Search results for: security critical application
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 15113

Search results for: security critical application

13763 A Critical Analysis of the Financial Reporting Practices of Islamic Financial Institutions (IFI)

Authors: Riaz Dhai

Abstract:

The inherent differences between Islamic and conventional finance have given rise to a debate on whether conventional accounting standards provide sufficient disclosure in the annual financial statements of Islamic financial institutions (IFI). This issue has become more pronounced due to the rapid growth of IFIs over the last decade. This paper seeks to collate the literature surrounding this debate as well as summarise the key macro and micro level financial reporting differences between conventional and Islamic accounting. Based on these findings we propose some important areas of future research in this emerging field.

Keywords: Islamic financial institutions, financial reporting, critical analysis, conventional accounting standards

Procedia PDF Downloads 439
13762 Performance Analysis of N-Tier Grid Protocol for Resource Constrained Wireless Sensor Networks

Authors: Jai Prakash Prasad, Suresh Chandra Mohan

Abstract:

Modern wireless sensor networks (WSN) consist of small size, low cost devices which are networked through tight wireless communications. WSN fundamentally offers cooperation, coordination among sensor networks. Potential applications of wireless sensor networks are in healthcare, natural disaster prediction, data security, environmental monitoring, home appliances, entertainment etc. The design, development and deployment of WSN based on application requirements. The WSN design performance is optimized to improve network lifetime. The sensor node resources constrain such as energy and bandwidth imposes the limitation on efficient resource utilization and sensor node management. The proposed N-Tier GRID routing protocol focuses on the design of energy efficient large scale wireless sensor network for improved performance than the existing protocol.

Keywords: energy efficient, network lifetime, sensor networks, wireless communication

Procedia PDF Downloads 466
13761 Assessing Justice, Security and Human Rights Violations in Crisis Situations: The Case of Cameroon

Authors: Forbah Julius Ajamah

Abstract:

The protection of human rights and respect of the rule of law in Sub-Saharan African is a constant challenge due to ongoing and protracted conflict situations, political instability, shrinking democratic space and allegations of large-scale corruption in some countries. Conflict and/or crisis is most often resulting from constant violations of individual rights, with the risk increasing when many human rights are violated in a systematic or widespread fashion. Violations related to economic, social and cultural rights at times are as significant as violations of civil and political rights. Cameroon a country in Sub-Saharan African, for many years now has been confronted by numerous crises across different regions. Despite measures carried out, it has been reported that lesser and lesser attention has been placed on various conflict/crisis across Cameroon. To reach a common understanding of how both the economic, social and cultural rights has been violated and related impact on the quality of life, this paper evaluates justice, security and human rights violations in the present crisis situations. Without the prevention of human rights violations, wider conflict and/or crisis, will continue to have a negative impact in the lives of the inhabitants. This paper aims at providing evidence to support the fact that effective prevention requires early identification of risks that could allow for preventive and/or mitigatory measures to be designed and implemented.

Keywords: justice, security, human rights abuses, conflicts, crisis

Procedia PDF Downloads 83
13760 Image Steganography Using Least Significant Bit Technique

Authors: Preeti Kumari, Ridhi Kapoor

Abstract:

 In any communication, security is the most important issue in today’s world. In this paper, steganography is the process of hiding the important data into other data, such as text, audio, video, and image. The interest in this topic is to provide availability, confidentiality, integrity, and authenticity of data. The steganographic technique that embeds hides content with unremarkable cover media so as not to provoke eavesdropper’s suspicion or third party and hackers. In which many applications of compression, encryption, decryption, and embedding methods are used for digital image steganography. Due to compression, the nose produces in the image. To sustain noise in the image, the LSB insertion technique is used. The performance of the proposed embedding system with respect to providing security to secret message and robustness is discussed. We also demonstrate the maximum steganography capacity and visual distortion.

Keywords: steganography, LSB, encoding, information hiding, color image

Procedia PDF Downloads 468
13759 Next-Generation Laser-Based Transponder and 3D Switch for Free Space Optics in Nanosatellite

Authors: Nadir Atayev, Mehman Hasanov

Abstract:

Future spacecraft will require a structural change in the way data is transmitted due to the increase in the volume of data required for space communication. Current radio frequency communication systems are already facing a bottleneck in the volume of data sent to the ground segment due to their technological and regulatory characteristics. To overcome these issues, free space optics communication plays an important role in the integrated terrestrial space network due to its advantages such as significantly improved data rate compared to traditional RF technology, low cost, improved security, and inter-satellite free space communication, as well as uses a laser beam, which is an optical signal carrier to establish satellite-ground & ground-to-satellite links. In this approach, there is a need for high-speed and energy-efficient systems as a base platform for sending high-volume video & audio data. Nano Satellite and its branch CubeSat platforms have more technical functionality than large satellites, wheres cover an important part of the space sector, with their Low-Earth-Orbit application area with low-cost design and technical functionality for building networks using different communication topologies. Along the research theme developed in this regard, the output parameter indicators for the FSO of the optical communication transceiver subsystem on the existing CubeSat platforms, and in the direction of improving the mentioned parameters of this communication methodology, 3D optical switch and laser beam controlled optical transponder with 2U CubeSat structural subsystems and application in the Low Earth Orbit satellite network topology, as well as its functional performance and structural parameters, has been studied accordingly.

