Search results for: communication with physical layer security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14178

Search results for: communication with physical layer security

12768 Tag Impersonation Attack on Ultra-lightweight Radio Frequency Identification Authentication Scheme (ESRAS)

Authors: Reham Al-Zahrani, Noura Aleisa

Abstract:

The proliferation of Radio Frequency Identification (RFID) technology has raised concerns about system security, particularly regarding tag impersonation attacks. Regarding RFID systems, an appropriate authentication protocol must resist active and passive attacks. A tag impersonation occurs when an adversary's tag is used to fool an authenticating reader into believing it is a legitimate tag. This paper analyzed the security of the efficient, secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS). Then, the paper presents a comprehensive analysis of the Efficient, Secure, and Practical Ultra-Lightweight RFID Authentication Scheme (ESRAS) in the context of radio frequency identification (RFID) systems that employed the Scyther tool to examine the protocol's security against a tag impersonation attack.

Keywords: RFID, impersonation attack, authentication, ultra-lightweight protocols

Procedia PDF Downloads 58
12767 The Nexus between Child Marriage and Women Empowerment with Physical Violence in Two Culturally Distinct States of India

Authors: Jayakant Singh, Enu Anand

Abstract:

Background: Child marriage is widely prevalent in India. It is a form of gross human right violation that succumbs a child bride to be subservient to her husband within a marital relation. We investigated the relationship between age at marriage of women and her level of empowerment with physical violence experienced 12 months preceding the survey among young women aged 20-24 in two culturally distinct states- Bihar and Tamil Nadu of India. Methods: We used the information collected from 10514 young married women (20-24 years) at all India level, 373 in Bihar and 523 in Tamil Nadu from the third round of National Family Health Survey. Empowerment index was calculated using different parameters such as mobility, economic independence and decision making power of women using Principal Component Analysis method. Bivariate analysis was performed primarily using chi square for the test of significance. Logistic regression was carried out to assess the effect of age at marriage and empowerment on physical violence. Results: Lower level of women empowerment was significantly associated with physical violence in Tamil Nadu (OR=2.38, p<0.01) whereas child marriage (marriage before age 15) was associated with physical violence in Bihar (OR=3.27, p<0.001). The mean difference in age at marriage between those who experienced physical violence and those who did not experience varied by 7 months in Bihar and 10 months in Tamil Nadu. Conclusion: Culture specific intervention may be a key to reduction of violence against women as the results showed association of different factors contributing to physical violence in Bihar and Tamil Nadu. Marrying at an appropriate age perhaps is protective of abuse because it equips a woman to assert her rights effectively. It calls for an urgent consideration to curb both violence and child marriage with stricter involvement of family, civil society and the government. In the meanwhile physical violence may be recognized as a public health problem and integrate appropriate treatment to the victims within the health care institution.

Keywords: child marriage, empowerment, India, physical violence

Procedia PDF Downloads 311
12766 Evaluation of Food Safety and Security Practices in Midday Meal Programmes in Rural Areas of Beed District

Authors: Nuzhat Sultana M. B.

Abstract:

Children are high-risk population in terms of food born illnesses. Food safety and security are the most important aspect of the success of midday meal programmes. Improper holding temperatures, cross-contamination and poor personal hygiene of food handlers are the main causes for the prevalence of pathogenic microbes in the food servicing areas. Two hundred and fifty preschool children in the age of 3 to 6 years from urban and rural anganwadies (pre school center) of Beed district were selected. Nutritional status of preschool children were assessed by anthropometrical and clinical measurement. The study assessed the food safety and security with the help of personal hygiene and other safety measures maintained by the food personnel working for midday meal programme, supplying mid meals to children in govt. anganwadies (pre school center). The hygiene level, sanitary condition and microbial quality of food and water, pathological health examination of food handlers were assessed with the help of checklist. A questionnaire was designed to evaluate knowledge, attitude, and practices of food handlers. Results of the study show that the nutritional and health status of rural and urban preschool children was very poor. Many of the food handlers were not aware of general knowledge and hygiene practices to be followed during food preparation areas. An intervention programme of education and importing training at workplaces has shown a positive impact on the outcome of safety and security practices and safe, hygienic practices of food handlers at workplace.

Keywords: food, health, preschool children, safety, security

Procedia PDF Downloads 199
12765 A Study of Behaviors in Using Social Networks of Corporate Personnel of Suan Sunandha Rajabhat University

Authors: Wipada Chaiwchan

Abstract:

This research aims to study behaviors in using social networks of Corporate personnel of Suan Sunandha Rajabhat University. The sample used in the study were two groups: 1) Academic Officer 70 persons and 2) Operation Officer 143 persons were used in this study. The tools in this research consisted of questionnaire which the data were analyzed by using percentage, average (X) and Standard deviation (S.D.) and Independent Sample T-Test to test the difference between the mean values obtained from two independent samples, and One-way anova to analysis of variance, and Multiple comparisons to test that the average pair of different methods by Fisher’s Least Significant Different (LSD). The study result found that the most of corporate personnel have purpose in using social network to information awareness aspect was knowledge and online conference with social media. By using the average more than 3 hours per day in everyday. Using time in working in one day and there are computers connected to the Internet at home, by using the communication in the operational processes. Behaviors using social networks in relation to gender, age, job title, department, and type of personnel. Hypothesis testing, and analysis of variance for the effects of this analysis is divided into three aspects: The use of online social networks, the attitude of the users and the security analysis has found that Corporate Personnel of Suan Sunandha Rajabhat University. Overall and specifically at the high level, and considering each item found all at a high level. By sorting of the social network (X=3.22), The attitude of the users (X= 3.06) and the security (X= 3.11). The overall behaviors using of each side (X=3.11).

