmet Meyveci, Abdurrahman Tuncer, Erkan Demirci
Abstract:
This study is dedicated to the analysis of the problems of occupational safety in Turkey, Italy and Poland. The need analysis was applied to three different countries which are Turkey; 4, Poland; 1, Italy; 1 state. The number of the subjects is 891 in Turkey. The number of the subjects is 26 in Italy and the number of the subjects is 19 in Poland. The total number of samples of study is 936. Four different forms (Job Security Experts Form, Student Form, Teacher Form and Company Form) were applied. Results of experts of job security forms are rate of 7.1%. Then, the students’ forms are rate of 34.3%, teacher or instructor forms are rate of 9.9%. The last corporation forms are rate of 48.7%.Keywords: Europe, need analysis, occupational safety, Turkey, vocational education
Procedia PDF Downloads 4293186 Nutritional Evaluation and the Importance of Traditional Vegetables That Sustain the Indigenous People of Malaysia
Authors: Rachel Thomas Tharmabalan
Abstract:
The growing unease over the matter of food security in the world is the result of a maturing realization that the genetic base of most human caloric intake from plants is dangerously narrow. Malaysia’s tropical rainforests have the potential to contribute to diet diversification and provide a source of nutrient-rich food as the Orang Asli communities in Malaysia have relied almost entirely on the jungle for food, fodder, medicine and fuel antithetical to what is happening today. This segregation of the Orang Asli from traditional lands and resources leads to severe loss of knowledge of biodiversity. In order to preserve these wild edibles, four different types of vegetables that are frequently consumed by the Orang Asli which consists of Rebu, Meranti, Saya and Pama were selected. These vegetables were then analysed to determine its proximate and mineral content to help ascertain claims and reaffirm the impact it can play in ensuring food and nutrition security, in addition to combating chronic diseases. From the results obtained, the Meranti had the highest crude fiber, iron and calcium content. Other minerals such as potassium, magnesium and copper were also found in varying content. These wild edibles could also contribute to education and bring awareness to younger generations as well as urban populations to start consuming more of these in their daily life as it could prevent various chronic diseases in Malaysia.Keywords: food and nutrition security, Orang Asli, underutilized plants, wild edible food systems
Procedia PDF Downloads 1543185 A Goal-Driven Crime Scripting Framework
Authors: Hashem Dehghanniri
Abstract:
Crime scripting is a simple and effective crime modeling technique that aims to improve understanding of security analysts about security and crime incidents. Low-quality scripts provide a wrong, incomplete, or sophisticated understanding of the crime commission process, which oppose the purpose of their application, e.g., identifying effective and cost-efficient situational crime prevention (SCP) measures. One important and overlooked factor in generating quality scripts is the crime scripting method. This study investigates the problems within the existing crime scripting practices and proposes a crime scripting approach that contributes to generating quality crime scripts. It was validated by experienced crime scripters. This framework helps analysts develop better crime scripts and contributes to their effective application, e.g., SCP measures identification or policy-making.Keywords: attack modelling, crime commission process, crime script, situational crime prevention
Procedia PDF Downloads 1253184 Recognizing Juxtaposition Patterns of the Dwelling Units in Housing Cluster: The Case Study of Aghayan Complex: An Example of Rural Residential Development in Qajar Era in Iran
Authors: Outokesh Fatemeh, Jourabchi Keivan, Talebi Maryam, Nikbakht Fatemeh
Abstract:
Mayamei is a small town in Iran that is located between Shahrud and Sabzevar cities, on the Silk Road. It enjoys a history of approximately 1000 years. An alley entitled ‘Aghayan’ exists in this town that comprises residential buildings of a famous family. Bathhouse, mosque, telegraph center, cistern are all related to this alley. This architectural complex belongs to Sadat Mousavi, who is one of the Mayamei's major grandees and religious household. The alley after construction has been inherited from generation to generation within the family masters. The purpose of this study, which was conducted on Aghayan alley and its associated complex, was to elucidate Iranian vernacular domestic architecture of Qajar era in small towns and villages. We searched for large, medium, and small architectural patterns in the contemplated complex, and tried to elaborate their evolution from past to the present. The other objective of this project was finding a correlation between changes in the lifestyle of the alley’s inhabitants with the form of the building's architecture. Our investigation methods included: literature review especially in regard to historical travelogues, peer site visiting, mapping, interviewing of the elderly people of the Mousavi family (the owners), and examining the available