Search results for: layered security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3049

Search results for: layered security

1669 Disaster Response Training Simulator Based on Augmented Reality, Virtual Reality, and MPEG-DASH

Authors: Sunho Seo, Younghwan Shin, Jong-Hong Park, Sooeun Song, Junsung Kim, Jusik Yun, Yongkyun Kim, Jong-Moon Chung

Abstract:

In order to effectively cope with large and complex disasters, disaster response training is needed. Recently, disaster response training led by the ROK (Republic of Korea) government is being implemented through a 4 year R&D project, which has several similar functions as the HSEEP (Homeland Security Exercise and Evaluation Program) of the United States, but also has several different features as well. Due to the unpredictiveness and diversity of disasters, existing training methods have many limitations in providing experience in the efficient use of disaster incident response and recovery resources. Always, the challenge is to be as efficient and effective as possible using the limited human and material/physical resources available based on the given time and environmental circumstances. To enable repeated training under diverse scenarios, an AR (Augmented Reality) and VR (Virtual Reality) combined simulator is under development. Unlike existing disaster response training, simulator based training (that allows remote login simultaneous multi-user training) enables freedom from limitations in time and space constraints, and can be repeatedly trained with different combinations of functions and disaster situations. There are related systems such as ADMS (Advanced Disaster Management Simulator) developed by ETC simulation and HLS2 (Homeland Security Simulation System) developed by ELBIT system. However, the ROK government needs a simulator custom made to the country's environment and disaster types, and also combines the latest information and communication technologies, which include AR, VR, and MPEG-DASH (Moving Picture Experts Group - Dynamic Adaptive Streaming over HTTP) technology. In this paper, a new disaster response training simulator is proposed to overcome the limitation of existing training systems, and adapted to actual disaster situations in the ROK, where several technical features are described.

Keywords: augmented reality, emergency response training simulator, MPEG-DASH, virtual reality

Procedia PDF Downloads 288
1668 Creation of S-Box in Blowfish Using AES

Authors: C. Rekha, G. N. Krishnamurthy

Abstract:

This paper attempts to develop a different approach for key scheduling algorithm which uses both Blowfish and AES algorithms. The main drawback of Blowfish algorithm is, it takes more time to create the S-box entries. To overcome this, we are replacing process of S-box creation in blowfish, by using key dependent S-box creation from AES without affecting the basic operation of blowfish. The method proposed in this paper uses good features of blowfish as well as AES and also this paper demonstrates the performance of blowfish and new algorithm by considering different aspects of security namely Encryption Quality, Key Sensitivity, and Correlation of horizontally adjacent pixels in an encrypted image.

Keywords: AES, blowfish, correlation coefficient, encryption quality, key sensitivity, s-box

Procedia PDF Downloads 208
1667 Rural Water Management Strategies and Irrigation Techniques for Sustainability. Nigeria Case Study; Kwara State

Authors: Faith Eweluegim Enahoro-Ofagbe

Abstract:

Water is essential for sustaining life. As a limited resource, effective water management is vital. Water scarcity has become more common due to the effects of climate change, land degradation, deforestation, and population growth, especially in rural communities, which are more susceptible to water-related issues such as water shortage, water-borne disease, et c., due to the unsuccessful implementation of water policies and projects in Nigeria. Since rural communities generate the majority of agricultural products, they significantly impact on water management for sustainability. The development of methods to advance this goal for residential and agricultural usage in the present and the future is a challenge for rural residents. This study evaluated rural water supply systems and irrigation management techniques to conserve water in Kwara State, North-Central Nigeria. Suggesting some measures to conserve water resources for sustainability, off-season farming, and socioeconomic security that will remedy water degradation, unemployment which is one of the causes of insecurity in the country, by considering the use of fabricated or locally made irrigation equipment, which are affordable by rural farmers, among other recommendations. Questionnaires were distributed to respondents in the study area for quantitative evaluation of irrigation methods practices. For physicochemical investigation, samples were also gathered from their available water sources. According to the study's findings, 30 percent of farmers adopted intelligent irrigation management techniques to conserve water resources, saving 45% of the water previously used for irrigation. 70 % of farmers practice seasonal farming. Irrigation water is drawn from river channels, streams, and unlined and unprotected wells. 60% of these rural residents rely on private boreholes for their water needs, while 40% rely on government-supplied rural water. Therefore, the government must develop additional water projects, raise awareness, and offer irrigation techniques that are simple to adapt for water management, increasing socio-economic productivity, security, and water sustainability.

Keywords: water resource management, sustainability, irrigation, rural water management, irrigation management technique

Procedia PDF Downloads 90
1666 Journey of Silver Workers Post Retirement in India: An Exploratory Study

Authors: Avani Maniar, Shivani Mehta

Abstract:

Population aging is one of the most challenging issues of the twenty-first century, facing both developed and developing countries worldwide. In the developed world, there has already been a substantial amount of research on aging and work to help understand the capacity and potential of older people. They attract ever ones attention. Their existence in human society gives rise to variety of responses, reactions and apprehensions, because it connotes on greater part, to some kind of compulsion or willingness that prompt elderly to decide to work after retirement. Work due to social attention and assurance for security both economical and social. In this age, elderly aspire for psychological security with due attention. But the fact remains that despite age related limitations good number of persons in their age of sixty and beyond were hunting for work that would support them and get them some kind of support and in it turns helps them to remain physically and mentally active. Based on the existing diversities in the ageing process, it may be stated that there is a need to pay greater attention to the increasing awareness on the ageing issues and its socio-economic effects and to promote the development of policies and programmes for dealing with an ageing society. Addressing the needs, wants, and well-being of elderly people is essential for maintaining a healthy productive workforce in an aging society. This paper will draw on the results of the study about reasons of elderly working post retirement, problems faced by them and about the future of retirement to ask how widespread negative attitudes and stereotypes among employers are and whether these attitudes influence behavior towards older employees. The aim of research is not only to point out certain stereotypes concerning the elderly labour force, but also to stress that unless preconditions for overcoming these stereotypes are created and employment opportunities are given to this segment of the labour force, full employment as an ultimate goal of global economic policy cannot be achieved.

