Search results for: high security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 22002

Search results for: high security

20712 A Nanoelectromechanical Tunable Oscillator Base on a High-Q Optical Cavity

Authors: Jianguo Huang, Hong Cai, Bin Dong, Jifang Tao, Aiqun Liu, Dim-Lee Kwong, Yuandong Gu

Abstract:

We developed a miniaturized tunable optomechanical oscillator based on the nanoelectromechanical systems (NEMS) technology, and its frequencies can be electrostatically tuned by as much as 10%. By taking both advantages of optical and electrical spring, the oscillator achieves a high tuning sensitivity without resorting to mechanical tension. In particular, the proposed high-Q optical cavity design greatly enhances the system sensitivity, making it extremely sensitive to the small motional signal.

Keywords: nanoelectromechanical systems (NEMS), nanotechnology, optical force, oscillator

Procedia PDF Downloads 491
20711 The Cost-Effectiveness of High-Volume Hospital’s Surgical Care for Pancreatic Cancer: Economic Evidence Reviewed

Authors: Shannon Hearney, Jeffrey Hoch

Abstract:

Pancreatic cancer is a notoriously costly and deadly form of cancer. Many types of treatment centers exist for patients to seek care from, including high-volume centers which have shown promise to provide the highest quality of care. While it may be true that this type of center provides the best care it is unclear if that care is cost-effective. Studies in the US have confirmed that high-volume hospitals do provide higher quality of care but have shown inconsistencies in the cost-effectiveness of that care. Other studies, like those from Finland have shown that high-volume centers had lower mortality and lower costs than low-volume centers. This paper thus seeks to review the current scientific literature to better understand if high-volume centers are cost-effective in delivering care in both a European setting and in the US. A review of major reference databases such as Medline, Embase and PubMed will be conducted for cost-effectiveness studies on the surgical treatment of pancreatic cancer at high-volume centers. Possible MeSH terms to be included, but not limited to, are: “pancreatic cancer”, “cost analysis”, “cost-effectiveness”, “economic evaluation”, “pancreatic neoplasms”, “surgical”, and “high-volume”. Studies must also have been available in the English language. This review will encompass European scientific literature, as well as those in the US. Based on our preliminary findings, we anticipate high-volume hospitals to provide better care at greater costs. We anticipate that high-volume hospitals may be cost-effective in different contexts depending on the national structure of a healthcare system. Countries with more centralized and socialized healthcare may yield results that are more cost-effective. High-volume centers may differ in their cost-effectiveness of the surgical care of pancreatic cancer internationally especially when comparing those in the United States to others throughout Europe.

Keywords: cost-effectiveness analysis, economic evaluation, pancreatic cancer, scientific literature review

Procedia PDF Downloads 85
20710 Introduce a New Model of Anomaly Detection in Computer Networks Using Artificial Immune Systems

Authors: Mehrshad Khosraviani, Faramarz Abbaspour Leyl Abadi

Abstract:

The fundamental component of the computer network of modern information society will be considered. These networks are connected to the network of the internet generally. Due to the fact that the primary purpose of the Internet is not designed for, in recent decades, none of these networks in many of the attacks has been very important. Today, for the provision of security, different security tools and systems, including intrusion detection systems are used in the network. A common diagnosis system based on artificial immunity, the designer, the Adhasaz Foundation has been evaluated. The idea of using artificial safety methods in the diagnosis of abnormalities in computer networks it has been stimulated in the direction of their specificity, there are safety systems are similar to the common needs of m, that is non-diagnostic. For example, such methods can be used to detect any abnormalities, a variety of attacks, being memory, learning ability, and Khodtnzimi method of artificial immune algorithm pointed out. Diagnosis of the common system of education offered in this paper using only the normal samples is required for network and any additional data about the type of attacks is not. In the proposed system of positive selection and negative selection processes, selection of samples to create a distinction between the colony of normal attack is used. Copa real data collection on the evaluation of ij indicates the proposed system in the false alarm rate is often low compared to other ir methods and the detection rate is in the variations.

Keywords: artificial immune system, abnormality detection, intrusion detection, computer networks

Procedia PDF Downloads 349
20709 An Intelligent Watch-Over System Using an IoT Device, for Elderly People Living by Themselves

Authors: Hideo Suzuki, Yuya Kiyonobu, Kotaro Matsushita, Masaki Hanada, Rie Suzuki, Noriko Niijima, Noriko Uosaki, Tadao Nakamura

Abstract:

People often worry about their elderly family members who are living by themselves or staying alone somewhere. An intelligent watch-over system for such elderly people, using a Raspberry Pi IoT device, has been newly developed to monitor those who live or stay separately from their families and alert them if a problem occurs. The system consists of motion sensors and temperature-humidity combined sensors that are located at seven points within an elderly person's home. The intelligent algorithms of the system detect signs and the possibility of unhealthy situations arising for the elderly relative; e.g., an unusually long bathing time, or a visit to a restroom, too high a room temperature, etc., by using data cached by the sensors above, at seven points within their house. The system gives more consideration to the elderly person's privacy, by using the sensors above, instead of using cameras and microphones placed around the house. The system invented and described here, can send a Twitter direct message to designated family members when an elderly relative is possibly in an unhealthy condition. Thus the system helps decrease family members' anxieties regarding their elderly relatives and increases their sense of security.

