Search results for: human factor in security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 15189

Search results for: human factor in security

13959 Improving Security in Healthcare Applications Using Federated Learning System With Blockchain Technology

Authors: Aofan Liu, Qianqian Tan, Burra Venkata Durga Kumar

Abstract:

Data security is of the utmost importance in the healthcare area, as sensitive patient information is constantly sent around and analyzed by many different parties. The use of federated learning, which enables data to be evaluated locally on devices rather than being transferred to a central server, has emerged as a potential solution for protecting the privacy of user information. To protect against data breaches and unauthorized access, federated learning alone might not be adequate. In this context, the application of blockchain technology could provide the system extra protection. This study proposes a distributed federated learning system that is built on blockchain technology in order to enhance security in healthcare. This makes it possible for a wide variety of healthcare providers to work together on data analysis without raising concerns about the confidentiality of the data. The technical aspects of the system, including as the design and implementation of distributed learning algorithms, consensus mechanisms, and smart contracts, are also investigated as part of this process. The technique that was offered is a workable alternative that addresses concerns about the safety of healthcare while also fostering collaborative research and the interchange of data.

Keywords: data privacy, distributed system, federated learning, machine learning

Procedia PDF Downloads 133
13958 Reclaiming and Reconstructing the History of the Universal Declaration of Human Rights

Authors: Hamid Vahidkia

Abstract:

The origins of the Universal Declaration of Human Rights (UDHR) are not widely understood, leading to misconceptions that need to be examined. Recent research disputes the idea that the UDHR was exclusively backed and endorsed by Western countries and even raised doubts about powerful nations backing the creation of global human rights norms. This article examines four political misconceptions regarding the Universal Declaration, with each one having some truth to it but also being misleading. The significance of small states in promoting human rights norms has been underestimated, just as the importance of large states has been exaggerated in history. The Universal Declaration was created through negotiations with the involvement of numerous states. All states have a stake in small states reclaiming their portion of history due to the legitimacy it gained from the political process that formed it.

Keywords: declaration. law, rights, humanity, UDHR

Procedia PDF Downloads 39
13957 Transfer of Electrical Energy by Magnetic Induction

Authors: Carlos Oliveira Santiago Filho, Ciro Egoavil, Eduardo Oliveira, Jéferson Galdino, Moises Galileu, Tiago Oliveira Correa

Abstract:

Transfer of Electrical Energy through resonant inductive magnetic coupling is demonstrated experimentally in a system containing coil primary for transmission and secondary reception. The topology used in the prototype of the Class-E amplifier, has been identified as optimal for power transfer applications. Characteristic of the inductor and the load are defined by the requirements of the resonant inductive system. The frequency limitation the of circuit restricts unloaded “Q-Factor”, quality factor of the coils and thus the link efficiency. With a suitable circuit, copper coil unloaded Q-Factors of over 1,000 can be achieved in the low Mhz region, enabling a cost-effective high Q coil assembly. The circuit is capable system capable of transmitting energy with direct current to load efficiency above 60% at 2 Mhz.

Keywords: magnetic induction, transfer of electrical energy, magnetic coupling, Q-Factor

Procedia PDF Downloads 518
13956 Threat of Islamic State of Khorasan in Pakistan and Afghanistan Region: Impact on Regional Security

Authors: Irfan U. Din

Abstract:

The growing presence and operational capacity of Islamic State aka Daesh, which emerged in Pak-Afghan region in 2015, poses a serious threat to the already fragile state of the security situation in the region. This paper will shed light on the current state of IS-K network in the Pak-Afghan region and will explain how its presence and operational capacity in the northern and central Afghanistan has increased despite intensive military operations against the group in Nangarhar province – the stronghold of IS-K. It will also explore the role of Pakistani Taliban in the emergence and expansion of IS-K in the region and will unveil the security implication of growing nexus of IS-K and transnational organized groups for the region in Post NATO withdrawal scenario. The study will be qualitative and will rely on secondary and primary data to explore the topic. For secondary data existing literature on the topic will be extensively reviewed while for primary data in-depth interviews will be conducted with subject experts, Taliban commanders, and field researchers.

Keywords: Islamic State of Khorasan (IS-K), North Atlantic Treaty Organization (NATO), Pak-Afghan Region, Transnational Organized Crime (TNOC)

Procedia PDF Downloads 290
13955 Biosignal Recognition for Personal Identification

Authors: Hadri Hussain, M.Nasir Ibrahim, Chee-Ming Ting, Mariani Idroas, Fuad Numan, Alias Mohd Noor

Abstract:

A biometric security system has become an important application in client identification and verification system. A conventional biometric system is normally based on unimodal biometric that depends on either behavioural or physiological information for authentication purposes. The behavioural biometric depends on human body biometric signal (such as speech) and biosignal biometric (such as electrocardiogram (ECG) and phonocardiogram or heart sound (HS)). The speech signal is commonly used in a recognition system in biometric, while the ECG and the HS have been used to identify a person’s diseases uniquely related to its cluster. However, the conventional biometric system is liable to spoof attack that will affect the performance of the system. Therefore, a multimodal biometric security system is developed, which is based on biometric signal of ECG, HS, and speech. The biosignal data involved in the biometric system is initially segmented, with each segment Mel Frequency Cepstral Coefficients (MFCC) method is exploited for extracting the feature. The Hidden Markov Model (HMM) is used to model the client and to classify the unknown input with respect to the modal. The recognition system involved training and testing session that is known as client identification (CID). In this project, twenty clients are tested with the developed system. The best overall performance at 44 kHz was 93.92% for ECG and the worst overall performance was ECG at 88.47%. The results were compared to the best overall performance at 44 kHz for (20clients) to increment of clients, which was 90.00% for HS and the worst overall performance falls at ECG at 79.91%. It can be concluded that the difference multimodal biometric has a substantial effect on performance of the biometric system and with the increment of data, even with higher frequency sampling, the performance still decreased slightly as predicted.

Keywords: electrocardiogram, phonocardiogram, hidden markov model, mel frequency cepstral coeffiecients, client identification

Procedia PDF Downloads 280
13954 Implications of Agricultural Subsidies Since Green Revolution: A Case Study of Indian Punjab

Authors: Kriti Jain, Sucha Singh Gill

Abstract:

Subsidies have been a major part of agricultural policies around the world, and more extensively since the green revolution in developing countries, for the sake of attaining higher agricultural productivity and achieving food security. But entrenched subsidies lead to distorted incentives and promote inefficiencies in the agricultural sector, threatening the viability of these very subsidies and sustainability of the agricultural production systems, posing a threat to the livelihood of farmers and laborers dependent on it. This paper analyzes the economic and ecological sustainability implications of prolonged input and output subsidies in agriculture by studying the case of Indian Punjab, an agriculturally developed state responsible for ensuring food security in the country when it was facing a major food crisis. The paper focuses specifically on the environmentally unsustainable cropping pattern changes as a result of Minimum Support Price (MSP) and assured procurement and on the resource use efficiency and cost implications of power subsidy for irrigation in Punjab. The study is based on an analysis of both secondary and primary data sources. Using secondary data, a time series analysis was done to capture the changes in Punjab’s cropping pattern, water table depth, fertilizer consumption, and electrification of agriculture. This has been done to examine the role of price and output support adopted to encourage the adoption of green revolution technology in changing the cropping structure of the state, resulting in increased input use intensities (especially groundwater and fertilizers), which harms the ecological balance and decreases factor productivity. Evaluation of electrification of Punjab agriculture helped evaluate the trend in electricity productivity of agriculture and how free power imposed further pressure on the extant agricultural ecosystem. Using data collected from a primary survey of 320 farmers in Punjab, the extent of wasteful application of groundwater irrigation, water productivity of output, electricity usage, and cost of irrigation driven electricity subsidy to the exchequer were estimated for the dominant cropping pattern amongst farmers. The main findings of the study revealed how because of a subsidy has driven agricultural framework, Punjab has lost area under agro climatically suitable and staple crops and moved towards a paddy-wheat cropping system, that is gnawing away the state’s natural resources like water table has been declining at a significant rate of 25 cms per year since 1975-76, and excessive and imbalanced fertilizer usage has led to declining soil fertility in the state. With electricity-driven tubewells as the major source of irrigation within a regime of free electricity and water-intensive crop cultivation, there is both wasteful application of irrigation water and electricity in the cultivation of paddy crops, burning an unproductive hole in the exchequer’s pocket. There is limited access to both agricultural extension services and water-conserving technology, along with policy imbalance, keeping farmers in an intensive and unsustainable production system. Punjab agriculture is witnessing diminishing returns to factor, which under the business-as-usual scenario, will soon enter the phase of negative returns to factor.

Keywords: cropping pattern, electrification, subsidy, sustainability

Procedia PDF Downloads 186
13953 Criminal Law and Internet of Things: Challenges and Threats

Authors: Celina Nowak

Abstract:

The development of information and communication technologies (ICT) and a consequent growth of cyberspace have become a reality of modern societies. The newest addition to this complex structure has been Internet of Things which is due to the appearance of smart devices. IoT creates a new dimension of the network, as the communication is no longer the domain of just humans, but has also become possible between devices themselves. The possibility of communication between devices, devoid of human intervention and real-time supervision, generated new societal and legal challenges. Some of them may and certainly will eventually be connected to criminal law. Legislators both on national and international level have been struggling to cope with this technologically evolving environment in order to address new threats created by the ICT. There are legal instruments on cybercrime, however imperfect and not of universal scope, sometimes referring to specific types of prohibited behaviors undertaken by criminals, such as money laundering, sex offences. However, the criminal law seems largely not prepared to the challenges which may arise because of the development of IoT. This is largely due to the fact that criminal law, both on national and international level, is still based on the concept of perpetration of an offence by a human being. This is a traditional approach, historically and factually justified. Over time, some legal systems have developed or accepted the possibility of commission of an offence by a corporation, a legal person. This is in fact a legal fiction, as a legal person cannot commit an offence as such, it needs humans to actually behave in a certain way on its behalf. Yet, the legislators have come to understand that corporations have their own interests and may benefit from crime – and therefore need to be penalized. This realization however has not been welcome by all states and still give rise to doubts of ontological and theoretical nature in many legal systems. For this reason, in many legislations the liability of legal persons for commission of an offence has not been recognized as criminal responsibility. With the technological progress and the growing use of IoT the discussions referring to criminal responsibility of corporations seem rather inadequate. The world is now facing new challenges and new threats related to the ‘smart’ things. They will have to be eventually addressed by legislators if they want to, as they should, to keep up with the pace of technological and societal evolution. This will however require a reevaluation and possibly restructuring of the most fundamental notions of modern criminal law, such as perpetration, guilt, participation in crime. It remains unclear at this point what norms and legal concepts will be and may be established. The main goal of the research is to point out to the challenges ahead of the national and international legislators in the said context and to attempt to formulate some indications as to the directions of changes, having in mind serious threats related to privacy and security related to the use of IoT.

