Search results for: security test institutionalization
10547 Properties of Self-Compacting Concrete Mixed with Fly Ash
Authors: Abhinandan Singh Gill, Gurbir Kaur Jawanda
Abstract:
Since the introduction of self-consolidating concrete (SCC) in Japan during the late 1980’s, acceptance and usage of this concrete in the construction industry has been steadily gaining momentum. In the United States, the usage of SCC has been spearheaded by the precast concrete industry. Good SCC must possess the following key fresh properties: filling ability, passing ability, and resistance to segregation. Self-compacting concrete is one of 'the most revolutionary developments' in concrete research; this concrete is able to flow and to fill the most restocked places of the form work without vibration. There are several methods for testing its properties. In the fresh state: the most frequently used are slump flow test, L box and V-funnel. This work presents properties of self-compacting concrete, mixed with fly ash. The test results for acceptance characteristics of self-compacting concrete such as slump flow; V-funnel and L-Box are presented. Further, the compressive strength at the ages of 7, 28 days was also determined and results are included here.Keywords: compressive strength, fly ash, self-compacting concrete, slump flow test, super plasticizer
Procedia PDF Downloads 41210546 Development of Terrorist Threat Prediction Model in Indonesia by Using Bayesian Network
Authors: Hilya Mudrika Arini, Nur Aini Masruroh, Budi Hartono
Abstract:
There are more than 20 terrorist threats from 2002 to 2012 in Indonesia. Despite of this fact, preventive solution through studies in the field of national security in Indonesia has not been conducted comprehensively. This study aims to provide a preventive solution by developing prediction model of the terrorist threat in Indonesia by using Bayesian network. There are eight stages to build the model, started from literature review, build and verify Bayesian belief network to what-if scenario. In order to build the model, four experts from different perspectives are utilized. This study finds several significant findings. First, news and the readiness of terrorist group are the most influent factor. Second, according to several scenarios of the news portion, it can be concluded that the higher positive news proportion, the higher probability of terrorist threat will occur. Therefore, the preventive solution to reduce the terrorist threat in Indonesia based on the model is by keeping the positive news portion to a maximum of 38%.Keywords: Bayesian network, decision analysis, national security system, text mining
Procedia PDF Downloads 39210545 The Effect of Reminiscence Therapy with Ethernet-Based Videos on Cognition and Apathy in Elderly with Mild Dementia
Authors: Ayse Inel Manav, Nuray Simsek
Abstract:
The number of people with dementia and the problems that are experienced by these people are increasing along with aging world population. This study was carried out to assess the effects of reminiscence therapy using internet videos on the cognitive condition and apathy levels of elderly people who had mild dementia and lived in nursing homes. This randomly controlled experimental study was conducted between 25 May-25 August 2016 in the nursing home, elderly care and rehabilitation centers in Adana and Seyhan, Turkey. A total of 32 individuals participated in this study, 16 in the experimental group and 16 in the control group. Data were collected using a personal information form developed on the basis of the published literature, the Standardized Mini Mental Test (SMMT) and the Apathy Rating Scale (ARS). The Clinical Research Ethics Committee's approval, written institutional permission, and the written consent of the participants were obtained before data collection. The individuals in the experimental group received reminiscence therapy using internet videos for 60 minutes one day a week for three months. During the same period, 25-30 minutes of unstructured interviews on subjects unrelated to reminiscence were carried out with individuals in the control group. The SMMT and ARS were administered before the applications in the experimental group and at the end of the third month. The collected data were analyzed using descriptive statistics (means, standard deviations, and frequencies) as well as Student's t-test, the Mann-Whitney U-test, and Wilcoxon's signed ranks test. In this study, the total SMMT post-test scores of the experimental group were higher than those of the control group (p = 0.001; p < 0.01). There was a difference between experimental and control groups' total SMMT post-test scores (p = 0.001; p < 0.01). The experimental group's ARS total post-test scores were higher than those of the control group (p = 0.001; p < 0.01). This study found that group reminiscence therapy using internet videos improved the cognitive functions and apathy levels of elderly individuals with mild dementia.Keywords: apaty, cognitive testing, dementia, elderly, reminisence threapy
Procedia PDF Downloads 19810544 African Traditional Method of Social Control Mechanism: A Sociological Review of Native Charms in Farm Security in Ayetoro Community, Ogun State, Nigeria
Authors: Adebisi A. Sunday, Babajide Adeokin
Abstract:
The persistent rise in farm theft in rural region of Nigeria is attributed to the lack of adequate and effective policing in the regions; thus, this brought about the inevitable introduction of native charms on farmlands as a means of fortification of harvests against theft in Ayetoro community. The use of charm by farmers as security on farmlands is a traditional crime control mechanism that is largely based on unwritten laws which greatly influenced the lives of people, and their attitudes toward the society. This research presents a qualitative sociological study on how native charms are deployed by farmers for protection against theft. The study investigated the various types of charms that are employed as security measures among farmers in Ayetoro community and the rationale behind the use of these mechanisms as farm security. The study utilized qualitative method to gather data in the research process. Under the qualitative method, in-depth interview method was adopted to generate a robust and detailed data from the respondents. Also the data generated were analysed qualitatively using thematic content analysis and simple description which was preceded by transcription of data from the recorder. It was revealed that amidst numerous charms known, two major charms are used on farmlands as a measure of social control in Ayetoro community, Ogun state South West Nigeria. Furthermore, the result of this study showed that, the desire for safekeeping of harvest from pilferers and the heavy punishments dispense on offenders by native charms are the reasons why farmers deploy charms on their farms. In addition, findings revealed that the adoption of these charms for protection has improved yields among farmers in the community because the safety of harvest has been made possible by virtue of the presence of various charms in the farm lands. Therefore, based on the findings of this study, it is recommended that such measures should be recognized in mainstream social control mechanisms in the fight against crime in Nigeria and the rest of the world. Lastly, native charms could be installed in all social and cooperate organisation and position of authority to prevent theft of valuables and things hold with utmost importance.Keywords: Ayetoro, farm theft, mechanism, native charms, Pilferer
Procedia PDF Downloads 14610543 Mechanical and Tribological Characterization of Squeeze Cast Al 6061 Alloy Reinforced with SiC and Al₂O₃ Particulates
Authors: Gurcan A. B., Baker T. N.
