Search results for: internal security
3833 Structured Tariff Calculation to Promote Geothermal for Energy Security
Authors: Siti Mariani, Arwin DW Sumari, Retno Gumilang Dewi
Abstract:
This paper analyzes the necessity of a structured tariff calculation for geothermal electricity in Indonesia. Indonesia is blessed with abundant natural resources and a choices of energy resources to generate electricity among other are coal, gas, biomass, hydro to geothermal, creating a fierce competition in electricity tariffs. While geothermal is inline with energy security principle and green growth initiative, it requires a huge capital funding. Geothermal electricity development consists of phases of project with each having its own financial characteristics. The Indonesian government has set a support in the form of ceiling price of geothermal electricity tariff by 11 U.S cents / kWh. However, the government did not set a levelized cost of geothermal, as an indication of lower limit capacity class, to which support is given. The government should establish a levelized cost of geothermal energy to reflect its financial capability in supporting geothermal development. Aside of that, the government is also need to establish a structured tariff calculation to reflect a fair and transparent business cooperation.Keywords: load fator, levelized cost of geothermal, geothermal power plant, structured tariff calculation
Procedia PDF Downloads 4383832 Integrated Performance Management System a Conceptual Design for PT. XYZ
Authors: Henrie Yunianto, Dermawan Wibisono
Abstract:
PT. XYZ is a family business (private company) in Indonesia that provide an educational program and consultation services. Since its establishment in 2011, the company has run without any strategic management system implemented. Though the company could survive until now. The management of PT. XYZ sees the business opportunity for such product is huge, even though the targeted market is very specific (niche), the volume is large (due to large population of Indonesia) and numbers of competitors are low (now). It can be said if the product life cycle is in between ‘Introduction stage’ and ‘growth’ stage. It is observed that nowadays the new entrants (competitors) are increasing, thus PT. XYZ consider reacting in facing the intense business rivalry by conducting the business in an appropriate manner. A Performance Management System is important to be implemented in accordance with the business sustainability and growth. The framework of Performance Management System chosen is Integrated Performance Management System (IPMS). IPMS framework has the advantages of its simplicity, linkage between its business variables and indicators where the company can see the connections between all factors measured. IPMS framework consists of perspectives: (1) Business Result, (2) Internal Processes, (3) Resource Availability. Variables and indicators were examined through deep analysis of the business external and internal environments, Strength-Weakness-Opportunity-Threat (SWOT) analysis, Porter’s five forces analysis. Analytical Hierarchy Process (AHP) analysis was then used to quantify the weight of each variable/indicators. AHP is needed since in this study, PT. XYZ, the data of existing performance indicator was not available. Later, where the IPMS is implemented, the real data measured can be examined to determine the weight factor of each indicators using correlation analysis (or other methods). In this study of IPMS design for PT. XYZ, the analysis shows that with current company goals, along with the AHP methodology, the critical indicators for each perspective are: (1) Business results: Customer satisfaction and Employee satisfaction, (2) Internal process: Marketing performance, Supplier quality, Production quality, Continues improvement; (3) Resources Availability: Leadership and company culture & value, Personal Competences, Productivity. Company and/or organization require performance management system to help them in achieving their vision and mission. Company strategy will be effectively defined and addressed by using performance management system. Integrated Performance Management System (IPMS) framework and AHP analysis help us in quantifying the factors which influence the business output expected.Keywords: analytical hierarchy process, business strategy, differentiation strategy, integrated performance management system
Procedia PDF Downloads 3053831 Psychometric Properties of the Secondary School Stressor Questionnaire among Adolescents at Five Secondary Schools
Authors: Muhamad Saiful Bahri Yusoff
Abstract:
This study aimed to evaluate the construct, convergent, and discriminant validity of the Secondary School Stressor Questionnaire (3SQ) as well as to evaluate its internal consistency among adolescents in Malaysian secondary schools. A cross-sectional study was conducted on 700 secondary school students in five secondary schools. Stratified random sampling was used to select schools and participants. The confirmatory factor analysis was performed by AMOS to examine construct, convergent, and discriminant validity. The reliability analysis was performed by SPSS to determine internal consistency. The results showed that the original six-factor model with 44 items failed to achieve acceptable values of the goodness of fit indices, suggesting poor model fit. The new five-factor model of 3SQ with 22 items demonstrated acceptable level of goodness of fit indices to signify a model fit. The overall Cronbach’s alpha value for the new version 3SQ was 0.93, while the five constructs ranged from 0.68 to 0.94. The composite reliability values of each construct ranged between 0.68 and 0.93, indicating satisfactory to high level of convergent validity. Our study did not support the construct validity of the original version of 3SQ. We found the new version 3SQ showed more convincing evidence of validity and reliability to measure stressors of adolescents. Continued research is needed to verify and maximize the psychometric credentials of 3SQ across countries.Keywords: stressors, adolescents, secondary school students, 3SQ, psychometric properties
Procedia PDF Downloads 4013830 Cybersecurity Protective Behavior in Industrial Revolution 4.0 Era: A Conceptual Framework
Authors: Saif Hussein Abdallah Alghazo, Norshima Humaidi
Abstract:
Adopting cybersecurity protective behaviour among the employees is seriously considered in the organization, especially when the Internet of Things (IoT) is widely used in Industrial Revolution 4.0 (IR 4.0) era. Cybersecurity issues arise due to weaknesses of employees’ behaviour such as carelessness and failure to adopt good practices of information security behaviour. Therefore, this study aims to explore the dimensions that might influence employees’ behaviour to adopt good cybersecurity practices and to develop a new holistic model related to this concept. The study proposed this by reviewing the existing works of literature related to this field extensively, especially by focusing on the existing theory such as Protection Motivation Theory (PMT). Moreover, this study has also explored the role of cybersecurity competency among the security manager in the organization since this construct is essential to enhance the protective behaviour towards cybersecurity among the employees in the organization. The proposed research model is important to be quantitatively tested in the future as the findings will serve as the input to the act that will enhance employee’s cybersecurity protective behaviour in the IR 4.0 environment.Keywords: cybersecurity protective behaviour, protection motivation theory, IR 4.0, cybersecurity competency
Procedia PDF Downloads 1513829 Tribological Behavior of Hybrid Nanolubricants for Internal Combustion Engines