Keywords: cubesat, free space optics, nano satellite, optical laser communication.

Procedia PDF Downloads 86
13758 Parental Education on Early Childhood Development Using Mobile App and Website in China

Authors: Margo O'Sullivan, Xuefeng Chen, Qi Zhao, J. Jiang, Ning Fu

Abstract:

Early childhood development, or ECD, is about the 'whole child' – the physical, social and emotional, cognitive thinking and language progression of each young individual. Overwhelming evidence is now available to support investment in Early Childhood Development internationally, attendance at ECD leads to: improved learning outcomes; improved completion and reduced less dropout rates; and most notably, Professor Heckman, Nobel Laureate’s, findings that for every dollar invested, there is an economic return of up to 17%. Notably, ECD has been included in the 2015-2030 Sustainable Development Goals. The Government of China (GOC) has embraced this research and in 2010, State Council, announced focus on ECD setting a target to provide access to ECD for 85% of 3-6 year olds by 2020; to date, the target has surpassed expectations and reached 70.4%. GoC is also increasingly focusing on the even more critical 0-3 age group, when the plasticity of the brain is at its peak and neurons form connections as fast as 1,000 per second. Key to ECD are parents and caregivers of young children, with parental education critical to fully exploiting the significant potential of the early years of children. In China, with such vast numbers, one in seven pre-school age children in the world live in China, the Ministry of Education (MoE) and the National Centre for Education Technology, explored how to best provide parental education and provide key child developmental related knowledge to parents and caregivers. In response, MoE and UNICEF created a resource for parenting information that began with a computer website in 2012, followed by piloting a kiosk service in 2013 for parents in remote areas without access to the internet, and then a mobile phone application in 2014. The resource includes 269 ECD messages and 200 micro-videos covering critical issues of early childhood development from birth to age 6 years: daily care, nutrition and feeding, disease prevention, immunization, development and education, and safety and protection. To date, there have been 397,599 unique views on the website, and data for the mobile app currently being analysed (Links: http://yuer.cbern.gov.cn/; App: https://appsto.re/cn/OiKPZ.i). This paper will explore the development of this resource, its use by parents and the public, efforts to assess the effectiveness in improving parenting and child development, and future plans to roll an updated version in 2016 to all parents.

Keywords: early childhood development, mobile apps for education, parental education, China

Procedia PDF Downloads 223
13757 Use of Simultaneous Electron Backscatter Diffraction and Energy Dispersive X-Ray Spectroscopy Techniques to Characterize High-Temperature Oxides Formed on Nickel-Based Superalloys Exposed to Super-Critical Water Environment

Authors: Mohsen Sanayei, Jerzy Szpunar, Sami Penttilä

Abstract:

Exposure of Nickel-based superalloys to high temperature and harsh environment such as Super-Critical Water (SCW) environment leads to the formation of oxide scales composed of multiple and complex phases that are difficult to differentiate with conventional analysis techniques. In this study, we used simultaneous Electron Backscatter Diffraction (EBSD) and Energy Dispersive X-ray Spectroscopy (EDS) to analyze the complex oxide scales formed on several Nickel-based Superalloys exposed to high temperature SCW. Multi-layered structures of Iron, Nickel, Chromium and Molybdenum oxides and spinels were clearly identified using the simultaneous EBSD-EDS analysis technique. Furthermore, the orientation relationship between the oxide scales and the substrate has been investigated.

Keywords: electron backscatter diffraction, energy dispersive x-ray spectroscopy, superalloy, super-critical water

Procedia PDF Downloads 312
13756 Engineering Management and Practice in Nigeria

Authors: Harold Jideofor

Abstract:

The application of Project Management (PM) tools and techniques in the public sector is gradually becoming an important issue in developing economies, especially in a country like Nigeria where projects of different size and structures are undertaken. The paper examined the application of the project management practice in the public sector in Nigeria. The PM lifecycles, tools, and techniques were presented. The study was carried out in Lagos because of its metropolitan nature and rapidly growing economy. Twenty-three copies of questionnaire were administered to 23 public institutions in Lagos to generate primary data. The descriptive analysis techniques using percentages and table presentations coupled with the coefficient of correlation were used for data analysis. The study revealed that application of PM tools and techniques is an essential management approach that tends to achieve specified objectives within specific time and budget limits through the optimum use of resources. Furthermore, the study noted that there is a lack of in-depth knowledge of PM tools and techniques in public sector institutions sampled, also a high cost of the application was also observed by the respondents. The study recommended among others that PM tools and techniques should be applied gradually especially in old government institutions where resistance to change is perceived to be high.

