Search results for: hybrid threats
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2353

Search results for: hybrid threats

1093 Community-based Mapping as a Planning Tool; Examples from Pakistan

Authors: Noman Ahmed, Fariha Tahseen

Abstract:

Since several decades, unplanned urbanization and rapid growth of informal settlements have evolved and increased in size and number. Large cities such as Karachi have been impacted with sprawl and rising share of unplanned settlements where poor communities reside. Threats of eviction, deteriorating law and order situation, lack of essential amenities and infrastructure, extortion and bullying from local and non-local musclemen and feeble response of government agencies towards their development needs are some predicaments. Non-governmental organizations (NGOs) have caused important interventions in such locations. Appraisal of the community-based mapping as a tool in supporting the development work in less privileged areas in Karachi has been the objective of this research. The Orangi Pilot Project (OPP), under the leadership of its slain director Perween Rahman had a significant role to play in developing and extending this approach in low income locations in Karachi and beyond. The paper investigates the application of mapping in the process of peri urban land invasion causing rapid transformation of traditional settlements in Karachi. Mixed methodology components comprising literature review, archival research, and unstructured interviews with key informants and case studies have been used.

Keywords: squatters (katchi abadis), land grabbing, community empowerment, housing rights, mapping, infrastructure development

Procedia PDF Downloads 304
1092 On the Use of Machine Learning for Tamper Detection

Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode

Abstract:

The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.

Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT

Procedia PDF Downloads 134
1091 Reciprocal Interferences in Bilingual English-Igbo Speaking Society: The Implications in Language Pedagogy

Authors: Ugwu Elias Ikechukwu

Abstract:

Discussions on bilingualism have always dwelt on how the mother tongue interferes with the target language. This interference is considered a serious problem in second language learning. Usually, the interference has been phonological. But the objective of this research is to explore how the target language interferes with the mother tongue. In the case of the Igbo language, it interferes with English mostly at the phonological level while English interferes with Igbo at the realm of vocabulary. The result is a new language \"Engligbo\" which is a hybrid of English and Igbo. The Igbo language spoken by about 25 million people is one of the three most prominent languages in Nigeria. This paper discusses the phenomenal Engligbo, and other implications for Igbo learners of English. The method of analysis is descriptive. A number of recommendations were made that would help teachers handle problems arising from such mutual interferences.

Keywords: reciprocal interferences, bilingualism, implications, language pedagogy

Procedia PDF Downloads 382
1090 Adapting Cyber Physical Production Systems to Small and Mid-Size Manufacturing Companies

Authors: Yohannes Haile, Dipo Onipede, Jr., Omar Ashour

Abstract:

The main thrust of our research is to determine Industry 4.0 readiness of small and mid-size manufacturing companies in our region and assist them to implement Cyber Physical Production System (CPPS) capabilities. Adopting CPPS capabilities will help organizations realize improved quality, order delivery, throughput, new value creation, and reduced idle time of machines and work centers of their manufacturing operations. The key metrics for the assessment include the level of intelligence, internal and external connections, responsiveness to internal and external environmental changes, capabilities for customization of products with reference to cost, level of additive manufacturing, automation, and robotics integration, and capabilities to manufacture hybrid products in the near term, where near term is defined as 0 to 18 months. In our initial evaluation of several manufacturing firms which are profitable and successful in what they do, we found low level of Physical-Digital-Physical (PDP) loop in their manufacturing operations, whereas 100% of the firms included in this research have specialized manufacturing core competencies that have differentiated them from their competitors. The level of automation and robotics integration is low to medium range, where low is defined as less than 30%, and medium is defined as 30 to 70% of manufacturing operation to include automation and robotics. However, there is a significant drive to include these capabilities at the present time. As it pertains to intelligence and connection of manufacturing systems, it is observed to be low with significant variance in tying manufacturing operations management to Enterprise Resource Planning (ERP). Furthermore, it is observed that the integration of additive manufacturing in general, 3D printing, in particular, to be low, but with significant upside of integrating it in their manufacturing operations in the near future. To hasten the readiness of the local and regional manufacturing companies to Industry 4.0 and transitions towards CPPS capabilities, our working group (ADMAR Working Group) in partnership with our university have been engaged with the local and regional manufacturing companies. The goal is to increase awareness, share know-how and capabilities, initiate joint projects, and investigate the possibility of establishing the Center for Cyber Physical Production Systems Innovation (C2P2SI). The center is intended to support the local and regional university-industry research of implementing intelligent factories, enhance new value creation through disruptive innovations, the development of hybrid and data enhanced products, and the creation of digital manufacturing enterprises. All these efforts will enhance local and regional economic development and educate students that have well developed knowledge and applications of cyber physical manufacturing systems and Industry 4.0.