Authors: José M. Liñeira Del Río, Ramón Rial, Khodor Nasser, María J.G. Guimarey
Abstract:
The need to develop new lubricants that offer better anti-friction and anti-wear performance in internal combustion vehicles is one of the great challenges of lubrication in the automotive field. The addition of nanoparticles has emerged as a possible solution and, combined with the lubricating power of ionic liquids, may become one of the alternatives to reduce friction losses and wear of the contact surfaces in the conditions to which tribo-pairs are subjected, especially in the contact of the piston rings and the cylinder liner surface. In this study, the improvement in SAE 10W-40 engine oil tribological performance after the addition of magnesium oxide (MgO) nanoadditives and two different phosphonium-based ionic liquids (ILs) was investigated. The nanoparticle characterization was performed by means of transmission electron microscopy (TEM), Fourier-transform infrared spectroscopy (FTIR), Raman spectroscopy, X-ray diffraction (XRD), and scanning electron microscopy (SEM). The tribological properties, friction coefficients and wear parameters of the formulated oil modified with 0.01 wt.% MgO and 1 wt.% ILs compared with the neat 10W-40 oil were performed and analyzed using a ball-on-three-pins tribometer and a 3D optical profilometer, respectively. Further analysis on the worn surface was carried out by Raman spectroscopy and SEM microscopy, illustrating the formation of the protective IL and MgO tribo-films as hybrid additives. In friction tests with sliding steel-steel tribo-pairs, IL3-based hybrid nanolubricant decreased the friction coefficient and wear volume by 7% and 59%, respectively, in comparison with the neat SAE 10W-40, while the one based on IL1 only achieved a reduction of these parameters by 6% and 39%, respectively. Thus, the tribological characterization also revealed that the MgO and IL3 addition has a positive synergy over the commercial lubricant, adequately meeting the requirements for their use in internal combustion engines. In summary, this study has shown that the addition of ionic liquids to MgO nanoparticles can improve the stability and lubrication behavior of MgO nanolubricant and encourages more investigations on using nanoparticle additives with green solvents such as ionic liquids to protect the environment as well as prolong the lifetime of machinery. The improvement in the lubricant properties was attributed to the following wear mechanisms: the formation of a protective tribo-film and the ability of nanoparticles to fill out valleys between asperities, thereby effectively smoothing out the shearing surfaces.Keywords: lubricant, nanoparticles, phosphonium-based ionic liquids, tribology
Procedia PDF Downloads 813828 An Assessment of Housing Affordability and Safety Measures in the Varied Residential Area of Lagos, A Case Study of the Amuwo-Odofin Local Government Area in Lagos State
Authors: Jubril Olatunbosun Akinde
Abstract:
Unplanned population growth are mostly attributed to a lack of infrastructural facilities and poor economic condition in the rural dwellings and the incidence of rural-urban migration, which has resulted in severe housing deficiency in the urban centre, with a resultant pressure on housing delivery in the cities. Affordable housing does not only encompass environmental factors that make living acceptable and comfortable, which include good access routes, ventilation, sanitation and access to other basic human needs, which include water and safety. The research assessed the housing affordability and safety measures in the varied residential area of lagos by examining the demographic and socioeconomic attributes of residents; examining the existing residential safety measures; by examining the residential quality in terms of safety; the researcher therefore examined if relationship between housing affordability and safety in the varied residential areas. The research adopted the bartlett, kotrlik and higgins (2001) method of t-test to determine the sample size which specifies different populations at different levels of significance (α). The researcher adopted primary data which was sourced from a field survey where the sample population was simply randomly selected to give a member of the population an equal chance of being selected, therefore, the sample size for the field survey was two hundred (200) respondents, and subjected to necessary testing. The research come to conclusion that housing safety and security is the responsibility of every resident, the landlords/landladies possess a better sense of security in their neighbourhood than renters in the community, therefore they need to be aware of their responsibility of ensuring the safety of lives and property.Keywords: housing, housing affordability, housing security, residential, residential quality
Procedia PDF Downloads 1103827 Impact Evaluation of Discriminant Analysis on Epidemic Protocol in Warships’s Scenarios
Authors: Davi Marinho de Araujo Falcão, Ronaldo Moreira Salles, Paulo Henrique Maranhão
Abstract:
Disruption Tolerant Networks (DTN) are an evolution of Mobile Adhoc Networks (MANET) and work good in scenarioswhere nodes are sparsely distributed, with low density, intermittent connections and an end-to-end infrastructure is not possible to guarantee. Therefore, DTNs are recommended for high latency applications that can last from hours to days. The maritime scenario has mobility characteristics that contribute to a DTN network approach, but the concern with data security is also a relevant aspect in such scenarios. Continuing the previous work, which evaluated the performance of some DTN protocols (Epidemic, Spray and Wait, and Direct Delivery) in three warship scenarios and proposed the application of discriminant analysis, as a classification technique for secure connections, in the Epidemic protocol, thus, the current article proposes a new analysis of the directional discriminant function with opening angles smaller than 90 degrees, demonstrating that the increase in directivity influences the selection of a greater number of secure connections by the directional discriminant Epidemic protocol.Keywords: DTN, discriminant function, epidemic protocol, security, tactical messages, warship scenario
Procedia PDF Downloads 1913826 Cybersecurity for Digital Twins in the Built Environment: Research Landscape, Industry Attitudes and Future Direction
Authors: Kaznah Alshammari, Thomas Beach, Yacine Rezgui
Abstract:
Technological advances in the construction sector are helping to make smart cities a reality by means of cyber-physical systems (CPS). CPS integrate information and the physical world through the use of information communication technologies (ICT). An increasingly common goal in the built environment is to integrate building information models (BIM) with the Internet of Things (IoT) and sensor technologies using CPS. Future advances could see the adoption of digital twins, creating new opportunities for CPS using monitoring, simulation, and optimisation technologies. However, researchers often fail to fully consider the security implications. To date, it is not widely possible to assimilate BIM data and cybersecurity concepts, and, therefore, security has thus far been overlooked. This paper reviews the empirical literature concerning IoT applications in the built environment and discusses real-world applications of the IoT intended to enhance construction practices, people’s lives and bolster cybersecurity. Specifically, this research addresses two research questions: (a) how suitable are the current IoT and CPS security stacks to address the cybersecurity threats facing digital twins in the context of smart buildings and districts? and (b) what are the current obstacles to tackling cybersecurity threats to the built environment CPS? To answer these questions, this paper reviews the current state-of-the-art research concerning digital twins in the built environment, the IoT, BIM, urban cities, and cybersecurity. The results of these findings of this study confirmed the importance of using digital twins in both IoT and BIM. Also, eight reference zones across Europe have gained special recognition for their contributions to the advancement of IoT science. Therefore, this paper evaluates the use of digital twins in CPS to arrive at recommendations for expanding BIM specifications to facilitate IoT compliance, bolster cybersecurity and integrate digital twin and city standards in the smart cities of the future.Keywords: BIM, cybersecurity, digital twins, IoT, urban cities