Keywords: employers, India, inequality, problems, reasons of working, silver workers

Procedia PDF Downloads 141
1665 Relation of Optimal Pilot Offsets in the Shifted Constellation-Based Method for the Detection of Pilot Contamination Attacks

Authors: Dimitriya A. Mihaylova, Zlatka V. Valkova-Jarvis, Georgi L. Iliev

Abstract:

One possible approach for maintaining the security of communication systems relies on Physical Layer Security mechanisms. However, in wireless time division duplex systems, where uplink and downlink channels are reciprocal, the channel estimate procedure is exposed to attacks known as pilot contamination, with the aim of having an enhanced data signal sent to the malicious user. The Shifted 2-N-PSK method involves two random legitimate pilots in the training phase, each of which belongs to a constellation, shifted from the original N-PSK symbols by certain degrees. In this paper, legitimate pilots’ offset values and their influence on the detection capabilities of the Shifted 2-N-PSK method are investigated. As the implementation of the technique depends on the relation between the shift angles rather than their specific values, the optimal interconnection between the two legitimate constellations is investigated. The results show that no regularity exists in the relation between the pilot contamination attacks (PCA) detection probability and the choice of offset values. Therefore, an adversary who aims to obtain the exact offset values can only employ a brute-force attack but the large number of possible combinations for the shifted constellations makes such a type of attack difficult to successfully mount. For this reason, the number of optimal shift value pairs is also studied for both 100% and 98% probabilities of detecting pilot contamination attacks. Although the Shifted 2-N-PSK method has been broadly studied in different signal-to-noise ratio scenarios, in multi-cell systems the interference from the signals in other cells should be also taken into account. Therefore, the inter-cell interference impact on the performance of the method is investigated by means of a large number of simulations. The results show that the detection probability of the Shifted 2-N-PSK decreases inversely to the signal-to-interference-plus-noise ratio.

Keywords: channel estimation, inter-cell interference, pilot contamination attacks, wireless communications

Procedia PDF Downloads 200
1664 Organic Agriculture in Pakistan: Opportunities, Challenges, and Future Directions

Authors: Sher Ali

Abstract:

Organic agriculture has gained significant momentum globally as a sustainable and environmentally friendly farming practice. In Pakistan, amidst growing concerns about food security, environmental degradation, and health issues related to conventional farming methods, the adoption of organic agriculture presents a promising pathway for agricultural development. This abstract aims to provide an overview of the status, opportunities, challenges, and future directions of organic agriculture in Pakistan. It delves into the current state of organic farming practices, including the extent of adoption, key crops cultivated, and the regulatory framework governing organic certification. Furthermore, the abstract discusses the unique opportunities that Pakistan offers for organic agriculture, such as its diverse agro-climatic zones, rich biodiversity, and traditional farming knowledge. It highlights successful initiatives and case studies that showcase the potential of organic farming to improve rural livelihoods, enhance food security, and promote sustainable agricultural practices. However, the abstract also addresses the challenges hindering the widespread adoption of organic agriculture in Pakistan, ranging from limited awareness and technical know-how among farmers to inadequate infrastructure and market linkages. It emphasizes the need for supportive policies, capacity-building programs, and investment in research and extension services to overcome these challenges and promote the growth of the organic agriculture sector. Lastly, the abstract outlines future directions and recommendations for advancing organic agriculture in Pakistan, including strategies for scaling up production, strengthening certification mechanisms, and fostering collaboration among stakeholders. By shedding light on the opportunities, challenges, and potential of organic agriculture in Pakistan, this abstract aims to contribute to the discourse on sustainable farming practices at the upcoming Agro Conference in the USA. It invites participants to engage in dialogue, share experiences, and explore avenues for collaboration toward promoting organic agriculture for a healthier, more resilient food system.

Keywords: agriculture, challenges, organic, Pakistan

Procedia PDF Downloads 25
1663 WAQF Financing Using WAQF Sukuk in Iran

Authors: Meysam Doaei, Mojtaba Kavand

Abstract:

WAQF as a part of Islamic social security system is developed in Islam. Traditional WAQF has some limitations which are resolved in WAQF Sukuk. In regard to acceptability of Islamic finance in the world, WAQF Sukuk also has been developing in Islamic countries. In this paper, concept of WAQF, traditional and modern WAQF financing are presented. Then, WAQF Sukuk, its application and its model in Iran are developed.

Keywords: Al-mawqūfat development, traditional financing, modern financing, WAQF Sukuk

Procedia PDF Downloads 504
1662 Determining Factors for Opening Accounts, Customers’ Perception and Their Satisfaction Level Towards the First Security Islamic Bank of Bangladesh

Authors: Md. Akiz Uddin

Abstract:

This research attempted to identify the determining factors that extensively persuaded customers of the First Security Islamic Bank Limited (FSIBL) to open accounts and their perception and satisfaction level towards it. Initially, a theoretical model was established based on existing literature reviews. After that, a self-administered structured questionnaire was developed, and data were collected from 180 customers of the FSIBL of Bangladesh using purposive sampling technique. The collected data were later analyzed through a statistical software. Structural Equation Modelling (SEM) was used to verify the model of the study and test the hypotheses. The study particularly examined the determinants of opening accounts, customers’ perception and their satisfaction level towards the bank on several factors like the bank’s compliance with Shariah law, use of modern technology, assurance, reliability, empathy, profitability, and responsiveness. To examine the impact of religious belief on being FSIBL clients, the study also investigates non-Muslim clients’ perception about FSIBL. The study focused on FSIBL customers only from five branches of Dhaka city. The study found that the religious beliefs is the most significant factors for Muslim customers for considering FSIBL to open an account, and they are satisfied with the services, too. However, for non-Muslim customers, other benefits like E-banking, various user-friendly services are the most significant factors for choosing FSIBL. Their satisfaction level is also statistically significant. Furthermore, even if the non- Muslim customers didn’t consider religious beliefs as determinant factors for choosing FSIBL, the respondents informed that they have trust that people who believe in shariah law are more reliable to keep money with them. These findings open up the avenue for future researchers to conduct more study in this area through employing a larger sample size and more branches and extending the current model by incorporating new variables. The study will be an important addition to the potentials of Islamic banking system, literature of service quality and customer satisfaction level, particularly in the success of Islamic banking system in Bangladesh.