Keywords: automation, cyber-physical production system, digital manufacturing enterprises, disruptive innovation, new value creation, physical-digital-physical loop

Procedia PDF Downloads 120
1089 Electric Propulsion System Development for High Floor Trolley Bus

Authors: Asep Andi Suryandi, Katri Yulianto, Dewi Rianti Mandasari

Abstract:

The development of environmentally friendly vehicles increasingly attracted the attention of almost all countries in the world, including Indonesia. There are various types of environmentally friendly vehicles, such as: electric vehicles, hybrid, and fuel gas. The Electric vehicle has been developed in Indonesia, a private or public vehicle. But many electric vehicles had been developed using the battery as a power source, while the battery technology for electric vehicles still constraints in capacity, dimensions of the battery itself and charging system. Trolley bus is one of the electric buses with the main power source of the network catenary / overhead line with trolley pole as the point of contact. This paper will discuss the design and manufacture electrical system in Trolleybus.

Keywords: trolley bus, electric propulsion system, design, manufacture, electric vehicle

Procedia PDF Downloads 331
1088 Comparative Study of Experimental and Theoretical Convective, Evaporative for Two Model Distiller

Authors: Khaoula Hidouri, Ali Benhmidene, Bechir Chouachi

Abstract:

The purification of brackish seawater becomes a necessity and not a choice against demographic and industrial growth especially in third world countries. Two models can be used in this work: simple solar still and simple solar still coupled with a heat pump. In this research, the productivity of water by Simple Solar Distiller (SSD) and Simple Solar Distiller Hybrid Heat Pump (SSDHP) was determined by the orientation, the use of heat pump, the simple or double glass cover. The productivity can exceed 1.2 L/m²h for the SSDHP and 0.5 L/m²h for SSD model. The result of the global efficiency is determined for two models SSD and SSDHP give respectively 30%, 50%. The internal efficiency attained 35% for SSD and 60% of the SSDHP models. Convective heat coefficient can be determined by attained 2.5 W/m²°C and 0.5 W/m²°C respectively for SSDHP and SSD models.

Keywords: productivity, efficiency, convective heat coefficient, SSD model, SSDHPmodel

Procedia PDF Downloads 197
1087 Highly Transparent, Hydrophobic and Self-Cleaning ZnO-Durazane Based Hybrid Organic-Inorganic Coatings

Authors: Abderrahmane Hamdi, Julie Chalon, Benoit Dodin, Philippe Champagne

Abstract:

In this report, we present a simple route to realize robust, hydrophobic, and highly transparent coatings using organic polysilazane (durazane) and zinc oxide nanoparticles (ZnO). These coatings were deposited by spraying the mixture solution on glass slides. Thus, the properties of the films were characterized by scanning electron microscopy (SEM), Fourier transform infrared spectroscopy (FT-IR), UV–vis-NIR spectrophotometer, and water contact angle method. This sprayable polymer mixed with ZnO nanoparticles shows high transparency for visible light > 90%, a hydrophobic character (CA > 90°), and good mechanical and chemical stability. The coating also demonstrates excellent self-cleaning properties, which makes it a promising candidate for commercial use.

Keywords: coatings, durability, hydrophobicity, organic polysilazane, self-cleaning, transparence, zinc oxide nanoparticles

Procedia PDF Downloads 150
1086 Effect of Using Baffles Inside Spiral Micromixer

Authors: Delara Soltani, Sajad Alimohammadi, Tim Persoons

Abstract:

Microfluidic technology reveals a new area of research in drug delivery, biomedical diagnostics, and the food and chemical industries. Mixing is an essential part of microfluidic devices. There is a need for fast and homogeneous mixing in microfluidic devices. On the other hand, mixing is difficult to achieve in microfluidic devices because of the size and laminar flow in these devices. In this study, a hybrid passive micromixer of a curved channel with obstacles inside the channel is designed. The computational fluid dynamic method is employed to solve governing equations. The results show that using obstacles can improve mixing efficiency in spiral micromixers. the effects of Reynolds number, number, and position of baffles are investigated. In addition, the effect of baffles on pressure drop is presented. this novel micromixer has the potential to utilize in microfluidic devices.

Keywords: CFD, micromixer, microfluidics, spiral, reynolds number

Procedia PDF Downloads 72
1085 Risk Management for Smart Healthcare System: Multi-Criteria Decision-Making (MCDM) Approach

Authors: Abdullah, Ali, Salamai

Abstract:

Smart healthcare management systems (SHMS) play a vital role in medical centers. SHMS has various risks and threats that affect patient care. So, risk management is the best choice to identify and mitigate these risks. This study proposed a multi-criteria decision-making (MCDM) framework for identifying risks in SHMS and selecting the best project in SHMS to reduce risks. This study used the MCDM method to deal with conflict criteria. There are two MCDM methods: CRiteria Importance Through Intercriteria Correlation (CRITIC) and Additive Ration Assessment (ARAS). The CRITIC approach is used to compute the criteria weights, and the ARAS algorithm is used to select the appropriate projects in SHMS. The neutrosophic set (NS) was applied with MCDM methods to deal with inconsistent data in the evaluation process. The results show the Health Data Informational System project is the best. Sensitivity analysis was conducted to show the stability of the rank. The comparative study was conducted to show the effectiveness of the proposed methodology. The outcomes demonstrate the rank of projects is stable through all scenarios, and the proposed methodology is effective compared with MCDM methods.

