Search results for: employee security behavior
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9348

Search results for: employee security behavior

7908 Radio Based Location Detection

Authors: M. Pallikonda Rajasekaran, J. Joshapath, Abhishek Prasad Shaw

Abstract:

Various techniques has been employed to find location such as GPS, GLONASS, Galileo, and Beidou (compass). This paper currently deals with finding location using the existing FM signals that operates between 88-108 MHz. The location can be determined based on the received signal strength of nearby existing FM stations by mapping the signal strength values using trilateration concept. Thus providing security to users data and maintains eco-friendly environment at zero installation cost as this technology already existing FM stations operating in commercial FM band 88-108 MHZ. Along with the signal strength based trilateration it also finds azimuthal angle of the transmitter by employing directional antenna like Yagi-Uda antenna at the receiver side.

Keywords: location, existing FM signals, received signal strength, trilateration, security, eco-friendly, direction, privacy, zero installation cost

Procedia PDF Downloads 501
7907 A Watermarking Signature Scheme with Hidden Watermarks and Constraint Functions in the Symmetric Key Setting

Authors: Yanmin Zhao, Siu Ming Yiu

Abstract:

To claim the ownership for an executable program is a non-trivial task. An emerging direction is to add a watermark to the program such that the watermarked program preserves the original program’s functionality and removing the watermark would heavily destroy the functionality of the watermarked program. In this paper, the first watermarking signature scheme with the watermark and the constraint function hidden in the symmetric key setting is constructed. The scheme uses well-known techniques of lattice trapdoors and a lattice evaluation. The watermarking signature scheme is unforgeable under the Short Integer Solution (SIS) assumption and satisfies other security requirements such as the unremovability security property.

Keywords: short integer solution (SIS) problem, symmetric-key setting, watermarking schemes, watermarked signatures

Procedia PDF Downloads 113
7906 Development of an Indigenous Motorized Planter for the Sustainable Production of Grain Crops in Nigeria

Authors: Babatunde Oluwamayokun Soyoye

Abstract:

This technology, whose development revolves round culture, tradition, and prevailing needs of the people, is seen as a solution in promoting development in poor rural communities in many parts of Nigeria. The research was based on one of the food security agenda of the Federal Government of Nigeria by developing a motorized multi-grain crop planter suitable for planting operations in tropical soils. The ergonomic design is tailored towards the ease of planting operations for would-be users, improve crop yields and profitability by minimizing the cost of production. Some properties of the grain crops were determined and were used to develop and assemble the locally-made motorized planter. These properties were used in establishing the design criteria of various components of the planter. The geometric mean diameter of the maize, cowpea, groundnut, and soybean were 8.26 mm, 8.72 mm, 9.51 mm and 6.52 mm respectively, with respective groove depths of 8 mm, 7 mm, 9 mm and 6 mm. The results obtained from the evaluation of the planter confirmed that the planter has a uniform discharge and application rates. The field capacity of the planter was determined to be 0.187 ha/h. Also, the average performance efficiency of the planter was 95.5%, with the average discharge and application rates of 7.86 kg/h and 42.1 kg/ha, respectively. The motorized multi-grain planter can be used in increasing food production, reduce time, cost of production, and can become a major tool to fast-track the food security agenda of the government of Nigeria.

Keywords: design and fabrication, food security, grain crop, motorized planter

Procedia PDF Downloads 119
7905 Investigation of Heating Behaviour of E-Textile Structures

Authors: Hande Sezgin, Senem Kursun Bahadır, Yakup Erhan Boke, Fatma Kalaoğlu

Abstract:

Electronic textiles (e-textiles) are fabrics that contain electronics and interconnections with them. In this study, two types of base yarns (cotton and acrylic) and three conductive steel yarns with different linear resistance values (14Ω/m, 30Ω/m, 70Ω/m) were used to investigate the effect of base yarn type and linear resistance of conductive yarns on thermal behavior of e-textile structures. Thermal behavior of samples were examined by thermal camera.