Keywords: islamic banking, customers’ satisfaction, customers’ perception, shariah law

Procedia PDF Downloads 65
1661 Analysis the Impacts of WeChat Mobile Payment in China Teens' Online Purchasing Behaviors

Authors: Lok Yi Joyce Poon

Abstract:

China's mobile payment market has boomed in the past few years. WeChat (Chinese name as Weixin) owned by Tencent is known as the fastest growing all-in-one social messaging platforms. The company has launched the WeChat Pay in 2013, in which users can link their credit card to their user account and make payments within the app’s built in digital wallet. WeChat Payment is a one-stop payment tool that can provide a seamless online experience for the shoppers to transfer money between WeChat users (peer-to-peer) and make payments online by scanning a QR code, a prominent facilitator for transactions in WeChat, to complete the payment with the app without directing the users to the external websites. The aims of this study are to examine the effectiveness of WeChat mobile payment in China as well as the impacts of the China teen’s online purchasing behavior since the establishment of WeChat Payment. The research method of this study is conducted by both online survey on Sojump, a popular online survey platform in China. A total of 120 respondents among 18 to 25 teens in China completed the survey. Data sources included participants’ response to an end-of-session questionnaire, encompassing with the types of multiple choice, open-ended questions. To have an in-depth analysis, a face-to-face interview with a Chinese teen who is a frequent user of the WeChat Pay. The main finding of the study shows that the majority of the teenagers frequently use the WeChat payment tool because of its convenience, user-friendliness and the scenarios offered within the WeChat Wallet. The respondents claimed that they will settle the bills in their daily lives via WeChat Pay. However, the respondents in the age group of 40 or above will not use the WeChat Pay due to the security concern and they do not see the app as a platform for commercial activities like online shopping. Throughout the study, it is recommended WeChat should put more efforts on the security issue and improve the payment technology by adopting the near-field communication terminals instead of requiring users to scan QR codes before they complete the transaction.

Keywords: digital wallet, mobile payment, online purchasing behavior, WeChat Pay

Procedia PDF Downloads 377
1660 Nanostructured Oxide Layer by Anodization on Austenitic Stainless Steels: Structural and Corrosion Insights

Authors: Surya Prakash Gajagouni, Akram Alfantazi, Imad Barsoum

Abstract:

Austenitic stainless steels are widely recognized for their exceptional corrosion resistance and mechanical properties, rendering them indispensable materials across various industries from construction to biomedical applications. However, in chloride and high temperature atmosphere it to further enhance their surface properties, anodization has emerged as a promising surface treatment technique. Anodization modifies the surface of stainless steels by creating a protective oxide layer, improving corrosion resistance and imparting additional functional characteristics. This paper explores the structural and corrosion characteristics of anodized austenitic stainless steels (AISI 304) using a two-step anodic technique. We utilized a perchloric acid-based electrolyte followed by an ammonium fluoride-based electrolyte. This sequential approach aimed to cultivate deeper and intricately self-ordered nanopore oxide arrays on a substrate made of 304 stainless steel. Electron Microscopic (SEM and TEM) images revealed nanoporous layered structures with increased length and crack development correlating with higher voltage and anodization time. Surface composition and chemical oxidation state of surface-treated SS were determined using X-ray photoelectron spectroscopy (XPS) techniques, revealing a surface layer rich in Ni and suppressed Cr, resulting in a thin film composed of Ni and Fe oxide compared to untreated SS. Electrochemical studies demonstrated enhanced corrosion resistance in a strong alkaline medium compared to untreated SS. Understanding the intricate relationship between the structural features of anodized stainless steels and their corrosion resistance is crucial for optimizing the performance of these materials in diverse applications. This study aims to contribute to the advancement of surface engineering strategies for enhancing the durability and functionality of austenitic stainless steels in aggressive environments.

Keywords: austenitic stainless steel, anodization, nanoporous oxides, marine corrosion

Procedia PDF Downloads 23
1659 Privatising Higher Education: Imparting Quality in Academics

Authors: Manish Khanna

Abstract:

Higher education seeks to preserve, transmit and advance knowledge. It is one of the most important instruments of change and progress. The observation of Kothari Commission (1964-66) is true even today; The destiny of India is now being shaped in her classrooms. This, we believe, is no more rhetoric. In the world based on science and technology it is education that determines the level of prosperity, welfare, and security of the people. On the quality and number of persons coming out of our schools and colleges will depend our success in the great enterprise of national reconstruction.

Keywords: higher education, quality in academics, Kothari commission, privatising higher education

Procedia PDF Downloads 458
1658 Rethinking the Smartness for Sustainable Development Through the Relationship between Public and Private Actors

Authors: Selin Tosun

Abstract:

The improvements in technology have started to transform the way we live, work, play, and commute in our cities. The emerging smart city understanding has been paving the way for more efficient, more useful, and more profitable cities. Smart sensors, smart lighting, smart waste, water and electricity management, smart transportation and communication systems are introduced to cities at a rapid pace. In today's world, innovation is often correlated with start-up companies and technological pioneers seeking broader economic objectives such as production and competitiveness. The government's position is primarily that of an enabler, with creativity mostly coming from the private sector. The paper argues that to achieve sustainable development, the ways in which smart and sustainable city approaches are being applied to cities need to be redefined. The research aims to address common discussions in the discourse of smart and sustainable cities criticizing the priority of lifestyle sterilization over human-centered sustainable interventions and social innovation strategies. The dichotomy between the fact that smart cities are mostly motivated by the competitive global market and the fact that the delocalization is, in fact, their biggest problem in the way of becoming authentic, sustainable cities is the main challenge that we face today. In other words, the key actors in smart cities have different and somewhat conflicting interests and demands. By reviewing the roles of the public and private actors in smart city making, the paper aspires to reconceptualize the understanding of “smartness” in achieving sustainable development in which the “smartness” is understood as a multi-layered complex phenomenon that can be channeled through different dynamics. The case cities around the world are explored and compared in terms of their technological innovations, governance and policy innovations, public-private stakeholder relationships, and the understanding of the public realm. The study aims to understand the current trends and general dynamics in the field, key issues that are being addressed, the scale that is preferred to reflect upon and the projects that are designed for the particular issues.