Keywords: risk management, portfolio management, smart healthcare, neutrosophic set, MCDM

Procedia PDF Downloads 5
1084 Strategic Mine Planning: A SWOT Analysis Applied to KOV Open Pit Mine in the Democratic Republic of Congo

Authors: Patrick May Mukonki

Abstract:

KOV pit (Kamoto Oliveira Virgule) is located 10 km from Kolwezi town, one of the mineral rich town in the Lualaba province of the Democratic Republic of Congo. The KOV pit is currently operating under the Katanga Mining Limited (KML), a Glencore-Gecamines (a State Owned Company) join venture. Recently, the mine optimization process provided a life of mine of approximately 10 years withnice pushbacks using the Datamine NPV Scheduler software. In previous KOV pit studies, we recently outlined the impact of the accuracy of the geological information on a long-term mine plan for a big copper mine such as KOV pit. The approach taken, discussed three main scenarios and outlined some weaknesses on the geological information side, and now, in this paper that we are going to develop here, we are going to highlight, as an overview, those weaknesses, strengths and opportunities, in a global SWOT analysis. The approach we are taking here is essentially descriptive in terms of steps taken to optimize KOV pit and, at every step, we categorized the challenges we faced to have a better tradeoff between what we called strengths and what we called weaknesses. The same logic is applied in terms of the opportunities and threats. The SWOT analysis conducted in this paper demonstrates that, despite a general poor ore body definition, and very rude ground water conditions, there is room for improvement for such high grade ore body.

Keywords: mine planning, mine optimization, mine scheduling, SWOT analysis

Procedia PDF Downloads 210
1083 Genome-Wide Identification of Genes Resistance to Nitric Oxide in Vibrio parahaemolyticus

Authors: Yantao Li, Jun Zheng

Abstract:

Food poison caused by consumption of contaminated food, especially seafood, is one of most serious public health threats worldwide. Vibrio parahaemolyticus is emerging bacterial pathogen and the leading cause of human gastroenteritis associated with food poison, especially in the southern coastal region of China. To successfully cause disease in host, bacterial pathogens need to overcome the host-derived stresses encountered during infection. One of the toxic chemical species elaborated by the host is nitric oxide (NO). NO is generated by acidified nitrite in the stomach and by enzymes of the inducible NO synthase (iNOS) in the host cell, and is toxic to bacteria. Bacterial pathogens have evolved some mechanisms to battle with this toxic stress. Such mechanisms include genes to sense NO produced from immune system and activate others to detoxify NO toxicity, and genes to repair the damage caused by toxic reactive nitrogen species (RNS) generated during NO toxic stress. However, little is known about the NO resistance in V. parahaemolyticus. In this study, a transposon coupled with next generation sequencing (Tn-seq) technology will be utilized to identify genes for NO resistance in V. parahaemolyticus. Our strategy will include construction the saturating transposon insertion library, transposon library challenging with NO, next generation sequencing (NGS), bioinformatics analysis and verification of the identified genes in vitro and in vivo.

Keywords: vibrio parahaemolyticus, nitric oxide, tn-seq, virulence

Procedia PDF Downloads 250
1082 American Criminal Justice Responses to Terrorism in the Post 9/11 Era

Authors: Summer Jackson

Abstract:

September 11, 2001 terrorist attacks exposed weaknesses in federal law enforcement’s ability to proactively counter threats to American homeland security. Following the attacks, legislative reforms and policy changes cleared both bureaucratic and legal obstacles to anti-terrorism efforts. The Federal Bureau of Investigation (FBI) transformed into a domestic intelligence agency responsible for preventing future terrorist attacks. Likewise, the passage of the 2001 USA Patriot Act gave federal agents new discretionary powers to more easily collect intelligence on those suspected of supporting terrorism. Despite these changes, there has been only limited scholarly attention paid to terrorism responses by the federal criminal justice system. This study sought to examine the investigative and prosecutorial changes made in the Post-9/11 era. The methodology employed bivariate and multivariate statistics using data from the American Terrorism Study (ATS). This analysis examined how policy changes are reflected in the nature of terrorism investigations, the handling of terrorist defendants by federal prosecutors, and the outcomes of terrorism cases since 2001. The findings indicate significant investigative and prosecutorial changes in the Post-9/11 era. Specifically, this study found terrorism cases involved younger defendants, fewer indictees per case, less use of human intelligence, less complicated attacks, less serious charges, and more plea bargains. Overall, this study highlights the important shifts in responses to terrorism following the 9/11 attacks.

Keywords: terrorism, law enforcement, post-9/11, federal policy

Procedia PDF Downloads 105
1081 A Framework for Security Risk Level Measures Using CVSS for Vulnerability Categories

Authors: Umesh Kumar Singh, Chanchala Joshi

Abstract:

With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensuring that the network is robust enough against malicious network users like attackers and intruders. Security risk management provides a way to manage the growing threats to infrastructures or system. This paper proposes a framework for risk level estimation which uses vulnerability database National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) and the Common Vulnerability Scoring System (CVSS). The proposed framework measures the frequency of vulnerability exploitation; converges this measured frequency with standard CVSS score and estimates the security risk level which helps in automated and reasonable security management. In this paper equation for the Temporal score calculation with respect to availability of remediation plan is derived and further, frequency of exploitation is calculated with determined temporal score. The frequency of exploitation along with CVSS score is used to calculate the security risk level of the system. The proposed framework uses the CVSS vectors for risk level estimation and measures the security level of specific network environment, which assists system administrator for assessment of security risks and making decision related to mitigation of security risks.