Keywords: conductive yarn, e-textiles, smart textiles, thermal analysis

Procedia PDF Downloads 534
7904 Marketing Mix Factor Affecting Decision Making Behavior in Using Fitness Service

Authors: Siri-Orn Champatong

Abstract:

The objectives of this research were to study the attitude of service marketing mix that affected the decision making behavior to use fitness service in case of the fitness in Thailand. This study employed by survey research and questionnaire was used to collect the data from 400 of consumers who have used the service and interested in using the service in the future. The descriptive statistics and multiple regression analysis were used to analyze data. The results revealed that the attitude toward overall marketing mix was at moderate level. For particulars, attitude toward product and service aspects were at good level, however, attitude toward price, place, promotion, people, physical evidence and service quality aspects were at moderate level. The hypothesis testing results showed that attitude toward each aspect affected word of mouth, however, attitude toward product and service, place, promotion, people and physical evidence affected tendency to use fitness service at .05 statistically significant level.

Keywords: decision making behavior, fitness, marketing mix, marketing service

Procedia PDF Downloads 317
7903 Literature Review and Evaluation of the Internal Marketing Theory

Authors: Hsiao Hsun Yuan

Abstract:

Internal marketing was proposed in 1970s. The theory of the concept has continually changed over the past forty years. This study discussed the following themes: the definition and implication of internal marketing, the progress of its development, and the evolution of its theoretical model. Moreover, the study systematically organized the strategies of the internal marketing theory adopted on enterprise and how they were put into practice. It also compared the empirical studies focusing on how the existent theories influenced the important variables of internal marketing. The results of this study are expected to serve as references for future exploration of the boundary and studies aiming at how internal marketing is applied to different types of enterprises.

Keywords: corporate responsibility, employee organizational performance, internal marketing, internal customer

Procedia PDF Downloads 337
7902 A Study of Relationship between Leadership Style and Organisational Culture in Private Organisations

Authors: Shreya Sirohi, Vineeta Sirohi

Abstract:

In the 21st century, the nature of work has become quite complex and dynamic, and in response to this, the organizational culture continues to change and develop new perspectives. Organizational culture and leadership are important elements of any organization. Organization’s performance and success to a large extent, depend upon these two factors. The ability of a leader lies in confronting with the challenge of evolving and adapting the culture of the organization as per the situational demands. Leadership and organizational culture are conceptually intertwined. Leadership is a key ingredient for the successful transformation of any organization, and a favorable organizational culture helps to motivate the employees towards their work. Organizational culture and leadership style plays a crucial role in achieving the specified objectives of an organization. The harmony between culture and leader within organization undoubtedly affects relationships, processes, and employee performance. The present investigation aimed to study the Leadership style and Organisational Culture of private organizations and the relationship between the two. The study was carried out on a sample of 100 employees from five private organizations located in the cities of Gurgaon and Delhi in India. The data was collected by employing organisational culture profile and multifactor leadership questionnaire. The findings of the study indicate that the selected organizations had dominant transformation leadership style, whereas the organizational culture varied from one organization to another. However, technocratic culture was found to be prominent, followed by entrepreneurial organizational culture. A low positive correlation was found between leadership style and organizational culture. The transformational leaders have a positive and significant relationship with employee’s satisfaction, productivity, and organization’s culture. The leaders practicing transformational leadership style inspire their followers, are innovative and are aware of their needs as well as of their followers. Such leadership style has a positive impact both on employees and working culture. Employees of such organization are able to come up with innovative ideas and are efficient in handling situations and making effective decisions. However, low correlation is self indicative of the fact that a single leadership style or a single culture type alone cannot contribute solely towards the growth of an organization. There is a need to blend the culture types and leadership styles suiting the needs of the organization. Organisational culture represents the deeper values and beliefs of the employees and influences organizational performance; hence, the leader has a crucial role to play in creating and managing organizational culture in aligning to the requirements of the present era of competitiveness, globalization and technological advancement.

Keywords: leadership style, organizational culture, technocratic, transformational

Procedia PDF Downloads 122
7901 Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure

Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh

Abstract:

Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.