Procedia PDF Downloads 1673825 Implementation of Risk Management System to Improve the Quality of Higher Education Institutes
Authors: Muhammad Wasif, Asif Ahmed Shaikh, Sarosh Hashmat Lodi, Muhammad Aslam Bhutto, Riazuddin
Abstract:
Risk Management System is quite popular in profit- based organizations, health and safety and project management fields since the last few decades. But due to rapidly changing environment and requirement of ISO 9001:2015 standards, public-sector institution, especially higher education institutes are also performing risk assessment to monitor the performance of the institution and aligning it with the latest benchmark. In this context, NED University of Engineering and Technology performed research and developed a Standard Operating Procedure (SOP) for the risk assessment, its monitoring and control. In this research, risks are broken into the four sources, namely; Internal Academics Risks, External Academics Risks, Internal Non-academic Risks, External Non-academic Risks. Risks are identified by the management at all levels. Severity and likelihood of the risks are assigned based on the previous audit results and the customer complains. Risk Ratings are calculated to orderly arrange the risk according to the Risk Rating, and controls for the risks are designed, which are assigned to the responsible person. At the end of the article, result and analysis on the different sources of risk are discussed in details and the conclusion is drawn. Discussion on few sample risks are presented in this article. Hence it is presented in the research that the Risk Management System can be applied in a Higher Education Institute to effectively control the risks which might affect the scope and Quality Management System of an organization.Keywords: higher education, quality management system, risk assessment, risk management
Procedia PDF Downloads 3093824 Food Insecurity and Its Implication for Poverty Alleviation in Nigeria
Authors: Peter Okpamen
Abstract:
Food security concentrates on the collective efforts of all nations to produce enough food to feed their people. Recently, though the emphasis shifted from food availability to accessibility constraints, which entails the difficulties undernourished people face in gaining access to food even when it is available. Broadly speaking, access to food depends on an individual’s access to resources, markets and food transfers. The opportunities to obtain food through these channels are entitlements, which when denied constitute food insecurity. Evidence shows that a significant percentage of Nigerians are undernourished with adverse implications for the fight against poverty. The greatest danger or consequence of food insecurity is malnutrition. Food insecurity as both an agent and consequence of poverty also increases the economic, political and social tensions in the country. The undernourished in Nigeria are marginalised in several ways to the extent that they are often ill; and because of illness, their work capacity is reduced with attendant reduction in their income. Without adequate income, they cannot save nor invest enough resources to take care of their basic needs. In this paper therefore, we used the political economy approach and statistical analysis to demonstrate that poverty alleviation in Nigeria would be a mirage if food security problems are not adequately resolved.Keywords: alleviation, demographic, food insecurity, undernourished
Procedia PDF Downloads 4283823 Leadership Styles and Adoption of Risk Governance in Insurance and Energy Industry: A Comparative Case Study
Authors: Ruchi Agarwal
Abstract:
In today’s world, companies are operating in dynamic, uncertain and ambiguous business environments. Globally, more companies are failing due to Environmental, Social and Governance (ESG) factors than ever. Corporate governance and risk management are intertwined in nature. For decades, corporate governance and risk management have been influenced by internal and external factors. Three schools of thought have influenced risk governance for decades: Agency theory, Contingency theory, and Institutional theory. Agency theory argues that agents have interests conflicting with principal interests and the information problem. Contingency theory suggests that risk management adoption is influenced by internal and external factors, while Institutional theory suggests that organizations legitimize risk management with regulators, competitors, and professional bodies. The conflicting objectives of theories have created problems for executives in organizations in the adoption of Risk Governance. So far, there are many studies that discussed risk culture and the role of actors in risk governance, but there are rare studies discussing the role of risk culture in the adoption of risk governance from a leadership style perspective. This study explores the adoption of risk governance in two contrasting industries, such as the Insurance and energy business, to understand whether risk governance is influenced by internal/external factors or whether risk culture is influenced by leaders. We draw empirical evidence by comparing the cases of an Indian insurance company and a renewable energy-based firm in India. We interviewed more than 20 senior executives of companies and collected annual reports, risk management policies, and more than 10 PPTs and other reports from 2017 to 2024. We visited the company for follow-up questions several times. The findings of my research revealed that both companies have used risk governance for strategic renewal of the company. Insurance companies use a transactional leadership style based on performance and reward for improving risk, while energy companies use rather symbolic management to make debt restructuring meaningful for stakeholders. Overall, both companies turned from loss-making to profitable ones in a few years. This comparative study highlights the role of different leadership styles in the adoption of risk governance. The study is also distinct as previous research rarely studied risk governance in two contrasting industries in reference to leadership styles.Keywords: leadership style, corporate governance, risk management, risk culture, strategic renewal
Procedia PDF Downloads 473822 A Hybrid Digital Watermarking Scheme
Authors: Nazish Saleem Abbas, Muhammad Haris Jamil, Hamid Sharif
Abstract:
Digital watermarking is a technique that allows an individual to add and hide secret information, copyright notice, or other verification message inside a digital audio, video, or image. Today, with the advancement of technology, modern healthcare systems manage patients’ diagnostic information in a digital way in many countries. When transmitted between hospitals through the internet, the medical data becomes vulnerable to attacks and requires security and confidentiality. Digital watermarking techniques are used in order to ensure the authenticity, security and management of medical images and related information. This paper proposes a watermarking technique that embeds a watermark in medical images imperceptibly and securely. In this work, digital watermarking on medical images is carried out using the Least Significant Bit (LSB) with the Discrete Cosine Transform (DCT). The proposed methods of embedding and extraction of a watermark in a watermarked image are performed in the frequency domain using LSB by XOR operation. The quality of the watermarked medical image is measured by the Peak signal-to-noise ratio (PSNR). It was observed that the watermarked medical image obtained performing XOR operation between DCT and LSB survived compression attack having a PSNR up to 38.98.Keywords: watermarking, image processing, DCT, LSB, PSNR
Procedia PDF Downloads 463821 The Genetic Architecture Underlying Dilated Cardiomyopathy in Singaporeans
Authors: Feng Ji Mervin Goh, Edmund Chee Jian Pua, Stuart Alexander Cook
Abstract:
Dilated cardiomyopathy (DCM) is a common cause of heart failure. Genetic mutations account for 50% of DCM cases with TTN mutations being the most common, accounting for up to 25% of DCM cases. However, the genetic architecture underlying Asian DCM patients is unknown. We evaluated 68 patients (female= 17) with DCM who underwent follow-up at the National Heart Centre, Singapore from 2013 through 2014. Clinical data were obtained and analyzed retrospectively. Genomic DNA was subjected to next-generation targeted sequencing. Nextera Rapid Capture Enrichment was used to capture the exons of a panel of 169 cardiac genes. DNA libraries were sequenced as paired-end 150-bp reads on Illumina MiSeq. Raw sequence reads were processed and analysed using standard bioinformatics techniques. The average age of onset of DCM was 46.1±10.21 years old. The average left ventricular ejection fraction (LVEF), left ventricular diastolic internal diameter (LVIDd), left ventricular systolic internal diameter (LVIDs) were 26.1±11.2%, 6.20±0.83cm, and 5.23±0.92cm respectively. The frequencies of mutations in major DCM-associated genes were as follows TTN (5.88% vs published frequency of 20%), LMNA (4.41% vs 6%), MYH7 (5.88% vs 4%), MYH6 (5.88% vs 4%), and SCN5a (4.41% vs 3%). The average callability at 10 times coverage of each major gene were: TTN (99.7%), LMNA (87.1%), MYH7 (94.8%), MYH6 (95.5%), and SCN5a (94.3%). In conclusion, TTN mutations are not common in Singaporean DCM patients. The frequencies of other major DCM-associated genes are comparable to frequencies published in the current literature.Keywords: heart failure, dilated cardiomyopathy, genetics, next-generation sequencing
Procedia PDF Downloads 2423820 A Case Study on Effectiveness of Hijamah (Wet Cupping) on Numbness of Foot in Diabetic Patient
Authors: Nafdha Thajudeen
Abstract:
Hijamah therapy is one of the leading alternative & complementary modalities in the World. It is a kind of detoxification, rejuvenation, and blood purification method. It comes under Ilaj bil Tadbeer (Regimental therapy) in the Unani medical system. In diabetes, hands and foot care in people is very important because of slow blood circulation, where blood sometimes is not able to fully penetrate the capillaries. Hijamah therapy works upon the following two principles- Tanqiyae Mawad (Evacuation of morbid humor) and Imalae Mawad (Diversion of humor). The aim of this study was to find out the effectiveness of hijamah therapy on the numbness of legs in a diabetic patient. This case study was carried out in Ayurvedic Research Hospital (Non-Communicable Diseases), Ninthavur, Sri Lanka. A 63 years old female diabetic patient came to the clinic with the complain of numbness in both feet for one year. The treatment history of the patient revealed that she had taken western medicine for her complaints for 7 months. In her first visit, wet cupping was done on local and distal points. The patient said there was a remarkable improvement; internal medicines were given to keep the sugar level in normal with some external applications. Every week, wet cupping was done on the same points, with repeating the same medicines. Foot numbness was fully cured within one month. The finding of this study shows that the complaint of numbness in the diabetic patient was treated with hijamah therapy with internal & external medicine. This case study can be concluded as hijamah therapy is very effective in treating diabetic numbness. This single case study may be the entrance for future clinical studiesKeywords: Hijamah therapy, Ilaj bil thadbeer, diabetes, numbness
Procedia PDF Downloads 1373819 Influence of Boron and Germanium Doping on Physical-Mechanical Properties of Monocrystalline Silicon
Authors: Ia Kurashvili, Giorgi Darsavelidze, Giorgi Chubinidze, Marina Kadaria
Abstract:
Boron-doped Czochralski (CZ) silicon of p-type, widely used in the photovoltaic industry is suffering from the light-induced-degradation (LID) of bulk electrophysical characteristics. This is caused by specific metastable B-O defects, which are characterized by strong recombination activity. In this regard, it is actual to suppress B-O defects in CZ silicon. One of the methods is doping of silicon by different isovalent elements (Ge, C, Sn). The present work deals with the investigations of the influence of germanium doping on the internal friction and shear modulus amplitude dependences in the temperature interval of 600-800⁰C and 0.5-5 Hz frequency range in boron-containing monocrystalline silicon. Experimental specimens were grown by Czochralski method (CZ) in [111] direction. Four different specimens were investigated: Si+0,5at%Ge:B (5.1015cm-3), Si+0,5at%Ge:B (1.1019cm-3), Si+2at%Ge:B (5.1015cm-3) and Si+2at%Ge:B (1.1019cm-3). Increasing tendency of dislocation density and inhomogeneous distribution in silicon crystals with high content of boron and germanium were revealed by metallographic studies on the optical microscope of NMM-80RF/TRF. Weak increase of current carriers-holes concentration and slight decrease of their mobility were observed by Van der Pauw method on Ecopia HMS-3000 device. Non-monotonous changes of dislocation origin defects mobility and microplastic deformation characteristics influenced by measuring temperatures and boron and germanium concentrations were revealed. Possible mechanisms of changes of mechanical characteristics in Si-Ge experimental specimens were discussed.Keywords: dislocation, internal friction, microplastic deformation, shear modulus
Procedia PDF Downloads 2373818 Deterministic Random Number Generator Algorithm for Cryptosystem Keys
Authors: Adi A. Maaita, Hamza A. A. Al Sewadi
Abstract:
One of the crucial parameters of digital cryptographic systems is the selection of the keys used and their distribution. The randomness of the keys has a strong impact on the system’s security strength being difficult to be predicted, guessed, reproduced or discovered by a cryptanalyst. Therefore, adequate key randomness generation is still sought for the benefit of stronger cryptosystems. This paper suggests an algorithm designed to generate and test pseudo random number sequences intended for cryptographic applications. This algorithm is based on mathematically manipulating a publically agreed upon information between sender and receiver over a public channel. This information is used as a seed for performing some mathematical functions in order to generate a sequence of pseudorandom numbers that will be used for encryption/decryption purposes. This manipulation involves permutations and substitutions that fulfills Shannon’s principle of “confusion and diffusion”. ASCII code characters wereutilized in the generation process instead of using bit strings initially, which adds more flexibility in testing different seed values. Finally, the obtained results would indicate sound difficulty of guessing keys by attackers.Keywords: cryptosystems, information security agreement, key distribution, random numbers