Keywords: CVSS score, risk level, security measurement, vulnerability category

Procedia PDF Downloads 308
1080 Impact of Rebar-Reinforcement on Flexural Response of Shear-Critical Ultrahigh-Performance Concrete Beams

Authors: Yassir M. Abbas, Mohammad Iqbal Khan, Galal Fare

Abstract:

In the present work, the structural responses of 12 ultrahigh-performance concrete (UHPC) beams to four-point loading conditions were experimentally and analytically studied. The inclusion of a fibrous system in the UHPC material increased its compressive and flexural strengths by 31.5% and 237.8%, respectively. Based on the analysis of the load-deflection curves of UHPC beams, it was found that UHPC beams with a low reinforcement ratio are prone to sudden brittle failure. This failure behavior was changed, however, to a ductile one in beams with medium to high ratios. The implication is that improving UHPC beam tensile reinforcement could result in a higher level of safety. More reinforcement bars also enabled the load-deflection behavior to be improved, particularly after yielding.

Keywords: ultrahigh-performance concrete, moment capacity, RC beams, hybrid fiber, ductility

Procedia PDF Downloads 54
1079 Measurement of Natural Radioactivity and Health Hazard Index Evaluation in Major Soils of Tin Mining Areas of Perak

Authors: Habila Nuhu

Abstract:

Natural radionuclides in the environment can significantly contribute to human exposure to ionizing radiation. The knowledge of their levels in an environment can help the radiological protection agencies in policymaking. Measurement of natural radioactivity in major soils in the tin mining state of Perak Malaysia has been conducted using an HPGe detector. Seventy (70) soil samples were collected at widely distributed locations in the state. Six major soil types were sampled, and thirteen districts around the state were covered. The following were the results of the 226Ra (238U), 228Ra (232Th), and 40K activity in the soil samples: 226Ra (238U) has a mean activity concentration of 191.83 Bq kg⁻¹, more than five times the UNSCEAR reference limits of 35 Bq kg⁻¹. The mean activity concentration of 228Ra (232Th) with a value of 232.41 Bq kg⁻¹ is over seven times the UNSCEAR reference values of 30 Bq kg⁻¹. The average concentration of 40K activity was 275.24 Bq kg⁻¹, which was less than the UNSCEAR reference limit of 400 Bq Kg⁻¹. The range of external hazards index (Hₑₓ) values was from 1.03 to 2.05, while the internal hazards index (Hin) was from 1.48 to 3.08. The Hex and Hin should be less than one for minimal external and internal radiation threats as well as secure use of soil material for building construction. The Hₑₓ and Hin results generally indicate that while using the soil types and their derivatives as building materials in the study area, care must be taken.

Keywords: activity concentration, hazard index, soil samples, tin mining

Procedia PDF Downloads 94
1078 Exploring the Challenges and Opportunities in Clinical Waste Management: The Case of Private Clinics, Selangor, Malaysia

Authors: Golyasamin Khanehzaei, Mohd. Bakri Ishak, Ahmad Makmom Hj Abdullah, Latifah Abd Manaf

Abstract:

Abstract—Management of clinical waste is a critical problem worldwide. Immediate attention is required to manage the clinical waste in an appropriate way in newly developing economy country such as Malaysia. The increasing amount of clinical waste generated is resulted from rapid urbanization and growing number of private health care facilities in developing countries such as Malaysia. In order to develop a sensible clinical waste management system and improvement of the management, information on factors affecting clinical waste generation has the crucial role. This paper is the study of management characteristics of clinical waste and the level of efficiency of clinical waste management systems operating in private clinics located in Selangor, Malaysia. Are they following the proper international standards? By taking all of this in consideration the aim of this paper is to identify and discuss the current trend, current challenges and also the present opportunities among the challenges of clinical waste management in private clinics of Selangor, Malaysia. The SWOT analysis was characterized for the evaluation of strengths, weaknesses, opportunities and threats. The methodology for this study was constituted of direct observation, Informal interviews, Conducting SWOT analysis, conduction of one sustainability dimensions analysis and application. The results show that clinical waste management in private clinics is far from an ideal model.