Keywords: elderly person, IoT device, Raspberry Pi, watch-over system

Procedia PDF Downloads 218
20708 Production Value, Constraints, and Opportunities in East African Freshwater Fisheries: Systematic Review

Authors: Alamrew Eyayu, Abebe Getahun, James Last Keyombe

Abstract:

Demand for fish continued to grow worldwide while production from capture fisheries has decreased. In the Eastern African Region (EAR), the open-access nature of capture fisheries has resulted in illegal fishing. Within communities engaged in fishing, small-scale fisheries support food security strategies and sustain livelihoods. Despite the role of fisheries in EAR, inland fisheries are vulnerable to loss, and management solutions authorized for inland fisheries are inadequate. This review investigates production potential, challenges, opportunities, and management of inland fisheries in the EAR. It is therefore expected that in aquaculture promising areas, the EAR will turn to depend more on aquaculture to meet the extended needs and supply gaps created as a result of capture fisheries shortfalls. However, aquaculture is still in its infant stage in the region, and there exists no adequate aquaculture policy framework and funds in some EAR (e.g., Ethiopia, Somalia). Stakeholders at all levels should entertain the importance of fishery-based activities for food security in EAR. As a result, easily implemented and community-oriented fisheries legislative documents need to be prepared for advancing sustainable fisheries management. Legislative documents might consider techniques of continual catch statistics (consider small water bodies as much as possible) of inland fisheries and enforcing existing laws to manage illegal fishing activities to accustom sustainable development of inland capture fisheries.

Keywords: aquaculture, capture fisheries, East Africa, fisheries management

Procedia PDF Downloads 13
20707 Comparison of Catalyst Support for High Pressure Reductive Amination

Authors: Tz-Bang Du, Cheng-Han Hsieh, Li-Ping Ju, Hung-Jie Liou

Abstract:

Polyether amines synthesize by secondary hydroxyl polyether diol play an important role in epoxy hardener. The low molecular weight product is used in low viscosity and high transparent polyamine product for the logo, ground cover, especially for wind turbine blade, while the high molecular weight products are used in advanced agricultures such as a high-speed railway. High-pressure reductive amination process is required for producing these amines. In the condition of higher than 150 atm pressure and 200 degrees Celsius temperature, supercritical ammonia is used as a reactant and also a solvent. It would be a great challenge to select a catalyst support for such high-temperature alkaline circumstance. In this study, we have established a six-autoclave-type (SAT) high-pressure reactor for amination catalyst screening, which six experiment conditions with different temperature and pressure could be examined at the same time. We synthesized copper-nickel catalyst on different shaped alumina catalyst support and evaluated the catalyst activity for high-pressure reductive amination of polypropylene glycol (PPG) by SAT reactor. Ball type gamma alumina, ball type activated alumina and pellet type gamma alumina catalyst supports are evaluated in this study. Gamma alumina supports have shown better activity on PPG reductive amination than activated alumina support. In addition, the catalysts are evaluated in fixed bed reactor. The diamine product was successfully synthesized via this catalyst and the strength of the catalysts is measured. The crush strength of blank supports is about 13.5 lb for both gamma alumina and activated alumina. The strength increases to 20.3 lb after synthesized to be copper-nickel catalyst. After test in the fixed bed high-pressure reductive amination process for 100 hours, the crush strength of the used catalyst is 3.7 lb for activated alumina support, 12.0 lb for gamma alumina support. The gamma alumina is better than activated alumina to use as catalyst support in high-pressure reductive amination process.

Keywords: high pressure reductive amination, copper nickel catalyst, polyether amine, alumina

Procedia PDF Downloads 223
20706 Protecting Labor Rights in the Platform Economy: Legal Challenges and Innovative Explorations

Authors: Ruwen Pei

Abstract:

In the rapidly evolving landscape of the digital economy, platform employment has emerged as a transformative labor force, fundamentally altering the traditional paradigms of the employer-employee relationship. This paper provides a comprehensive analysis of the unique dynamics and intricate legal challenges associated with platform work, where workers often navigate precarious labor conditions without the robust safety nets typically afforded in traditional industries. It underscores the limitations of current labor regulations, particularly in addressing pressing concerns such as income volatility and disparate benefits. By drawing insights from diverse global case studies, this study emphasizes the compelling need for platform companies to shoulder their social welfare responsibilities, ensuring fair treatment and security for their workers. Moreover, it critically examines the profound influence of socio-cultural factors and educational awareness on the platform economy, shedding light on the complexities of this emerging labor landscape. Advocating for a harmonious equilibrium between flexibility and security, this paper calls for substantial legal reforms and innovative policy initiatives that can adapt to the evolving nature of work in the digital age. Finally, it anticipates forthcoming trends in the digital economy and platform labor relations, underscoring the significance of proactive adaptation to foster equitable and inclusive employment practices.