Keywords: anonymity, authentication, Internet of Things, lightweight, un-traceability

Procedia PDF Downloads 275
7900 Navigating through Organizational Change: TAM-Based Manual for Digital Skills and Safety Transitions

Authors: Margarida Porfírio Tomás, Paula Pereira, José Palma Oliveira

Abstract:

Robotic grasping is advancing rapidly, but transferring techniques from rigid to deformable objects remains a challenge. Deformable and flexible items, such as food containers, demand nuanced handling due to their changing shapes. Bridging this gap is crucial for applications in food processing, surgical robotics, and household assistance. AGILEHAND, a Horizon project, focuses on developing advanced technologies for sorting, handling, and packaging soft and deformable products autonomously. These technologies serve as strategic tools to enhance flexibility, agility, and reconfigurability within the production and logistics systems of European manufacturing companies. Key components include intelligent detection, self-adaptive handling, efficient sorting, and agile, rapid reconfiguration. The overarching goal is to optimize work environments and equipment, ensuring both efficiency and safety. As new technologies emerge in the food industry, there will be some implications, such as labour force, safety problems and acceptance of the new technologies. To overcome these implications, AGILEHAND emphasizes the integration of social sciences and humanities, for example, the application of the Technology Acceptance Model (TAM). The project aims to create a change management manual, that will outline strategies for developing digital skills and managing health and safety transitions. It will also provide best practices and models for organizational change. Additionally, AGILEHAND will design effective training programs to enhance employee skills and knowledge. This information will be obtained through a combination of case studies, structured interviews, questionnaires, and a comprehensive literature review. The project will explore how organizations adapt during periods of change and identify factors influencing employee motivation and job satisfaction. This project received funding from European Union’s Horizon 2020/Horizon Europe research and innovation program under grant agreement No101092043 (AGILEHAND).

Keywords: change management, technology acceptance model, organizational change, health and safety

Procedia PDF Downloads 29
7899 Modeling Slow Crack Growth under Thermal and Chemical Effects for Fitness Predictions of High-Density Polyethylene Material

Authors: Luis Marquez, Ge Zhu, Vikas Srivastava

Abstract:

High-density polyethylene (HDPE) is one of the most commonly used thermoplastic polymer materials for water and gas pipelines. Slow crack growth failure is a well-known phenomenon in high-density polyethylene material and causes brittle failure well below the yield point with no obvious sign. The failure of transportation pipelines can cause catastrophic environmental and economic consequences. Using the non-destructive testing method to predict slow crack growth failure behavior is the primary preventative measurement employed by the pipeline industry but is often costly and time-consuming. Phenomenological slow crack growth models are useful to predict the slow crack growth behavior in the polymer material due to their ability to evaluate slow crack growth under different temperature and loading conditions. We developed a quantitative method to assess the slow crack growth behavior in the high-density polyethylene pipeline material under different thermal conditions based on existing physics-based phenomenological models. We are also working on developing an experimental protocol and quantitative model that can address slow crack growth behavior under different chemical exposure conditions to improve the safety, reliability, and resilience of HDPE-based pipeline infrastructure.

Keywords: mechanics of materials, physics-based modeling, civil engineering, fracture mechanics

Procedia PDF Downloads 188
7898 Modeling and Prediction of Hot Deformation Behavior of IN718

Authors: M. Azarbarmas, J. M. Cabrera, J. Calvo, M. Aghaie-Khafri

Abstract:

The modeling of hot deformation behavior for unseen conditions is important in metal-forming. In this study, the hot deformation of IN718 has been characterized in the temperature range 950-1100 and strain rate range 0.001-0.1 s-1 using hot compression tests. All stress-strain curves showed the occurrence of dynamic recrystallization. These curves were implemented quantitatively in mathematics, and then constitutive equation indicating the relationship between the flow stress and hot deformation parameters was obtained successfully.

Keywords: compression test, constitutive equation, dynamic recrystallization, hot working

Procedia PDF Downloads 406
7897 Effect of Scalping on the Mechanical Behavior of Coarse Soils

Authors: Nadine Ali Hassan, Ngoc Son Nguyen, Didier Marot, Fateh Bendahmane

Abstract:

This paper aims at presenting a study of the effect of scalping methods on the mechanical properties of coarse soils by resorting to numerical simulations based on the discrete element method (DEM) and experimental triaxial tests. Two reconstitution methods are used, designated as scalping method and substitution method. Triaxial compression tests are first simulated on a granular materials with a grap graded particle size distribution by using the DEM. We study the effect of these reconstitution methods on the stress-strain behavior of coarse soils with different fine contents and with different ways to control the densities of the scalped and substituted materials. Experimental triaxial tests are performed on original mixtures of sands and gravels with different fine contents and on their corresponding scalped and substituted samples. Numerical results are qualitatively compared to experimental ones. Agreements and discrepancies between these results are also discussed.