Keywords: clinical waste, SWOT analysis, Selangor, Malaysia

Procedia PDF Downloads 333
1077 From Design, Experience and Play Framework to Common Design Thinking Tools: Using Serious Modern Board Games

Authors: Micael Sousa

Abstract:

Board games (BGs) are thriving as new designs emerge from the hobby community to greater audiences all around the world. Although digital games are gathering most of the attention in game studies and serious games research fields, the post-digital movement helps to explain why in the world dominated by digital technologies, the analog experiences are still unique and irreplaceable to users, allowing innovation in new hybrid environments. The BG’s new designs are part of these post-digital and hybrid movements because they result from the use of powerful digital tools that enable the production and knowledge sharing about the BGs and their face-to-face unique social experiences. These new BGs, defined as modern by many authors, are providing innovative designs and unique game mechanics that are still not yet fully explored by the main serious games (SG) approaches. Even the most established frameworks settled to address SG, as fun games implemented to achieve predefined goals need more development, especially when considering modern BGs. Despite the many anecdotic perceptions, researchers are only now starting to rediscover BGs and demonstrating their potentials. They are proving that BGs are easy to adapt and to grasp by non-expert players in experimental approaches, with the possibility of easy-going adaptation to players’ profiles and serious objectives even during gameplay. Although there are many design thinking (DT) models and practices, their relations with SG frameworks are also underdeveloped, mostly because this is a new research field, lacking theoretical development and the systematization of the experimental practices. Using BG as case studies promise to help develop these frameworks. Departing from the Design, Experience, and Play (DPE) framework and considering the Common Design Think Tools (CDST), this paper proposes a new experimental framework for the adaptation and development of modern BG design for DT: the Design, Experience, and Play for Think (DPET) experimental framework. This is done through the systematization of the DPE and CDST approaches applied in two case studies, where two different sequences of adapted BG were employed to establish a DT collaborative process. These two sessions occurred with different participants and in different contexts, also using different sequences of games for the same DT approach. The first session took place at the Faculty of Economics at the University of Coimbra in a training session of serious games for project development. The second session took place in the Casa do Impacto through The Great Village Design Jam light. Both sessions had the same duration and were designed to progressively achieve DT goals, using BGs as SGs in a collaborative process. The results from the sessions show that a sequence of BGs, when properly adapted to address the DPET framework, can generate a viable and innovative process of collaborative DT that is productive, fun, and engaging. The DPET proposed framework intents to help establish how new SG solutions could be defined for new goals through flexible DT. Applications in other areas of research and development can also benefit from these findings.

Keywords: board games, design thinking, methodology, serious games

Procedia PDF Downloads 96
1076 Intelligent Rescheduling Trains for Air Pollution Management

Authors: Kainat Affrin, P. Reshma, G. Narendra Kumar

Abstract:

Optimization of timetable is the need of the day for the rescheduling and routing of trains in real time. Trains are scheduled in parallel with the road transport vehicles to the same destination. As the number of trains is restricted due to single track, customers usually opt for road transport to use frequently. The air pollution increases as the density of vehicles on road transport is increased. Use of an alternate mode of transport like train helps in reducing air-pollution. This paper mainly aims at attracting the passengers to Train transport by proper rescheduling of trains using hybrid of stop-skip algorithm and iterative convex programming algorithm. Rescheduling of train bi-directionally is achieved on a single track with dynamic dual time and varying stops. Introduction of more trains attract customers to use rail transport frequently, thereby decreasing the pollution. The results are simulated using Network Simulator (NS-2).

Keywords: air pollution, AODV, re-scheduling, WSNs

Procedia PDF Downloads 342
1075 Impact of Agricultural Waste Utilization and Management on the Environment

Authors: Ravi Kumar

Abstract:

Agricultural wastes are the non-product outcomes of agricultural processing whose monetary value is less as compared to its collection cost, transportation, and processing. When such agricultural waste is not properly disposed of, it may damage the natural environment and cause detrimental pollution in the atmosphere. Agricultural development and intensive farming methods usually result in wastes that remarkably affect the rural environments in particular and the global environment in general. Agricultural waste has toxicity latent to human beings, animals, and plants through various indirect and direct outlets. The present paper explores the various activities that result in agricultural waste and the routes that can utilize the agricultural waste in a manageable manner to reduce its adverse impact on the environment. Presently, the agricultural waste management system for ecological agriculture and sustainable development has emerged as a crucial issue for policymakers. There is an urgent need to consider agricultural wastes as prospective resources rather than undesirable in order to avoid the transmission and contamination of water, land, and air resources. Waste management includes the disposal and treatment of waste with a view to eliminate threats of waste by modifying the waste to condense the microbial load. The study concludes that proper waste utilization and management will facilitate the purification and development of the ecosystem and provide feasible biofuel resources. This proper utilization and management of these wastes for agricultural production may reduce their accumulation and further reduce environmental pollution by improving environmental health.

Keywords: agricultural waste, utilization, management, environment, health

Procedia PDF Downloads 74
1074 Detection of Cytotoxicity of Green Synthesized Silver, Gold, and Silver/Gold Bimetallic on Baby Hamster Kidney-21 Cells Using MTT Assay

Authors: Naila Sher, Mushtaq Ahmed, Nadia Mushtaq, Rahmat Ali Khan

Abstract:

In cancer therapy, nanoparticles (NPs) shall be applied possibly by inoculation in the veins of humans. This action will connect them with white (WBCs) and red blood cells (RBCs) in the bloodstream before they reach their main targeted cancer cells. However, possible effects of silver, gold, and silver/gold bimetallic NPs (Ag, Au, and Ag/Au BNPs) on baby hamster kidney-21 (BHK-21) cells were studied by MTT assay. Here, Ag, Au, and their Ag/Au BNPs (bimetallic nanoparticles) were synthesized by using Hippeastrum hybridum (HH) extract. These NPs were characterized by UV-visible spectroscopy, FT-IR, XRD, and EDX, and SEM analysis. XRD analysis conferring the crystal structure with an average size of 13.3, 10.72, and 8.34nm of Ag, Au, and Ag/Au BNPs, respectively. SEM showed that Ag, Au, and Ag/Au BNPs had irregular morphologies, with nano measures calculated sizes of 40, 30, and 20 nm respectively. EDX spectrometers confirmed the presence of elemental Ag signal of the AgNPs with 22.75%, Au signal of the AuNPs with 48.08%, Ag signal with 12%, and Au signal with 38.26% of the Ag/Au BNPs. The BHK-21cells were incubated in the existence of doxorubicin, plant extract, Ag, Au, and Ag/Au BNPs. The cytotoxic effects could be observed in a dose-dependent mode; doxorubicin and Ag/Au BNPs were more toxic than plant extract, Ag, and Au NPs. It is demonstrated that NPs interact with BHK-21cells and significantly reduce cell viability in a concentration-dependent manner. However, to reduce the potential threats of NPs further studies are recommended.

Keywords: hippeastrum hybridum, nanoparticle, BHK-21cells

Procedia PDF Downloads 115
1073 Bitcoin, Blockchain and Smart Contract: Attacks and Mitigations

Authors: Mohamed Rasslan, Doaa Abdelrahman, Mahmoud M. Nasreldin, Ghada Farouk, Heba K. Aslan

Abstract:

Blockchain is a distributed database that endorses transparency while bitcoin is a decentralized cryptocurrency (electronic cash) that endorses anonymity and is powered by blockchain technology. Smart contracts are programs that are stored on a blockchain. Smart contracts are executed when predetermined conditions are fulfilled. Smart contracts automate the agreement execution in order to make sure that all participants immediate-synchronism of the outcome-certainty, without any intermediary's involvement or time loss. Currently, the Bitcoin market worth billions of dollars. Bitcoin could be transferred from one purchaser to another without the need for an intermediary bank. Network nodes through cryptography verify bitcoin transactions, which are registered in a public-book called “blockchain”. Bitcoin could be replaced by other coins, merchandise, and services. Rapid growing of the bitcoin market-value, encourages its counterparts to make use of its weaknesses and exploit vulnerabilities for profit. Moreover, it motivates scientists to define known vulnerabilities, offer countermeasures, and predict future threats. In his paper, we study blockchain technology and bitcoin from the attacker’s point of view. Furthermore, mitigations for the attacks are suggested, and contemporary security solutions are discussed. Finally, research methods that achieve strict security and privacy protocol are elaborated.

Keywords: Cryptocurrencies, Blockchain, Bitcoin, Smart Contracts, Peer-to-Peer Network, Security Issues, Privacy Techniques

Procedia PDF Downloads 62
1072 Tomato Fruit Color Changes during Ripening of Vine

Authors: A.Radzevičius, P. Viškelis, J. Viškelis, R. Karklelienė, D. Juškevičienė

Abstract:

Tomato (Lycopersicon esculentum Mill.) hybrid 'Brooklyn' was investigated at the LRCAF Institute of Horticulture. For investigation, five green tomatoes, which were grown on vine, were selected. Color measurements were made in the greenhouse with the same selected tomato fruits (fruits were not harvested and were growing and ripening on tomato vine through all experiment) in every two days while tomatoes fruits became fully ripen. Study showed that color index L has tendency to decline and established determination coefficient (R2) was 0.9504. Also, hue angle has tendency to decline during tomato fruit ripening on vine and it’s coefficient of determination (R2) reached–0.9739. Opposite tendency was determined with color index a, which has tendency to increase during tomato ripening and that was expressed by polynomial trendline where coefficient of determination (R2) reached–0.9592.

Keywords: color, color index, ripening, tomato

Procedia PDF Downloads 471
1071 Integrated Risk Management as a Framework for Organisational Success

Authors: Olakunle Felix Adekunle

Abstract:

Risk management is recognised as an essential tool to tackle the inevitable uncertainty associated with business and projects at all levels. But it frequently fails to meet expectations, with projects continuing to run late, over budget or under performing, and business is not gaining the expected benefits. The evident disconnect which often occurs between strategic vision and tactical project delivery typically arises from poorly defined project objectives and inadequate attention to the proactive management of risks that could affect those objectives. One of the main failings in the traditional approach to risk management arises from a narrow focus on the downside, restricted to the technical or operational field, addressing tactical threats to processes, performance or people. This shortcoming can be overcome by widening the scope of risk management to encompass both strategic risks and upside opportunities, creating an integrated approach which can bridge the gap between strategy and tactics. Integrated risk management addresses risk across a variety of levels in the organisation, including strategy and tactics, and covering both opportunity and threat. Effective implementation of integrated risk management can produce a number of benefits to the organisation which are not available from the typical limited-scope risk process. This paper explores how to expand risk management to deliver strategic advantage while retaining its use as a tactical tool.