Keywords: platform employment, labor protections, social welfare, legal reforms, digital economy

Procedia PDF Downloads 56
20705 21st Century Gunboat Diplomacy and Strategic Sea Areas

Authors: Mustafa Avsever

Abstract:

Throughout history, states have attached great importance to seas in terms of economic and security. Advanced civilizations have always founded in coastal regions. Over time, human being has tended to trade and naturally always aimed get more and more. Seas by covering 71% of the earth, provide the greatest economic opportunities for access to raw material resources and the world market. As a result, seas have become the most important areas of conflict over the course of time. Coastal states, use seas as a tool for defense zone, trade, marine transportation and power transfer, they have acquired colonies overseas and increased their capital, raw materials and labor. Societies, have increased their economic prosperity, though their navies in order to retain their welfare and achieve their foreign policy objectives. Sometimes they have imposed their demands through the use or threat of limited naval force in accordance with their interests that is gunboat diplomacy. Today we can see samples of gunboat diplomacy used in the Eastern Mediterranean, during Ukraine crisis, in dispute between North Korea and South Korea and the ongoing power struggle in Asia-Pacific. Gunboat diplomacy has been and continues to be applied consistently in solving problems by the stronger side of the problem. The purpose of this article is to examine using navy under the gunboat diplomacy as an active instrument of foreign policy and security policy and reveal the strategic sea areas in which gunboat diplomacy is used effectively in the matrix of international politics in the 21st century.

Keywords: gunboat diplomacy, maritime strategy, sea power, strategic sea lands

Procedia PDF Downloads 430
20704 Revival of Old Silk Route and New Maritime Route: An Opportunity for India or Hidden Geopolitics of China

Authors: Geetanjali Sharma

Abstract:

There are always provincial variations which deserve more detailed treatment. Before the arrival of modern era, geography and cultural homogeneity were determining factors of human habitat and migration. Boundaries as if we see them, did not exist earlier. The connectivity of the world was also different as of now. The reinforcement of the old silk route will improve economic cooperation and connectivity between Asian, European and African countries, but obviously, it is designed to improve China’s geopolitical and geostrategic position in the world. The paper is based on the secondary sources of data. Analytical and historical approach has been used to clarify the ties between the old silk routes and new One-Belt-One-Road initiative China. The paper begins with an explanation of the historical background of the old Silk Route, its origin and development, trailed by an analysis of latest declarations by the Chinese leaders to revive it. It also discusses the impacts of this initiative on India’s economy and cultural exchange between associated regions. Lastly, the paper sums up the findings and suggestions for keeping a balance between the security and economic relationship between the countries. It concludes that the silk route is an effort in commencing a ‘grand strategy’ for global trade and cooperation with hidden objectives of China to increase the investment of China in other continents as well. The revival of silk route may prove to be a very helpful in reinforcing cooperation and raising it to a new level of economic establishments. However, China has yet to promote the much-needed political and strategic trust.

Keywords: OBOR (One-Belt-One-Road), geopolitics, economic relation, security concerns

Procedia PDF Downloads 281
20703 Small Businesses as Vehicles for Job Creation in North-West Nigeria

Authors: Mustapha Shitu Suleiman, Francis Neshamba, Nestor Valero-Silva

Abstract:

Small businesses are considered as engine of economic growth, contributing to employment generation, wealth creation, and poverty alleviation and food security in both developed and developing countries. Nigeria is facing many socio-economic problems and it is believed that by supporting small business development, as propellers of new ideas and more effective users of resources, often driven by individual creativity and innovation, Nigeria would be able to address some of its economic and social challenges, such as unemployment and economic diversification. Using secondary literature, this paper examines the role small businesses can play in the creation of jobs in North-West Nigeria to overcome issues of unemployment, which is the most devastating economic challenge facing the region. Most studies in this area have focused on Nigeria as a whole and only a few studies provide a regional focus, hence, this study will contribute to knowledge by filling this gap by concentrating on North-West Nigeria. It is hoped that with the present administration’s determination to improve the economy, small businesses would be used as vehicles for diversification of the economy away from crude oil to create jobs that would lead to a reduction in the country’s high unemployment level.