Keywords: smart city, sustainable development, technological innovation, social innovation

Procedia PDF Downloads 170
1657 Measuring Stakeholder Engagement and Drivers of Success in Ethiopian Tourism Sector

Authors: Gezahegn Gizaw

Abstract:

The FDRE Tourism Training Institute organizes forums for debates, best practices exchange and focus group discussions to forge a sustainable and growing tourism sector while minimizing negative impacts on the environment, communities, and cultures. This study aimed at applying empirical research method to identify and quantify relative importance of success factors and individual engagement indicators that were identified in these forums. Response to the 12-question survey was collected from a total of 437 respondents in academic training institutes (212), business executive and employee (204) and non-academic government offices (21). Overall, capacity building was perceived as the most important driver of success for stakeholder engagement. Business executive and employee category rated capacity building as the most important driver of success (53%), followed by decision-making process (27%) and community participation (20%). Among educators and students, both capacity building and decision-making process were perceived as the most important factors (40% of respondents), whereas community participation was perceived as the most important success factor only by 20% of respondents. Individual engagement score in capacity building, decision-making process and community participation showed highest variability by educational level of participants (variance of 3.4% - 5.2%, p<0.001). Individual engagement score in capacity building was highly correlated to perceived benefit of training on improved efficiency, job security, higher customer satisfaction and self-esteem. On the other hand, individual engagement score in decision making process was highly correlated to its perceived benefit on lowering business costs, improving ability to meet the needs of a target market, job security, self-esteem and more teamwork. The study provides a set of recommendations that help educators, business executives and policy makers to maximize the individual and synergetic effect of training, decision making process on sustainability and growth of the tourism sector in Ethiopia.

Keywords: engagement score, driver of success, capacity building, tourism

Procedia PDF Downloads 60
1656 Safe and Scalable Framework for Participation of Nodes in Smart Grid Networks in a P2P Exchange of Short-Term Products

Authors: Maciej Jedrzejczyk, Karolina Marzantowicz

Abstract:

Traditional utility value chain is being transformed during last few years into unbundled markets. Increased distributed generation of energy is one of considerable challenges faced by Smart Grid networks. New sources of energy introduce volatile demand response which has a considerable impact on traditional middlemen in E&U market. The purpose of this research is to search for ways to allow near-real-time electricity markets to transact with surplus energy based on accurate time synchronous measurements. A proposed framework evaluates the use of secure peer-2-peer (P2P) communication and distributed transaction ledgers to provide flat hierarchy, and allow real-time insights into present and forecasted grid operations, as well as state and health of the network. An objective is to achieve dynamic grid operations with more efficient resource usage, higher security of supply and longer grid infrastructure life cycle. Methods used for this study are based on comparative analysis of different distributed ledger technologies in terms of scalability, transaction performance, pluggability with external data sources, data transparency, privacy, end-to-end security and adaptability to various market topologies. An intended output of this research is a design of a framework for safer, more efficient and scalable Smart Grid network which is bridging a gap between traditional components of the energy network and individual energy producers. Results of this study are ready for detailed measurement testing, a likely follow-up in separate studies. New platforms for Smart Grid achieving measurable efficiencies will allow for development of new types of Grid KPI, multi-smart grid branches, markets, and businesses.

Keywords: autonomous agents, Distributed computing, distributed ledger technologies, large scale systems, micro grids, peer-to-peer networks, Self-organization, self-stabilization, smart grids

Procedia PDF Downloads 283
1655 New Approach for Constructing a Secure Biometric Database

Authors: A. Kebbeb, M. Mostefai, F. Benmerzoug, Y. Chahir

Abstract:

The multimodal biometric identification is the combination of several biometric systems. The challenge of this combination is to reduce some limitations of systems based on a single modality while significantly improving performance. In this paper, we propose a new approach to the construction and the protection of a multimodal biometric database dedicated to an identification system. We use a topological watermarking to hide the relation between face image and the registered descriptors extracted from other modalities of the same person for more secure user identification.

Keywords: biometric databases, multimodal biometrics, security authentication, digital watermarking

Procedia PDF Downloads 375
1654 A Novel Approach of Secret Communication Using Douglas-Peucker Algorithm

Authors: R. Kiruthika, A. Kannan

Abstract:

Steganography is the problem of hiding secret messages in 'innocent – looking' public communication so that the presence of the secret message cannot be detected. This paper introduces a steganographic security in terms of computational in-distinguishability from a channel of probability distributions on cover messages. This method first splits the cover image into two separate blocks using Douglas – Peucker algorithm. The text message and the image will be hided in the Least Significant Bit (LSB) of the cover image.