Abstract:
Due to economic and environmental requirements, it is becoming increasingly important to reduce vehicle weight. The first approach consisted in using light materials with high thermal conductivity, such as aluminium alloys. This choice allowed significant mass reduction and lower temperature but required recourse to ventilated discs. Among aluminium alloys, Al 6xxx series alloys enjoy the highest strength-to-weight ratio and, therefore, have found wide applications in the automobile and aerospace industries. However, these alloys lose their high strength rapidly when they are exposed to elevated temperatures. This rapid decline in the strength is directly related to the coarsening of very fine precipitates which are then not as effective in obstructing the dislocations. The incorporation of micro-scale and nano-scale particulates in aluminium systems can greatly enhance their mechanical characteristics.Keywords: mechanical and tribological behaviour, scanning electron microscope, optical test, mechanical properties test, experimental test
Procedia PDF Downloads 5710542 Effect of Gender on Carcass Parameters in Japanese Quail
Authors: M. Bolacali
Abstract:
This study was conducted to determine the effects of and sex on the carcass characteristics in Japanese quails. A total of 320 (160 for each sex groups) one-day-old quail chicks were randomly allocated to the sex groups, each containing 160 chicks according to a completely randomized design. Each gender was then divided into five replicate groups of 32 chicks. According to sex groups, the chicks of all replicate groups were housed in cages. The normality of distribution for all data was tested with the Shapiro-Wilk test at 95% confidence interval. A P value of ≤ 0.05 was interpreted as different. The statistical analysis for normal distribution data of the dietary groups was carried out with the general linear model procedure of SPSS software. The results are expressed as mean ± standard deviation of five replications. Duncan’s multiple range test was used for multiple comparisons in important groups. Data points bearing different letters are significantly different P ≤ 0.05. For the distribution of data that was different from normal, Kruskal Wallis H-Test was applied as a nonparametric test, and the results were expressed as median, minimum and maximum values. Pairwise comparisons of groups were made when Kruskal Wallis H-Test was significant. The study period lasted 42 days. Hot carcass, cold carcass, heart, and leg percentages in male quails was higher than female quails (P < 0.05), but liver, and breast percentages in female quails was higher than male quails (P > 0.05). The highest slaughter and carcass weight values were determined in the female quails in the cage. As a conclusion, it may be recommended to quail meat producers, who would like to obtain higher carcass weight to make more economic profit, to raise female quails in cage.Keywords: carcass yield, chick, gender, management
Procedia PDF Downloads 18910541 A Hybrid Model for Secure Protocol Independent Multicast Sparse Mode and Dense Mode Protocols in a Group Network
Authors: M. S. Jimah, A. C. Achuenu, M. Momodu
Abstract:
Group communications over public infrastructure are prone to a lot of security issues. Existing network protocols like Protocol Independent Multicast Sparse Mode (PIM SM) and Protocol Independent Multicast Dense Mode (PIM DM) do not have inbuilt security features. Therefore, any user or node can easily access the group communication as long as the user can send join message to the source nodes, the source node then adds the user to the network group. In this research, a hybrid method of salting and hashing to encrypt information in the source and stub node was designed, and when stub nodes need to connect, they must have the appropriate key to join the group network. Object oriented analysis design (OOAD) was the methodology used, and the result shows that no extra controlled bandwidth overhead cost was added by encrypting and the hybrid model was more securing than the existing PIM SM, PIM DM and Zhang secure PIM SM.Keywords: group communications, multicast, PIM SM, PIM DM, encryption
Procedia PDF Downloads 16410540 Survey to Assess the Feasibility of Executing the Web-Based Collaboration Process Using WBCS
Authors: Mohamed A. Sullabi
Abstract:
The importance of the formal specification in the software life cycle is barely concealing to anyone. Formal specifications use mathematical notation to describe the properties of information system precisely, without unduly constraining the way in how these properties are achieved. Having a correct and quality software specification is not easy task. This study concerns with how a group of rectifiers can communicate with each other and work to prepare and produce a correct formal software specification. WBCS has been implemented based mainly in the proposed supported cooperative work model and a survey conducted on the existing Webbased collaborative writing tools. This paper aims to assess the feasibility of executing the web-based collaboration process using WBCS. The purpose of conducting this test is to test the system as a whole for functionality and fitness for use based on the evaluation test plan.Keywords: formal methods, formal specifications, collaborative writing, usability testing
Procedia PDF Downloads 39910539 Determining the Effectiveness of Dialectical Behavior Therapy in Reducing the Psychopathic Deviance of Criminals
Authors: Setareh Gerayeli
Abstract:
The present study tries to determine the effectiveness of dialectical behavior therapy in reducing the psychopathic deviance of employed criminals released from prison. The experimental method was used in this study, and the statistical population included employed criminals released from prison in Mashhad. Thirty offenders were selected randomly as the samples of the study. The MMPI-2 was used to collect data in the pre-test and post-test stages. The behavioral therapy was conducted on the experimental group during fourteen two and a half hour sessions, while the control group did not receive any intervention. Data analysis was conducted by using covariance. The results showed there is a significant difference between the post-test mean scores of the two groups. The findings suggest that dialectical behavior therapy is effective in reducing psychopathic deviance.Keywords: criminals, dialectical behavior therapy, psychopathic deviance, prison