Keywords: job creation, north-west, Nigeria, small business, unemployment

Procedia PDF Downloads 299
20702 Real-Time Pedestrian Detection Method Based on Improved YOLOv3

Authors: Jingting Luo, Yong Wang, Ying Wang

Abstract:

Pedestrian detection in image or video data is a very important and challenging task in security surveillance. The difficulty of this task is to locate and detect pedestrians of different scales in complex scenes accurately. To solve these problems, a deep neural network (RT-YOLOv3) is proposed to realize real-time pedestrian detection at different scales in security monitoring. RT-YOLOv3 improves the traditional YOLOv3 algorithm. Firstly, the deep residual network is added to extract vehicle features. Then six convolutional neural networks with different scales are designed and fused with the corresponding scale feature maps in the residual network to form the final feature pyramid to perform pedestrian detection tasks. This method can better characterize pedestrians. In order to further improve the accuracy and generalization ability of the model, a hybrid pedestrian data set training method is used to extract pedestrian data from the VOC data set and train with the INRIA pedestrian data set. Experiments show that the proposed RT-YOLOv3 method achieves 93.57% accuracy of mAP (mean average precision) and 46.52f/s (number of frames per second). In terms of accuracy, RT-YOLOv3 performs better than Fast R-CNN, Faster R-CNN, YOLO, SSD, YOLOv2, and YOLOv3. This method reduces the missed detection rate and false detection rate, improves the positioning accuracy, and meets the requirements of real-time detection of pedestrian objects.

Keywords: pedestrian detection, feature detection, convolutional neural network, real-time detection, YOLOv3

Procedia PDF Downloads 137
20701 An Assessment of Rice Yield Improvement Among Smallholder Rice Farmers in Asunafo North Municipality of Ghana

Authors: Isaac Diaka, Matsui Kenichi

Abstract:

Ghana’s rice production has increased mainly because of increased cultivated areas. On this point, scholars who promoted crop production increase for food security have overlooked the fact that its per-acre yield has not increased. Also, Ghana’s domestic rice production has not contributed much to domestic rice consumption especially in major cities where consumers tend to rely on imported rice from Asia. Considering these points, the paper seeks to understand why smallholder rice farmers have not been able to increase per acre rice yield. It also examines smallholder rice farmers’ rice yield improvement needs, and the relationship that exist between rice farmers’ socioeconomic factors and their yield levels by rice varieties. The study adopted a simple random sampling technique to select 154 rice farmers for a questionnaire survey between October and November 2020. The data was analyzed by performing a correlation analysis, an independent t-test, and Kendall’s coefficient of concordance. The results showed that 58.4% of the respondents cultivated popular high-yield varieties like AGRA and Jasmine. The rest used local varieties. Regarding respondents’ yield differentials, AGRA and Jasmine had an average yield of 2.6 mt/ha, which is higher than that of local varieties (1.6mt/ha). The study found untimely availability of improved seed varieties and high cost of inputs some of the major reasons affecting yield in the area. For respondents’ yield improvement needs, Kendall’s coefficient of concordance showed that access to improved varieties, irrigation infrastructure, and row planting were respondents’ major technological needs. As to their non-technological needs, the respondents needed timely information about rice production, access to credit support options, and extension services. The correlation analysis revealed that farm size and off-farm income exhibited a positive and negative association towards respondents’ yield level, respectively. This paper then discusses recommendations for providing with improved rice production technologies to farmers.

Keywords: Ghana, rice, smallholder farmers, yield improvement.

Procedia PDF Downloads 85
20700 Auto-Tuning of CNC Parameters According to the Machining Mode Selection

Authors: Jenq-Shyong Chen, Ben-Fong Yu

Abstract:

CNC(computer numerical control) machining centers have been widely used for machining different metal components for various industries. For a specific CNC machine, its everyday job is assigned to cut different products with quite different attributes such as material type, workpiece weight, geometry, tooling, and cutting conditions. Theoretically, the dynamic characteristics of the CNC machine should be properly tuned match each machining job in order to get the optimal machining performance. However, most of the CNC machines are set with only a standard set of CNC parameters. In this study, we have developed an auto-tuning system which can automatically change the CNC parameters and in hence change the machine dynamic characteristics according to the selection of machining modes which are set by the mixed combination of three machine performance indexes: the HO (high surface quality) index, HP (high precision) index and HS (high speed) index. The acceleration, jerk, corner error tolerance, oscillation and dynamic bandwidth of machine’s feed axes have been changed according to the selection of the machine performance indexes. The proposed auto-tuning system of the CNC parameters has been implemented on a PC-based CNC controller and a three-axis machining center. The measured experimental result have shown the promising of our proposed auto-tuning system.

Keywords: auto-tuning, CNC parameters, machining mode, high speed, high accuracy, high surface quality

Procedia PDF Downloads 374
20699 Designing, Processing and Isothermal Transformation of Al-Si High Carbon Ultrafine High Strength Bainitic Steel

Authors: Mohamed K. El-Fawkhry, Ahmed Shash, Ahmed Ismail Zaki Farahat, Sherif Ali Abd El Rahman, Taha Mattar

Abstract:

High-carbon, silicon-rich steels are commonly suggested to obtain very fine bainitic microstructure at low temperature ranged from 200 to 300°C. Thereby, the resulted microstructure consists of slender of bainitic-ferritic plates interwoven with retained austenite. The advanced strength and ductility package of this steel is much dependent on the fineness of bainitic ferrite, as well as the retained austenite phase. In this article, Aluminum to Silicon ratio, and the isothermal transformation temperature have been adopted to obtain ultra high strength high carbon steel. Optical and SEM investigation of the produced steels have been performed. XRD has been used to track the retained austenite development as a result of the change in the chemical composition of developed steels and heat treatment process. Mechanical properties in terms of hardness and microhardness of obtained phases and structure were investigated. It was observed that the increment of aluminum to silicon ratio has a great effect in promoting the bainitic transformation, in tandem with improving the stability and the fineness of retained austenite. Such advanced structure leads to enhancement in the whole mechanical properties of the high carbon steel.