Keywords: social network, behaviors, social media, computer information systems

Procedia PDF Downloads 393
12764 Structural and Microstructural Analysis of White Etching Layer Formation by Electrical Arcing Induced on the Surface of Rail Track

Authors: Ali Ahmed Ali Al-Juboori, H. Zhu, D. Wexler, H. Li, C. Lu, J. McLeod, S. Pannila, J. Barnes

Abstract:

A number of studies have focused on the formation mechanics of white etching layer and its origin in the railway operation. Until recently, the following hypotheses consider the precise mechanics of WELs formation: (i) WELs are the result of thermal process caused by wheel slip; (ii) WELs are mechanically induced by severe plastic deformation; (iii) WELs are caused by a combination of thermo-mechanical process. The mechanisms discussed above lead to occurrence of white etching layers on the area of wheel and rail contact. This is because the contact patch which is the active point of the wheel on the rail is exposed to highest shear stresses which result in localised severe plastic deformation; and highest rate of heat caused by wheel slipe during excessive traction or braking effort. However, if the WELs are not on the running band area, it would suggest that there is another cause of WELs formation. In railway system, particularly electrified railway, arcing phenomenon has been occurring more often and regularly on the rails. In electrified railway, the current is delivered to the train traction motor via contact wires and then returned to the station via the contact between the wheel and the rail. If the contact between the wheel and the rail is temporarily losing, due to dynamic vibration, entrapped dirt or water, lubricant effect or oxidation occurrences, high current can jump through the gap and results in arcing. The other resources of arcing also include the wheel passage the insulated joint and lightning on a train during bad weather. During the arcing, an extensive heat is generated and speared over a large area of top surface of rail. Thus, arcing is considered another heat source in the rail head (rather than wheel slipe) that results in microstructural changes and white etching layer formation. A head hardened (HH) rail steel, cut from a curved rail truck was used for the investigation. Samples were sectioned from a depth of 10 mm below the rail surface, where the material is considered to be still within the hardened layer but away from any microstructural changes on the top surface layer caused by train passage. These samples were subjected to electrical discharges by using Gas Tungsten Arc Welding (GTAW) machine. The arc current was controlled and moved along the samples surface in the direction of travel, as indicated by an arrow. Five different conditions were applied on the surface of the samples. Samples containing pre-existed WELs, taken from ex-service rail surface, were also considered in this study for comparison. Both simulated and ex-serviced WELs were characterised by advanced methods including SEM, TEM, TKD, EDS, XRD. Samples for TEM and TKFD were prepared by Focused Ion Beam (FIB) milling. The results showed that both simulated WELs by electrical arcing and ex-service WEL comprise similar microstructure. Brown etching layer was found with WELs and likely induced by a concurrent tempering process. This study provided a clear understanding of new formation mechanics of WELs which contributes to track maintenance procedure.

Keywords: white etching layer, arcing, brown etching layer, material characterisation

Procedia PDF Downloads 119
12763 Characterization of White Spot Lesion Using Focused Ion Beam - Scanning Electron Microscopy

Authors: Malihe Moeinin, Robert Hill, Ferranti Wong

Abstract:

Background: A white spot lesion (WSL) is defined as subsurface enamel porosity from carious demineralisation on the smooth surfaces of the tooth. It appears as a milky white opacity. Lesions shown an apparently intact surface layer, followed underneath by the more porous lesion body. The small pores within the body of the lesion act as diffusion pathway for both acids and minerals, so allowing the demineralisation of enamel to occur at the advancing front of the lesion. Objectives: The objective is to mapthe porosity and its size on WSL with Focused Ion Bean- Scanning Electron Microscopy (FIB-SEM) Method: The basic method used for FIB-SEM consisted of depositing a one micron thick layer of platinum over 25μmx 25μm of the interest region of enamel. Then, making a rough cut (25μmx 5μmx 20μm) with 3nA current and 30Kv was applied with the help of drift suppression (DS), using a standard “cross-sectional” cutting pattern, which ended at the front of the deposited platinum layer. Two adjacent areas (25μmx 5μmx 20μm) on the both sides of the platinum layer were milled under the same conditions. Subsequent, cleaning cross-sections were applied to polish the sub-surface edge of interest running perpendicular to the surface. The "slice and view" was carried out overnight for milling almost 700 slices with 2Kv and 4nA and taking backscattered (BS) images. Then, images were imported into imageJ and analysed. Results: The prism structure is clearly apparent on FIB-SEM slices of WSL with the dissolution of prism boundaries as well as internal porosity within the prism itself. Porosity scales roughly 100-400nm, which is comparable to the light wavelength (500nm). Conclusion: FIB-SEM is useful to characterize the porosity of WSL and it clearly shows the difference between WSL and normal enamel.