Procedia PDF Downloads 23210538 Factors Affecting the Fear of Insulin Injection and Finger Punching in Individuals Diagnosed with Diabetes
Authors: Gaye Demi̇rtaş Adli
Abstract:
Research: It was conducted to determine the factors affecting the fear of self-injection and self-pricking of fingers of diabetic individuals.The study was conducted as a cross-sectional, relation-seeking, and descriptive study. The study was conducted on 122 patients who had just started insulin therapy. Data were obtained through The Descriptive Patient Form, The Diabetic Self-Injection, and the Fear of Testing Questionnaire Form (D-FISQ). Descriptive statistical methods used in the evaluation of data are the Mann-Whitney U test, Kruskal-Wallis H test, and the Spearman correlation. The factors affecting the scale scores were evaluated with multiple linear regression analysis. The value of P<0.05 was considered statistically significant. Study group: 56.6% of the patients are male patients. Fear of self-injection (injection), fear of self-testing (test), and total fear (total) scores of women were found to be statistically higher than men (p<0.001). Age, gender, and pain experience were important variables that affected patients' fear of injections. With a one-unit increase in age, the injection fear score decreased by 0.13 points, and the mean injection fear score of women was 2.11 points higher than that of men. It was determined that the patient's age, gender, living with whom, and blood donation history were important variables affecting the fear of self-testing. It is seen that the fear test score decreases by 0.18 points with an increase in age by one unit, and the fear test scores of women compared to men are on average 3,358 points, the fear test scores of those living alone are 4,711 points compared to those living with family members, and the fear test scores of those who do not donate blood are 2,572 compared to those who donate blood score, it was determined that those with more pain experience were 3,156 points higher on average than those with less fear of injection. As a result, it was seen that the most important factors affecting the fear of insulin injection and finger punching in individuals with diabetes were age, gender, pain experience, living with whom, and blood donation history.Keywords: diabetes, needle phobia, fear of injection, insulin injection
Procedia PDF Downloads 7210537 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016
Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto
Abstract:
The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss
Procedia PDF Downloads 14210536 Nexus of Pakistan Stock Exchange with World's Top Five Stock Markets after Launching China Pakistan Economic Corridor
Authors: Abdul Rauf, Xiaoxing Liu, Waqas Amin
Abstract:
Stock markets are fascinating more and more conductive to each other due to liberalization and globalization trends in recent years. China Pakistan Economic Corridor (CPEC) has dragged Pakistan stock exchange to the new heights and global investors are making investments to reap its benefits. So, in investors and government perspective, the study focuses co-integration of Pakistan stock exchange with world’s five big economies i-e US, China, England, Japan, and France. The time period of study is seven years i-e 2010 to 2016 and daily values of major indices of corresponding stock exchanges collected. All variables of that particular study are stationary at first difference confirmed by unit root test. The study Johansen system co integration test for analysis of data along with Granger causality test is performed for result purpose. Co integration test asserted that Pakistan stock exchange integrated with Shanghai stock exchange (SSE) and NIKKEI stock exchange in short run. Granger causality test also proclaimed these results. But NASDAQ, FTSE, DAX not co integrated and Granger cause at a short run but long run these markets are bonded with Pakistan stock exchange (KSE). VECM also confirmed this liaison in short and long run. Investors, therefore, need to be updated regarding co-integration of world’s stock exchanges to ensure well diversified and risk adjusted high returns. Equally, governments also need updated status so that they could reduce co-integration through multiple steps and hence drag investors for diversified investment.Keywords: CPEC, DAX, FTSE, liberalization, NASDAQ, NIKKEI, SSE, stock markets
Procedia PDF Downloads 30310535 Detecting and Secluding Route Modifiers by Neural Network Approach in Wireless Sensor Networks
Authors: C. N. Vanitha, M. Usha
Abstract:
In a real world scenario, the viability of the sensor networks has been proved by standardizing the technologies. Wireless sensor networks are vulnerable to both electronic and physical security breaches because of their deployment in remote, distributed, and inaccessible locations. The compromised sensor nodes send malicious data to the base station, and thus, the total network effectiveness will possibly be compromised. To detect and seclude the Route modifiers, a neural network based Pattern Learning predictor (PLP) is presented. This algorithm senses data at any node on present and previous patterns obtained from the en-route nodes. The eminence of any node is upgraded by their predicted and reported patterns. This paper propounds a solution not only to detect the route modifiers, but also to seclude the malevolent nodes from the network. The simulation result proves the effective performance of the network by the presented methodology in terms of energy level, routing and various network conditions.Keywords: neural networks, pattern learning, security, wireless sensor networks
Procedia PDF Downloads 40510534 The Development of Traffic Devices Using Natural Rubber in Thailand
Authors: Weeradej Cheewapattananuwong, Keeree Srivichian, Godchamon Somchai, Wasin Phusanong, Nontawat Yoddamnern
Abstract:
Natural rubber used for traffic devices in Thailand has been developed and researched for several years. When compared with Dry Rubber Content (DRC), the quality of Rib Smoked Sheet (RSS) is better. However, the cost of admixtures, especially CaCO₃ and sulphur, is higher than the cost of RSS itself. In this research, Flexible Guideposts and Rubber Fender Barriers (RFB) are taken into consideration. In case of flexible guideposts, the materials used are both RSS and DRC60%, but for RFB, only RSS is used due to the controlled performance tests. The objective of flexible guideposts and RFB is to decrease a number of accidents, fatal rates, and serious injuries. Functions of both devices are to save road users and vehicles as well as to absorb impact forces from vehicles so as to decrease of serious road accidents. This leads to the mitigation methods to remedy the injury of motorists, form severity to moderate one. The solution is to find the best practice of traffic devices using natural rubber under the engineering concepts. In addition, the performances of materials, such as tensile strength and durability, are calculated for the modulus of elasticity and properties. In the laboratory, the simulation of crashes, finite element of materials, LRFD, and concrete technology methods are taken into account. After calculation, the trials' compositions of materials are mixed and tested in the laboratory. The tensile test, compressive test, and weathering or durability test are followed and based on ASTM. Furthermore, the Cycle-Repetition Test of Flexible Guideposts will be taken into consideration. The final decision is to fabricate all materials and have a real test section in the field. In RFB test, there will be 13 crash tests, 7 Pickup Truck tests, and 6 Motorcycle Tests. The test of vehicular crashes happens for the first time in Thailand, applying the trial and error methods; for example, the road crash test under the standard of NCHRP-TL3 (100 kph) is changed to the MASH 2016. This is owing to the fact that MASH 2016 is better than NCHRP in terms of speed, types, and weight of vehicles and the angle of crash. In the processes of MASH, Test Level 6 (TL-6), which is composed of 2,270 kg Pickup Truck, 100 kph, and 25 degree of crash-angle is selected. The final test for real crash will be done, and the whole system will be evaluated again in Korea. The researchers hope that the number of road accidents will decrease, and Thailand will be no more in the top tenth ranking of road accidents in the world.Keywords: LRFD, load and resistance factor design, ASTM, american society for testing and materials, NCHRP, national cooperation highway research program, MASH, manual for assessing safety hardware
Procedia PDF Downloads 13010533 An Open Loop Distribution Module for Precise and Uniform Drip Fertigation in Soilless Culture
Authors: Juan Ignacio Arango, Andres Diaz, Giacomo Barbieri
Abstract:
In soilless culture, the definition of efficient fertigation strategies is fundamental for the growth of crops. Flexible test-benches able to independently manage groups of crops are key for investigating efficient fertigation practices through experimentation. These test-benches must be able to provide nutrient solution (NS) in a precise, uniform and repeatable way in order to effectively implement and compare different fertigation strategies. This article describes a distribution module for investigating fertigation practices able to control the fertigation dose and frequency. The proposed solution is characterized in terms of precision, uniformity and repeatability since these parameters are fundamental in the implementation of effective experiments for the investigation of fertigation practices. After a calibration process, the implemented system reaches a precision of 1mL, a uniformity of 98.5% at a total cost of 735USD.Keywords: recision horticulture, test-bench, fertigation strategy, automation, flexibility
Procedia PDF Downloads 14010532 Treadmill Negotiation: The Stagnation of the Israeli – Palestinian Peace Process
Authors: Itai Kohavi, Wojciech Nowiak
Abstract:
This article explores the stagnation of the Israeli -Palestinian peace negotiation process, and the reasons behind the failure of more than 12 international initiatives to resolve the conflict. Twenty-seven top members of the Israeli national security elite (INSE) were interviewed, including heads of the negotiation teams, the National Security Council, the Mossad, and other intelligence and planning arms. The interviewees provided their insights on the Israeli challenges in reaching a sustainable and stable peace agreement and in dealing with the international pressure on Israel to negotiate a peace agreement while preventing anti-Israeli UN decisions and sanctions. The findings revealed a decision tree, with red herring deception strategies implemented to postpone the negotiation process and to delay major decisions during the negotiation process. Beyond the possible applications for the Israeli – Palestinian conflict, the findings shed more light on the phenomenon of rational deception of allies in a negotiation process, a subject less frequently researched as compared with deception of rivals.Keywords: deception, Israeli-Palestinian conflict, negotiation, red herring, terrorist state, treadmill negotiation
Procedia PDF Downloads 30510531 Discovering Event Outliers for Drug as Commercial Products
Authors: Arunas Burinskas, Aurelija Burinskiene
Abstract:
On average, ten percent of drugs - commercial products are not available in pharmacies due to shortage. The shortage event disbalance sales and requires a recovery period, which is too long. Therefore, one of the critical issues that pharmacies do not record potential sales transactions during shortage and recovery periods. The authors suggest estimating outliers during shortage and recovery periods. To shorten the recovery period, the authors suggest using average sales per sales day prediction, which helps to protect the data from being downwards or upwards. Authors use the outlier’s visualization method across different drugs and apply the Grubbs test for significance evaluation. The researched sample is 100 drugs in a one-month time frame. The authors detected that high demand variability products had outliers. Among analyzed drugs, which are commercial products i) High demand variability drugs have a one-week shortage period, and the probability of facing a shortage is equal to 69.23%. ii) Mid demand variability drugs have three days shortage period, and the likelihood to fall into deficit is equal to 34.62%. To avoid shortage events and minimize the recovery period, real data must be set up. Even though there are some outlier detection methods for drug data