Keywords: high-carbon steel, silicon-rich steels, fine bainitic microstructure, retained austenite, isothermal transformation

Procedia PDF Downloads 341
20698 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks

Authors: Walid Abdallah, Noureddine Boudriga

Abstract:

Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.

Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based

Procedia PDF Downloads 652
20697 A Methodology for the Synthesis of Multi-Processors

Authors: Hamid Yasinian

Abstract:

Random epistemologies and hash tables have garnered minimal interest from both security experts and experts in the last several years. In fact, few information theorists would disagree with the evaluation of expert systems. In our research, we discover how flip-flop gates can be applied to the study of superpages. Though such a hypothesis at first glance seems perverse, it is derived from known results.

Keywords: synthesis, multi-processors, interactive model, moor’s law

Procedia PDF Downloads 431
20696 Denoising Convolutional Neural Network Assisted Electrocardiogram Signal Watermarking for Secure Transmission in E-Healthcare Applications

Authors: Jyoti Rani, Ashima Anand, Shivendra Shivani

Abstract:

In recent years, physiological signals obtained in telemedicine have been stored independently from patient information. In addition, people have increasingly turned to mobile devices for information on health-related topics. Major authentication and security issues may arise from this storing, degrading the reliability of diagnostics. This study introduces an approach to reversible watermarking, which ensures security by utilizing the electrocardiogram (ECG) signal as a carrier for embedding patient information. In the proposed work, Pan-Tompkins++ is employed to convert the 1D ECG signal into a 2D signal. The frequency subbands of a signal are extracted using RDWT(Redundant discrete wavelet transform), and then one of the subbands is subjected to MSVD (Multiresolution singular valued decomposition for masking. Finally, the encrypted watermark is embedded within the signal. The experimental results show that the watermarked signal obtained is indistinguishable from the original signals, ensuring the preservation of all diagnostic information. In addition, the DnCNN (Denoising convolutional neural network) concept is used to denoise the retrieved watermark for improved accuracy. The proposed ECG signal-based watermarking method is supported by experimental results and evaluations of its effectiveness. The results of the robustness tests demonstrate that the watermark is susceptible to the most prevalent watermarking attacks.

Keywords: ECG, VMD, watermarking, PanTompkins++, RDWT, DnCNN, MSVD, chaotic encryption, attacks

Procedia PDF Downloads 92
20695 Privacy Preserving in Association Rule Mining on Horizontally Partitioned Database

Authors: Manvar Sagar, Nikul Virpariya

Abstract:

The advancement in data mining techniques plays an important role in many applications. In context of privacy and security issues, the problems caused by association rule mining technique are investigated by many research scholars. It is proved that the misuse of this technique may reveal the database owner’s sensitive and private information to others. Many researchers have put their effort to preserve privacy in Association Rule Mining. Amongst the two basic approaches for privacy preserving data mining, viz. Randomization based and Cryptography based, the later provides high level of privacy but incurs higher computational as well as communication overhead. Hence, it is necessary to explore alternative techniques that improve the over-heads. In this work, we propose an efficient, collusion-resistant cryptography based approach for distributed Association Rule mining using Shamir’s secret sharing scheme. As we show from theoretical and practical analysis, our approach is provably secure and require only one time a trusted third party. We use secret sharing for privately sharing the information and code based identification scheme to add support against malicious adversaries.

Keywords: Privacy, Privacy Preservation in Data Mining (PPDM), horizontally partitioned database, EMHS, MFI, shamir secret sharing

Procedia PDF Downloads 400
20694 Information and Communication Technology Learning between Parents and High School Students

Authors: Yu-Mei Tseng, Chih-Chun Wu

Abstract:

As information and communication technology (ICT) has become a part of people’s lives, most teenagers born after the 1980s and grew up in internet generation are called digital natives. Meanwhile, those teenagers’ parents are called digital immigrants. They need to keep learning new skills of ICT. This study investigated that high school students helped their parents set up social network services (SNS) and taught them how to use ICT. This study applied paper and pencil anonymous questionnaires that asked the ICT learning and ICT products using in high school students’ parents. The sample size was 2,621 high school students, including 1,360 (51.9%) males and 1,261 (48.1%) females. The sample was from 12 high school and vocational high school in central Taiwan. Results from paired sample t-tests demonstrated regardless genders, both male and female high school students help mothers set up Facebook and LINE more often than fathers. In addition, both male and female high school students taught mothers to use ICT more often than fathers. Meanwhile, both male and female high school students teach mothers to use SNS more often than fathers. The results showed that intergenerational ICT teaching occurred more often between mothers and her children than fathers. It could imply that mothers play a more important role in family ICT learning than fathers, or it could be that mothers need more help regarding ICT than fathers. As for gender differences, results from the independent t-tests showed that female high school students were more likely than male ones to help their parents setup Facebook and LINE. In addition, compared to male high school students, female ones were more likely to teach their parents to use smartphone, Facebook and LINE. However, no gender differences were detected in teaching mothers. The gender differences results suggested that female teenagers offer more helps to their parents regarding ICT learning than their male counterparts. As for area differences, results from the independent t-tests showed that the high school in remote area students were more likely than metropolitan ones to teach parents to use computer, search engine and download files of audio and video. The area differences results might indicate that remote area students were more likely to teach their parents how to use ICT. The results from this study encourage children to help and teach their parents with ICT products.