Keywords: project management, public sector, practice, Nigeria

Procedia PDF Downloads 336
13755 Potential of Intercropping Corn and Cowpea to Ratooned Sugarcane for Food and Forage

Authors: Maricon E. Gepolani, Edna A. Aguilar, Pearl B. Sanchez, Enrico P. Supangco

Abstract:

Intercropping farming system and biofertilizer application are sustainable agricultural practices that increase farm productivity by improving the yield performance of the components involved in the production system. Thus, this on-farm trial determined the yield and forage quality of corn and cowpea with and without biofertilizer application when intercropped with ratooned sugarcane. Intercropping corn and cowpea without biofertilizer application had no negative effect on the vegetative growth of sugarcane. However, application of biofertilizer on intercrops decreased tiller production at 117 days after stubble shaving (DASS), consequently reducing the estimated tonnage yield of sugarcane. The yield of intercrops and forage production of Cp3 cowpea variety increased when intercropped to ratooned sugarcane. In contrast, intercropping PSB 97-92 corn variety to ratooned sugarcane reduced its forage production, but when biofertilizer was applied to intercropped Cp5 cowpea variety, the forage production increased. Profitability (income equivalent ratio) of intercropping for both corn and cowpea are higher than monocropping and are thus suitable intercrops to ratooned sugarcane. Unaffected tiller count (a determinant of sugarcane tonnage yield) when biofertilizer was not applied to intercrops and a reduced tiller count with biofertilizer application to intercrops implies the need to develop a nutrient management practices specific for intercropping systems.

Keywords: biofertilizer, corn, cowpea, intercropping system, ratooned sugarcane

Procedia PDF Downloads 126
13754 Guidelines for Proper Internal Control of Internet Payment: A Case Study of Internet Payment Gateway, Thailand

Authors: Pichamon Chansuchai

Abstract:

The objective of this research were to investigate electronic payment system on the internet and offer the guidelines for proper internal control of the payment system based on international standard security control (ISO/IEC 17799:2005),in a case study of payment of the internet, Thailand. The guidelines covered five important areas: (1) business requirement for access control, (2) information systems acquisition, development and maintenance, (3) information security incident management, (4) business continuity management, and (5) compliance with legal requirement. The findings from this qualitative study revealed the guidelines for proper internet control that were more reliable and allow the same line of business to implement the same system of control.

Keywords: audit, best practice, internet, payment

Procedia PDF Downloads 493
13753 Role of Salicylic Acid in Alleviating Chromium Toxicity in Chickpea (Cicer Arietinum L.)

Authors: Ghulam Hassan Abbasi, Moazzam Jamil, Ghazala Akhtar, M.Anwar-ul-Haq

Abstract:

Heavy metals are significant pollutants in environment and their toxicity is a problem for survival of living things while salicylic acid (SA) is signaling and ubiquitous bioactive molecule that regulates cellular mechanism in plants under stress condition. Therefore, exogenous application of salicylic acid (SA) under chromium stress in two chickpea varieties were investigated in hydroponic experiment with five treatments comprising of control, 5 µM Cr + 5 mM SA, 5µM Cr + 10 mM SA, 10µM Cr + 5 mM SA, and 10µM Cr + 10 mM SA. Results revealed that treatments of plants with 10 mM SA application under both 5 µM Cr and 10 µM Cr stress resulted in maximum improvement in plant morphological attributes (root and shoot length, root and shoot fresh and dry weight, membrane stability index and relative water contents) relative to 5 mM SA application in both chickpea varieties. Results regarding Cr concentration showed that Cr was more retained in roots followed by shoots and maximum reduction in Cr uptake was observed at 10 mM SA application. Chickpea variety BRC-61 showed maximum growth and least concentration of Cr in root and shoot relative to BRC-390 variety.

Keywords: chromium, Chickpea, salicylic acid, growth

Procedia PDF Downloads 505
13752 The Visualizer for Real-Time Analysis of Internet Trends

Authors: Radek Malinský, Ivan Jelínek

Abstract:

The current web has become a modern encyclopedia, where people share their thoughts and ideas on various topics around them. Such kind of encyclopedia is very useful for other people who are looking for answers to their questions. However, with the growing popularity of social networking and blogging and ever expanding network services, there has also been a growing diversity of technologies along with different structure of individual websites. It is, therefore, difficult to directly find a relevant answer for a common Internet user. This paper presents a web application for the real-time end-to-end analysis of selected Internet trends; where the trend can be whatever the people post online. The application integrates fully configurable tools for data collection and analysis using selected webometric algorithms, and for its chronological visualization to user. It can be assumed that the application facilitates the users to evaluate the quality of various products that are mentioned online.