cleaning, they have not been used for the minimization of recovery period once a shortage has occurred. The authors use Grubbs’ test real-life data cleaning method for outliers’ adjustment. In the paper, the outliers’ adjustment method is applied with a confidence level of 99%. In practice, the Grubbs’ test was used to detect outliers for cancer drugs and reported positive results. The application of the Grubbs’ test is used to detect outliers which exceed boundaries of normal distribution. The result is a probability that indicates the core data of actual sales. The application of the outliers’ test method helps to represent the difference of the mean of the sample and the most extreme data considering the standard deviation. The test detects one outlier at a time with different probabilities from a data set with an assumed normal distribution. Based on approximation data, the authors constructed a framework for scaling potential sales and estimating outliers with Grubbs’ test method. The suggested framework is applicable during the shortage event and recovery periods. The proposed framework has practical value and could be used for the minimization of the recovery period required after the shortage of event occurrence.Keywords: drugs, Grubbs' test, outlier, shortage event
Procedia PDF Downloads 13510530 Evaluation of Liquefaction Potential of Fine Grained Soil: Kerman Case Study
Authors: Reza Ziaie Moayed, Maedeh Akhavan Tavakkoli
Abstract:
This research aims to investigate and evaluate the liquefaction potential in a project in Kerman city based on different methods for fine-grained soils. Examining the previous damages caused by recent earthquakes, it has been observed that fine-grained soils play an essential role in the level of damage caused by soil liquefaction. But, based on previous investigations related to liquefaction, there is limited attention to evaluating the cyclic resistance ratio for fine-grain soils, especially with the SPT method. Although using a standard penetration test (SPT) to find the liquefaction potential of fine-grain soil is not common, it can be a helpful method based on its rapidness, serviceability, and availability. In the present study, the liquefaction potential has been first determined by the soil’s physical properties obtained from laboratory tests. Then, using the SPT test and its available criterion for evaluating the cyclic resistance ratio and safety factor of liquefaction, the correction of effecting fine-grained soils is made, and then the results are compared. The results show that using the SPT test for liquefaction is more accurate than using laboratory tests in most cases due to the contribution of different physical parameters of soil, which leads to an increase in the ultimate N₁(60,cs).Keywords: liquefaction, cyclic resistance ratio, SPT test, clay soil, cohesion soils
Procedia PDF Downloads 10210529 Requirement Engineering for Intrusion Detection Systems in Wireless Sensor Networks
Authors: Afnan Al-Romi, Iman Al-Momani
Abstract:
The urge of applying the Software Engineering (SE) processes is both of vital importance and a key feature in critical, complex large-scale systems, for example, safety systems, security service systems, and network systems. Inevitably, associated with this are risks, such as system vulnerabilities and security threats. The probability of those risks increases in unsecured environments, such as wireless networks in general and in Wireless Sensor Networks (WSNs) in particular. WSN is a self-organizing network of sensor nodes connected by wireless links. WSNs consist of hundreds to thousands of low-power, low-cost, multi-function sensor nodes that are small in size and communicate over short-ranges. The distribution of sensor nodes in an open environment that could be unattended in addition to the resource constraints in terms of processing, storage and power, make such networks in stringent limitations such as lifetime (i.e. period of operation) and security. The importance of WSN applications that could be found in many militaries and civilian aspects has drawn the attention of many researchers to consider its security. To address this important issue and overcome one of the main challenges of WSNs, security solution systems have been developed by researchers. Those solutions are software-based network Intrusion Detection Systems (IDSs). However, it has been witnessed, that those developed IDSs are neither secure enough nor accurate to detect all malicious behaviours of attacks. Thus, the problem is the lack of coverage of all malicious behaviours in proposed IDSs, leading to unpleasant results, such as delays in the detection process, low detection accuracy, or even worse, leading to detection failure, as illustrated in the previous studies. Also, another problem is energy consumption in WSNs caused by IDS. So, in other words, not all requirements are implemented then traced. Moreover, neither all requirements are identified nor satisfied, as for some requirements have been compromised. The drawbacks in the current IDS are due to not following structured software development processes by researches and developers when developing IDS. Consequently, they resulted in inadequate requirement management, process, validation, and verification of requirements quality. Unfortunately, WSN and SE research communities have been mostly impermeable to each other. Integrating SE and WSNs is a real subject that will be expanded as technology evolves and spreads in industrial applications. Therefore, this paper will study the importance of Requirement Engineering when developing IDSs. Also, it will study a set of existed IDSs and illustrate the absence of Requirement Engineering and its effect. Then conclusions are drawn in regard of applying requirement engineering to systems to deliver the required functionalities, with respect to operational constraints, within an acceptable level of performance, accuracy and reliability.Keywords: software engineering, requirement engineering, Intrusion Detection System, IDS, Wireless Sensor Networks, WSN
Procedia PDF Downloads 32410528 Border Security: Implementing the “Memory Effect” Theory in Irregular Migration
Authors: Iliuta Cumpanasu, Veronica Oana Cumpanasu
Abstract:
This paper focuses on studying the conjunction between the new emerged theory of “Memory Effect” in Irregular Migration and Related Criminality and the notion of securitization, and its impact on border management, bringing about a scientific advancement in the field by identifying the patterns corresponding to the linkage of the two concepts, for the first time, and developing a theoretical explanation, with respect to the effects of the non-military threats on border security. Over recent years, irregular migration has experienced a significant increase worldwide. The U.N.'s refugee agency reports that the number of displaced people is at its highest ever - surpassing even post-World War II numbers when the world was struggling to come to terms with the most devastating event in history. This is also the fresh reality within the core studied coordinate, the Balkan Route of Irregular Migration, which starts from Asia and Africa and continues to Turkey, Greece, North Macedonia or Bulgaria, Serbia, and ends in Romania, where thousands of migrants find themselves in an irregular situation concerning their entry to the European Union, with its important consequences concerning the related criminality. The data from the past six years was collected by making use of semi-structured interviews with experts in the field of migration and desk research within some organisations involved in border security, pursuing the gathering of genuine insights from the aforementioned field, which was constantly addressed the existing literature and subsequently subjected to the mixed methods of analysis, including the use of the Vector Auto-Regression estimates model. Thereafter, the analysis of the data followed the processes and outcomes in Grounded Theory, and a new Substantive Theory emerged, explaining how the phenomena of irregular migration and cross-border criminality are the decisive impetus for implementing the concept of securitization in border management by using the proposed pattern. The findings of the study are therefore able to capture an area that has not yet benefitted from a comprehensive approach in the scientific community, such as the seasonality, stationarity, dynamics, predictions, or the pull and push factors in Irregular Migration, also highlighting how the recent ‘Pandemic’ interfered with border security. Therefore, the research uses an inductive revelatory theoretical approach which aims at offering a new theory in order to explain a phenomenon, triggering a practically handy contribution for the scientific community, research institutes or Academia and also usefulness to organizational practitioners in the field, among which UN, IOM, UNHCR, Frontex, Interpol, Europol, or national agencies specialized in border security. The scientific outcomes of this study were validated on June 30, 2021, when the author defended his dissertation for the European Joint Master’s in Strategic Border Management, a two years prestigious program supported by the European Commission and Frontex Agency and a Consortium of six European Universities and is currently one of the research objectives of his pending PhD research at the West University Timisoara.Keywords: migration, border, security, memory effect
Procedia PDF Downloads 9210527 Cross Professional Team-Assisted Teaching Effectiveness
Authors: Shan-Yu Hsu, Hsin-Shu Huang
Abstract:
The main purpose of this teaching research is to design an interdisciplinary team-assisted teaching method for trainees and interns and review the effectiveness of this teaching method on trainees' understanding of peritoneal dialysis. The teaching research object is the fifth and sixth-grade trainees in a medical center's medical school. The teaching methods include media teaching, demonstration of technical operation, face-to-face communication with patients, special case discussions, and field visits to the peritoneal dialysis room. Evaluate learning effectiveness before, after, and verbally. Statistical analysis was performed using the SPSS paired-sample t-test to analyze whether there is a difference in peritoneal dialysis professional cognition before and after teaching intervention. Descriptive statistics show that the average score of the previous test is 74.44, the standard deviation is 9.34, the average score of the post-test is 95.56, and the standard deviation is 5.06. The results of the t-test of the paired samples are shown as p-value = 0.006, showing the peritoneal dialysis professional cognitive test. Significant differences were observed before and after. The interdisciplinary team-assisted teaching method helps trainees and interns to improve their professional awareness of peritoneal dialysis. At the same time, trainee physicians have positive feedback on the inter-professional team-assisted teaching method. This teaching research finds that the clinical ability development education of trainees and interns can provide cross-professional team-assisted teaching methods to assist clinical teaching guidance.Keywords: monitor quality, patient safety, health promotion objective, cross-professional team-assisted teaching methods
Procedia PDF Downloads 14610526 The Impact of Artificial Intelligence on Human Rights Priciples and Obligations
Authors: Adel Atta Youssef Rezkalla
Abstract:
Russia's invasion of Ukraine tested the international community and prompted not only states but also non-state actors to take deterrent measures in response. In fact, international sports federations, notably FIFA and UEFA, have managed to shift the power dynamic quite effectively by imposing a blanket ban on Russian national teams and clubs. The purpose of this article is to examine the human rights consequences of such actions by international sports organizations. First, the article moves away from assessing the legal status of FIFA and UEFA under international law and examines the question of how a legal connection can be established with their human rights obligations. Secondly, the human rights aspects of the controversial FIFA and UEFA measures against Russian athletes are examined and these are analyzed in more detail using the proportionality test than the principle of non-discrimination under international human rights law. Finally, the main avenues for redress for possible human rights violations related to the actions taken by these organizations are identified and the challenges of arbitration and litigation in Switzerland are highlighted.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.