Keywords: white spot lesion, FIB-SEM, enamel porosity, porosity

Procedia PDF Downloads 89
12762 National Security Threat and Fear of Rising Islamic Extremism in Bangladesh due to Influx of Rohingya Refugees

Authors: Afsana Afsar Tuly

Abstract:

The Rohingyas are a group of minority Muslimsin Myanmar who witnessed series of persecution, violence, and torture from Burmese military since 1948. In 2017, around 700,000 Rohingyas fled to the neighboring country Bangladesh and took shelter as refugees after facing clashes with Myanmar security forces. The number increased to 1.8 million in 2020, creating one of the largest refugee crises of recent times. This research focuses on the vulnerability and poverty faced by Rohingyas in refugee camps and how thelack of long-term solution and silence from international communitycan pose national security threat and increasing Islamic extremism in Bangladesh. Islamic religious and terrorist groups have used the Rohingyas position as stateless people to influence them into speaking against the secular government of Bangladesh. There has been increasing crime rates and formation of different rebel groups in refugee camps, causing clashes with Bangladeshi police and authority. Human trafficking, illegal drug dealings, prostitution, and other illicit activities have continuously gone up in the southeastern part of Bangladesh. Some economic, social, and environmental factors are studied and analyzed to show the change in Bangladesh between 2017 and 2020.

Keywords: national security threat, islamic extremism, rohingya refugees, refugee studies, Bangladesh, myanmar

Procedia PDF Downloads 139
12761 Height of Highway Embankment for Tolerable Residual Settlement of Loose Cohesionless Subsoil Overlain by Stronger Soil

Authors: Sharifullah Ahmed

Abstract:

Residual settlement of cohesionless or non-plastic soil of different strength underlying highway embankment overlain by stronger soil layer highway embankment is studied. A parametric study is carried out for different height of embankment and for different ESAL factor. The sum of elastic settlements of cohesionless subsoil due to axle induced stress and due to self-weight of pavement layers is termed as the residual settlement. The values of residual settlement (Sr) for different heights of road embankment (He) are obtained and presented as design charts for different SPT Value (N60) and ESAL factor. For rigid pavement and flexible pavement in approach to bridge or culvert, the tolerable residual settlement is 0.100m. This limit is taken as 0.200m for flexible pavement in general sections of highway without approach to bridge or culvert. A simplified guideline is developed for design of highway embankment underlain by very loose to loose cohesionless subsoil overlain by a stronger soil layer for limiting value of the residual settlement. In the current research study range of ESAL factor is 1-10 and range of SPT value (N60) is 1-10. That is found that, ground improvement is not required if the overlying stronger layer is minimum 1.5m and 4.0m for general road section of flexible pavement except bridge or culvert approach and for rigid pavement or flexible pavement in bridge or culvert approach. Tables and charts are included in the prepared guideline to obtain minimum allowable height of highway embankment to limit the residual settlement with in mentioned tolerable limit. Allowable values of the embankment height (He) are obtained corresponding to tolerable or limiting level of the residual settlement of loose subsoil for different SPT value, thickness of stronger layer (d) and ESAL factor. The developed guideline is may be issued to be used in assessment of the necessity of ground improvement in case of cohesionless subsoil underlying highway embankment overlain by stronger subsoil layer for limiting residual settlement. The ground improvement is only to be required if the residual settlement of subsoil is more than tolerable limit.

Keywords: axle pressure, equivalent single axle load, ground improvement, highway embankment, tolerable residual settlement

Procedia PDF Downloads 124
12760 Cryptography Based Authentication Methods

Authors: Mohammad A. Alia, Abdelfatah Aref Tamimi, Omaima N. A. Al-Allaf

Abstract:

This paper reviews a comparison study on the most common used authentication methods. Some of these methods are actually based on cryptography. In this study, we show the main cryptographic services. Also, this study presents a specific discussion about authentication service, since the authentication service is classified into several categorizes according to their methods. However, this study gives more about the real life example for each of the authentication methods. It talks about the simplest authentication methods as well about the available biometric authentication methods such as voice, iris, fingerprint, and face authentication.

Keywords: information security, cryptography, system access control, authentication, network security

Procedia PDF Downloads 465
12759 An in silico Approach for Exploring the Intercellular Communication in Cancer Cells

Authors: M. Cardenas-Garcia, P. P. Gonzalez-Perez

Abstract:

Intercellular communication is a necessary condition for cellular functions and it allows a group of cells to survive as a population. Throughout this interaction, the cells work in a coordinated and collaborative way which facilitates their survival. In the case of cancerous cells, these take advantage of intercellular communication to preserve their malignancy, since through these physical unions they can send signs of malignancy. The Wnt/β-catenin signaling pathway plays an important role in the formation of intercellular communications, being also involved in a large number of cellular processes such as proliferation, differentiation, adhesion, cell survival, and cell death. The modeling and simulation of cellular signaling systems have found valuable support in a wide range of modeling approaches, which cover a wide spectrum ranging from mathematical models; e.g., ordinary differential equations, statistical methods, and numerical methods– to computational models; e.g., process algebra for modeling behavior and variation in molecular systems. Based on these models, different simulation tools have been developed from mathematical ones to computational ones. Regarding cellular and molecular processes in cancer, its study has also found a valuable support in different simulation tools that, covering a spectrum as mentioned above, have allowed the in silico experimentation of this phenomenon at the cellular and molecular level. In this work, we simulate and explore the complex interaction patterns of intercellular communication in cancer cells using the Cellulat bioinformatics tool, a computational simulation tool developed by us and motivated by two key elements: 1) a biochemically inspired model of self-organizing coordination in tuple spaces, and 2) the Gillespie’s algorithm, a stochastic simulation algorithm typically used to mimic systems of chemical/biochemical reactions in an efficient and accurate way. The main idea behind the Cellulat simulation tool is to provide an in silico experimentation environment that complements and guides in vitro experimentation in intra and intercellular signaling networks. Unlike most of the cell signaling simulation tools, such as E-Cell, BetaWB and Cell Illustrator which provides abstractions to model only intracellular behavior, Cellulat is appropriate for modeling both intracellular signaling and intercellular communication, providing the abstractions required to model –and as a result, simulate– the interaction mechanisms that involve two or more cells, that is essential in the scenario discussed in this work. During the development of this work we made evident the application of our computational simulation tool (Cellulat) for the modeling and simulation of intercellular communication between normal and cancerous cells, and in this way, propose key molecules that may prevent the arrival of malignant signals to the cells that surround the tumor cells. In this manner, we could identify the significant role that has the Wnt/β-catenin signaling pathway in cellular communication, and therefore, in the dissemination of cancer cells. We verified, using in silico experiments, how the inhibition of this signaling pathway prevents that the cells that surround a cancerous cell are transformed.

Keywords: cancer cells, in silico approach, intercellular communication, key molecules, modeling and simulation

Procedia PDF Downloads 248
12758 Outdoor Physical Play as Critical to Early Childhood Development: Findings from Saudi Arabia

Authors: Rana S. Alghamdi

Abstract:

Play in early childhood education has been stifled across the world due to an overemphasis on academic achievement and a reduced focus on physical play and motor development. In Saudi Arabia, teachers reticent to allocate more time to play for fear of retribution from parents and administrators that children are losing academic seat time. This practice has proven to be detrimental to the social, emotional, physical, and cognitive development of children. Teachers are pressured to prioritize Arabic, math, and science while providing minimal time for physical activities. Administrators tend to push for an ever-increasing emphasis on academia in order to achieve higher test scores. However, young children often find it difficult to concentrate if they are not able to get out energy through physical play. Furthermore, many youth educators are not qualified to oversee physical activities, and many facilities are unprepared for safe, outdoor play. This results in children getting little to no outdoor activity. They are stuck in a strict academic regimen that may dampen the creativity and imagination easily fostered through cooperative play. For a stronger educational system and more well-rounded students, Saudi schools should enact policies that extend the number of required hours dedicated to outdoor and physical play. They should also offer training for unqualified teachers. This training should focus on the benefits of physical play and instruct them on how to facilitate these activities safely and effectively. School administrators must focus on providing adequate equipment and safe environments for the purpose of outdoor play and education. In doing so, they will be setting their students up for a successful future and improving their abilities in all aspects of education.

Keywords: early childhood education, play, outdoor, Saudi Arabia

Procedia PDF Downloads 147
12757 Communication About Health and Fitness in Media and Its Hidden Message About Objectification

Authors: Emiko Suzuki

Abstract:

Although fitness is defined as the body’s ability to respond to the demand of physical activity without undue fatigue in health science, in media oftentimes physical activity is presented as means to an attractive body rather than a fit and healthy one. Of all types of media, Instagram is becoming an increasingly persuasive source of information and advice on health and fitness, where individuals conceptualize what health and fitness mean for them. However, this user-generated and unregulated platform can be problematic, as it can communicate misleading information about health and fitness and possibly leading individuals to psychological problems such as eating disorders. In fact, previous research has shown that some messages that were posted with a tag that related to inspire others to do fitness, in fact, encouraged distancing the self from the internal needs of the body. For this reason, this present study aims to explore how health and fitness are communicated on Instagram by analyzing images and texts. A content analysis of images that were labeled with particular hashtags was performed, followed by a thematic analysis of texts from the same set of images. The result shows an interesting insight about messages about how health and fitness are communicated from companies through media, then digested and further shared among communities on Instagram. The study explores how the use of visual focused way of communicating health and fitness can lead to the dehumanization of human bodies.