Keywords: coarse soils, mechanical behavior, scalping, replacement, triaxial devices

Procedia PDF Downloads 189
7896 Seismic Performance of Reinforced Concrete Frame Structure Based on Plastic Rotation

Authors: Kahil Amar, Meziani Faroudja, Khelil Nacim

Abstract:

The principal objective of this study is the evaluation of the seismic performance of reinforced concrete frame structures, taking into account of the behavior laws, reflecting the real behavior of materials, using CASTEM2000 software. A finite element model used is based in modified Takeda model with Timoshenko elements for columns and beams. This model is validated on a Vecchio experimental reinforced concrete (RC) frame model. Then, a study focused on the behavior of a RC frame with three-level and three-story in order to visualize the positioning the plastic hinge (plastic rotation), determined from the curvature distribution along the elements. The results obtained show that the beams of the 1st and 2nd level developed a very large plastic rotations, or these rotations exceed the values corresponding to CP (Collapse prevention with cp qCP = 0.02 rad), against those developed at the 3rd level, are between IO and LS (Immediate occupancy and life Safety with qIO = 0.005 rad and rad qLS = 0.01 respectively), so the beams of first and second levels submit a very significant damage.

Keywords: seismic performance, performance level, pushover analysis, plastic rotation, plastic hinge

Procedia PDF Downloads 119
7895 Analysis of the Influence of Fiber Volume and Fiber Orientation on Post-Cracking Behavior of Steel Fiber Reinforced Concrete

Authors: Marilia M. Camargo, Luisa A. Gachet-Barbosa, Rosa C. C. Lintz

Abstract:

The addition of fibers into concrete matrix can enhance some properties of the composite, such as tensile, flexural and impact strengths, toughness, deformation capacity and post-cracking ductility. Many factors affect the mechanical behavior of fiber reinforced concrete, such as concrete matrix (concrete strength, additions, aggregate diameter, etc.), characteristics of the fiber (geometry, type, aspect ratio, volume, orientation, distribution, strength, stiffness, etc.), specimen (size, geometry, method of preparation and loading rate). This research investigates the effects of fiber volume and orientation on the post-cracking behavior of steel fiber reinforced concrete (SFRC). Hooked-end steel fibers with aspect ratios of 45 were added into concrete with volume of 0,32%, 0,64%, 0,94%. The post-cracking behaviour was assessed by double punch test of cubic specimens and the actual volume and orientation of the fibers were determined by non-destructive tests by means of electromagnetic induction. The results showed that the actual volume of fibers in each sample differs in a small amount from the dosed volume of fibers and that the deformation and toughness of the concrete increase with the increase in the actual volume of fibers. In determining the orientation of the fibers, it was found that they tend to distribute more in the X and Y axes due to the influence of the walls of the mold. In addition, it was concluded that the orientation of the fibers is important in the post-cracking behaviour of FRC when analyzed together with the actual volume of fibers, since the greater the volume of fibers, the greater the number of fibers oriented orthogonally to the application of loadings and, consequently, there is a better mechanical behavior of the composite. These results provide a better understanding of the influence of volume and fiber orientation on the post-cracking behavior of the FRC.

Keywords: fiber reinforced concrete, steel fibers, volume of fibers, orientation of fibers, post-cracking behaviour

Procedia PDF Downloads 163
7894 Digital Immunity System for Healthcare Data Security

Authors: Nihar Bheda

Abstract:

Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.

Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology

Procedia PDF Downloads 52
7893 Secure Network Coding-Based Named Data Network Mutual Anonymity Transfer Protocol

Authors: Tao Feng, Fei Xing, Ye Lu, Jun Li Fang

Abstract:

NDN is a kind of future Internet architecture. Due to the NDN design introduces four privacy challenges,Many research institutions began to care about the privacy issues of naming data network(NDN).In this paper, we are in view of the major NDN’s privacy issues to investigate privacy protection,then put forwards more effectively anonymous transfer policy for NDN.Firstly,based on mutual anonymity communication for MP2P networks,we propose NDN mutual anonymity protocol.Secondly,we add interest package authentication mechanism in the protocol and encrypt the coding coefficient, security of this protocol is improved by this way.Finally, we proof the proposed anonymous transfer protocol security and anonymity.