Keywords: criminal law, internet of things, privacy, security threats

Procedia PDF Downloads 162
13952 Comparative Evaluation of Pharmacologically Guided Approaches (PGA) to Determine Maximum Recommended Starting Dose (MRSD) of Monoclonal Antibodies for First Clinical Trial

Authors: Ibraheem Husain, Abul Kalam Najmi, Karishma Chester

Abstract:

First-in-human (FIH) studies are a critical step in clinical development of any molecule that has shown therapeutic promise in preclinical evaluations, since preclinical research and safety studies into clinical development is a crucial step for successful development of monoclonal antibodies for guidance in pharmaceutical industry for the treatment of human diseases. Therefore, comparison between USFDA and nine pharmacologically guided approaches (PGA) (simple allometry, maximum life span potential, brain weight, rule of exponent (ROE), two species methods and one species methods) were made to determine maximum recommended starting dose (MRSD) for first in human clinical trials using four drugs namely Denosumab, Bevacizumab, Anakinra and Omalizumab. In our study, the predicted pharmacokinetic (pk) parameters and the estimated first-in-human dose of antibodies were compared with the observed human values. The study indicated that the clearance and volume of distribution of antibodies can be predicted with reasonable accuracy in human and a good estimate of first human dose can be obtained from the predicted human clearance and volume of distribution. A pictorial method evaluation chart was also developed based on fold errors for simultaneous evaluation of various methods.

Keywords: clinical pharmacology (CPH), clinical research (CRE), clinical trials (CTR), maximum recommended starting dose (MRSD), clearance and volume of distribution

Procedia PDF Downloads 374
13951 Perceiving Interpersonal Conflict and the Big Five Personality Traits

Authors: Emily Rivera, Toni DiDona

Abstract:

The Big Five personality traits is a hierarchical classification of personality traits that applies factor analysis to a personality survey data in order to describe human personality using five broad dimensions: Extraversion, Agreeableness, Conscientiousness, Neuroticism, and Openness (Fetvadjiev & Van de Vijer, 2015). Research shows that personality constructs underline individual differences in processing conflict and interpersonal relations. (Graziano et al., 1996). This research explores the understudied correlation between the Big Five personality traits and perceived interpersonal conflict in the workplace. It revises social psychological literature on Big Five personality traits within a social context and discusses organizational development journal articles on the perceived efficacy of conflict tactics and approach to interpersonal relationships. The study also presents research undertaken on a survey group of 867 subjects over the age of 18 that were recruited by means of convenience sampling through social media, email, and text messaging. The central finding of this study is that only two of the Big Five personality traits had a significant correlation with perceiving interpersonal conflict in the workplace. Individuals who score higher on agreeableness and neuroticism, perceive more interpersonal conflict in the workplace compared to those that score lower on each dimension. The relationship between both constructs is worthy of research due to its everyday frequency and unique individual psycho-social consequences. This multimethod research associated the Big Five personality dimensions to interpersonal conflict. Its findings that can be utilized to further understand social cognition, person perception, complex social behavior and social relationships in the work environment.

Keywords: five-factor model, interpersonal conflict, personality, The Big Five personality traits

Procedia PDF Downloads 157
13950 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing

Authors: Jaimin Patel

Abstract:

Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.

Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack

Procedia PDF Downloads 280
13949 Human Resource Management in the Innovation Activity in the Republic of Kazakhstan

Authors: A. T. Omarova, G. N. Nakipova

Abstract:

This article discusses the principles of object-oriented human capital development using the technology program. Also the article includes priorities of the strategy of industrial-innovative development of Kazakhstan in conditions of integration activity into the world community. The article shows the tasks of human resource management in the implementation of industrial and innovation development, particularities of Kazakhstan's theory of management staff, as well as due to the specificity of the Kazakhstan authorities. In the article, we have considered the factors which are affecting the people in the organization and also have considered mechanisms of HRM within organization in the conditions of innovative development in Kazakhstan.