Keywords: Instagram, fitness, dehumanization, body image, embodiment

Procedia PDF Downloads 133
12756 Defining the Turbulent Coefficients with the Effect of Atmospheric Stability in Wake of a Wind Turbine Wake

Authors: Mohammad A. Sazzad, Md M. Alam

Abstract:

Wind energy is one of the cleanest form of renewable energy. Despite wind industry is growing faster than ever there are some roadblocks towards the improvement. One of the difficulties the industry facing is insufficient knowledge about wake within the wind farms. As we know energy is generated in the lowest layer of the atmospheric boundary layer (ABL). This interaction between the wind turbine (WT) blades and wind introduces a low speed wind region which is defined as wake. This wake region shows different characteristics under each stability condition of the ABL. So, it is fundamental to know this wake region well which is defined mainly by turbulence transport and wake shear. Defining the wake recovery length and width are very crucial for wind farm to optimize the generation and reduce the waste of power to the grid. Therefore, in order to obtain the turbulent coefficients of velocity and length, this research focused on the large eddy simulation (LES) data for neutral ABL (NABL). According to turbulent theory, if we can present velocity defect and Reynolds stress in the form of local length and velocity scales, they become invariant. In our study velocity and length coefficients are 0.4867 and 0.4794 respectively which is close to the theoretical value of 0.5 for NABL. There are some invariant profiles because of the presence of thermal and wind shear power coefficients varied a little from the ideal condition.

Keywords: atmospheric boundary layer, renewable energy, turbulent coefficient, wind turbine, wake

Procedia PDF Downloads 130
12755 Automatic Speech Recognition Systems Performance Evaluation Using Word Error Rate Method

Authors: João Rato, Nuno Costa

Abstract:

The human verbal communication is a two-way process which requires a mutual understanding that will result in some considerations. This kind of communication, also called dialogue, besides the supposed human agents it can also be performed between human agents and machines. The interaction between Men and Machines, by means of a natural language, has an important role concerning the improvement of the communication between each other. Aiming at knowing the performance of some speech recognition systems, this document shows the results of the accomplished tests according to the Word Error Rate evaluation method. Besides that, it is also given a set of information linked to the systems of Man-Machine communication. After this work has been made, conclusions were drawn regarding the Speech Recognition Systems, among which it can be mentioned their poor performance concerning the voice interpretation in noisy environments.

Keywords: automatic speech recognition, man-machine conversation, speech recognition, spoken dialogue systems, word error rate

Procedia PDF Downloads 317
12754 Improving Security Features of Traditional Automated Teller Machines-Based Banking Services via Fingerprint Biometrics Scheme

Authors: Anthony I. Otuonye, Juliet N. Odii, Perpetual N. Ibe

Abstract:

The obvious challenges faced by most commercial bank customers while using the services of ATMs (Automated Teller Machines) across developing countries have triggered the need for an improved system with better security features. Current ATM systems are password-based, and research has proved the vulnerabilities of these systems to heinous attacks and manipulations. We have discovered by research that the security of current ATM-assisted banking services in most developing countries of the world is easily broken and maneuvered by fraudsters, majorly because it is quite difficult for these systems to identify an impostor with privileged access as against the authentic bank account owner. Again, PIN (Personal Identification Number) code passwords are easily guessed, just to mention a few of such obvious limitations of traditional ATM operations. In this research work also, we have developed a system of fingerprint biometrics with PIN code Authentication that seeks to improve the security features of traditional ATM installations as well as other Banking Services. The aim is to ensure better security at all ATM installations and raise the confidence of bank customers. It is hoped that our system will overcome most of the challenges of the current password-based ATM operation if properly applied. The researchers made use of the OOADM (Object-Oriented Analysis and Design Methodology), a software development methodology that assures proper system design using modern design diagrams. Implementation and coding were carried out using Visual Studio 2010 together with other software tools. Results obtained show a working system that provides two levels of security at the client’s side using a fingerprint biometric scheme combined with the existing 4-digit PIN code to guarantee the confidence of bank customers across developing countries.

Keywords: fingerprint biometrics, banking operations, verification, ATMs, PIN code

Procedia PDF Downloads 35
12753 Soliton Solutions in (3+1)-Dimensions

Authors: Magdy G. Asaad

Abstract:

Solitons are among the most beneficial solutions for science and technology for their applicability in physical applications including plasma, energy transport along protein molecules, wave transport along poly-acetylene molecules, ocean waves, constructing optical communication systems, transmission of information through optical fibers and Josephson junctions. In this talk, we will apply the bilinear technique to generate a class of soliton solutions to the (3+1)-dimensional nonlinear soliton equation of Jimbo-Miwa type. Examples of the resulting soliton solutions are computed and a few solutions are plotted.

Keywords: Pfaffian solutions, N-soliton solutions, soliton equations, Jimbo-Miwa

Procedia PDF Downloads 448
12752 Environmental Modeling of Storm Water Channels

Authors: L. Grinis

Abstract:

Turbulent flow in complex geometries receives considerable attention due to its importance in many engineering applications. It has been the subject of interest for many researchers. Some of these interests include the design of storm water channels. The design of these channels requires testing through physical models. The main practical limitation of physical models is the so called “scale effect”, that is, the fact that in many cases only primary physical mechanisms can be correctly represented, while secondary mechanisms are often distorted. These observations form the basis of our study, which centered on problems associated with the design of storm water channels near the Dead Sea, in Israel. To help reach a final design decision we used different physical models. Our research showed good coincidence with the results of laboratory tests and theoretical calculations, and allowed us to study different effects of fluid flow in an open channel. We determined that problems of this nature cannot be solved only by means of theoretical calculation and computer simulation. This study demonstrates the use of physical models to help resolve very complicated problems of fluid flow through baffles and similar structures. The study applies these models and observations to different construction and multiphase water flows, among them, those that include sand and stone particles, a significant attempt to bring to the testing laboratory a closer association with reality.