Keywords: Trend, visualizer, web analysis, web 2.0.

Procedia PDF Downloads 261
13751 Literature Review: Application of Artificial Intelligence in EOR

Authors: Masoumeh Mofarrah, Amir NahanMoghadam

Abstract:

Higher oil prices and increasing oil demand are main reasons for great attention to Enhanced Oil Recovery (EOR). Comprehensive researches have been accomplished to develop, appraise and improve EOR methods and their application. Recently Artificial Intelligence (AI) gained popularity in petroleum industry that can help petroleum engineers to solve some fundamental petroleum engineering problems such as reservoir simulation, EOR project risk analysis, well log interpretation and well test model selection. This study presents a historical overview of most popular AI tools including neural networks, genetic algorithms, fuzzy logic and expert systems in petroleum industry and discusses two case studies to represent the application of two mentioned AI methods for selecting an appropriate EOR method based on reservoir characterization in feasible and effective way.

Keywords: artificial intelligence, EOR, neural networks, expert systems

Procedia PDF Downloads 406
13750 Sustainable Manufacturing Framework for Small and Medium Enterprises

Authors: Rajan Deglurkar

Abstract:

The research carried out in this piece of work is on 'Framework of Sustainable Manufacturing for Small and Medium Enterprises'. It consists of elucidation of concepts about sustainable manufacturing and sustainable product development with critical review performed on seven techniques of sustainable manufacturing. The work also covers the survey about critical review of awareness in the market with respect to the manufacturers and the consumers. The factors and challenges for sustainable manufacturing implementation are reviewed and simple framework is constructed for the small and medium enterprise for successful implementation of sustainable manufacturing and sustainable product.

Keywords: sustainable development, sustainable manufacturing, resource efficiency, framework for sustainable manufacturing

Procedia PDF Downloads 511
13749 Non-Destructive Test of Bar for Determination of Critical Compression Force Directed towards the Pole

Authors: Boris Blostotsky, Elia Efraim

Abstract:

The phenomenon of buckling of structural elements under compression is revealed in many cases of loading and found consideration in many structures and mechanisms. In the present work the method and results of dynamic test for buckling of bar loaded by a compression force directed towards the pole are considered. Experimental determination of critical force for such system has not been made previously. The tested object is a bar with semi-rigid connection to the base at one of its ends, and with a hinge moving along a circle at the other. The test includes measuring the natural frequency of the bar at different values of compression load. The lateral stiffness is calculated based on natural frequency and reduced mass on the bar's movable end. The critical load is determined by extrapolation the values of lateral stiffness up to zero value. For the experimental investigation the special test-bed was created that allows the stability testing at positive and negative curvature of the movable end's trajectory, as well as varying the rotational stiffness of the other end connection. Decreasing a friction at the movable end allows extend the diapason of applied compression force. The testing method includes: - Methodology of the experiment planning, that allows determine the required number of tests under various loads values in the defined range and the type of extrapolating function; - Methodology of experimental determination of reduced mass at the bar's movable end including its own mass; - Methodology of experimental determination of lateral stiffness of uncompressed bar rotational semi-rigid connection at the base. For planning the experiment and for comparison of the experimental results with the theoretical values of critical load, the analytical dependencies of lateral stiffness of the bar with defined end conditions on compression load. In the particular case of perfectly rigid connection of the bar to the base, the critical load value corresponds to solution by S.P. Timoshenko. Correspondence of the calculated and experimental values was obtained.

Keywords: non-destructive test, buckling, dynamic method, semi-rigid connections

Procedia PDF Downloads 353
13748 Determination of Complexity Level in Okike's Merged Irregular Transposition Cipher

Authors: Okike Benjami, Garba Ejd

Abstract:

Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In other to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often decrypted by adversaries with ease. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Okike’s Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.

Keywords: transposition cipher, merged irregular cipher, encryption, complexity level

Procedia PDF Downloads 284
13747 Numerical Investigation of 3D Printed Pin Fin Heat Sinks for Automotive Inverter Cooling Application

Authors: Alexander Kospach, Fabian Benezeder, Jürgen Abraham

Abstract:

E-mobility poses new challenges for inverters (e.g., higher switching frequencies) in terms of thermal behavior and thermal management. Due to even higher switching frequencies, thermal losses become greater, and the cooling of critical components (like insulated gate bipolar transistor and diodes) comes into focus. New manufacturing methods, such as 3D printing, enable completely new pin-fin structures that can handle higher waste heat to meet the new thermal requirements. Based on the geometrical specifications of the industrial partner regarding the manufacturing possibilities for 3D printing, different and completely new pin-fin structures were numerically investigated for their hydraulic and thermal behavior in fundamental studies assuming an indirect liquid cooling. For the 3D computational fluid dynamics (CFD) thermal simulations OpenFOAM was used, which has as numerical method the finite volume method for solving the conjugate heat transfer problem. A steady-state solver for turbulent fluid flow and solid heat conduction with conjugate heat transfer between solid and fluid regions was used for the simulations. In total, up to fifty pinfin structures and arrangements, some of them completely new, were numerically investigated. On the basis of the results of the principal investigations, the best two pin-fin structures and arrangements for the complete module cooling of an automotive inverter were numerically investigated and compared. There are clear differences in the maximum temperatures for the critical components, such as IGTBs and diodes. In summary, it was shown that 3D pin fin structures can significantly contribute to the improvement of heat transfer and cooling of an automotive inverter. This enables in the future smaller cooling designs and a better lifetime of automotive inverter modules. The new pin fin structures and arrangements can also be applied to other cooling applications where 3D printing can be used.

Keywords: pin fin heat sink optimization, 3D printed pin fins, CFD simulation, power electronic cooling, thermal management

Procedia PDF Downloads 98
13746 An Intelligence-Led Methodologly for Detecting Dark Actors in Human Trafficking Networks

Authors: Andrew D. Henshaw, James M. Austin

Abstract:

Introduction: Human trafficking is an increasingly serious transnational criminal enterprise and social security issue. Despite ongoing efforts to mitigate the phenomenon and a significant expansion of security scrutiny over past decades, it is not receding. This is true for many nations in Southeast Asia, widely recognized as the global hub for trafficked persons, including men, women, and children. Clearly, human trafficking is difficult to address because there are numerous drivers, causes, and motivators for it to persist, such as non-military and non-traditional security challenges, i.e., climate change, global warming displacement, and natural disasters. These make displaced persons and refugees particularly vulnerable. The issue is so large conservative estimates put a dollar value at around $150 billion-plus per year (Niethammer, 2020) spanning sexual slavery and exploitation, forced labor, construction, mining and in conflict roles, and forced marriages of girls and women. Coupled with corruption throughout military, police, and civil authorities around the world, and the active hands of powerful transnational criminal organizations, it is likely that such figures are grossly underestimated as human trafficking is misreported, under-detected, and deliberately obfuscated to protect those profiting from it. For example, the 2022 UN report on human trafficking shows a 56% reduction in convictions in that year alone (UNODC, 2022). Our Approach: To better understand this, our research utilizes a bespoke methodology. Applying a JAM (Juxtaposition Assessment Matrix), which we previously developed to detect flows of dark money around the globe (Henshaw, A & Austin, J, 2021), we now focus on the human trafficking paradigm. Indeed, utilizing a JAM methodology has identified key indicators of human trafficking not previously explored in depth. Being a set of structured analytical techniques that provide panoramic interpretations of the subject matter, this iteration of the JAM further incorporates behavioral and driver indicators, including the employment of Open-Source Artificial Intelligence (OS-AI) across multiple collection points. The extracted behavioral data was then applied to identify non-traditional indicators as they contribute to human trafficking. Furthermore, as the JAM OS-AI analyses data from the inverted position, i.e., the viewpoint of the traffickers, it examines the behavioral and physical traits required to succeed. This transposed examination of the requirements of success delivers potential leverage points for exploitation in the fight against human trafficking in a new and novel way. Findings: Our approach identified new innovative datasets that have previously been overlooked or, at best, undervalued. For example, the JAM OS-AI approach identified critical 'dark agent' lynchpins within human trafficking that are difficult to detect and harder to connect to actors and agents within a network. Our preliminary data suggests this is in part due to the fact that ‘dark agents’ in extant research have been difficult to detect and potentially much harder to directly connect to the actors and organizations in human trafficking networks. Our research demonstrates that using new investigative techniques such as OS-AI-aided JAM introduces a powerful toolset to increase understanding of human trafficking and transnational crime and illuminate networks that, to date, avoid global law enforcement scrutiny.

Keywords: human trafficking, open-source intelligence, transnational crime, human security, international human rights, intelligence analysis, JAM OS-AI, Dark Money

Procedia PDF Downloads 89
13745 Tackling Food Waste Challenge with Nanotechnology: Controllable Ripening via Metal Organic Framework

Authors: Boce Zhang, Yaguang Luo

Abstract:

Ripening of climacteric fruits, such as bananas and avocados, are usually initiated days prior to the retail marketing. However, upon the onset of irreversible ripening, they undergo rapid spoilage if not consumed within a narrow climacteric time window. Controlled ripening of climacteric fruits is a critical step to provide consumers with high-quality products while reducing postharvest losses and food waste. There is a high demand for technologies that can retard the ripening process or enable accelerated ripening immediately before consumption. In this work, metal−organic framework (MOF) was developed as a solid porous matrix to encapsulate gaseous hormone, including ethylene, for subsequent application. The feasibility of the on-demand stimulated ripening of bananas and avocados is also evaluated. MOF was synthesized and loaded with ethylene gas. The MOF−ethylene was placed inside sealed containers with preclimacteric bananas and avocados and stored at 16 °C. The fruits were treated for 24-48 hours, and evaluated for ripening progress. Results indicate that MOF−ethylene treatment significantly accelerated the ripening-related changes of color and textural properties in treated bananas and avocados. The average ripening period for both avocados and bananas were reduced in half by using this method. No significant differences of quality characteristics at respective ripening stages were observed between produce ripened via MOF-ethylene versus exogenously supplied ethylene gas or endogenously produced ethylene. Solid MOF matrices could have multiple advantages compared to existing systems, including easy to transport and safe to use by minimally trained produce handlers and consumers. We envision that this technology can help tackle food waste challenges at the critical retail and consumer stages in the food supply chain.

Keywords: climacteric produce, controllable ripening, food waste challenge, metal organic framework

Procedia PDF Downloads 244
13744 Non-Universality in Barkhausen Noise Signatures of Thin Iron Films

Authors: Arnab Roy, P. S. Anil Kumar

Abstract:

We discuss angle dependent changes to the Barkhausen noise signatures of thin epitaxial Fe films upon altering the angle of the applied field. We observe a sub-critical to critical phase transition in the hysteresis loop of the sample upon increasing the out-of-plane component of the applied field. The observations are discussed in the light of simulations of a 2D Gaussian Random Field Ising Model with references to a reducible form of the Random Anisotropy Ising Model.

Keywords: Barkhausen noise, Planar Hall effect, Random Field Ising Model, Random Anisotropy Ising Model

Procedia PDF Downloads 385
13743 Cryptanalysis of ID-Based Deniable Authentication Protocol Based On Diffie-Hellman Problem on Elliptic Curve

Authors: Eun-Jun Yoon

Abstract:

Deniable authentication protocol is a new security authentication mechanism which can enable a receiver to identify the true source of a given message, but not to prove the identity of the sender to a third party. In 2013, Kar proposed a secure ID-based deniable authentication protocol whose security is based on computational infeasibility of solving Elliptic Curve Diffie-Hellman Problem (ECDHP). Kar claimed that the proposed protocol achieves properties of deniable authentication, mutual authentication, and message confidentiality. However, this paper points out that Kar's protocol still suffers from sender spoofing attack and message modification attack unlike its claims.

Keywords: deniable authentication, elliptic curve cryptography, Diffie-Hellman problem, cryptanalysis

Procedia PDF Downloads 327
13742 Re-Envisioning Modernity: Transformations of Postwar Suburban Landscapes

Authors: Shannon Clayton

Abstract:

In an effort to explore the potential transformation of North American postwar suburbs, this M.Arch thesis actively engages in the ongoing critique of modernism from the mid 20th century to the present. Contemporary urban design practice has emerged out of the reaction to orthodox modernism. Typically, new suburban development falls into one of two strategies; an attempt to replicate pre-war fabric that never existed, or a reliance on high-density to create instant urbanism. In both cases, the critical role of architecture has been grossly undervalued. Ironically, it is the denial of suburbia’s inherent modernity that has served to prevent genuine place-making. As history demonstrates, modernism is not antithetical to architecture and place. In the postwar years, a critical discussion emerged amongst architects, which sought to evolve modernism beyond functionalism. This was demonstrated through critical discussions on image, experience, and monumentality. As well as increased interest in civic space, and investigations into mat urbanism and the megastructure. The undercurrent within these explorations was a belief that the scale and complexity of modern development could become an opportunity to create urbanism, rather than squander it. This critical discourse has continued through architectural work in the Netherlands and Denmark since the early 1990s, where an emphasis on visual variety, human scale, and public interaction has been given high priority. This thesis applies principles from this ongoing dialogue, and identifies hidden potential within existing North American suburban networks. As a result, the project re-evaluates the legacy of the master plan from a contemporary perspective.

Keywords: urbanism, modernism, suburbia, place-making

Procedia PDF Downloads 246
13741 Achieving Better Security by Using Nonlinear Cellular Automata as a Cryptographic Primitive

Authors: Swapan Maiti, Dipanwita Roy Chowdhury

Abstract:

Nonlinear functions are essential in different cryptoprimitives as they play an important role on the security of the cipher designs. Rule 30 was identified as a powerful nonlinear function for cryptographic applications. However, an attack (MS attack) was mounted against Rule 30 Cellular Automata (CA). Nonlinear rules as well as maximum period CA increase randomness property. In this work, nonlinear rules of maximum period nonlinear hybrid CA (M-NHCA) are studied and it is shown to be a better crypto-primitive than Rule 30 CA. It has also been analysed that the M-NHCA with single nonlinearity injection proposed in the literature is vulnerable against MS attack, whereas M-NHCA with multiple nonlinearity injections provide maximum length cycle as well as better cryptographic primitives and they are also secure against MS attack.