Keywords: steganography, lsb, embedding, Douglas-Peucker algorithm

Procedia PDF Downloads 347
1653 Effect of Pressure and Glue Spread on the Bonding Properties of CLT Panels Made from Low-Grade Hardwood

Authors: Sumanta Das, Miroslav Gašparík, Tomáš Kytka, Anil Kumar Sethy

Abstract:

In this modern century, Cross-laminated timber (CLT) evolved as an excellent material for building and high load-bearing structural applications worldwide. CLT is produced mainly from softwoods such as Norway spruce, White fir, Scots pine, European larch, Douglas fir, and Swiss stone pine. The use of hardwoods in CLT production is still at an early stage, and the utilization of hardwoods is expected to provide the opportunity for obtaining higher bending stiffness and shear resistance to CLT panels. In load-bearing structures like CLT, bonding is an important character that is needed to evaluate. One particular issue with using hardwood lumber in CLT panels is that it is often more challenging to achieve a strong, durable adhesive bond. Several researches in the past years have already evaluated the bonding properties of CLT panels from hardwood both from higher and lower densities. This research aims to identify the effect of pressure and glue spread and evaluate which poplar lumber characteristics affect adhesive bond quality. Three-layered CLT panels were prepared from poplar wood with one-component polyurethane (PUR) adhesive by applying pressure of 0.6 N/mm2 and 1 N/mm2 with a glue spread rate of 160 and 180 g/m2. The delamination and block shear tests were carried out as per EN 16351:2015, and the wood failure percentage was also evaluated. The results revealed that glue spread rate and applied pressure significantly influenced both the shear bond strength and wood failure percentage of the CLT. However, samples with lower pressure 0.6 N/mm2 and less glue spread rate showed delamination, and in samples with higher pressure 1 N/mm2 and higher glue spread rate, no delamination was observed. All the properties determined by this study met the minimum requirement mentioned in EN 16351:2015 standard.

Keywords: cross-laminated timber, delamination, glue spread rate, poplar, pressure, PUR, shear strength, wood failure percentage

Procedia PDF Downloads 144
1652 Post Mutiny Institutional Buildings of India: A Visual Language of Reconciliation

Authors: Aruna Ramani Grover

Abstract:

In 1857 the British army in Bengal rose in mutiny. The outcome of a yearlong stifle was the abolition of the East India Company and establishment of Crown rule in 1958. Despite being a political democracy back home, with the declaration of Queen Victoria as Empress of India, the British established themselves as imperialistic successors to the Mughals in India. With the institution of the Crown role in the sub-continent, there was a serious endeavour for systematic governance. This led to infrastructure development and creation of institutions as well. The outcome was many public buildings like courts, railway- stations and headquarters, senates, post offices, banks, libraries, memorial halls, museums, memorials, theatres, government colleges, residential-schools and clock towers. These were built in the old and emerging urban settlements of the sub-continents. In the realm of architecture, like all political masters of the past, the British architects too encountered the living tradition of the sub-continent. A bewildering plethora of buildings in various climatic zones, using local materials and crafted with tools and techniques of the region by local craftsmen had to be understood and assimilated. The19th century British architects who built in India, designed institutional buildings which were functional and responded to the need of the user. In visual terms however, it was a completely different story. Using the manifest elements of the complex and layered indigenous tradition, they fashioned buildings to create an architecture of reconciliation. Treating the traditional architecture as a pattern book, finished buildings was served up to the local population coloured by their understanding of tradition. This paper will discuss a series of building some of which are the Senate House and Law courts at Madras, the Municipal Building and Gateway of India in Bombay, the Muir college in Allahabad, Mayo college Ajmer, the Mubarak Mahal in Jaipur to demonstrate how a visual language of reconciliation was created.

Keywords: infrastructure, British architects, tradition, pattern book, reconciliation

Procedia PDF Downloads 8
1651 Case Study: Institutionalization of CSR Activities of MRGC through an NGO (OSDI)

Authors: Aasim Siddiqui

Abstract:

In a country where 45.6 per cent of the total population lives below the poverty line, according to the Human Development Report 2014 by UNDP, an increasing number of private companies are now dedicating their resources to remedy this situation of chronic poverty. Most corporations in Pakistan now have a separate and dedicated department for Corporate Social Responsibility (CSR), albeit with varying goals and hence different strategies for achieving those goals. Similarly, Marine Group of Companies (MRGC) also has a robust CSR policy which the group implements through a Non-Government Organization (NGO) called Organization for Social Development Initiatives (OSDI). This organization, which operates under the ambit of MRGC’s CSR division, has a concentrated focus on helping the poorest communities in the rural areas of Pakistan to break out of intergenerational poverty. This paper maps the theoretical strategies as well as practical activities undertaken by OSDI for poverty alleviation via rural development in Pakistan. To obtain in-depth information of demographics, livelihood and socio-economic indicators in OSDI’s focused districts; a combination of quantitative and qualitative research methodologies was used during the course of this research. The paper highlights and explains OSDI’s unique three-pronged approach which aims at reducing poverty through income generation via the livelihood assistance program and through the provision of access to the most basic services (including health and education) via the community development and food security programs. Modeled on the concept of capacity building, OSDI’s modus operandi is centered on disbursing timely microcredit facilities to farmers who can benefit from these funds by investing in productive assets to foster financial capability for the future. With a focus on increasing the income of poor farmers, OSDI’s approach is to integrate all the socio-economic facets: education, health and sanitation and food security, to induce a sustained positive impact on their living standards.

Keywords: CSR, poverty, rural, sustainability

Procedia PDF Downloads 233
1650 Evolutional Substitution Cipher on Chaotic Attractor

Authors: Adda Ali-Pacha, Naima Hadj-Said

Abstract:

Nowadays, the security of information is primarily founded on the calculation of algorithms that confidentiality depend on the number of bits necessary to define a cryptographic key. In this work, we introduce a new chaotic cryptosystem that we call evolutional substitution cipher on a chaotic attractor. In this research paper, we take the Henon attractor. The evolutional substitution cipher on Henon attractor is based on the principle of monoalphabetic cipher and it associates the plaintext at a succession of real numbers calculated from the attractor equations.