Keywords: open channel, physical modeling, baffles, turbulent flow

Procedia PDF Downloads 283
12751 Energy and Exergy Analyses of Thin-Layer Drying of Pineapple Slices

Authors: Apolinar Picado, Steve Alfaro, Rafael Gamero

Abstract:

Energy and exergy analyses of thin-layer drying of pineapple slices (Ananas comosus L.) were conducted in a laboratory tunnel dryer. Drying experiments were carried out at three temperatures (100, 115 and 130 °C) and an air velocity of 1.45 m/s. The effects of drying variables on energy utilisation, energy utilisation ratio, exergy loss and exergy efficiency were studied. The enthalpy difference of the gas increased as the inlet gas temperature increase. It is observed that at the 75 minutes of the drying process the outlet gas enthalpy achieves a maximum value that is very close to the inlet value and remains constant until the end of the drying process. This behaviour is due to the reduction of the total enthalpy within the system, or in other words, the reduction of the effective heat transfer from the hot gas flow to the vegetable being dried. Further, the outlet entropy exhibits a significant increase that is not only due to the temperature variation, but also to the increase of water vapour phase contained in the hot gas flow. The maximum value of the exergy efficiency curve corresponds to the maximum value observed within the drying rate curves. This maximum value represents the stage when the available energy is efficiently used in the removal of the moisture within the solid. As the drying rate decreases, the available energy is started to be less employed. The exergetic efficiency was directly dependent on the evaporation flux and since the convective drying is less efficient that other types of dryer, it is likely that the exergetic efficiency has relatively low values.

Keywords: efficiency, energy, exergy, thin-layer drying

Procedia PDF Downloads 249
12750 Direct Oxidation Synthesis for a Dual-Layer Silver/Silver Orthophosphate with Controllable Tetrahedral Structure as an Active Photoanode for Solar-Driven Photoelectrochemical Water Splitting

Authors: Wen Cai Ng, Saman Ilankoon, Meng Nan Chong

Abstract:

The vast increase in global energy demand, coupled with the growing concerns on environmental issues, has triggered the search for cleaner alternative energy sources. In view of this, the photoelectrochemical (PEC) water splitting offers a sustainable hydrogen (H2) production route that only requires solar energy, water, and PEC system operating in an ambient environment. However, the current advancement of PEC water splitting technologies is still far from the commercialization benchmark indicated by the solar-to-H2 (STH) efficiency of at least 10 %. This is largely due to the shortcomings of photoelectrodes used in the PEC system, such as the rapid recombination of photogenerated charge carriers and limited photo-responsiveness in the visible-light spectrum. Silver orthophosphate (Ag3PO4) possesses many desirable intrinsic properties for the fabrication into photoanode used in PEC systems, such as narrow bandgap of 2.4 eV and low valence band (VB) position. Hence, in this study, a highly efficient Ag3PO4-based photoanode was synthesized and characterized. The surface of the Ag foil substrate was directly oxidized to fabricate a top layer composed of {111}-bound Ag3PO4 tetrahedrons layer with a porous structure, forming the dual-layer Ag/Ag3PO4 photoanode. Furthermore, the key synthesis parameters were systematically investigated by varying the concentration ratio of capping agent-to-precursor (R), the volume ratio of hydrogen peroxide (H2O2)-to-water, and reaction period. Results showed that the optimized dual-layer Ag/Ag3PO4 photoanode achieved a photocurrent density as high as 4.19 mA/cm2 at 1 V vs. Ag/AgCl for the R-value of 4, the volume ratio of H2O2-to-water of 3:5 and 20 h reaction period. The current work provides a solid foundation for further nanoarchitecture modification strategies on Ag3PO4-based photoanodes for more efficient PEC water splitting applications. This piece of information needs to be backed up by evidence; therefore, you need to provide a reference. As the abstract should be self-contained, all information requiring a reference should be removed. This is a fact known to the area of research, and not necessarily required a reference to support.

Keywords: solar-to-hydrogen fuel, photoelectrochemical water splitting, photoelectrode, silver orthophosphate

Procedia PDF Downloads 117
12749 Free Vibration Analysis of Symmetric Sandwich Beams

Authors: Ibnorachid Zakaria, El Bikri Khalid, Benamar Rhali, Farah Abdoun

Abstract:

The aim of the present work is to study the linear free symmetric vibration of three-layer sandwich beam using the energy method. The zigzag model is used to describe the displacement field. The theoretical model is based on the top and bottom layers behave like Euler-Bernoulli beams while the core layer like a Timoshenko beam. Based on Hamilton’s principle, the governing equation of motion sandwich beam is obtained in order to calculate the linear frequency parameters for a clamped-clamped and simple supported-simple-supported beams. The effects of material properties and geometric parameters on the natural frequencies are also investigated.