Keywords: programming, management of human resources, innovation, investment, innovation process, HRD model, innovative development, integration, management, transformation, economic potential, competitiveness

Procedia PDF Downloads 399
13948 Secure Distance Bounding Protocol on Ultra-WideBand Based Mapping Code

Authors: Jamel Miri, Bechir Nsiri, Ridha Bouallegue

Abstract:

Ultra WidBand-IR physical layer technology has seen a great development during the last decade which makes it a promising candidate for short range wireless communications, as they bring considerable benefits in terms of connectivity and mobility. However, like all wireless communication they suffer from vulnerabilities in terms of security because of the open nature of the radio channel. To face these attacks, distance bounding protocols are the most popular counter measures. In this paper, we presented a protocol based on distance bounding to thread the most popular attacks: Distance Fraud, Mafia Fraud and Terrorist fraud. In our work, we study the way to adapt the best secure distance bounding protocols to mapping code of ultra-wideband (TH-UWB) radios. Indeed, to ameliorate the performances of the protocol in terms of security communication in TH-UWB, we combine the modified protocol to ultra-wideband impulse radio technology (IR-UWB). The security and the different merits of the protocols are analyzed.

Keywords: distance bounding, mapping code ultrawideband, terrorist fraud, physical layer technology

Procedia PDF Downloads 299
13947 Enhancing Human Resource Development in Entrepreneurship: A Catalyst for Economic Growth and Development in Nigeria

Authors: Eli Maikoto Agison

Abstract:

The relevance of enhancing human resource development in entrepreneurship for economic growth and development cannot be overemphasized since no country can grow and developed economically above its citizenry. Africa for example and Nigeria in particular is lagging behind in terms of economic growth and development when compared with other developed countries of the world like China, Japan, Singapore, USA etc. The reason is not farfetched from these developed countries efforts in enhancing human resource development in entrepreneurship education. For Nigeria to attain this height of development, this paper discusses the meaning of human resource development in entrepreneurship as the framework for helping employees develop their personal and organizational skills knowledge and abilities as this includes employee training, career development and performance management to enable an organization achieve a set goal. While entrepreneurship education is seen as an aspect of education that is geared towards self-reliance, some of the challenges faced in the enhancement of human resource development in Nigeria include inadequate training and re-training of instructors of entrepreneurship in higher education. Insufficient funding to higher education were discussed and recommendations to include adequate funding, training and re-training of instructors of higher education be enhanced as some of the ways forward.

Keywords: economic development, economic growth, entrepreneurship education, human resource development

Procedia PDF Downloads 292
13946 Design of Orientation-Free Handler and Fuzzy Controller for Wire-Driven Heavy Object Lifting System

Authors: Bo-Wei Song, Yun-Jung Lee

Abstract:

This paper presents an intention interface and controller for a wire-driven heavy object lifting system that assists the operator with moving a heavy object. The handler is designed to allow a comfortable working posture for the operator. Plus, as a human assistive system, the operator is involved in the control loop, where a fuzzy control system is used to consider the human control characteristics. The effectiveness and performance of the proposed system are proved by experiments.

Keywords: fuzzy controller, handler design, heavy object lifting system, human-assistive device, human-in-the-loop system

Procedia PDF Downloads 514
13945 Human-Induced Vibration and Degree of Human Comfortability Analysis of Intersection Pedestrian Bridge

Authors: Yaowen Sheng, Jiuxian Liu

Abstract:

In order to analyze the pedestrian bridge dynamic characteristics and degree of comfortability, the finite element method and live load time history method is used to calculate the dynamic response of the bridge. The example bridge’s dynamic characteristics and degree of human comfortability need to be analyzed. The project background is a three-way intersection. The intersection has three side blocks. An intersection bridge is designed to help people cross the streets. The finite element model of the bridge is established by the Midas/Civil software, and the analysis of the model is done. The strength, stiffness, and stability checks are also completed. Apart from the static analysis of the bridge, the dynamic analysis of the bridge is also completed to avoid the problems resulted from vibrations. The results show that the pedestrian bridge has different dynamic characteristics compared to other normal bridges. The degree of human comfortability satisfies the requirements of Chinese and British specifications. The live load time history method can be used to calculate the dynamic response of the bridge.

Keywords: pedestrian bridge, steel box girder, human-induced vibration, finite element analysis, degree of human comfortability

Procedia PDF Downloads 157
13944 An Efficient Encryption Scheme Using DWT and Arnold Transforms

Authors: Ali Abdrhman M. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The color image is decomposed into red, green, and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using a key image that has same original size and is generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours of color image recovery can be obtained with accepted level of distortion using Canny edge detector. Experiments have demonstrated that proposed algorithm can fully encrypt 2D color image and completely reconstructed without any distortion. It has shown that the color image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: color image, wavelet transform, edge detector, Arnold transform, lossy image encryption

Procedia PDF Downloads 482
13943 Levels of Heavy Metals and Arsenic in Sediment and in Clarias Gariepinus, of Lake Ngami