Procedia PDF Downloads 2683817 Design and Validation of the 'Teachers' Resilience Scale' for Assessing Protective Factors
Authors: Athena Daniilidou, Maria Platsidou
Abstract:
Resilience is considered to greatly affect the personal and occupational wellbeing and efficacy of individuals; therefore, it has been widely studied in the social and behavioral sciences. Given its significance, several scales have been created to assess resilience of children and adults. However, most of these scales focus on examining only the internal protective or risk factors that affect the levels of resilience. The aim of the present study is to create a reliable scale that assesses both the internal and the external protective factors that affect Greek teachers’ levels of resilience. Participants were 136 secondary school teachers (89 females, 47 males) from urban areas of Greece. Connor-Davidson Resilience Scale (CD-Risc) and Resilience Scale for Adults (RSA) were used to collect the data. First, exploratory factor analysis was employed to investigate the inner structure of each scale. For both scales, the analyses revealed a differentiated factor solution compared to the ones proposed by the creators. That prompt us to create a scale that would combine the best fitting subscales of the CD-Risc and the RSA. To this end, the items of the four factors with the best fit and highest reliability were used to create the ‘Teachers' resilience scale’. Exploratory factor analysis revealed that the scale assesses the following protective/risk factors: Personal Competence and Strength (9 items, α=.83), Family Cohesion Spiritual Influences (7 items, α=.80), Social Competence and Peers Support (7 items, α=.78) and Spiritual Influence (3 items, α=.58). This four-factor model explained 49,50% of the total variance. In the next step, a confirmatory factor analysis was performed on the 26 items of the derived scale to test the above factor solution. The fit of the model to the data was good (χ2/292 = 1.245, CFI = .921, GFI = .829, SRMR = .074, CI90% = .026-,056, RMSEA = 0.43), indicating that the proposed scale can validly measure the aforementioned four aspects of teachers' resilience and thus confirmed its factorial validity. Finally, analyses of variance were performed to check for individual differences in the levels of teachers' resilience in relation to their gender, age, marital status, level of studies, and teaching specialty. Results were consistent to previous findings, thus providing an indication of discriminant validity for the instrument. This scale has the advantage of assessing both the internal and the external protective factors of resilience in a brief yet comprehensive way, since it consists 26 items instead of the total of 58 of the CD-Risc and RSA scales. Its factorial inner structure is supported by the relevant literature on resilience, as it captures the major protective factors of resilience identified in previous studies.Keywords: protective factors, resilience, scale development, teachers
Procedia PDF Downloads 2953816 Coaching for Lecturers at German Universities: An Inventory Based on a Qualitative Interview Study
Authors: Freya Willicks
Abstract:
The society of the 21st century is characterized by dynamic and complexity, developments that also shape universities and university life. The Bologna reform, for example, has led to restructuring at many European universities. Today's university teachers, therefore, have to meet many expectations: Their tasks include not only teaching but also the general improvement of the quality of teaching, good research, the management of various projects or the development of their own personal skills. This requires a high degree of flexibility and openness to change. The resulting pressure can often lead to exhaustion. Coaching can be a way for university teachers to cope with these pressures because it gives them the opportunity to discuss stressful situations with a coach and self-reflect on them. As a result, more and more universities in Europe offer to coach to their teachers. An analysis of the services provided at universities in Germany, however, quickly reveals an immense disagreement with regard to the understanding of ‘coaching’. A variety of terms is used, such as coaching, counselling or supervision. In addition, each university defines its offer individually, from process-oriented consulting to expert consulting, from group training to individual coaching. The biographic backgrounds of those who coach are also very divergent, both external and internal coaches can be suitable. These findings lead to the following questions: Which structural characteristics for coaching at universities have been proven successful? What competencies should a good coach for university lecturers have? In order to answer these questions, a qualitative study was carried out. In a first step, qualitative semi-structured interviews (N = 14) were conducted, on the one hand with coaches for university teachers and on the other hand with university teachers who have been coached. In a second step, the interviews were transcribed and analyzed using Mayring's qualitative content analysis. The study shows how great the potential of coaching can be for university teachers, who otherwise have little opportunity to talk about their teaching in a private setting. According to the study, the coach should neither be a colleague nor a superior of the coachee but should take an independent perspective, as this is the only way for the coachee to openly reflect on himself/herself. In addition, the coach should be familiar with the university system, i.e., be an academic himself/herself. Otherwise, he/she cannot fully understand the complexity of the teaching situation and the role expectations. However, internal coaches do not necessarily have much coaching experience or explicit coaching competencies. They often come from the university's own didactics department, are experts in didactics, but do not necessarily have a certified coaching education. Therefore, it is important to develop structures and guidelines for internal coaches to support their coaching. In further analysis, such guidelines will be developed on the basis of these interviews.Keywords: coaching, university coaching, university didactics, qualitative interviews
Procedia PDF Downloads 1103815 Wireless Transmission of Big Data Using Novel Secure Algorithm
Authors: K. Thiagarajan, K. Saranya, A. Veeraiah, B. Sudha
Abstract:
This paper presents a novel algorithm for secure, reliable and flexible transmission of big data in two hop wireless networks using cooperative jamming scheme. Two hop wireless networks consist of source, relay and destination nodes. Big data has to transmit from source to relay and from relay to destination by deploying security in physical layer. Cooperative jamming scheme determines transmission of big data in more secure manner by protecting it from eavesdroppers and malicious nodes of unknown location. The novel algorithm that ensures secure and energy balance transmission of big data, includes selection of data transmitting region, segmenting the selected region, determining probability ratio for each node (capture node, non-capture and eavesdropper node) in every segment, evaluating the probability using binary based evaluation. If it is secure transmission resume with the two- hop transmission of big data, otherwise prevent the attackers by cooperative jamming scheme and transmit the data in two-hop transmission.Keywords: big data, two-hop transmission, physical layer wireless security, cooperative jamming, energy balance
Procedia PDF Downloads 4863814 Uniform and Controlled Cooling of a Steel Block by Multiple Jet Impingement and Airflow
Authors: E. K. K. Agyeman, P. Mousseau, A. Sarda, D. Edelin