Keywords: adult ICT learning, family ICT learning, ICT learning, urban-rural gap

Procedia PDF Downloads 176
20693 Dominant Correlation Effects in Atomic Spectra

Authors: Hubert Klar

Abstract:

High double excitation of two-electron atoms has been investigated using hyperpherical coordinates within a modified adiabatic expansion technique. This modification creates a novel fictitious force leading to a spontaneous exchange symmetry breaking at high double excitation. The Pauli principle must therefore be regarded as approximation valid only at low excitation energy. Threshold electron scattering from high Rydberg states shows an unexpected time reversal symmetry breaking. At threshold for double escape we discover a broad (few eV) Cooper pair.

Keywords: correlation, resonances, threshold ionization, Cooper pair

Procedia PDF Downloads 342
20692 A Novel Eccentric Lapping Method with Two Rotatable Lapping Plates for Finishing Cemented Carbide Balls

Authors: C. C. Lv, Y. L. Sun, D. W. Zuo

Abstract:

Cemented carbide balls are usually implemented in industry under the environment of high speed, high temperature, corrosiveness and strong collisions. However, its application is limited due to high fabrication cost, processing efficiency and quality. A novel eccentric lapping method with two rotatable lapping plates was proposed in this paper. A mathematical model was constructed to analyze the influence of each design parameter on this lapping method. To validate this new lapping method, an orthogonal experiment was conducted with cemented carbide balls (YG6). The simulation model was verified and the optimal lapping parameters were derived. The results show that the surface roundness of the balls reaches to 0.65um from 2um in 1 hour using this lapping method. So, using this novel lapping method, it can effectively improve the machining precision and efficiency of cemented carbide balls.

Keywords: cemented carbide balls, eccentric lapping, high precision, lapping tracks, V-groove

Procedia PDF Downloads 391
20691 Production of Amorphous Boron Powder via Chemical Vapor Deposition (CVD)

Authors: Meltem Bolluk, Ismail Duman

Abstract:

Boron exhibits the properties of high melting temperature (2273K to 2573 K), high hardness (Mohs: 9,5), low density (2,340 g/cm3), high chemical resistance, high strength, and semiconductivity (band gap:1,6-2,1 eV). These superior properties enable to use it in several high-tech areas from electronics to nuclear industry and especially in high temperature metallurgy. Amorphous boron and crystalline boron have different application areas. Amorphous boron powder (directly amorphous and/or α-rhombohedral) is preferred in rocket firing, airbag inflating and in fabrication of superconducting MgB2 wires. The conventional ways to produce elemental boron with a purity of 85 pct to 95 prc are metallothermic reduction, fused salt electrolysis and mechanochemical synthesis; but the only way to produce high-purity boron powders is Chemical Vapour Deposition (Hot Surface CVD). In this study; amorphous boron powders with a minimum purity of 99,9 prc were synthesized in quartz tubes using BCl3-H2 gas mixture by CVD. Process conditions based on temperature and gas flow rate were determined. Thermodynamical interpretation of BCl3-H2 system for different temperatures and molar rates were performed using Fact Sage software. The characterization of powders was examined by using Xray diffraction (XRD), Scanning Electron Microscope (SEM) and Transmission Electron Microscope (TEM), Stereo Microscope (SM), Helium gas pycnometer analysis. The purities of final products were determined by titration after lime fusion.

Keywords: amorphous boron, CVD, powder production, powder characterization

Procedia PDF Downloads 207
20690 A Comprehensive Review of Electronic Health Records Implementation in Healthcare

Authors: Lateefat Amao, Misagh Faezipour

Abstract:

Implementing electronic health records (EHR) in healthcare is a pivotal transition aimed at digitizing and optimizing patient health information management. The expectations associated with this transition are high, even towards other health information systems (HIS) and health technology. This multifaceted process involves careful planning and execution to improve the quality and efficiency of patient care, especially as healthcare technology is a sensitive niche. Key considerations include a thorough needs assessment, judicious vendor selection, robust infrastructure development, and training and adaptation of healthcare professionals. Comprehensive training programs, data migration from legacy systems and models, interoperability, as well as security and regulatory compliance are imperative for healthcare staff to navigate EHR systems adeptly. The purpose of this work is to offer a comprehensive review of the literature on EHR implementation. It explores the impact of this health technology on health practices, highlights challenges and barriers to its successful utility, and offers practical strategies that can impact its success in healthcare. This paper provides a thorough review of studies on the adoption of EHRs, emphasizing the wide range of experiences and results connected to EHR use in the medical field, especially across different types of healthcare organizations.