Authors: Nashaat Mazrui, Oarabile Mogobe, Barbara Ngwenya, Ketlhatlogile Mosepele, Mangaliso Gondwe

Abstract:

Over the last several decades, the world has seen a rapid increase in activities such as deforestation, agriculture, and energy use. Subsequently, trace elements are being deposited into our water bodies, where they can accumulate to toxic levels in aquatic organisms and can be transferred to humans through fish consumption. Thus, though fish is a good source of essential minerals and omega-3 fatty acids, it can also be a source of toxic elements. Monitoring trace elements in fish is important for the proper management of aquatic systems and the protection of human health. The aim of this study was to determine concentrations of trace elements in sediment and muscle tissues of Clarias gariepinus at Lake Ngami, in the Okavango Delta in northern Botswana, during low floods. The fish were bought from local fishermen, and samples of muscle tissue were acid-digested and analyzed for iron, zinc, copper, manganese, molybdenum, nickel, chromium, cadmium, lead, and arsenic using inductively coupled plasma optical emission spectroscopy (ICP-OES). Sediment samples were also collected and analyzed for the elements and for organic matter content. Results show that in all samples, iron was found in the greatest amount while cadmium was below the detection limit. Generally, the concentrations of elements in sediment were higher than in fish except for zinc and arsenic. While the concentration of zinc was similar in the two media, arsenic was almost 3 times higher in fish than sediment. To evaluate the risk to human health from fish consumption, the target hazard quotient (THQ) and cancer risk for an average adult in Botswana, sub-Saharan Africa, and riparian communities in the Okavango Delta was calculated for each element. All elements were found to be well below regulatory limits and do not pose a threat to human health except arsenic. The results suggest that other benthic feeding fish species could potentially have high arsenic levels too. This has serious implications for human health, especially riparian households to whom fish is a key component of food and nutrition security.

Keywords: Arsenic, African sharp tooth cat fish, Okavango delta, trace elements

Procedia PDF Downloads 192
13942 Effect of Scarp Topography on Seismic Ground Motion

Authors: Haiping Ding, Rongchu Zhu, Zhenxia Song

Abstract:

Local irregular topography has a great impact on earthquake ground motion. For scarp topography, using numerical simulation method, the influence extent and scope of the scarp terrain on scarp's upside and downside ground motion are discussed in case of different vertical incident SV waves. The results show that: (1) The amplification factor of scarp's upside region is greater than that of the free surface, while the amplification factor of scarp's downside part is less than that of the free surface; (2) When the slope angle increases, for x component, amplification factors of the scarp upside also increase, while the downside part decrease with it. For z component, both of the upside and downside amplification factors will increase; (3) When the slope angle changes, the influence scope of scarp's downside part is almost unchanged, but for the upside part, it slightly becomes greater with the increase of slope angle; (4) Due to the existence of the scarp, the z component ground motion appears at the surface. Its amplification factor increases for larger slope angle, and the peaks of the surface responses are related with incident waves. However, the input wave has little effects on the x component amplification factors.

Keywords: scarp topography, ground motion, amplification factor, vertical incident wave

Procedia PDF Downloads 262
13941 Study on the Effects of Geometrical Parameters of Helical Fins on Heat Transfer Enhancement of Finned Tube Heat Exchangers

Authors: H. Asadi, H. Naderan Tahan

Abstract:

The aim of this paper is to investigate the effect of geometrical properties of helical fins in double pipe heat exchangers. On the other hand, the purpose of this project is to derive the hydraulic and thermal design tables and equations of double heat exchangers with helical fins. The numerical modeling is implemented to calculate the considered parameters. Design tables and correlated equations are generated by repeating the parametric numerical procedure for different fin geometries. Friction factor coefficient and Nusselt number are calculated for different amounts of Reynolds, fluid Prantle and fin twist angles for the range of laminar fluid flow in annular tube with helical fins. Results showed that friction factor coefficient and Nusselt number will be increased for higher Reynolds numbers and fins’ twist angles in general. These two parameters follow different patterns in response to Reynolds number increment. Thermal performance factor is defined to analyze these different patterns. Temperature and velocity contours are plotted against twist angle and number of fins to describe the changes in flow patterns in different geometries of twisted finned annulus. Finally twisted finned annulus friction factor coefficient, Nusselt Number and thermal performance factor are correlated by simulating the model in different design points.

Keywords: double pipe heat exchangers, heat exchanger performance, twisted fins, computational fluid dynamics

Procedia PDF Downloads 289
13940 Investigating the Causes of Human Error-Induced Incidents in the Maintenance Operations of Petrochemical Industry by Using Human Factors Analysis and Classification System

Authors: Omid Kalatpour, Mohammadreza Ajdari

Abstract:

This article studied the possible causes of human error-induced incidents in the petrochemical industry maintenance activities by using Human Factors Analysis and Classification System (HFACS). The purpose of the study was anticipating and identifying these causes and proposing corrective and preventive actions. Maintenance department in a petrochemical company was selected for research. A checklist of human error-induced incidents was developed based on four HFACS main levels and nineteen sub-groups. Hierarchical task analysis (HTA) technique was used to identify maintenance activities and tasks. The main causes of possible incidents were identified by checklist and recorded. Corrective and preventive actions were defined depending on priority. Analyzing the worksheets of 444 activities in four levels of HFACS showed 37.6% of the causes were at the level of unsafe actions, 27.5% at the level of unsafe supervision, 20.9% at the level of preconditions for unsafe acts and 14% of the causes were at the level of organizational effects. The HFACS sub-groups showed errors (24.36%) inadequate supervision (14.89%) and violations (13.26%) with the most frequency. According to findings of this study, increasing the training effectiveness of operators and supervision improvement respectively are the most important measures in decreasing the human error-induced incidents in petrochemical industry maintenance.