Keywords: cryptography, substitution cipher, chaos theory, Henon attractor, evolutional substitution cipher

Procedia PDF Downloads 412
1649 Polymer-Layered Gold Nanoparticles: Preparation, Properties and Uses of a New Class of Materials

Authors: S. M. Chabane sari S. Zargou, A.R. Senoudi, F. Benmouna

Abstract:

Immobilization of nano particles (NPs) is the subject of numerous studies pertaining to the design of polymer nano composites, supported catalysts, bioactive colloidal crystals, inverse opals for novel optical materials, latex templated-hollow inorganic capsules, immunodiagnostic assays; “Pickering” emulsion polymerization for making latex particles and film-forming composites or Janus particles; chemo- and biosensors, tunable plasmonic nano structures, hybrid porous monoliths for separation science and technology, biocidal polymer/metal nano particle composite coatings, and so on. Particularly, in the recent years, the literature has witnessed an impressive progress of investigations on polymer coatings, grafts and particles as supports for anchoring nano particles. This is actually due to several factors: polymer chains are flexible and may contain a variety of functional groups that are able to efficiently immobilize nano particles and their precursors by dispersive or van der Waals, electrostatic, hydrogen or covalent bonds. We review methods to prepare polymer-immobilized nano particles through a plethora of strategies in view of developing systems for separation, sensing, extraction and catalysis. The emphasis is on methods to provide (i) polymer brushes and grafts; (ii) monoliths and porous polymer systems; (iii) natural polymers and (iv) conjugated polymers as platforms for anchoring nano particles. The latter range from soft bio macromolecular species (proteins, DNA) to metallic, C60, semiconductor and oxide nano particles; they can be attached through electrostatic interactions or covalent bonding. It is very clear that physicochemical properties of polymers (e.g. sensing and separation) are enhanced by anchored nano particles, while polymers provide excellent platforms for dispersing nano particles for e.g. high catalytic performances. We thus anticipate that the synergetic role of polymeric supports and anchored particles will increasingly be exploited in view of designing unique hybrid systems with unprecedented properties.

Keywords: gold, layer, polymer, macromolecular

Procedia PDF Downloads 382
1648 Visual, Zoological Metaphors and 'Urtiin Duu' (Long Song) in Alshaa, Inner Mongolia

Authors: Oyuna Weina

Abstract:

This study examines how musicians use visual and zoological metaphors for singing technique and voice quality in a genre of traditional music called urtiin duu (‘long song’) in Alshaa, Inner Mongolia, China. Previous studies have discussed melodic contour in Mongol music, but little study of the intersection of singing technique, visual and zoological metaphors has yet been undertaken. The purpose of this study is to address this lack by analysing urtiin duu itself, traditional pedagogy and performances, all of which have been inspired and are assessed by reference to nature and mobile pastoral herding practices. This study investigates the visual and zoological metaphors related to urtiin duu especially colour, the shape of the circle and animals in the Mongol community. Urtiin duu singing is associated with certain colours in song texts, in selection of repertoire and in the status of singers. Musicians also use colour to describe timbre. These colours in turn reference worship of nature, religions, and daily practices of most Mongols in Alshaa. Moreover, voice quality and singing technique are often related to the animals not only in song text but also in the approach to breathing and to melodic contour. Additionally, the concept of boronhoi (‘the shape of circle’), not only is applied to the melodic contour but also to the voice quality and singing technique. These three factors illustrate the connections among nature, spiritual world and everyday herding life of Mongols. These different connections provide evidence of multi-layered meanings. In contemporary Alshaa, urtiin duu singers received Western musical training from the city and returned to their homelands to perform urtiin duu. In doing so, they are also trying to reconnect with the history, nature and spiritual world in order to achieve their ideal sound. Within a multicultural society, singers negotiate amongst themselves, and with ethnic groups, audiences and government officials. The power of the metaphor therefore assists and reconnects the strength of regional identity and ethnic identity in Alshaa.

Keywords: Alshaa, urtiin duu, visual, zoological metaphors

Procedia PDF Downloads 346
1647 Observation of Critical Sliding Velocity

Authors: Visar Baxhuku, Halil Demolli, Alishukri Shkodra

Abstract:

This paper presents the monitoring of vehicle movement, namely the developing of speed of vehicles during movement in a certain twist. The basic geometry data of twist are measured with the purpose of calculating the slide in border speed. During the research, measuring developed speed of passenger vehicles for the real conditions of the road surface, dry road with average damage, was realised. After setting values, the analysis was done in function security of movement in twist.

Keywords: critical sliding velocity, moving velocity, curve, passenger vehicles

Procedia PDF Downloads 397
1646 Transforming Data Science Curriculum Through Design Thinking

Authors: Samar Swaid

Abstract:

Today, corporates are moving toward the adoption of Design-Thinking techniques to develop products and services, putting their consumer as the heart of the development process. One of the leading companies in Design-Thinking, IDEO (Innovation, Design, Engineering Organization), defines Design-Thinking as an approach to problem-solving that relies on a set of multi-layered skills, processes, and mindsets that help people generate novel solutions to problems. Design thinking may result in new ideas, narratives, objects or systems. It is about redesigning systems, organizations, infrastructures, processes, and solutions in an innovative fashion based on the users' feedback. Tim Brown, president and CEO of IDEO, sees design thinking as a human-centered approach that draws from the designer's toolkit to integrate people's needs, innovative technologies, and business requirements. The application of design thinking has been witnessed to be the road to developing innovative applications, interactive systems, scientific software, healthcare application, and even to utilizing Design-Thinking to re-think business operations, as in the case of Airbnb. Recently, there has been a movement to apply design thinking to machine learning and artificial intelligence to ensure creating the "wow" effect on consumers. The Association of Computing Machinery task force on Data Science program states that" Data scientists should be able to implement and understand algorithms for data collection and analysis. They should understand the time and space considerations of algorithms. They should follow good design principles developing software, understanding the importance of those principles for testability and maintainability" However, this definition hides the user behind the machine who works on data preparation, algorithm selection and model interpretation. Thus, the Data Science program includes design thinking to ensure meeting the user demands, generating more usable machine learning tools, and developing ways of framing computational thinking. Here, describe the fundamentals of Design-Thinking and teaching modules for data science programs.