Keywords: linear vibration, sandwich, shear deformation, Timoshenko zig-zag model

Procedia PDF Downloads 470
12748 Individual Physiological and Psycho-Physical Response on Predicting Thermal Comfort in Transient Environments: A Literature Review

Authors: Fatemeh Deldarabdolmaleki, Nur Dalilah Dahlan, Farzad Hejazi

Abstract:

Human individual physiological and psycho-physical responses widely affect thermal comfort and preferences. They should be carefully researched to help improve the design and comfort of indoor environments. This paper aims to explore and test the degree and importance of individual physiological and psycho-physical differences, reviewing the most preferred, neutral, and comfortable temperature in previous studies conducted across the world. Basic individual physiological differences like gender, age, BMI and etc., have been the focus of this research. There is no unique consensus in the literature to date in regard to providing a universal thermal comfort formula that meets all individual physiological and psycho-physical needs. In order to achieve a balanced, thermally comfortable indoor environment, studying and evaluating individual needs in different parts of the world could be helpful. Even though personalized comfort systems in indoor environments sound promising, they might not be easily achieved in bigger office interiors, considering the cost and current open-plan office trends.

Keywords: thermal comfort, indoor environments, occupants' physiological response, occupants psycho-physical response

Procedia PDF Downloads 69
12747 Governance, Risk Management, and Compliance Factors Influencing the Adoption of Cloud Computing in Australia

Authors: Tim Nedyalkov

Abstract:

A business decision to move to the cloud brings fundamental changes in how an organization develops and delivers its Information Technology solutions. The accelerated pace of digital transformation across businesses and government agencies increases the reliance on cloud-based services. They are collecting, managing, and retaining large amounts of data in cloud environments makes information security and data privacy protection essential. It becomes even more important to understand what key factors drive successful cloud adoption following the commencement of the Privacy Amendment Notifiable Data Breaches (NDB) Act 2017 in Australia as the regulatory changes impact many organizations and industries. This quantitative correlational research investigated the governance, risk management, and compliance factors contributing to cloud security success. The factors influence the adoption of cloud computing within an organizational context after the commencement of the NDB scheme. The results and findings demonstrated that corporate information security policies, data storage location, management understanding of data governance responsibilities, and regular compliance assessments are the factors influencing cloud computing adoption. The research has implications for organizations, future researchers, practitioners, policymakers, and cloud computing providers to meet the rapidly changing regulatory and compliance requirements.

Keywords: cloud compliance, cloud security, data governance, privacy protection

Procedia PDF Downloads 111
12746 Feedback of Using Set-Up Candid Clips as New Media

Authors: Miss Suparada Prapawong

Abstract:

The objectives were to analyze the using of new media in the form of set up candid clip that affects the product and presenter, to study the effectiveness of using new media in the form of set up candid clip in order to increase the circulation and audience satisfaction and to use the earned information and knowledge to develop the communication for publicizing and advertising via new media. This research is qualitative research based on questionnaire and in-depth interview from experts. The findings showed the advantages and disadvantages of communication for publicizing and advertising via new media in the form of set up candid clip including with the specific target group for this kind of advertising. It will be useful for fields of publicizing and advertising in the new media forms at the present.

Keywords: candid clip, communication, new media, social network

Procedia PDF Downloads 304
12745 Intrusion Detection in Cloud Computing Using Machine Learning

Authors: Faiza Babur Khan, Sohail Asghar

Abstract:

With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.

Keywords: cloud security, threats, machine learning, random forest, classification

Procedia PDF Downloads 317
12744 Physical Health, Depression and Related Factors for Elementary School Students in Seoul, South Korea

Authors: Kyung-Sook Bang

Abstract:

Background: The health status of school-age children has a great influence on their growth and life-long health. The purposes of this study were to identify physical and mental health status of late school-age children in Seoul, South Korea and to investigate the related factors for their health. Methods: After gaining the approval from Institutional Review Board (IRB), a cross-sectional study was conducted with elementary students in grade 4 or 5. Questionnaires were distributed to eight elementary schools located different regions of Seoul in November, 2016, and 302 participants were finally included. From all participants, informed consents from the parents, and assents from children were received. Children's socioeconomic status, family functioning, peer relations, physical health symptoms, and depression were measured with self-reported questionnaires. Data were analyzed with descriptive statistics, t-test, Pearson’s correlations, and multiple regression. Results: Children's physical health symptoms and depression were not significantly different, and only their peer relations were significantly different according to their socioeconomic status (t=-3.93, p<.001). Depression showed significant positive correlation with physical health symptoms (r=.720, p<.001) and negative correlations with family functioning (r=-.428, p<.001) and peer relations (r=-.775, p<.001). The multiple regression model, which explained 73.5% of variance, showed peer relations (r2 =.604), physical health symptoms (r2 change=.125), and family functioning (r2 change=.005) as significant predictors for depression. Only the peer relations was significant predictor for their physical health symptoms and explained 50.6% of it. Conclusions: The peer relations was the most important factor in their physical and mental health at this age, and it can be affected by their socioeconomic status. Nursing interventions for promoting social relations and family functioning are required to improve children’s physical and mental health, especially for vulnerable population.