Keywords: human error, petrochemical industry, maintenance, HFACS

Procedia PDF Downloads 242
13939 Cooperative Agents to Prevent and Mitigate Distributed Denial of Service Attacks of Internet of Things Devices in Transportation Systems

Authors: Borhan Marzougui

Abstract:

Road and Transport Authority (RTA) is moving ahead with the implementation of the leader’s vision in exploring all avenues that may bring better security and safety services to the community. Smart transport means using smart technologies such as IoT (Internet of Things). This technology continues to affirm its important role in the context of Information and Transportation Systems. In fact, IoT is a network of Internet-connected objects able to collect and exchange different data using embedded sensors. With the growth of IoT, Distributed Denial of Service (DDoS) attacks is also growing exponentially. DDoS attacks are the major and a real threat to various transportation services. Currently, the defense mechanisms are mainly passive in nature, and there is a need to develop a smart technique to handle them. In fact, new IoT devices are being used into a botnet for DDoS attackers to accumulate for attacker purposes. The aim of this paper is to provide a relevant understanding of dangerous types of DDoS attack related to IoT and to provide valuable guidance for the future IoT security method. Our methodology is based on development of the distributed algorithm. This algorithm manipulates dedicated intelligent and cooperative agents to prevent and to mitigate DDOS attacks. The proposed technique ensure a preventive action when a malicious packets start to be distributed through the connected node (Network of IoT devices). In addition, the devices such as camera and radio frequency identification (RFID) are connected within the secured network, and the data generated by it are analyzed in real time by intelligent and cooperative agents. The proposed security system is based on a multi-agent system. The obtained result has shown a significant reduction of a number of infected devices and enhanced the capabilities of different security dispositives.

Keywords: IoT, DDoS, attacks, botnet, security, agents

Procedia PDF Downloads 143
13938 Human Performance Technology (HPT) as an Entry Point to Achieve Organizational Development in Educational Institutions of the Ministry of Education

Authors: Alkhathlan Mansour

Abstract:

Current research aims at achieving the organizational development in the educational institutions in the governorate of Al-Kharj through the human performance technology (HPT) model that is named; “The Intellectual Model to improve human performance”. To achieve the goal of this research, it tools -that it is consisting of targeted questionnaires to research sample numbered (120)- have been set up. This sample is represented in; department managers in Prince Sattam Bin Abdulaziz University (50), educational supervisors in the Department of Education (40), school administrators in the governorate (30), and the views of education experts through personal interviews in the proposal to achieve organizational development through the intellectual model to improve human performance. Among the most important research results is that there are many obstacles prevent the organizational development in the educational institutions, so the research suggested a model to achieve organizational development through human performance technologies, as well as the researcher recommended through the results of his research that the administrators have to take into account the justice in the distribution of incentives to employees of educational institutions and training leaders in educational institutions on organizational development strategies and working on the preparation of experts of organizational development in the educational institutions to develop the necessary policies and procedures of each institution.

Keywords: human performance, development, education, organizational

Procedia PDF Downloads 290
13937 True Religious Piety and Its Social Implications an Analysis of Calvin’s Thought

Authors: Philip Tachin

Abstract:

Despite the positive contributions that religion has impacted human society, religious discrimination and violence also have been growing globally with extreme negative effects on human life and social relationships. Believers in religious extremism are motivated by a sense of exhibiting true religious piety in which case they do not only withhold their practical benevolence from those who do not belong to their faith but they even seek the elimination of other adherents from human existence. This phenomenon has a very high magnitude in Nigeria over the years, which deserves more research for the purpose of finding sustainable solutions to the problem. Calvin believed that true religious piety must, among other things, be categorized in personal and corporate positive social actions that esteem human needs irrespective of ethnic, ideological and belief differences. It is therefore appropriate to pose the following questions: Should true religious piety be seen in terms of how the actions of adherents positively impact human society? Could Calvin’s idea on this issue be very significant and helpful in the context of the Nigerian situation? In answering these questions, this research will limit its investigation to Calvin’s Institutes and some of his Commentaries. The goal of this research is to offer an instructive orientation to the readers that will help in building a more tolerable, peaceful, and a free and virtuous society.