Keywords: cellular automata, maximum period nonlinear CA, Meier and Staffelbach attack, nonlinear functions

Procedia PDF Downloads 306
13740 Development of a Web-Based Application for Intelligent Fertilizer Management in Rice Cultivation

Authors: Hao-Wei Fu, Chung-Feng Kao

Abstract:

In the era of rapid technological advancement, information technology (IT) has become integral to modern life, exerting significant influence across diverse sectors and serving as a catalyst for development in various industries. Within agriculture, the integration of IT offers substantial benefits, notably enhancing operational efficiency. Real-time monitoring systems, for instance, have been widely embraced in agriculture, effectively improving crop management practices. This study specifically addresses the management of rice panicle fertilizer, presenting the development of a web application tailored to handle data associated with rice panicle fertilizer management. Leveraging the normalized difference red edge index, this application optimizes the quantity of rice panicle fertilizer used, providing recommendations to agricultural stakeholders and service providers in the agricultural information sector. The overarching objective is to minimize costs while maximizing yields. Furthermore, a robust database system has been established to store and manage relevant data for future reference in rice cultivation management. Additionally, the study utilizes the Representational State Transfer software architectural style to construct an application programming interface (API), facilitating data creation, retrieval, updating, and deletion for users via the HyperText Transfer Protocol methods. Future plans involve integrating this API with third-party services to incorporate it into larger frameworks, thus catering to the diverse requirements of various third-party services.

Keywords: application programming interface, HyperText Transfer Protocol, nitrogen fertilizer intelligent management, web-based application

Procedia PDF Downloads 56
13739 Design and Development of a Computerized Medical Record System for Hospitals in Remote Areas

Authors: Grace Omowunmi Soyebi

Abstract:

A computerized medical record system is a collection of medical information about a person that is stored on a computer. One principal problem of most hospitals in rural areas is using the file management system for keeping records. A lot of time is wasted when a patient visits the hospital, probably in an emergency, and the nurse or attendant has to search through voluminous files before the patient's file can be retrieved; this may cause an unexpected to happen to the patient. This data mining application is to be designed using a structured system analysis and design method which will help in a well-articulated analysis of the existing file management system, feasibility study, and proper documentation of the design and implementation of a computerized medical record system. This computerized system will replace the file management system and help to quickly retrieve a patient's record with increased data security, access clinical records for decision-making, and reduce the time range at which a patient gets attended to.

Keywords: programming, data, software development, innovation

Procedia PDF Downloads 81
13738 A Structuring and Classification Method for Assigning Application Areas to Suitable Digital Factory Models

Authors: R. Hellmuth

Abstract:

The method of factory planning has changed a lot, especially when it is about planning the factory building itself. Factory planning has the task of designing products, plants, processes, organization, areas, and the building of a factory. Regular restructuring is becoming more important in order to maintain the competitiveness of a factory. Restrictions in new areas, shorter life cycles of product and production technology as well as a VUCA world (Volatility, Uncertainty, Complexity and Ambiguity) lead to more frequent restructuring measures within a factory. A digital factory model is the planning basis for rebuilding measures and becomes an indispensable tool. Furthermore, digital building models are increasingly being used in factories to support facility management and manufacturing processes. The main research question of this paper is, therefore: What kind of digital factory model is suitable for the different areas of application during the operation of a factory? First, different types of digital factory models are investigated, and their properties and usabilities for use cases are analysed. Within the scope of investigation are point cloud models, building information models, photogrammetry models, and these enriched with sensor data are examined. It is investigated which digital models allow a simple integration of sensor data and where the differences are. Subsequently, possible application areas of digital factory models are determined by means of a survey and the respective digital factory models are assigned to the application areas. Finally, an application case from maintenance is selected and implemented with the help of the appropriate digital factory model. It is shown how a completely digitalized maintenance process can be supported by a digital factory model by providing information. Among other purposes, the digital factory model is used for indoor navigation, information provision, and display of sensor data. In summary, the paper shows a structuring of digital factory models that concentrates on the geometric representation of a factory building and its technical facilities. A practical application case is shown and implemented. Thus, the systematic selection of digital factory models with the corresponding application cases is evaluated.