Keywords: data science, design thinking, AI, currculum, transformation

Procedia PDF Downloads 63
1645 Enhancing Healthcare Delivery in Low-Income Markets: An Exploration of Wireless Sensor Network Applications

Authors: Innocent Uzougbo Onwuegbuzie

Abstract:

Healthcare delivery in low-income markets is fraught with numerous challenges, including limited access to essential medical resources, inadequate healthcare infrastructure, and a significant shortage of trained healthcare professionals. These constraints lead to suboptimal health outcomes and a higher incidence of preventable diseases. This paper explores the application of Wireless Sensor Networks (WSNs) as a transformative solution to enhance healthcare delivery in these underserved regions. WSNs, comprising spatially distributed sensor nodes that collect and transmit health-related data, present opportunities to address critical healthcare needs. Leveraging WSN technology facilitates real-time health monitoring and remote diagnostics, enabling continuous patient observation and early detection of medical issues, especially in areas with limited healthcare facilities and professionals. The implementation of WSNs can enhance the overall efficiency of healthcare systems by enabling timely interventions, reducing the strain on healthcare facilities, and optimizing resource allocation. This paper highlights the potential benefits of WSNs in low-income markets, such as cost-effectiveness, increased accessibility, and data-driven decision-making. However, deploying WSNs involves significant challenges, including technical barriers like limited internet connectivity and power supply, alongside concerns about data privacy and security. Moreover, robust infrastructure and adequate training for local healthcare providers are essential for successful implementation. It further examines future directions for WSNs, emphasizing innovation, scalable solutions, and public-private partnerships. By addressing these challenges and harnessing the potential of WSNs, it is possible to revolutionize healthcare delivery and improve health outcomes in low-income markets.

Keywords: wireless sensor networks (WSNs), healthcare delivery, low-Income markets, remote patient monitoring, health data security

Procedia PDF Downloads 13
1644 Optimizing the Location of Parking Areas Adapted for Dangerous Goods in the European Road Transport Network

Authors: María Dolores Caro, Eugenio M. Fedriani, Ángel F. Tenorio

Abstract:

The transportation of dangerous goods by lorries throughout Europe must be done by using the roads conforming the European Road Transport Network. In this network, there are several parking areas where lorry drivers can park to rest according to the regulations. According to the "European Agreement concerning the International Carriage of Dangerous Goods by Road", parking areas where lorries transporting dangerous goods can park to rest, must follow several security stipulations to keep safe the rest of road users. At this respect, these lorries must be parked in adapted areas with strict and permanent surveillance measures. Moreover, drivers must satisfy several restrictions about resting and driving time. Under these facts, one may expect that there exist enough parking areas for the transport of this type of goods in order to obey the regulations prescribed by the European Union and its member countries. However, the already-existing parking areas are not sufficient to cover all the stops required by drivers transporting dangerous goods. Our main goal is, starting from the already-existing parking areas and the loading-and-unloading location, to provide an optimal answer to the following question: how many additional parking areas must be built and where must they be located to assure that lorry drivers can transport dangerous goods following all the stipulations about security and safety for their stops? The sense of the word “optimal” is due to the fact that we give a global solution for the location of parking areas throughout the whole European Road Transport Network, adjusting the number of additional areas to be as lower as possible. To do so, we have modeled the problem using graph theory since we are working with a road network. As nodes, we have considered the locations of each already-existing parking area, each loading-and-unloading area each road bifurcation. Each road connecting two nodes is considered as an edge in the graph whose weight corresponds to the distance between both nodes in the edge. By applying a new efficient algorithm, we have found the additional nodes for the network representing the new parking areas adapted for dangerous goods, under the fact that the distance between two parking areas must be less than or equal to 400 km.

Keywords: trans-european transport network, dangerous goods, parking areas, graph-based modeling

Procedia PDF Downloads 266
1643 Solar-Powered Smart Irrigation System as an Adaptation Strategy under Climate Change: A Case Study to Develop Medicinal Security Based on Ancestral Knowledge

Authors: Luisa Cabezas, Karol Leal, Harold Mendoza, Fabio Trochez, Angel Lozada

Abstract:

According to the 2030 Agenda for Sustainable Development Goals (SDG) in which equal importance is given to economic, social, and environmental dimensions where the equality and dignity of each human person is placed at the center of discussion, changing the development concept for one with more responsibility with the environment. It can be found that the energy and food systems are deeply entangled, and they are transversal to the 17 proposed SDG. In this order of ideas, a research project is carried out at Unidad Central del Valle del Cauca (UCEVA) with these two systems in mind, on one hand the energy transition and, on the other hand the transformation of agri-food systems. This project it could be achieved by automation and control irrigation system of medicinal, aromatic, and condimentary plants (MACP) area within the UCEVA Agroecological Farm and located in rural area of Tulua municipality (Valle del Cauca Department, Colombia). This system have allowed to stablish a remote monitoring of MACP area, including MACP moisture measurement, and execute the required system actions. In addition, the electrical system of irrigation control system is powered by a scalable photovoltaic solar energy system based on its specifications. Thus, the developed system automates and control de irrigation system, which is energetically self-sustainable and allows to satisfy the MACP area requirements. Is important to highlight that at MACP area, several medicinal, aromatic, and condimentary plants species are preserved to become primary sources for the pharmaceutical industry and, in many occasions, the only medicines for many communities. Therefore, preserve medicinal plants area would generates medicinal security and preserve cultural heritage as these plants are part of ancestral knowledge that penetrate academic and research communities at UCEVA campus to other society sectors.