Keywords: Calvin, human good, religious piety, virtuous society

Procedia PDF Downloads 279
13936 Morphometric Relationships of Length-Weight and Length-Length of Oreochromis aureus in Relation to Body Size and Condition Factor from Pakistan

Authors: Muhammad Naeem, Abdus Salam, Sumera Yasmin, Abir Ishtiaq

Abstract:

In the present study, eighty-three wild Oreochromis aureus of different body size ranging 5.3-14.6 cm in total length were collected from the River Chenab, District Muzzafer Garh, Pakistan to investigate the parameters of length –weight, length-length relationships and condition factor in relation to size. Each fish was measured and weighed on arrival at laboratory. Log transformed regressions were used to test the allometric growth. Length-weight relationship was found highly significant (r = 0.964; P < 0.01). The values of exponent “ b” in Length–weight regression (W=aL^b), deviated from 3, showing isometric growth (b = 2.75). Results for LLRs indicated that these are highly correlated (P < 0.001). Condition factor (K) found constant with increasing body weight, however, showed negative influence with increasing total length.

Keywords: lenght-weight, Oreochromis aureus, morphometric study

Procedia PDF Downloads 439
13935 A Study on an Evacuation Test to Measure Delay Time in Using an Evacuation Elevator

Authors: Kyungsuk Cho, Seungun Chae, Jihun Choi

Abstract:

Elevators are examined as one of evacuation methods in super-tall buildings. However, data on the use of elevators for evacuation at a fire are extremely scarce. Therefore, a test to measure delay time in using an evacuation elevator was conducted. In the test, time taken to get on and get off an elevator was measured and the case in which people gave up boarding when the capacity of the elevator was exceeded was also taken into consideration. 170 men and women participated in the test, 130 of whom were young people (20 ~ 50 years old) and 40 were senior citizens (over 60 years old). The capacity of the elevator was 25 people and it travelled between the 2nd and 4th floors. A video recording device was used to analyze the test. An elevator at an ordinary building, not a super-tall building, was used in the test to measure delay time in getting on and getting off an elevator. In order to minimize interference from other elements, elevator platforms on the 2nd and 4th floors were partitioned off. The elevator travelled between the 2nd and 4th floors where people got on and off. If less than 20 people got on the elevator which was empty, the data were excluded. If the elevator carrying 10 passengers stopped and less than 10 new passengers got on the elevator, the data were excluded. Getting-on an empty elevator was observed 49 times. The average number of passengers was 23.7, it took 14.98 seconds for the passengers to get on the empty elevator and the load factor was 1.67 N/s. It took the passengers, whose average number was 23.7, 10.84 seconds to get off the elevator and the unload factor was 2.33 N/s. When an elevator’s capacity is exceeded, the excessive number of people should get off. Time taken for it and the probability of the case were measure in the test. 37% of the times of boarding experienced excessive number of people. As the number of people who gave up boarding increased, the load factor of the ride decreased. When 1 person gave up boarding, the load factor was 1.55 N/s. The case was observed 10 times, which was 12.7% of the total. When 2 people gave up boarding, the load factor was 1.15 N/s. The case was observed 7 times, which was 8.9% of the total. When 3 people gave up boarding, the load factor was 1.26 N/s. The case was observed 4 times, which was 5.1% of the total. When 4 people gave up boarding, the load factor was 1.03 N/s. The case was observed 5 times, which was 6.3% of the total. Getting-on and getting-off time data for people who can walk freely were obtained from the test. In addition, quantitative results were obtained from the relation between the number of people giving up boarding and time taken for getting on. This work was supported by the National Research Council of Science & Technology (NST) grant by the Korea government (MSIP) (No. CRC-16-02-KICT).

Keywords: evacuation elevator, super tall buildings, evacuees, delay time

Procedia PDF Downloads 177
13934 Literature as a Tool for Sustenance of Human Dignity in the 21st Century

Authors: Arubi Thompson Abari

Abstract:

Globally, a writer is absolutely necessary to the society, for he mirrors and projects the society, grumbles and protects against the ills that hinders its development. A writer is committed to the language, social-cultural, political and economic factors that determine the sustenance of human dignity in the society. In this 21st century. The literary artist holds literature as a tool for the restoration and sustenance of human dignity. In Nigeria, literature is politically committed because colonialism gives birth to the modern Nigerian literature. Literature thus was regarded as one of the greatest weapons against colonialism in Nigeria. Nigerian literature is aimed at the restoration and sustenance of the dignity of Nigerians in the 21st century. A literary writer is a member of the society and his sensibility is conditioned by the socio-political situations around him. A writer cannot be excused from the task of regeneration and restoration of his past lost glorious days that must be done. This academic paper therefore showcases the efficacy of literature in bringing about the sustenance of human dignity in the 21st century. Consequently, the paper in its introduction clarifies some vital concepts. It discusses the forms of literature, portrays the ability and capability of literature as a tool for the sustenance of human dignity globally, and makes useful recommendations for the growth of knowledge in the 21st century and beyond.