Keywords: building information modeling, digital factory model, factory planning, maintenance

Procedia PDF Downloads 103
13737 Design of a Mhealth Therapy Management to Maintain Therapy Outcomes after Bariatric Surgery

Authors: A. Dudek, P. Tylec, G. Torbicz, P. Duda, K. Proniewska, P. Major, M. Pedziwiatr

Abstract:

Background: Conservative treatments of obesity, based only on a proper diet and physical activity, without the support of an interdisciplinary team of specialist does not bring satisfactory bariatric results. Long-term maintenance of a proper metabolic results after rapid weight loss due to bariatric surgery requires engagement from patients. Mobile health tool may offer alternative model that enhance participant engagement in keeping the therapy. Objective: We aimed to assess the influence of constant monitoring and subsequent motivational alerts in perioperative period and on post-operative effects in the bariatric patients. As well as the study was designed to identify factors conductive urge to change lifestyle after surgery. Methods: This prospective clinical control study was based on a usage of a designed prototype of bariatric mHealth system. The prepared application comprises central data management with a comprehensible interface dedicated for patients and data transfer module as a physician’s platform. Motivation system of a platform consist of motivational alerts, graphic outcome presentation, and patient communication center. Generated list of patients requiring urgent consultation and possibility of a constant contact with a specialist provide safety zone. 31 patients were enrolled in continuous monitoring program during a 6-month period along with typical follow-up visits. After one year follow-up, all patients were examined. Results: There were 20 active users of the proposed monitoring system during the entire duration of the study. After six months, 24 patients took a part in a control by telephone questionnaires. Among them, 75% confirmed that the application concept was an important element in the treatment. Active users of the application indicated as the most valuable features: motivation to continue treatment (11 users), graphical presentation of weight loss, and other parameters (7 users), the ability to contact a doctor (3 users). The three main drawbacks are technical errors (9 users), tedious questionnaires inside the application (5 users), and time-consuming tasks inside the system (2 users). Conclusions: Constant monitoring and successive motivational alerts to continue treatment is an appropriate tool in the treatment after bariatric surgery, mainly in the early post-operative period. Graphic presentation of data and continuous connection with a clinical staff seemed to be an element of motivation to continue treatment and a sense of security.

Keywords: bariatric surgery, mHealth, mobile health tool, obesity

Procedia PDF Downloads 111
13736 The Impact of India’s Centre-State Relations on its Maritime Counter-Terrorism Strategy

Authors: Riddhi Shah

Abstract:

Centre-state relations in India are a fascinating area of studies. The structure of the relationship has an effect on every single aspect of life as we know it in India. This paper is an attempt to study centre-state relations in the context of India’s maritime counter-terrorism strategy. Although the Government of India has not publicly stated its counter-terrorism strategy on the sea; intelligence, information sharing, crisis response, finances for internal security and the nation’s legislation for battling terrorism together comprise of India’s maritime-terrorism strategy. Through study of these areas, the paper argues that the centre-state divide has had systemic implications on India’s maritime security and has largely done more harm than good to collective initiatives that aspire to prevent future risk of terrorism from the sea or on the sea.

Keywords: counter-terrorism, maritime terrorism, India, federalism, centre-state relations

Procedia PDF Downloads 595
13735 Time Series Modelling for Forecasting Wheat Production and Consumption of South Africa in Time of War

Authors: Yiseyon Hosu, Joseph Akande

Abstract:

Wheat is one of the most important staple food grains of human for centuries and is largely consumed in South Africa. It has a special place in the South African economy because of its significance in food security, trade, and industry. This paper modelled and forecast the production and consumption of wheat in South Africa in the time covid-19 and the ongoing Russia-Ukraine war by using annual time series data from 1940–2021 based on the ARIMA models. Both the averaging forecast and selected models forecast indicate that there is the possibility of an increase with respect to production. The minimum and maximum growth in production is projected to be between 3million and 10 million tons, respectively. However, the model also forecast a possibility of depression with respect to consumption in South Africa. Although Covid-19 and the war between Ukraine and Russia, two major producers and exporters of global wheat, are having an effect on the volatility of the prices currently, the wheat production in South African is expected to increase and meat the consumption demand and provided an opportunity for increase export with respect to domestic consumption. The forecasting of production and consumption behaviours of major crops play an important role towards food and nutrition security, these findings can assist policymakers and will provide them with insights into the production and pricing policy of wheat in South Africa.

Keywords: ARIMA, food security, price volatility, staple food, South Africa

Procedia PDF Downloads 97
13734 A Multicopy Strategy for Improved Security Wireless Sensor Network

Authors: Tuğçe Yücel

Abstract:

A Wireless Sensor Network(WSN) is a collection of sensor nodes which are deployed randomly in an area for surveillance. Efficient utilization of limited battery energy of sensors for increased network lifetime as well as data security are major design objectives for WSN. Moreover secure transmission of data sensed to a base station for further processing. Producing multiple copies of data packets and sending them on different paths is one of the strategies for this purpose, which leads to redundant energy consumption and hence reduced network lifetime. In this work we develop a restricted multi-copy multipath strategy where data move through ‘frequently’ or ‘heavily’ used sensors is copied by the sensor incident to such central nodes and sent on node-disjoint paths. We develop a mixed integer programing(MIP) model and heuristic approach present some preleminary test results.

Keywords: MIP, sensor, telecommunications, WSN

Procedia PDF Downloads 506