documents especially the 4 meters’ scroll-type testament of 150 years ago. For the analysis of the aforementioned data, an effort was made to discover (1) the patterns of placing of different buildings in respect of the others, (2) finding the relation between function of the buildings with their relative location in the complex, as was considered in the original design, and (3) possible changes of functions of the buildings during the time. In such an investigation, special attention was paid to the chronological changes of lifestyles of the residents. In addition, we tried to take all different activities of the residents into account including their daily life activities, religious ceremonies, etc. By combining such methods, we were able to obtain a picture of the buildings in their original (construction) state, along with a knowledge of the temporal evolution of the architecture. An interesting finding is that the Aghayan complex seems to be a big structure of the horizontal type apartments, which are placed next to each other. The houses made in this way are connected to the adjacent neighbors both by the bifacial rooms and from the roofs.Keywords: Iran, Qajar period, vernacular domestic architecture, life style, residential complex
Procedia PDF Downloads 1613183 Sustainable Living Where the Immaterial Matters
Authors: Maria Hadjisoteriou, Yiorgos Hadjichristou
Abstract:
This paper aims to explore and provoke a debate, through the work of the design studio, “living where the immaterial matters” of the architecture department of the University of Nicosia, on the role that the “immaterial matter” can play in enhancing innovative sustainable architecture and viewing the cities as sustainable organisms that always grow and alter. The blurring, juxtaposing binary of immaterial and matter, as the theoretical backbone of the Unit is counterbalanced by the practicalities of the contested sites of the last divided capital Nicosia with its ambiguous green line and the ghost city of Famagusta in the island of Cyprus. Jonathan Hill argues that the ‘immaterial is as important to architecture as the material concluding that ‘Immaterial–Material’ weaves the two together, so that they are in conjunction not opposition’. This understanding of the relationship of the immaterial vs material set the premises and the departing point of our argument, and talks about new recipes for creating hybrid public space that can lead to the unpredictability of a complex and interactive, sustainable city. We hierarchized the human experience as a priority. We distinguish the notion of space and place referring to Heidegger’s ‘building dwelling thinking’: ‘a distinction between space and place, where spaces gain authority not from ‘space’ appreciated mathematically but ‘place’ appreciated through human experience’. Following the above, architecture and the city are seen as one organism. The notions of boundaries, porous borders, fluidity, mobility, and spaces of flows are the lenses of the investigation of the unit’s methodology, leading to the notion of a new hybrid urban environment, where the main constituent elements are in a flux relationship. The material and the immaterial flows of the town are seen interrelated and interwoven with the material buildings and their immaterial contents, yielding to new sustainable human built environments. The above premises consequently led to choices of controversial sites. Indisputably a provoking site was the ghost town of Famagusta where the time froze back in 1974. Inspired by the fact that the nature took over the a literally dormant, decaying city, a sustainable rebirthing was seen as an opportunity where both nature and built environment, material and immaterial are interwoven in a new emergent urban environment. Similarly, we saw the dividing ‘green line’ of Nicosia completely failing to prevent the trespassing of images, sounds and whispers, smells and symbols that define the two prevailing cultures and becoming a porous creative entity which tends to start reuniting instead of separating , generating sustainable cultures and built environments. The authors would like to contribute to the debate by introducing a question about a new recipe of cooking the built environment. Can we talk about a new ‘urban recipe’: ‘cooking architecture and city’ to deliver an ever changing urban sustainable organism, whose identity will mainly depend on the interrelationship of the immaterial and material constituents?Keywords: blurring zones, porous borders, spaces of flow, urban recipe
Procedia PDF Downloads 4203182 The Characteristics of Islamic Concept In Contemporary Mosque Design With The Case Modulation of Study: Kauman Mosque Yogyakarta Indonesia
Authors: Sulihantoro, Muhamad Irga Fahreza
Abstract:
Age of onset of the crisis makes more advanced understanding of the values of Islam that has been etched in architectural design. The majority Muslim mosque architecture designing buildings when they designed the architecture of Islam has always stuck in a cultural symbol, the shape of the facade, carving calligraphy, and all things that are closely related to the culture of the Middle East. As well as the interpretation of symbols, by designing a dome in every mosque, calligraphy carvings inside the mosque, and the other elements in the building which is interpreted by middle eastern culture. So here we have a problem understanding the meaning of Islam with kaf fah (overall), which appears distorted understanding to distinguish between cultural values and theological in design. This paper will try to evaluate the design of a contemporary mosque in Indonesia, with a case study in Masjid Kauman Yogyakarta Indonesia. building characteristics focused on the function of the building, history, aesthetics, comfort, and safety. The results of this study should be found on the evaluation of the integrated design of contemporary mosques are based on a study of the Quran and Hadith.Keywords: characteristics, Islamic concept, culture, Kauman Mosque
Procedia PDF Downloads 2243181 Biodiversity of the National Production through Companion Plants Analysis
Authors: Astrid Rivera, Diego Villatoro
Abstract:
The world population increases at an accelerated pace, and it is essential to find solutions to feed the population. Nevertheless, crop diversity has significantly decreased in the last years, and the increase in food production is not the optimal solution. It is essential to consider the origin of the food, the nutriment contributions, among other dimensions. In this regard, biodiversity plays an indispensable role when designing an effective strategy to face the actual food security problems. Consequently, the purpose of this work is to analyze biodiversity in the Mexican national food production and suggest a proper crop selection based on companion plants, for which empirical and experimental knowledge shows a better scenery than current efforts. As a result, we get a set of crop recommendations to increase production in sustainable and nutritive planning. It is essential to explore more feasible options to advance sustainable development goals beyond an economic aspect.Keywords: biodiversity, food security, companion plats, nutrition
Procedia PDF Downloads 1973180 Sustainable Electricity Generation Mix for Kenya from 2015 to 2035
Authors: Alex Maina, Mwenda Makathimo, Adwek George, Charles Opiyo
Abstract:
This research entails the simulation of three possible power scenarios for Kenya from 2015 to 2035 using the Low Emissions Analysis Platform (LEAP). These scenarios represent the unfolding future electricity generation that will fully satisfy the demand while considering the following: energy security, power generation cost and impacts on the environment. These scenarios are Reference Scenario (RS), Nuclear Scenario (NS) and More Renewable Scenario (MRS). The findings obtained reveals that the most sustainable scenario while comparing the costs was found to be the coal scenario with a Net Present Value (NPV) of $30,052.67 million though it has the highest Green House Gases (GHGs) emissions. However, the More Renewable Scenario (MRS) had the least GHGs emissions but was found to be a most expensive scenario to implement with an NPV of $30,733.07 million.Keywords: energy security, Kenya, low emissions analysis platform, net-present value, greenhouse gases
Procedia PDF Downloads 923179 Efficient Position Based Operation Code Authentication
Authors: Hashim Ali, Sheheryar Khan
Abstract:
Security for applications is always been a keen issue of concern. In general, security is to allow access of grant to legal user or to deny non-authorized access to the system. Shoulder surfing is an observation technique to hack an account or to enter into a system. When a malicious observer is capturing or recording the fingers of a user while he is entering sensitive inputs (PIN, Passwords etc.) and may be able to observe user’s password credential. It is very rigorous for a novice user to prevent himself from shoulder surfing or unaided observer in a public place while accessing his account. In order to secure the user account, there are five factors of authentication; they are: “(i) something you have, (ii) something you are, (iii) something you know, (iv) somebody you know, (v) something you process”. A technique has been developed of fifth-factor authentication “something you process” to provide novel approach to the user. In this paper, we have applied position based operational code authentication in such a way to more easy and user friendly to the user.Keywords: shoulder surfing, malicious observer, sensitive inputs, authentication
Procedia PDF Downloads 2713178 A QoE-driven Cross-layer Resource Allocation Scheme for High Traffic Service over Open Wireless Network Downlink
Authors: Liya Shan, Qing Liao, Qinyue Hu, Shantao Jiang, Tao Wang
Abstract:
In this paper, a Quality of Experience (QoE)-driven cross-layer resource allocation scheme for high traffic service over Open Wireless Network (OWN) downlink is proposed, and the related problem about the users in the whole cell including the users in overlap region of different cells has been solved.A method, in which assess models of the BestEffort service and the no-reference assess algorithm for video service are adopted, to calculate the Mean Opinion Score (MOS) value for high traffic service has been introduced. The cross-layer architecture considers the parameters in application layer, media access control layer and physical layer jointly. Based on this architecture and the MOS value, the Binary Constrained Particle Swarm Optimization (B_CPSO) algorithm is used to solve the cross-layer resource allocation problem. In addition,simulationresults show that the proposed scheme significantly outperforms other schemes in terms of maximizing average users’ MOS value for the whole system as well as maintaining fairness among users.Keywords: high traffic service, cross-layer resource allocation, QoE, B_CPSO, OWN