Keywords: literature, sustenance, human dignity, 21st century

Procedia PDF Downloads 91
13933 Altered Lower Extremity Biomechanical Risk Factor Related to Anterior Cruciate Ligament Injury in Athlete with Functional Ankle Instability

Authors: Mohammad Karimizadehardakani, Hooman Minoonejad, Reza Rajabi, Ali Sharifnejad

Abstract:

Background: Ankle sprain is one of the most important risk factor of anterior cruciate ligament (ACL) injury. Also, functional ankle instability (FAI) population has alterations in lower extremity sagittal plane biomechanics during landing task. We want to examine whether biomechanical alterations demonstrated by FAI patients are associated with the mechanism of ACL injury during high risk and sport related tasks. Methods: Sixteen basketball player with FAI and 16 non-injured control performed a single-leg cross drop landing. Knee sagittal and frontal (ATSF) was calculated. Independent t-tests, multiple linear regression, and Pearson correlation were used for analysis data. Result: Subject with FAI showed more peak ATFS, posterior ground reaction force (GRF) and less knee flexion, compared to the controls (P= 0.001, P= 0.004, P= 0.011). Knee flexion (r= −0.824, P = 0.011) and posterior GRF (r= 0.901, P = .001) were correlated with ATSF; Posterior GRF was factor that most explained the variance in ATSF (R2= 0.645; P = .001) in the FAI group. Conclusions: Result of our study showed there is a potential biomechanical relationship between the presence of FAI and risk factors associated with ACL injury mechanism.

Keywords: functional ankle instability, anterior cruciate ligament, biomechanics, risk factor

Procedia PDF Downloads 222
13932 Urban Regeneration of Unplanned Settlements in Al-Ruwais

Authors: Rama Ajineh

Abstract:

Neighborhoods are defined as local zones within settlements and cities recognized by individuals who live there, with their identities and given boundaries. Neighborhoods mainly structure individual’s lives, the small box which various social groups interact with each other, develop and become one strong entity. Also, it is a platform for more activities, providing many of the social services to enhance the connections between the people, giving a sense of community. However, some of these neighborhoods were unplanned and caused many social, economical and architectural problems to its residents in the first place, and to the city. A great example of such case is in Saudi Arabia, Jeddah, Al-Ruwais neighborhood, where the authority is planning to regenerate the area and make it a landmark for the city. Urban Regeneration of Unplanned Settlements is a process to make people live and work, now and in the future, and meet the various needs of the current and coming inhabitants, with a high-quality life for all. Through research, it was discovered that Urban regeneration plans on Al-Ruwais were planned regardless to the collective agreement of the inhabitants, giving themselves the absolute right to demolish and reconstruct the desired locations with a low compensation. Consequently, a deep research will be done on integrating the residents with the process, by showcasing examples of successful Urban Regenerations of Unplanned settlements in different cities. The research aims to understand the sustainable, and well-planned regeneration strategies used to enhance people’s living without harming them, and give sustainable urban solutions. Moreover, the research explores the definition of Sustainable Communities. The used methods in this paper are secondary research on site analysis and the relationship between the human and the neighborhood. The conclusion reveals the most successful fashion of Urban regeneration of Unplanned settlements and applies it to Al-Ruwais neighborhood considering the human factor as a primary element.

Keywords: architecture, human integration, original residents, site analysis, sustainable communities, urban sustainable solutions, urban regeneration

Procedia PDF Downloads 182
13931 Providing Security to Private Cloud Using Advanced Encryption Standard Algorithm

Authors: Annapureddy Srikant Reddy, Atthanti Mahendra, Samala Chinni Krishna, N. Neelima

Abstract:

In our present world, we are generating a lot of data and we, need a specific device to store all these data. Generally, we store data in pen drives, hard drives, etc. Sometimes we may loss the data due to the corruption of devices. To overcome all these issues, we implemented a cloud space for storing the data, and it provides more security to the data. We can access the data with just using the internet from anywhere in the world. We implemented all these with the java using Net beans IDE. Once user uploads the data, he does not have any rights to change the data. Users uploaded files are stored in the cloud with the file name as system time and the directory will be created with some random words. Cloud accepts the data only if the size of the file is less than 2MB.

Keywords: cloud space, AES, FTP, NetBeans IDE

Procedia PDF Downloads 206
13930 The Structure of Asadi's Poem and Human Psyche in Garshasb-Nameh Based on Jung's Perspective

Authors: Shirin Ghasemi

Abstract:

The structure of Asadi’s poem in Garshasb-Nameh coordinates with the structure of human psyche based on Jung’s perspective. The poetic stories of Asadi in Garshasb-Nameh is contrasted to human psyche according to Jung’s view in psychology which indicated the similarity of poetic structure of stories of Garshasb-Nameh to analytical psychology of Jung. In fact, by studying the stories of this collection the reader travels with him and finds it consistent with the human psyche. To demonstrate this, the story of Jamshid marriage with Kuhrang’s daughter and the story of Garshasb marriage with King’s daughter are selected. These two stories illustrate the poetic structure and the human psyche based on Jung’s analytical psychology perspective.

Keywords: Asadi Tusi, Garshasb-Nameh, Jung, analytical psychology

Procedia PDF Downloads 400