Abstract:
During the cooling of hot metals by the circulation of water in canals formed by boring holes in the metal, the rapid phase change of the water due to the high initial temperature of the metal leads to a non homogenous distribution of the phases within the canals. The liquid phase dominates towards the entrance of the canal while the gaseous phase dominates towards the exit. As a result of the different thermal properties of both phases, the metal is not uniformly cooled. This poses a problem during the cooling of moulds, where a uniform temperature distribution is needed in order to ensure the integrity of the part being formed. In this study, the simultaneous use of multiple water jets and an airflow for the uniform and controlled cooling of a steel block is investigated. A circular hole is bored at the centre of the steel block along its length and a perforated steel pipe is inserted along the central axis of the hole. Water jets that impact the internal surface of the steel block are generated from the perforations in the steel pipe when the water within it is put under pressure. These jets are oriented in the opposite direction to that of gravity. An intermittent airflow is imposed in the annular space between the steel pipe and the surface of hole bored in the steel block. The evolution of the temperature with respect to time of the external surface of the block is measured with the help of thermocouples and an infrared camera. Due to the high initial temperature of the steel block (350 °C), the water changes phase when it impacts the internal surface of the block. This leads to high heat fluxes. The strategy used to control the cooling speed of the block is the intermittent impingement of its internal surface by the jets. The intervals of impingement and of non impingement are varied in order to achieve the desired result. An airflow is used during the non impingement periods as an additional regulator of the cooling speed and to improve the temperature homogeneity of the impinged surface. After testing different jet positions, jet speeds and impingement intervals, it’s observed that the external surface of the steel block has a uniform temperature distribution along its length. However, the temperature distribution along its width isn’t uniform with the maximum temperature difference being between the centre of the block and its edge. Changing the positions of the jets has no significant effect on the temperature distribution on the external surface of the steel block. It’s also observed that reducing the jet impingement interval and increasing the non impingement interval slows down the cooling of the block and improves upon the temperature homogeneity of its external surface while increasing the duration of jet impingement speeds up the cooling process.Keywords: cooling speed, homogenous cooling, jet impingement, phase change
Procedia PDF Downloads 1243813 Landslide Hazard Assessment Using Physically Based Mathematical Models in Agricultural Terraces at Douro Valley in North of Portugal
Authors: C. Bateira, J. Fernandes, A. Costa
Abstract:
The Douro Demarked Region (DDR) is a production Porto wine region. On the NE of Portugal, the strong incision of the Douro valley developed very steep slopes, organized with agriculture terraces, have experienced an intense and deep transformation in order to implement the mechanization of the work. The old terrace system, based on stone vertical wall support structure, replaced by terraces with earth embankments experienced a huge terrace instability. This terrace instability has important economic and financial consequences on the agriculture enterprises. This paper presents and develops cartographic tools to access the embankment instability and identify the area prone to instability. The priority on this evaluation is related to the use of physically based mathematical models and develop a validation process based on an inventory of the past embankment instability. We used the shallow landslide stability model (SHALSTAB) based on physical parameters such us cohesion (c’), friction angle(ф), hydraulic conductivity, soil depth, soil specific weight (ϱ), slope angle (α) and contributing areas by Multiple Flow Direction Method (MFD). A terraced area can be analysed by this models unless we have very detailed information representative of the terrain morphology. The slope angle and the contributing areas depend on that. We can achieve that propose using digital elevation models (DEM) with great resolution (pixel with 40cm side), resulting from a set of photographs taken by a flight at 100m high with pixel resolution of 12cm. The slope angle results from this DEM. In the other hand, the MFD contributing area models the internal flow and is an important element to define the spatial variation of the soil saturation. That internal flow is based on the DEM. That is supported by the statement that the interflow, although not coincident with the superficial flow, have important similitude with it. Electrical resistivity monitoring values which related with the MFD contributing areas build from a DEM of 1m resolution and revealed a consistent correlation. That analysis, performed on the area, showed a good correlation with R2 of 0,72 and 0,76 at 1,5m and 2m depth, respectively. Considering that, a DEM with 1m resolution was the base to model the real internal flow. Thus, we assumed that the contributing area of 1m resolution modelled by MFD is representative of the internal flow of the area. In order to solve this problem we used a set of generalized DEMs to build the contributing areas used in the SHALSTAB. Those DEMs, with several resolutions (1m and 5m), were built from a set of photographs with 50cm resolution taken by a flight with 5km high. Using this maps combination, we modelled several final maps of terrace instability and performed a validation process with the contingency matrix. The best final instability map resembles the slope map from a DEM of 40cm resolution and a MFD map from a DEM of 1m resolution with a True Positive Rate (TPR) of 0,97, a False Positive Rate of 0,47, Accuracy (ACC) of 0,53, Precision (PVC) of 0,0004 and a TPR/FPR ratio of 2,06.Keywords: agricultural terraces, cartography, landslides, SHALSTAB, vineyards
Procedia PDF Downloads 1763812 Selective Oxidation of 6Mn-2Si Advanced High Strength Steels during Intercritical Annealing Treatment
Authors: Maedeh Pourmajidian, Joseph R. McDermid
Abstract:
Advanced High Strength Steels are revolutionizing both the steel and automotive industries due to their high specific strength and ability to absorb energy during crash events. This allows manufacturers to design vehicles with significantly increased fuel efficiency without compromising passenger safety. To maintain the structural integrity of the fabricated parts, they must be protected from corrosion damage through continuous hot-dip galvanizing process, which is challenging due to selective oxidation of Mn and Si on the surface of this AHSSs. The effects of process atmosphere oxygen partial pressure and small additions of Sn on the selective oxidation of a medium-Mn C-6Mn-2Si advanced high strength steel was investigated. Intercritical annealing heat treatments were carried out at 690˚C in an N2-5%H2 process atmosphere under dew points ranging from –50˚C to +5˚C. Surface oxide chemistries, morphologies, and thicknesses were determined at a variety of length scales by several techniques, including SEM, TEM+EELS, and XPS. TEM observations of the sample cross-sections revealed the transition to internal oxidation at the +5˚C dew point. EELS results suggested that the internal oxides network was composed of a multi-layer oxide structure with varying chemistry from oxide core towards the outer part. The combined effect of employing a known surface active element as a function of process atmosphere on the surface structure development and the possible impact on reactive wetting of the steel substrates by the continuous galvanizing zinc bath will be discussed.Keywords: 3G AHSS, hot-dip galvanizing, oxygen partial pressure, selective oxidation