Keywords: healthcare, electronic health records, EHR implementation, patient care, interoperability

Procedia PDF Downloads 70
20689 Porous Carbon Nanoparticels Co-Doped with Nitrogen and Iron as an Efficient Catalyst for Oxygen Reduction Reaction

Authors: Bita Bayatsarmadi, Shi-Zhang Qiao

Abstract:

Oxygen reduction reaction (ORR) performance of iron and nitrogen co-doped porous carbon nanoparticles (Fe-NPC) with various physical and (electro) chemical properties have been investigated. Fe-NPC nanoparticles are synthesized via a facile soft-templating procedure by using Iron (III) chloride hexa-hydrate as iron precursor and aminophenol-formaldehyde resin as both carbon and nitrogen precursor. Fe-NPC nanoparticles shows high surface area (443.83 m2g-1), high pore volume (0.52 m3g-1), narrow mesopore size distribution (ca. 3.8 nm), high conductivity (IG/ID=1.04), high kinetic limiting current (11.71 mAcm-2) and more positive onset potential (-0.106 V) compared to metal-free NPC nanoparticles (-0.295V) which make it high efficient ORR metal-free catalysts in alkaline solution. This study may pave the way of feasibly designing iron and nitrogen containing carbon materials (Fe-N-C) for highly efficient oxygen reduction electro-catalysis.

Keywords: electro-catalyst, mesopore structure, oxygen reduction reaction, soft-template

Procedia PDF Downloads 373
20688 Development of an Intelligent Decision Support System for Smart Viticulture

Authors: C. M. Balaceanu, G. Suciu, C. S. Bosoc, O. Orza, C. Fernandez, Z. Viniczay

Abstract:

The Internet of Things (IoT) represents the best option for smart vineyard applications, even if it is necessary to integrate the technologies required for the development. This article is based on the research and the results obtained in the DISAVIT project. For Smart Agriculture, the project aims to provide a trustworthy, intelligent, integrated vineyard management solution that is based on the IoT. To have interoperability through the use of a multiprotocol technology (being the future connected wireless IoT) it is necessary to adopt an agnostic approach, providing a reliable environment to address cyber security, IoT-based threats and traceability through blockchain-based design, but also creating a concept for long-term implementations (modular, scalable). The ones described above represent the main innovative technical aspects of this project. The DISAVIT project studies and promotes the incorporation of better management tools based on objective data-based decisions, which are necessary for agriculture adapted and more resistant to climate change. It also exploits the opportunities generated by the digital services market for smart agriculture management stakeholders. The project's final result aims to improve decision-making, performance, and viticulturally infrastructure and increase real-time data accuracy and interoperability. Innovative aspects such as end-to-end solutions, adaptability, scalability, security and traceability, place our product in a favorable situation over competitors. None of the solutions in the market meet every one of these requirements by a unique product being innovative.

Keywords: blockchain, IoT, smart agriculture, vineyard

Procedia PDF Downloads 189
20687 The Benefit of a Universal Screening Program for Lipid Disorders in Two to Ten Years Old Lebanese Children

Authors: Nicolas Georges, Akiki Simon, Bassil Naim, Nawfal Georges, Abi Fares Georges

Abstract:

Introduction: Dyslipidemia has been recognized as a risk factor for cardiovascular diseases. While the development of atherosclerotic lesions begins in childhood and progresses throughout life, data on the prevalence of dyslipidemic children in Lebanon is lacking. Objectives: This study was conducted to assess the benefit of a protocol for universal screening for lipid disorder in Lebanese children aged between two and ten years old. Materials and Methods: A total of four hundred children aged 2 to 10 years old (51.5% boys) were included in the study. The subjects were recruited from private pediatric clinics after parental consent. Fasting total cholesterol (TC), triglycerides (TG), low-density lipoprotein (LDL), high-density lipoprotein (HDL) levels were measured and non-HDL cholesterol was calculated. The values were categorized according to 2011 Expert on Integrated Guidelines for Cardiovascular Health and Risk Reduction in Children and Adolescents. Results: The overall prevalence of high TC ( ≥ 200 mg/dL), high non-HDL-C ( ≥ 145 mg/dL), high LDL ( ≥ 130 mg/dL), high TG ( ≥ 100 mg/dL) and low HDL ( < 40 mg/dL) was respectively 19.5%, 23%, 19%, 31.8% and 20%. The overall frequency of dyslipidemia was 51.7%. In a bivariate analysis, dyslipidemia in children was associated with a BMI ≥ 95ᵗʰ percentile and parents having TC > 240 mg/dL with a P value respectively of 0.006 and 0.0001. Furthermore, high TG was independently associated with a BMI ≥ 95ᵗʰ percentile (P=0.0001). Children with parents having TC > 240 mg/dL was significantly correlated with high TC, high non-HDL-C and high LDL (P=0.0001 for all variables). Finally, according to the Pediatric dyslipidemia screening guidelines from the 2011 Expert Panel, 62.3% of dyslipidemic children had at least 1 risk factor that qualified them for screening while 37.7% of them didn’t have any risk factor. Conclusions: It is preferable to review the latest pediatric dyslipidemia screening guidelines by performing a universal screening program since a third of our dyslipidemic Lebanese children have been missed.