Procedia PDF Downloads 5383177 Embedded Acoustic Signal Processing System Using OpenMP Architecture
Authors: Abdelkader Elhanaoui, Mhamed Hadji, Rachid Skouri, Said Agounad
Abstract:
In this paper, altera de1-SoC FPGA board technology is utilized as a distinguished tool for nondestructive characterization of an aluminum circular cylindrical shell of radius ratio b/a (a: outer radius; b: inner radius). The acoustic backscattered signal processing system has been developed using OpenMP architecture. The design is built in three blocks; it is implemented per functional block, in a heterogeneous Intel-Altera system running under Linux. The useful data to determine the performances of SoC FPGA is computed by the analytical method. The exploitation of SoC FPGA has lead to obtain the backscattering form function and resonance spectra. A0 and S0 modes of propagation in the tube are shown. The findings are then compared to those achieved from the Matlab simulation of analytical method. A good agreement has, therefore, been noted. Moreover, the detailed SoC FPGA-based system has shown that acoustic spectra are performed at up to 5 times faster than the Matlab implementation using almost the same data. This FPGA-based system implementation of processing algorithms is realized with a coefficient of correlation R and absolute error respectively about 0.962 and 5 10⁻⁵.Keywords: OpenMP, signal processing system, acoustic backscattering, nondestructive characterization, thin tubes
Procedia PDF Downloads 893176 Towards A New Maturity Model for Information System
Authors: Ossama Matrane
Abstract:
Information System has become a strategic lever for enterprises. It contributes effectively to align business processes on strategies of enterprises. It is regarded as an increase in productivity and effectiveness. So, many organizations are currently involved in implementing sustainable Information System. And, a large number of studies have been conducted the last decade in order to define the success factors of information system. Thus, many studies on maturity model have been carried out. Some of this study is referred to the maturity model of Information System. In this article, we report on development of maturity models specifically designed for information system. This model is built based on three components derived from Maturity Model for Information Security Management, OPM3 for Project Management Maturity Model and processes of COBIT for IT governance. Thus, our proposed model defines three maturity stages for corporate a strong Information System to support objectives of organizations. It provides a very practical structure with which to assess and improve Information System Implementation.Keywords: information system, maturity models, information security management, OPM3, IT governance
Procedia PDF Downloads 4453175 Secure Authentication Scheme Based on Numerical Series Cryptography for Internet of Things
Authors: Maha Aladdin, Khaled Nagaty, Abeer Hamdy
Abstract:
The rapid advancement cellular networks and wireless networks have laid a solid basis for the Internet of Things. IoT has evolved into a unique standard that allows diverse physical devices to collaborate with one another. A service provider gives a variety of services that may be accessed via smart apps anywhere, at any time, and from any location over the Internet. Because of the public environment of mobile communication and the Internet, these services are highly vulnerable to a several malicious attacks, such as unauthorized disclosure by hostile attackers. As a result, the best option for overcoming these vulnerabilities is a strong authentication method. In this paper, a lightweight authentication scheme that is based on numerical series cryptography is proposed for the IoT environments. It allows mutual authentication between IoT devices Parametric study and formal proofs are utilized to illustrate that the pro-posed approach is resistant to a variety of security threats.Keywords: internet of things, authentication, cryptography, security protocol
Procedia PDF Downloads 1193174 Vegetation Integrated with Architecture: A Comparative Study in Vijayawada
Authors: Clince Rodrigues
Abstract:
Due to high dense areas, there is a continuous increase in the global warming and urban pollution, thus integrating green with the built environment is vital. The paper deals with the understanding of vegetation in architecture and how a proper design strategy can aim at improving not only the performances of buildings but also the outdoor climate. In the present scenario of cities, one cannot inhale pure air. Vegetations combat global warming by absorbing the carbon emitted by vehicles, lowering carbon emissions from fossil fuel-burning plants, and reducing the energy used for climate control in buildings by the use of plants which can reduce the carbon emission and thus, making the environment less polluted. A comparative study of areas, neighborhood and dwelling unit has been used as a scope for understanding different scenarios and scale. By comparing a system (area; building) with and without vegetation, and then finding out the difference. Understanding the Vijayawada city by taking its past and present conditions, and how these changes have affected the environment and people at a macro and micro level. Built environment and climactic performance at the building level and surrounding spaces are the areas that are covered in the study.Keywords: climate, environment, neighborhood, pollution, vegetation, Vijayawada, urban
Procedia PDF Downloads 1563173 An Ensemble Deep Learning Architecture for Imbalanced Classification of Thoracic Surgery Patients
Authors: Saba Ebrahimi, Saeed Ahmadian, Hedie Ashrafi
Abstract:
Selecting appropriate patients for surgery is one of the main issues in thoracic surgery (TS). Both short-term and long-term risks and benefits of surgery must be considered in the patient selection criteria. There are some limitations in the existing datasets of TS patients because of missing values of attributes and imbalanced distribution of survival classes. In this study, a novel ensemble architecture of deep learning networks is proposed based on stacking different linear and non-linear layers to deal with imbalance datasets. The categorical and numerical features are split using different layers with ability to shrink the unnecessary features. Then, after extracting the insight from the raw features, a novel biased-kernel layer is applied to reinforce the gradient of the minority class and cause the network to be trained better comparing the current methods. Finally, the performance and advantages of our proposed model over the existing models are examined for predicting patient survival after thoracic surgery using a real-life clinical data for lung cancer patients.Keywords: deep learning, ensemble models, imbalanced classification, lung cancer, TS patient selection
Procedia PDF Downloads 1443172 Climate Smart Agriculture: Nano Technology in Solar Drying
Authors: Figen Kadirgan, M. A. Neset Kadirgan, Gokcen A. Ciftcioglu
Abstract:
Addressing food security and climate change challenges have to be done in an integrated manner. To increase food production and to reduce emissions intensity, thus contributing to mitigate climate change, food systems have to be more efficient in the use of resources. To ensure food security and adapt to climate change they have to become more resilient. The changes required in agricultural and food systems will require the creation of supporting institutions and enterprises to provide services and inputs to smallholders, fishermen and pastoralists, and transform and commercialize their production more efficiently. Thus there is continously growing need to switch to green economy where simultaneously causes reduction in carbon emissions and pollution, enhances energy and resource-use efficiency; and prevents the loss of biodiversity and ecosystem services. Smart Agriculture takes into account the four dimensions of food security, availability, accessibility, utilization, and stability. It is well known that, the increase in world population will strengthen the population-food imbalance. The emphasis on reduction of food losses makes a point on production, on farmers, on increasing productivity and income ensuring food security. Where also small farmers enhance their income and stabilize their budget. The use of solar drying for agricultural, marine or meat products is very important for preservation. Traditional sun drying is a relatively slow process where poor food quality is seen due to an infestation of insects, enzymatic reactions, microorganism growth and micotoxin development. In contrast, solar drying has a sound solution to all these negative effects of natural drying and artificial mechanical drying. The technical directions in the development of solar drying systems for agricultural products are compact collector design with high efficiency and low cost. In this study, using solar selective surface produced in Selektif Teknoloji Co. Inc. Ltd., solar dryers with high efficiency will be developed and a feasibility study will be realized.Keywords: energy, renewable energy, solar collector, solar drying
Procedia PDF Downloads 2233171 Integrated Farming Barns as a Strategy for National Food Security
Authors: Ilma Ulfatul Janah, Ibnu Rizky Briwantara, Muhammad Afif
Abstract:
The agricultural sector is one of the sectors that contribute to national development. The benefit of the agricultural sector can be felt directly by the majority of Indonesian people. Indonesia is one of the agricultural countries and most of the people working in the agricultural sector. Hence, the agricultural sector’s become the second sector which has contributed greatly to the growth of Gross Domestic Product (GDP) after the manufacture sector. Based on the National Medium Term Development Plan (RPJMN) from 2015 to 2019, one of the targets to be achieved by the Indonesian government is rice’s self-sufficient. Rice is the main food commodities which as most people in Indonesia, and it is making Indonesian government attempt self-sufficient in rice. Indonesia as an agricultural country becomes one of the countries that have a lower percentage of food security than other ASEAN countries. Rice self-sufficiency can be created through agricultural productivity and the availability of a market for the output. There are some problems still to be faced by the farmers such as farmer exchange rate is low. The low exchange rate of farmers showed that the level of the welfare’s Indonesian farmers is still low. The aims of this paper are to resolve problems related to food security and improve the welfare of the national rice farmers. The method by using materials obtained from the analysis of secondary data with the descriptive approach and conceptual framework. Integrated Farmers barn raising rice production is integrated and managed by the government coupled with the implementation of technology in the form of systems connected and accessible to farmers, namely 'SIBUNGTAN'.Keywords: agriculture, self-sufficiency, technology, productivity
Procedia PDF Downloads 2483170 Virtual Reality Tilt Brush for Creativity: An Experimental Study among Architecture Students
Authors: Christena Stephen, Biju Kunnumpurath
Abstract:
This study intends to comprehend the effect of the Tilt Brush (TB) Virtual Reality 3D Painting application on creativity among final year architecture students. The research was done over the course of 30 hours and evaluated the performance of a group of 20 university students. Using a Structured Observation Form (SOF), the researcher assessed the research's progress. Four recently graduated artists, educators, and researchers used a Rubric to assess student designs. During the training, the study group was instructed in the fundamentals of virtual Reality, design principles, and TB. The design process, which began with the construction of a 3D design, progressed with the addition of texture, color, and script to items and culminated in the creation of a finished project. The group in the design process is rated as "Good" by the researcher based on feedback from SOF. The creativity evaluation rubric used by the experts rates their work as "Accomplished." According to the researcher's assessment, the group received a "Good" rating. Based on these findings, it can be said that including virtual reality 3D painting in the curriculum for art and design classes will help students improve their imagination and creativity as well as their 21st-century skills in education.Keywords: creativity, virtual reality, 3D painting, tilt brush, education
Procedia PDF Downloads 863169 Identifying the Phases of Indian Agriculture Towards Desertification: An Introspect of Karnataka State, India
Authors: Arun Das
Abstract:
Indian agriculture is acclaimed from the dates of Indus civilization (2500 BC). Since this time until the day, there were tremendous expansion in terms of space and technology has taken place. Abrupt growth in technology took place past one and half century. Consequent to this development, the land which was brought under agriculture in the initial stages of introducing agriculture for the first time, that land is not possessing the same physical condition. Either it has lost the productive capacity or modified into semi agriculture land. On the grounds of its capacity and interwoven characteristics seven phases of agriculture scenario has been identified. Most of the land is on the march of desertification. Identifying the stages and the phase of the agriculture scenario is most relevant from the point of view of food security at regional, national and at global level. Secondly decisive measure can put back the degenerating environmental condition into arrest. GIS and Remote sensing applications have been used to identify the phases of agriculture.Keywords: agriculture phases, desertification, deforestation, foods security, transmigration
Procedia PDF Downloads 4313168 A Multilevel Authentication Protocol: MAP in VANET for Human Safety
Authors: N. Meddeb, A. M. Makhlouf, M. A. Ben Ayed
Abstract:
Due to the real-time requirement of message in Vehicular Ad hoc NETworks (VANET), it is necessary to authenticate vehicles to achieve security, efficiency, and conditional privacy-preserving. Privacy is of utmost relevance in VANETs. For this reason, we have proposed a new protocol called ‘Multilevel Authentication Protocol’ (MAP) that considers different vehicle categories. The proposed protocol is based on our Multilevel Authentication protocol for Vehicular networks (MAVnet). But the MAP leads to human safety, where the priority is given to the ambulance vehicles. For evaluation, we used the Java language to develop a demo application and deployed it on the Network Security Simulation (Nessi2). Compared with existing authentication protocols, MAP markedly enhance the communication overhead and decreases the delay of exchanging messages while preserving conditional privacy.Keywords: Vehicular Ad hoc NETworks (VANET), vehicle categories, safety, databases, privacy, authentication, throughput, delay
Procedia PDF Downloads 295