Keywords: ancestral knowledge, climate change, medicinal plants, solar energy

Procedia PDF Downloads 214
1642 Evaluation of Double Displacement Process via Gas Dumpflood from Multiple Gas Reservoirs

Authors: B. Rakjarit, S. Athichanagorn

Abstract:

Double displacement process is a method in which gas is injected at an updip well to displace the oil bypassed by waterflooding operation from downdip water injector. As gas injection is costly and a large amount of gas is needed, gas dump-flood from multiple gas reservoirs is an attractive alternative. The objective of this paper is to demonstrate the benefits of the novel approach of double displacement process via gas dump-flood from multiple gas reservoirs. A reservoir simulation model consisting of a dipping oil reservoir and several underlying layered gas reservoirs was constructed in order to investigate the performance of the proposed method. Initially, water was injected via the downdip well to displace oil towards the producer located updip. When the water cut at the producer became high, the updip well was shut in and perforated in the gas zones in order to dump gas into the oil reservoir. At this point, the downdip well was open for production. In order to optimize oil recovery, oil production and water injection rates and perforation strategy on the gas reservoirs were investigated for different numbers of gas reservoirs having various depths and thicknesses. Gas dump-flood from multiple gas reservoirs can help increase the oil recovery after implementation of waterflooding upto 10%. Although the amount of additional oil recovery is slightly lower than the one obtained in conventional double displacement process, the proposed process requires a small completion cost of the gas zones and no operating cost while the conventional method incurs high capital investment in gas compression facility and high-pressure gas pipeline and additional operating cost. From the simulation study, oil recovery can be optimized by producing oil at a suitable rate and perforating the gas zones with the right strategy which depends on depths, thicknesses and number of the gas reservoirs. Conventional double displacement process has been studied and successfully implemented in many fields around the world. However, the method of dumping gas into the oil reservoir instead of injecting it from surface during the second displacement process has never been studied. The study of this novel approach will help a practicing engineer to understand the benefits of such method and can implement it with minimum cost.

Keywords: gas dump-flood, multi-gas layers, double displacement process, reservoir simulation

Procedia PDF Downloads 394
1641 Structural Health Monitoring of Buildings–Recorded Data and Wave Method

Authors: Tzong-Ying Hao, Mohammad T. Rahmani

Abstract:

This article presents the structural health monitoring (SHM) method based on changes in wave traveling times (wave method) within a layered 1-D shear beam model of structure. The wave method measures the velocity of shear wave propagating in a building from the impulse response functions (IRF) obtained from recorded data at different locations inside the building. If structural damage occurs in a structure, the velocity of wave propagation through it changes. The wave method analysis is performed on the responses of Torre Central building, a 9-story shear wall structure located in Santiago, Chile. Because events of different intensity (ambient vibrations, weak and strong earthquake motions) have been recorded at this building, therefore it can serve as a full-scale benchmark to validate the structural health monitoring method utilized. The analysis of inter-story drifts and the Fourier spectra for the EW and NS motions during 2010 Chile earthquake are presented. The results for the NS motions suggest the coupling of translation and torsion responses. The system frequencies (estimated from the relative displacement response of the 8th-floor with respect to the basement from recorded data) were detected initially decreasing approximately 24% in the EW motion. Near the end of shaking, an increase of about 17% was detected. These analysis and results serve as baseline indicators of the occurrence of structural damage. The detected changes in wave velocities of the shear beam model are consistent with the observed damage. However, the 1-D shear beam model is not sufficient to simulate the coupling of translation and torsion responses in the NS motion. The wave method is proven for actual implementation in structural health monitoring systems based on carefully assessing the resolution and accuracy of the model for its effectiveness on post-earthquake damage detection in buildings.

Keywords: Chile earthquake, damage detection, earthquake response, impulse response function, shear beam model, shear wave velocity, structural health monitoring, torre central building, wave method

Procedia PDF Downloads 354
1640 Development of an Systematic Design in Evaluating Force-On-Force Security Exercise at Nuclear Power Plants

Authors: Seungsik Yu, Minho Kang

Abstract:

As the threat of terrorism to nuclear facilities is increasing globally after the attacks of September 11, we are striving to recognize the physical protection system and strengthen the emergency response system. Since 2015, Korea has implemented physical protection security exercise for nuclear facilities. The exercise should be carried out with full cooperation between the operator and response forces. Performance testing of the physical protection system should include appropriate exercises, for example, force-on-force exercises, to determine if the response forces can provide an effective and timely response to prevent sabotage. Significant deficiencies and actions taken should be reported as stipulated by the competent authority. The IAEA(International Atomic Energy Agency) is also preparing force-on-force exercise program documents to support exercise of member states. Currently, ROK(Republic of Korea) is implementing exercise on the force-on-force exercise evaluation system which is developed by itself for the nuclear power plant, and it is necessary to establish the exercise procedure considering the use of the force-on-force exercise evaluation system. The purpose of this study is to establish the work procedures of the three major organizations related to the force-on-force exercise of nuclear power plants in ROK, which conduct exercise using force-on-force exercise evaluation system. The three major organizations are composed of licensee, KINAC (Korea Institute of Nuclear Nonproliferation and Control), and the NSSC(Nuclear Safety and Security Commission). Major activities are as follows. First, the licensee establishes and conducts an exercise plan, and when recommendations are derived from the result of the exercise, it prepares and carries out a force-on-force result report including a plan for implementation of the recommendations. Other detailed tasks include consultation with surrounding units for adversary, interviews with exercise participants, support for document evaluation, and self-training to improve the familiarity of the MILES (Multiple Integrated Laser Engagement System). Second, KINAC establishes a force-on-force exercise plan review report and reviews the force-on-force exercise plan report established by licensee. KINAC evaluate force-on-force exercise using exercise evaluation system and prepare training evaluation report. Other detailed tasks include MILES training, adversary consultation, management of exercise evaluation systems, and analysis of exercise evaluation results. Finally, the NSSC decides whether or not to approve the force-on-force exercise and makes a correction request to the nuclear facility based on the exercise results. The most important part of ROK's force-on-force exercise system is the analysis through the exercise evaluation system implemented by KINAC after the exercise. The analytical method proceeds in the order of collecting data from the exercise evaluation system and analyzing the collected data. The exercise application process of the exercise evaluation system introduced in ROK in 2016 will be concretely set up, and a system will be established to provide objective and consistent conclusions between exercise sessions. Based on the conclusions drawn up, the ultimate goal is to complement the physical protection system of licensee so that the system makes licensee respond effectively and timely against sabotage or unauthorized removal of nuclear materials.

Keywords: Force-on-Force exercise, nuclear power plant, physical protection, sabotage, unauthorized removal

Procedia PDF Downloads 131