Procedia PDF Downloads 7710525 Analytical Study of Applying the Account Aggregation Approach in E-Banking Services
Authors: A. Al Drees, A. Alahmari, R. Almuwayshir
Abstract:
The advanced information technology is becoming an important factor in the development of financial services industry, especially the banking industry. It has introduced new ways of delivering banking to the customer, such as Internet Banking. Banks began to look at electronic banking (e-banking) as a means to replace some of their traditional branch functions using the Internet as a new distribution channel. Some consumers have at least more than one account, and across banks, and access these accounts using e-banking services. To look at the current net worth position, customers have to login to each of their accounts and get the details and work on consolidation. This not only takes ample time but it is a repetitive activity at a specified frequency. To address this point, an account aggregation concept is added as a solution. E-banking account aggregation, as one of the e-banking types, appeared to build a stronger relationship with customers. Account Aggregation Service generally refers to a service that allows customers to manage their bank accounts maintained in different institutions through a common Internet banking operating a platform, with a high concern to security and privacy. This paper presents an overview of an e-banking account aggregation approach as a new service in the e-banking field.Keywords: e-banking, account aggregation, security, enterprise development
Procedia PDF Downloads 33210524 Variable Selection in a Data Envelopment Analysis Model by Multiple Proportions Comparison
Authors: Jirawan Jitthavech, Vichit Lorchirachoonkul
Abstract:
A statistical procedure using multiple comparisons test for proportions is proposed for variable selection in a data envelopment analysis (DEA) model. The test statistic in the multiple comparisons is the proportion of efficient decision making units (DMUs) in a DEA model. Three methods of multiple comparisons test for proportions: multiple Z tests with Bonferroni correction, multiple tests in 2Xc crosstabulation and the Marascuilo procedure, are used in the proposed statistical procedure of iteratively eliminating the variables in a backward manner. Two simulation populations of moderately and lowly correlated variables are used to compare the results of the statistical procedure using three methods of multiple comparisons test for proportions with the hypothesis testing of the efficiency contribution measure. From the simulation results, it can be concluded that the proposed statistical procedure using multiple Z tests for proportions with Bonferroni correction clearly outperforms the proposed statistical procedure using the remaining two methods of multiple comparisons and the hypothesis testing of the efficiency contribution measure.Keywords: Bonferroni correction, efficient DMUs, Marascuilo procedure, Pastor et al. method, 2xc crosstabulation
Procedia PDF Downloads 31110523 Effect of Chemical Treatment on Mechanical Properties of KENAF Fiber Reinforced Unsaturated Polyester Composites
Authors: S. S. Abdullahi, H. Musa, A. A. Salisu, A. Ismaila, A. H. Birniwa
Abstract:
In this study the treated and untreated kenaf fiber reinforced unsaturated polyester conventional composites were prepared. Hand lay-up technique was used with dump-bell shaped mold. The kenaf bast fiber was retted enzymatically, washed, dried and combed with a nylon brush. A portion of the kenaf fiber was mercerized and treated with benzoylchloride prior to composite fabrication. Untreated kenaf fiber was also used to prepare the composites to serve as control. The cured composites were subjected to various mechanical testes, such as hardness test, impact test and tensile strength test. The results obtained indicated an increase in all the parameters tested with the fiber treatment. This is because the lignin, hemi-celluloses, pectin and other impurities were removed during alkaline treatment (i.e mercerization). This shows that, the durability of the natural cellulosic fibers to different composite applications can be achieved via fiber treatments.Keywords: composite, kenaf fibre, reinforce, retted
Procedia PDF Downloads 51510522 Accelerating Mobile Innovation, Adoption, and Translational Science within a Large Research Enterprise and Healthcare System
Authors: Stephen Wheat
Abstract:
Institutional mobile application governance and distribution processes are essential to mobile app innovation. The absence of effective processes poses a significant barrier to the development and adoption of mobile apps for use within a research enterprise and also impedes the translational science of applying research apps in clinical and engineering settings. To accelerate mobile app innovation and adoption, Emory University and Emory Healthcare implemented a three-pronged strategy including. I) Mobile app review and distribution policies and processes. II) Mobile app management infrastructure and mobile app foundation components. III) A strategic sourcing strategy based on preferred mobile app development firms. The results have been an increase from five to 56 mobile apps in the pipeline over three years; increased engagement from technology transfer, legal counsel, compliance, and information security; articulation of a coordinated mobile app strategy; and allocation of more institutional resources toward specific mobile technology and mobile application goals.Keywords: mobile app management, governance, distribution, information security
Procedia PDF Downloads 30010521 Histamine Skin Reactivity Increased with Body Mass Index in Korean Children
Authors: Jeong Hong Kim, Ju Wan Kang
Abstract:
Objective: Histamine skin prick testing is most commonly used to diagnose immunoglobulin E (IgE)-mediated allergic diseases, and histamine reactivity is used as a standardized positive control in the interpretation of a skin prick test. However, reactivity to histamine differs among individuals for reasons that are poorly understood. The present study aimed to evaluate the potential association between body mass index (BMI) and histamine skin reactivity in children. Methods: A total of 451 children (246 boys, 205 girls) aged 7–8 years were enrolled in this study. The skin prick test was performed with 26 aeroallergens commonly found in Korea. Other information was collected, including sex, age, BMI, parental allergy history, and parental smoking status. Multivariate analysis was used to confirm the association between histamine skin reactivity and BMI. Results: The histamine wheal size was revealed to be associated with BMI (Spearman's Rho 0.161, p < 0.001). This association was confirmed by multivariate analysis, after adjusting for sex, age, parental allergy history, parental smoking status, and allergic sensitization (coefficient B 0.071, 95% confidence interval 0.030–0.112). Conclusions: Skin responses to histamine were primarily correlated with increased BMI. Further studies are needed to understand the clinical implication of BMI when interpreting the results of skin prick test.Keywords: allergy, body mass index, histamine, skin prick test
Procedia PDF Downloads 36310520 An Evaluation of People’s Susceptibility to Phishing Attacks in Nepal and Effectiveness of the Applied Countermeasures
Authors: Sunil Chaudhary, Rajendra Bahadur Thapa, Eleni Berki, Marko Helenius
Abstract:
The increasing number of Internet and mobile phone users, and essentially those, who use these electronic media to perform online transactions makes Nepal lucrative for phishing attacks. It is one of the reasons behind escalating phishing attacks in the country. Therefore, in this paper we examine various phishing attempts and real scenarios in Nepal to determine the seriousness of the problem. We also want to find out how prepared are the Internet and mobile phone users and how well-equipped are the private sector and government authorities responsible to handle cybercrime in the country. We considered five areas of research study, i.e., legal measures, technical and procedural measures, organizational structure, capacity building and international cooperation. These constitute important factors in cyber security and are recommended by the Global Cyber security Agenda (GCA). On the basis of our findings, we provide essential suggestions to make anti-phishing measures more appropriate to Nepalese State and society.Keywords: internet banking, mobile banking, e-commerce, phishing, anti-phishing, Nepal
Procedia PDF Downloads 48810519 Intrusion Detection Based on Graph Oriented Big Data Analytics
Authors: Ahlem Abid, Farah Jemili
Abstract:
Intrusion detection has been the subject of numerous studies in industry and academia, but cyber security analysts always want greater precision and global threat analysis to secure their systems in cyberspace. To improve intrusion detection system, the visualisation of the security events in form of graphs and diagrams is important to improve the accuracy of alerts. In this paper, we propose an approach of an IDS based on cloud computing, big data technique and using a machine learning graph algorithm which can detect in real time different attacks as early as possible. We use the MAWILab intrusion detection dataset . We choose Microsoft Azure as a unified cloud environment to load our dataset on. We implement the k2 algorithm which is a graphical machine learning algorithm to classify attacks. Our system showed a good performance due to the graphical machine learning algorithm and spark structured streaming engine.Keywords: Apache Spark Streaming, Graph, Intrusion detection, k2 algorithm, Machine Learning, MAWILab, Microsoft Azure Cloud
Procedia PDF Downloads 14910518 Effects of 8-Week Bee Bread Supplementation on Isokinetic Muscular Strength and Power in Young Athletes
Authors: Fadzel Wong Chee Ping, Chee Keong Chen, Foong Kiew Ooi, Mahaneem Mohamed
Abstract:
Introduction: To date, information on the effects of bee bread supplementation on isokinetic muscular performance are lacking. Therefore, this study was carried out to investigate the effects of 8-week bee bread supplementation on isokinetic muscular strength and power in young athletes. Methodology: Twelve male athletes (age: 24.0±1.8 years; BMI: 22.3 ± 1.3 kg.m-2; VO2max: 52.0 ± 2.8 mL.kg-1.min-1) were recruited in this randomised double blind, placebo-controlled crossover study. Participants consumed either bee bread at a dosage of 20 g.d-1 or placebo for 8 weeks. An isokinetic dynamometer was used to measure participants’ lower limb muscular strength and power prior (pre-test) and post (post-test) 8 weeks of experimental period. Testing angular velocities were set at 180o.s-1 and 300o.s-1 to determine knee flexion and extension muscular peak torque (an indicator of muscular strength) and average power of the participants. Statistical analyses were performed using ANOVA with repeated measures. Results: Isokinetic knee extension peak torque and average power at 180o.s-1, and isokinetic knee flexion peak torque and average power at 180o.s-1 were significantly (p<0.05) higher at post-test compared to pre-test with bee bread supplementation. However, significant differences were not observed in the measured parameters between pre- and post-test with placebo supplementation. Conclusion: Supplementation of bee bread for 8 weeks at a dosage of 20 g daily increased some of the measured isokinetic muscular strength and power parameters in young athletes.Keywords: bee bread, isokinetic, power, strength
Procedia PDF Downloads 257