Procedia PDF Downloads 3973811 Demonstration Operation of Distributed Power Generation System Based on Carbonized Biomass Gasification
Authors: Kunio Yoshikawa, Ding Lu
Abstract:
Small-scale, distributed and low-cost biomass power generation technologies are highly required in the modern society. There are big needs for these technologies in the disaster areas of developed countries and un-electrified rural areas of developing countries. This work aims to present a technical feasibility of the portable ultra-small power generation system based on the gasification of carbonized wood pellets/briquettes. Our project is designed for enabling independent energy production from various kinds of biomass resources in the open-field. The whole process mainly consists of two processes: biomass and waste pretreatment; gasification and power generation. The first process includes carbonization, densification (briquetting or pelletization), and the second includes updraft fixed bed gasification of carbonized pellets/briquettes, syngas purification, and power generation employing an internal combustion gas engine. A combined pretreatment processes including carbonization without external energy and densification were adopted to deal with various biomass. Carbonized pellets showed a better gasification performance than carbonized briquettes and their mixture. The 100-hour continuous operation results indicated that pelletization/briquetting of carbonized fuel realized the stable operation of an updraft gasifier if there were no blocking issues caused by the accumulation of tar. The cold gas efficiency and the carbon conversion during carbonized wood pellets gasification was about 49.2% and 70.5% with the air equivalence ratio value of around 0.32, and the corresponding overall efficiency of the gas engine was 20.3% during the stable stage. Moreover, the maximum output power was 21 kW at the air flow rate of 40 Nm³·h⁻¹. Therefore, the comprehensive system covering biomass carbonization, densification, gasification, syngas purification, and engine system is feasible for portable, ultra-small power generation. This work has been supported by Innovative Science and Technology Initiative for Security (Ministry of Defence, Japan).Keywords: biomass carbonization, densification, distributed power generation, gasification
Procedia PDF Downloads 1543810 Research on Spatial Distribution of Service Facilities Based on Innovation Function: A Case Study of Zhejiang University Zijin Co-Maker Town
Authors: Zhang Yuqi
Abstract:
Service facilities are the boosters for the cultivation and development of innovative functions in innovative cluster areas. At the same time, reasonable service facilities planning can better link the internal functional blocks. This paper takes Zhejiang University Zijin Co-Maker Town as the research object, based on the combination of network data mining and field research and verification, combined with the needs of its internal innovative groups. It studies the distribution characteristics and existing problems of service facilities and then proposes a targeted planning suggestion. The main conclusions are as follows: (1) From the perspective of view, the town is rich in general life-supporting services, but lacking of provision targeted and distinctive service facilities for innovative groups; (2) From the perspective of scale structure, small-scale street shops are the main business form, lack of large-scale service center; (3) From the perspective of spatial structure, service facilities layout of each functional block is too fragile to fit the characteristics of 2aggregation- distribution' of innovation and entrepreneurial activities; (4) The goal of optimizing service facilities planning should be guided for fostering function of innovation and entrepreneurship and meet the actual needs of the innovation and entrepreneurial groups.Keywords: the cultivation of innovative function, Zhejiang University Zijin Co-Maker Town, service facilities, network data mining, space optimization advice
Procedia PDF Downloads 1143809 The Correlation between Emotional Intelligence and Locus of Control: Empirical Study on Lithuanian Youth
Authors: Dalia Antiniene, Rosita Lekaviciene
Abstract:
The qualitative methodology based study is designed to reveal a connection between emotional intelligence (EI) and locus of control (LC) within the population of Lithuanian youth. In the context of emotional problems, the locus of control reflects how one estimates the causes of his/her emotions: internals (internal locus of control) associate their emotions with their manner of thinking, whereas externals (external locus of control) consider emotions to be evoked by external circumstances. On the other hand, there is little empirical data about this connection, and the results in disposition are often contradictory. In the conducted study 1430 young people, aged 17 to 27, from various regions of Lithuania were surveyed. The subjects were selected by quota sampling, maintaining natural proportions of the general Lithuanian youth population. To assess emotional intelligence the EI-DARL test (i.e. self-report questionnaire consisting of 75 items) was implemented. The emotional intelligence test, created applying exploratory factor analysis, reveals four main dimensions of EI: understanding of one’s own emotions, regulation of one’s own emotions, understanding other’s emotions, and regulation of other’s emotions (subscale reliability coefficients fluctuate between 0,84 and 0,91). An original 16-item internality/externality scale was used to examine the locus of control (internal consistency of the Externality subscale - 0,75; Internality subscale - 0,65). The study has determined that the youth understands and regulates other people’s emotions better than their own. Using the K-mean cluster analysis method, it was established that there are three groups of subjects according to their EI level – people with low, medium and high EI. After comparing means of subjects’ favorability of statements on the Internality/Externality scale, a predominance of internal locus of control in the young population was established. The multiple regression models has shown that a rather strong statistically significant correlation exists between total EI, EI subscales and LC. People who tend to attribute responsibility for the outcome of their actions to their own abilities and efforts have higher EI and, conversely, the tendency to attribute responsibility to external forces is related more with lower EI. While pursuing their goals, young people with high internality have a predisposition to analyze perceived emotions and, therefore, gain emotional experience: they learn to control their natural reactions and to act adequately in a situation at hand. Thus the study unfolds, that a person’s locus of control and emotional intelligence are related phenomena and allows us to draw a conclusion, that a person’s internality/externality is a reliable predictor of total EI and its components.Keywords: emotional intelligence, externality, internality, locus of control
Procedia PDF Downloads 2213808 Blind Watermarking Using Discrete Wavelet Transform Algorithm with Patchwork
Authors: Toni Maristela C. Estabillo, Michaela V. Matienzo, Mikaela L. Sabangan, Rosette M. Tienzo, Justine L. Bahinting
Abstract:
This study is about blind watermarking on images with different categories and properties using two algorithms namely, Discrete Wavelet Transform and Patchwork Algorithm. A program is created to perform watermark embedding, extraction and evaluation. The evaluation is based on three watermarking criteria namely: image quality degradation, perceptual transparency and security. Image quality is measured by comparing the original properties with the processed one. Perceptual transparency is measured by a visual inspection on a survey. Security is measured by implementing geometrical and non-geometrical attacks through a pass or fail testing. Values used to measure the following criteria are mostly based on Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The results are based on statistical methods used to interpret and collect data such as averaging, z Test and survey. The study concluded that the combined DWT and Patchwork algorithms were less efficient and less capable of watermarking than DWT algorithm only.Keywords: blind watermarking, discrete wavelet transform algorithm, patchwork algorithm, digital watermark
Procedia PDF Downloads 2673807 Secure Text Steganography for Microsoft Word Document
Authors: Khan Farhan Rafat, M. Junaid Hussain
Abstract:
Seamless modification of an entity for the purpose of hiding a message of significance inside its substance in a manner that the embedding remains oblivious to an observer is known as steganography. Together with today's pervasive registering frameworks, steganography has developed into a science that offers an assortment of strategies for stealth correspondence over the globe that must, however, need a critical appraisal from security breach standpoint. Microsoft Word is amongst the preferably used word processing software, which comes as a part of the Microsoft Office suite. With a user-friendly graphical interface, the richness of text editing, and formatting topographies, the documents produced through this software are also most suitable for stealth communication. This research aimed not only to epitomize the fundamental concepts of steganography but also to expound on the utilization of Microsoft Word document as a carrier for furtive message exchange. The exertion is to examine contemporary message hiding schemes from security aspect so as to present the explorative discoveries and suggest enhancements which may serve a wellspring of information to encourage such futuristic research endeavors.Keywords: hiding information in plain sight, stealth communication, oblivious information exchange, conceal, steganography
Procedia PDF Downloads 2413806 Preparation and Removal Properties of Hollow Fiber Membranes for Drinking Water
Authors: Seung Moon Woo, Youn Suk Chung, Sang Yong Nam
Abstract:
In the present time, we need advanced water treatment technology for separation of virus and bacteria in effluent which occur epidemic and waterborne diseases. Water purification system is mainly divided into two categorizations like reverse osmosis (RO) and ultrafiltration (UF). Membrane used in these systems requires higher durability because of operating in harsh condition. Of these, the membrane using in UF system has many advantages like higher efficiency and lower energy consume for water treatment compared with RO system. In many kinds of membrane, hollow fiber type membrane is possible to make easily and to get optimized property by control of various spinning conditions such as temperature of coagulation bath, concentration of polymer, addition of additive, air gap and internal coagulation. In this study, polysulfone hollow fiber membrane was successfully prepared by phase inversion method for separation of virus and bacteria. When we prepare the hollow fiber membrane, we controlled various factors such as the polymer concentration, air gap and internal coagulation to investigate effect to membrane property. Morphology of surface and cross section of membrane were measured by field emission scanning electron microscope (FE-SEM). Water flux of membrane was measured using test modules. Mean pore diameter of membrane was calculated using rejection of polystyrene (PS) latex beads for separation of virus and bacteria. Flux and mean flow pore diameter of prepared membrane show 1.5 LPM, 0.03 μm at 1.0 kgf/cm2. The bacteria and virus removal performance of prepared UF membranes were over 6 logs.Keywords: hollow fiber membrane, drinking water, ultrafiltration, bacteria
Procedia PDF Downloads 2463805 Structure of Consciousness According to Deep Systemic Constellations
Authors: Dmitry Ustinov, Olga Lobareva
Abstract:
The method of Deep Systemic Constellations is based on a phenomenological approach. Using the phenomenon of substitutive perception it was established that the human consciousness has a hierarchical structure, where deeper levels govern more superficial ones (reactive level, energy or ancestral level, spiritual level, magical level, and deeper levels of consciousness). Every human possesses a depth of consciousness to the spiritual level, however deeper levels of consciousness are not found for every person. It was found that the spiritual level of consciousness is not homogeneous and has its own internal hierarchy of sublevels (the level of formation of spiritual values, the level of the 'inner observer', the level of the 'path', the level of 'God', etc.). The depth of the spiritual level of a person defines the paradigm of all his internal processes and the main motives of the movement through life. At any level of consciousness disturbances can occur. Disturbances at a deeper level cause disturbances at more superficial levels and are manifested in the daily life of a person in feelings, behavioral patterns, psychosomatics, etc. Without removing the deepest source of a disturbance it is impossible to completely correct its manifestation in the actual moment. Thus a destructive pattern of feeling and behavior in the actual moment can exist because of a disturbance, for example, at the spiritual level of a person (although in most cases the source is at the energy level). Psychological work with superficial levels without removing a source of disturbance cannot fully solve the problem. The method of Deep Systemic Constellations allows one to work effectively with the source of the problem located at any depth. The methodology has confirmed its effectiveness in working with more than a thousand people.Keywords: constellations, spiritual psychology, structure of consciousness, transpersonal psychology
Procedia PDF Downloads 2493804 A Model to Assist Military Mission Planners in Identifying and Assessing Variables Impacting Food Security
Authors: Lynndee Kemmet
Abstract:
The U.S. military plays an increasing role in supporting political stability efforts, and this includes efforts to prevent the food insecurity that can trigger political and social instability. This paper presents a model that assists military commanders in identifying variables that impact food production and distribution in their areas of operation (AO), in identifying connections between variables and in assessing the impacts of those variables on food production and distribution. Through use of the model, military units can better target their data collection efforts and can categorize and analyze data within the data categorization framework most widely-used by military forces—PMESII-PT (Political, Military, Economic, Infrastructure, Information, Physical Environment and Time). The model provides flexibility of analysis in that commanders can target analysis to be highly focused on a specific PMESII-PT domain or variable or conduct analysis across multiple PMESII-PT domains. The model is also designed to assist commanders in mapping food systems in their AOs and then identifying components of those systems that must be strengthened or protected.Keywords: food security, food system model, political stability, US Military
Procedia PDF Downloads 193