Keywords: child, depression, health, peer relation

Procedia PDF Downloads 223
12743 Predicting Intentions of Physical Activity in Patients with Coronary Artery Disease: Attitudes, Subjective Norms and Perceived Behavioral Control

Authors: Shadi Kanan, Ghada Shahrour, Barbara Broome, Donna Bernert, Muntaha Alibrahim, Dana Hansen

Abstract:

Coronary artery disease is responsible for over 7 million deaths a year worldwide. In developing countries, such as Jordan, the incidence of coronary artery disease exceeds that of developed countries. One contributing factor to this disparity is decreased physical activity among the population, for reasons related to specific cultural and religious values. Using the theory of planned behaviour, the purpose of this study was to investigate the intentions of Jordanian patients with coronary artery disease regarding physical activity. A total of 109 patients with coronary artery disease were recruited for this cross-sectional study from King Abdullah University Hospital in Jordan. A 15-item questionnaire based on the theory of planned behaviour was used to assess participants’ attitudes, subjective norms, perceived behavioural control and intentions towards engagement in physical activity. Perceived behavioural control was found to have the strongest significant relationship with participants’ intentions to engage in physical activity. Barriers to physical activity included lack of time, lack of support from family or friends, and feelings of exhaustion. Lifestyle interventions for patients with coronary artery disease should focus on fostering a sense of control over the environment to encourage patients to engage in physical activity.

Keywords: coronary artery disease, perceived behavioural control, subjective norms, theory of planned behaviour

Procedia PDF Downloads 158
12742 Drying Modeling of Banana Using Cellular Automata

Authors: M. Fathi, Z. Farhaninejad, M. Shahedi, M. Sadeghi

Abstract:

Drying is one of the oldest preservation methods for food and agriculture products. Appropriate control of operation can be obtained by modeling. Limitation of continues models for complex boundary condition and non-regular geometries leading to appearance of discrete novel methods such as cellular automata, which provides a platform for obtaining fast predictions by rule-based mathematics. In this research a one D dimensional CA was used for simulating thin layer drying of banana. Banana slices were dried with a convectional air dryer and experimental data were recorded for validating of final model. The model was programmed by MATLAB, run for 70000 iterations and von-Neumann neighborhood. The validation results showed a good accordance between experimental and predicted data (R=0.99). Cellular automata are capable to reproduce the expected pattern of drying and have a powerful potential for solving physical problems with reasonable accuracy and low calculating resources.

Keywords: banana, cellular automata, drying, modeling

Procedia PDF Downloads 433
12741 Comparative Forensic Analysis of Lipsticks Using Thin Layer Chromatography and Gas Chromatography

Authors: M. O. Ezegbogu, H. B. Osadolor

Abstract:

Lipsticks constitute a significant source of transfer evidence, and can, therefore, provide corroborative or inclusionary evidence in criminal investigation. This study aimed to determine the uniqueness and persistence of different lipstick smears using Thin Layer Chromatography (TLC), and Gas Chromatography with a Flame Ionisation Detector (GC-FID). In this study, we analysed lipstick smears retrieved from tea cups exposed to the environment for up to four weeks. The n-alkane content of each sample was determined using GC-FID, while TLC was used to determine the number of bands, and retention factor of each band per smear. This study shows that TLC gives more consistent results over a 4-week period than GC-FID. It also proposes a maximum exposure time of two weeks for the analysis of lipsticks left in the open using GC-FID. Finally, we conclude that neither TLC nor GC-FID can distinguish lipstick evidence recovered from hypothetical crime scenes.

Keywords: forensic science, chromatography, identification, lipstick

Procedia PDF Downloads 181
12740 The Construction of Multilingual Online Gaming Community

Authors: Dina Alnefaie

Abstract:

This poster presents a study of a Discord private server with thirteen multilingual gamers, aiming to explore the elements that construct a multilingual online gaming community. The study focuses on the communication practices of four Saudi female and male gamers, using various data collection methods, including online observations through recorded videos and screenshots, interviews, and informal conversations for one year. The primary findings show that translanguaging was a prominent feature of their verbal and textual communication practices. Besides, these practices that mostly accompany cultural ones were used to facilitate communication and express their identities in an intercultural context.

Keywords: online community construction, perceptions, multilingualism, digital identity

Procedia PDF Downloads 82
12739 Set Up Candid Clips Effectiveness

Authors: P. Suparada, D. Eakapotch

Abstract:

The objectives were to analyze the using of new media in the form of set up candid clip that affects the product and presenter, to study the effectiveness of using new media in the form of set up candid clip in order to increase the circulation and audience satisfaction and to use the earned information and knowledge to develop the communication for publicizing and advertising via new media. This research is qualitative research based on questionnaire and in-depth interview from experts. The findings showed the advantages and disadvantages of communication for publicizing and advertising via new media in the form of set up candid clip including with the specific target group for this kind of advertising. It will be useful for fields of publicizing and advertising in the new media forms at the present.

Keywords: candid clip, communication, new media, social network

Procedia PDF Downloads 243