Keywords: risk management, success, organization, strategy, project, tactis, vision

Procedia PDF Downloads 372
1070 A Review on Factors Influencing Implementation of Secure Software Development Practices

Authors: Sri Lakshmi Kanniah, Mohd Naz’ri Mahrin

Abstract:

More and more businesses and services are depending on software to run their daily operations and business services. At the same time, cyber-attacks are becoming more covert and sophisticated, posing threats to software. Vulnerabilities exist in the software due to the lack of security practices during the phases of software development. Implementation of secure software development practices can improve the resistance to attacks. Many methods, models and standards for secure software development have been developed. However, despite the efforts, they still come up against difficulties in their deployment and the processes are not institutionalized. There is a set of factors that influence the successful deployment of secure software development processes. In this study, the methodology and results from a systematic literature review of factors influencing the implementation of secure software development practices is described. A total of 44 primary studies were analysed as a result of the systematic review. As a result of the study, a list of twenty factors has been identified. Some of factors that affect implementation of secure software development practices are: Involvement of the security expert, integration between security and development team, developer’s skill and expertise, development time and communication between stakeholders. The factors were further classified into four categories which are institutional context, people and action, project content and system development process. The results obtained show that it is important to take into account organizational, technical and people issues in order to implement secure software development initiatives.

Keywords: secure software development, software development, software security, systematic literature review

Procedia PDF Downloads 354
1069 Multistage Adomian Decomposition Method for Solving Linear and Non-Linear Stiff System of Ordinary Differential Equations

Authors: M. S. H. Chowdhury, Ishak Hashim

Abstract:

In this paper, linear and non-linear stiff systems of ordinary differential equations are solved by the classical Adomian decomposition method (ADM) and the multi-stage Adomian decomposition method (MADM). The MADM is a technique adapted from the standard Adomian decomposition method (ADM) where standard ADM is converted into a hybrid numeric-analytic method called the multistage ADM (MADM). The MADM is tested for several examples. Comparisons with an explicit Runge-Kutta-type method (RK) and the classical ADM demonstrate the limitations of ADM and promising capability of the MADM for solving stiff initial value problems (IVPs).

Keywords: stiff system of ODEs, Runge-Kutta Type Method, Adomian decomposition method, Multistage ADM

Procedia PDF Downloads 421
1068 The Evaluation of Transformational Leadership Characteristics and Behaviors in Air Forces

Authors: Cuma Şimşek

Abstract:

Nowadays our globalized world is in a very rapid and sophisticated change. In the information age, notion of ‘information’ has begun to spread faster than ever also in this age, changes and transformation has gained tremendous momentum with technology boom. This continuous change and transformation, increased the competition between existing organizations and corporations. Besides, the organizations which show resistance to change has been put out of action in this competitive environment. It is not possible to sustain the existence of organizations without adapting to change and transformation by isolating itself from developments. As a consequence of improved communication and dialog possibilities by means of increasing knowledge level, there has been made a change of scene in administrative mentality, style and activation, especially in 21th century. Leaders emerge as the most important factor in this process of perception and success. At the same time it is not enough to adapt the alteration with conventional leadership abilities and behaviors. In parallel with alteration, new types of leadership are coming up. The optimal leadership type for our era and a trending topic "Transformational Leadership" is in great demand now. In this research, current situation of the Air Forces which use high-technology weapons efficiently, operates in an environment full of threats and is analyzed. It is evaluated that in order to be ready for war continuously and adjusting itself to changing terms of warfare atmosphere , Air Forces need ‘transformational leaders’ who are innovative, foreseeing and having a vision so that they can develop new methods and strategies for complex problems. Because it is the Air Force which is responsible for being the deterrent force of its country.

Keywords: transformational, change, air force, leadership

Procedia PDF Downloads 428
1067 Application of Innovative Implementations in the SME Sector

Authors: Mateusz Janas

Abstract:

Innovative implementations in the micro, small, and medium-sized enterprises (MSME) sector are among the essential activities considering the current market realities, technological advancements, and digitization trends. MSMEs play a crucial role and significantly influence the economic conditions of countries, as their competitiveness directly impacts the global economy. Business development and investment in innovation and technology are integral parts of every modern enterprise's strategy, seeking to maintain and achieve a desired competitive position. The instability of the socio-economic environment, along with contemporary changes in artificial intelligence implementation and digitization, requires businesses to adopt increasingly newer solutions and actions. Enterprises must strive to survive in the global market and build competitive positions, especially in uncertain conditions. Being aware of the significance of innovative actions is crucial for MSMEs as it enables them to enhance their operations and expand their scope. It is essential for managers and executives of MSMEs to be focused on development and innovation, as their approach will also impact their employees, emphasizing results and maximizing the company's value. Managers of MSMEs must be aware of various threats, costs, opportunities, and gains that can arise from implementing new technical and organizational solutions. Businesses must view development as an integral part of their strategy and continuously strive for improvement.