Keywords: cardiovascular risk factors, dyslipidemia, Lebanese children, screening

Procedia PDF Downloads 226
20686 Impact of America's Anti-Ballistic Missile System (ABMS) on Power Dynamics of the World

Authors: Fehmeen Anwar, Ujala Liaqat

Abstract:

For over half a century, U.S. and the Soviet Union have been at daggers drawn with each other. Both leading powers of the world have been struggling hard to surpass each other in military and other technological fields. This neck-to-neck competition turned in favour of U.S. in the early 1990s when USSR had to face economic stagnation and later dismemberment of several of its states. The predominance of U.S. is still evident to date, rather it continues to grow. With this proposed defence program i.e. Anti-Ballistic Missile System, the U.S. will have a considerable chance of intercepting any nuclear strike by Russia, which re-asserts U.S. dominance in the region and creating a security dilemma for Russia and other states. The question is whether America’s recent nuclear deterrence project is merely to counter nuclear threats from Iran and North Korea or is it purely directed towards Russia, thus ensuring complete military supremacy in the world. Although U.S professes to direct its Anti-Ballistic Missile System (ABMS) against the axis of evil (Iran and North Korea), yet the deployment of this system in the East European territory undermines the Russian nuclear strategic capability, as this enables U.S. to initiate an attack and guard itself from retaliatory strike, thus disturbing the security equilibrium in Europe. The implications of this program can lead to power imbalance which can lead to the emergence of fundamentally different paradigm of international politics.

Keywords: Anti-Ballistic Missile System (ABMS), cold-war, axis of evil, power dynamics

Procedia PDF Downloads 286
20685 Cable Diameter Effect on the Contact Temperature of Power Automotive Connector

Authors: Amine Beloufa, Mohamed Amirat

Abstract:

In the electric vehicle, high power leads to high current; automotive power connector should resist to this high current in order to avoid a serious damage caused by the increase of contact temperature. The purpose of this paper is to analyze experimentally and numerically the effect of the cable diameter variation on the decrease of contact temperature. For this reason, a finite element model was developed to calculate the numerical contact temperature for several cable diameters and several electrical high currents. Also, experimental tests were established in order to validate this numerical model. Results show that the influence of cable diameter on the contact temperature is never neglected.

Keywords: contact temperature, experimental test, finite element, power automotive connector

Procedia PDF Downloads 256
20684 The OQAM-OFDM System Using WPT/IWPT Replaced FFT/IFFT

Authors: Alaa H. Thabet, Ehab F. Badran, Moustafa H. Aly

Abstract:

With the rapid expand of wireless digital communications, demand for wireless systems that are reliable and have a high spectral efficiency have increased too. FBMC scheme based on the OFDM/OQAM has been recognized for its good performance to achieve high data rates. Fast Fourier Transforms (FFT) has been used to produce the orthogonal sub-carriers. Due to the drawbacks of OFDM -FFT based system which are the high peak-to-average ratio (PAR) and the synchronization. In this paper, Wavelet Packet Transform (WPT) is used in the place of FFT, and show better performance.

Keywords: OQAM-OFDM, wavelet packet transform, PAPR, FFT

Procedia PDF Downloads 453
20683 Analysis of Environmental Activism in High Schools in District Peshawar

Authors: Hafiz M. Inamullah, Altaf Ullah

Abstract:

Environmental degradation is a serious issue that has adverse impacts on the human population locally, regionally, and globally. There is a dire need to adopt an environmentally friendly lifestyle to minimize further environmental degradation. One of the mediums through which environmentally friendly attitudes and behavior may be inculcated is through school education. The purpose of this study was to investigate environmental activities organized in High Schools of District Peshawar. The population for this study was comprised of 77 Headmasters of the High Schools in District Peshawar. A sample of 65 Headmasters was selected randomly from the above-mentioned population. One questionnaire was developed from the relevant literature for the Headmasters and was self-administered by the researcher. The collected data was entered into Excel and was analyzed and interpreted through SPSS 20 using the frequencies and percentages, and the Chi-square test was applied. The results indicated that most high schools had never organized environmental activities for secondary-level students. It was suggested that the high schools might organize various environmental activities such as plantations, park visits, debate competitions, environmental clubs, and drawing competitions.

Keywords: proinvirmenlaism, Khyber Pakhtunkhwa, secondary level, Peshawar

Procedia PDF Downloads 82