Keywords: innovation, SME, develop, management

Procedia PDF Downloads 49
1066 Experimental and Numerical Analysis on Enhancing Mechanical Properties of CFRP Adhesive Joints Using Hybrid Nanofillers

Authors: Qiong Rao, Xiongqi Peng

Abstract:

In this work, multi-walled carbon nanotubes (MWCNTs) and graphene nanoplates (GNPs) were dispersed into epoxy adhesive to investigate their synergy effects on the shear properties, mode I and mode II fracture toughness of unidirectional composite bonded joints. Testing results showed that the incorporation of MWCNTs and GNPs significantly improved the shear strength, the mode I and mode II fracture toughness by 36.6%, 45% and 286%, respectively. In addition, the fracture surfaces of the bonding area as well as the toughening mechanism of nanofillers were analyzed. Finally, a nonlinear cohesive/friction coupled model for delamination analysis of adhesive layer under shear and normal compression loadings was proposed and implemented in ABAQUS/Explicit via user subroutine VUMAT.

Keywords: nanofillers, adhesive joints, fracture toughness, cohesive zone model

Procedia PDF Downloads 118
1065 Calculation of Organ Dose for Adult and Pediatric Patients Undergoing Computed Tomography Examinations: A Software Comparison

Authors: Aya Al Masri, Naima Oubenali, Safoin Aktaou, Thibault Julien, Malorie Martin, Fouad Maaloul

Abstract:

Introduction: The increased number of performed 'Computed Tomography (CT)' examinations raise public concerns regarding associated stochastic risk to patients. In its Publication 102, the ‘International Commission on Radiological Protection (ICRP)’ emphasized the importance of managing patient dose, particularly from repeated or multiple examinations. We developed a Dose Archiving and Communication System that gives multiple dose indexes (organ dose, effective dose, and skin-dose mapping) for patients undergoing radiological imaging exams. The aim of this study is to compare the organ dose values given by our software for patients undergoing CT exams with those of another software named "VirtualDose". Materials and methods: Our software uses Monte Carlo simulations to calculate organ doses for patients undergoing computed tomography examinations. The general calculation principle consists to simulate: (1) the scanner machine with all its technical specifications and associated irradiation cases (kVp, field collimation, mAs, pitch ...) (2) detailed geometric and compositional information of dozens of well identified organs of computational hybrid phantoms that contain the necessary anatomical data. The mass as well as the elemental composition of the tissues and organs that constitute our phantoms correspond to the recommendations of the international organizations (namely the ICRP and the ICRU). Their body dimensions correspond to reference data developed in the United States. Simulated data was verified by clinical measurement. To perform the comparison, 270 adult patients and 150 pediatric patients were used, whose data corresponds to exams carried out in France hospital centers. The comparison dataset of adult patients includes adult males and females for three different scanner machines and three different acquisition protocols (Head, Chest, and Chest-Abdomen-Pelvis). The comparison sample of pediatric patients includes the exams of thirty patients for each of the following age groups: new born, 1-2 years, 3-7 years, 8-12 years, and 13-16 years. The comparison for pediatric patients were performed on the “Head” protocol. The percentage of the dose difference were calculated for organs receiving a significant dose according to the acquisition protocol (80% of the maximal dose). Results: Adult patients: for organs that are completely covered by the scan range, the maximum percentage of dose difference between the two software is 27 %. However, there are three organs situated at the edges of the scan range that show a slightly higher dose difference. Pediatric patients: the percentage of dose difference between the two software does not exceed 30%. These dose differences may be due to the use of two different generations of hybrid phantoms by the two software. Conclusion: This study shows that our software provides a reliable dosimetric information for patients undergoing Computed Tomography exams.

Keywords: adult and pediatric patients, computed tomography, organ dose calculation, software comparison

Procedia PDF Downloads 143
1064 Occurrence of the fall armyworm, Spodoptera frugiperda (J. E. Smith) (Lepidoptera, Noctuidae), on Maize in Katsina State, Nigeria and preliminary study of its Developmental Characteristics under Laboratory Conditions

Authors: Ibrahim Sani, Suleiman Mohammed., Salisu Sulaiman, Aminu Musa

Abstract:

The fall army worm (FAW), Spodoptera frugiperda (J. E. Smith) (Lepidoptera, Noctuidae) has recently become one of the major threats to maize production in the world. It is native to tropical and subtropical America and began to spread to many African and a few Asian Countries. A survey for the observation of infestation and collection of fall armyworm was conducted in field planted with maize in the northern part of Katsina state. Eggs and immature stages were collected, place in a plastic container and brought to the laboratory for observation and study of developmental stages. FAW was identified based on the morphological characteristics, i.e. the “Y” inverted shape on the head capsule and the patterns of black spots on the abdominal segments (square and trapezoidal forms). Different growing stage of maize are affected by fall armyworm, but the damage is greatest during the early growing phase of corn. Heavy infestation on the leaves also cause defoliation. Four developmental stages (eggs larvae, pupae and adults) of the FAW were studied when fed with young corn under laboratory conditions. Furthermore, effective scouting or monitoring of FAW could be practice at early stage of growth of maize.

Keywords: infestation, katsina, maize, fall armyworm

Procedia PDF Downloads 51