Keywords: NDN, mutual anonymity, anonymous routing, network coding, authentication mechanism

Procedia PDF Downloads 433
7892 Investigating Effective Factors on the Customer Switching Behaviour in the Saipa Emdad Khodro Company of Iran

Authors: Rohollah Asadian Kohestani, Mustafa Hashemzadeh

Abstract:

The present paper is the outcome of a field research that was conducted with the study objective of influencing factor's effect on the behavior of customers switching in the Saipa Emdad Khodro Company. To achieve this goal, six factors of service quality, service cost, waiting time to receive services, reputation of organization, costs of switching and the way to respond the needs of customers as the independent variables of research and their effect on the customer switching was studied as the variable related to the research. The statistical society of this research included all customers of the Saipa Emdad Khodro company that possess the vehicles of automobile manufacturing group of Saipa throughout the country and the statistical sample included 150 persons of such customers. The results of this research indicated that all under study factors excluding the reputation factor effect on the behavior of customer switching.

Keywords: customer services, switching cost, service price, customer switching behavior

Procedia PDF Downloads 284
7891 Field Emission Scanning Microscope Image Analysis for Porosity Characterization of Autoclaved Aerated Concrete

Authors: Venuka Kuruwita Arachchige Don, Mohamed Shaheen, Chris Goodier

Abstract:

Aerated autoclaved concrete (AAC) is known for its lightweight, easy handling, high thermal insulation, and extremely porous structure. Investigation of pore behavior in AAC is crucial for characterizing the material, standardizing design and production techniques, enhancing the mechanical, durability, and thermal performance, studying the effectiveness of protective measures, and analyzing the effects of weather conditions. The significant details of pores are complicated to observe with acknowledged accuracy. The High-resolution Field Emission Scanning Electron Microscope (FESEM) image analysis is a promising technique for investigating the pore behavior and density of AAC, which is adopted in this study. Mercury intrusion porosimeter and gas pycnometer were employed to characterize porosity distribution and density parameters. The analysis considered three different densities of AAC blocks and three layers in the altitude direction within each block. A set of understandings was presented to extract and analyze the details of pore shape, pore size, pore connectivity, and pore percentages from FESEM images of AAC. Average pore behavior outcomes per unit area were presented. Comparison of porosity distribution and density parameters revealed significant variations. FESEM imaging offered unparalleled insights into porosity behavior, surpassing the capabilities of other techniques. The analysis conducted from a multi-staged approach provides porosity percentage occupied by various pore categories, total porosity, variation of pore distribution compared to AAC densities and layers, number of two-dimensional and three-dimensional pores, variation of apparent and matrix densities concerning pore behaviors, variation of pore behavior with respect to aluminum content, and relationship among shape, diameter, connectivity, and percentage in each pore classification.

Keywords: autoclaved aerated concrete, density, imaging technique, microstructure, porosity behavior

Procedia PDF Downloads 39
7890 Consumer Protection Law For Users Mobile Commerce as a Global Effort to Improve Business in Indonesia

Authors: Rina Arum Prastyanti

Abstract:

Information technology has changed the ways of transacting and enabling new opportunities in business transactions. Problems to be faced by consumers M Commerce, among others, the consumer will have difficulty accessing the full information about the products on offer and the forms of transactions given the small screen and limited storage capacity, the need to protect children from various forms of excess supply and usage as well as errors in access and disseminate personal data, not to mention the more complex problems as well as problems agreements, dispute resolution that can protect consumers and assurance of security of personal data. It is no less important is the risk of payment and personal information of payment dal am also an important issue that should be on the swatch solution. The purpose of this study is 1) to describe the phenomenon of the use of Mobile Commerce in Indonesia. 2) To determine the form of legal protection for the consumer use of Mobile Commerce. 3) To get the right type of law so as to provide legal protection for consumers Mobile Commerce users. This research is a descriptive qualitative research. Primary and secondary data sources. This research is a normative law. Engineering conducted engineering research library collection or library research. The analysis technique used is deductive analysis techniques. Growing mobile technology and more affordable prices as well as low rates of provider competition also affects the increasing number of mobile users, Indonesia is placed into 4 HP users in the world, the number of mobile phones in Indonesia is estimated at around 250.1 million telephones with a population of 237 556. 363. Indonesian form of legal protection in the use of mobile commerce still a part of the Law No. 11 of 2008 on Information and Electronic Transactions and until now there is no rule of law that specifically regulates mobile commerce. Legal protection model that can be applied to protect consumers of mobile commerce users ensuring that consumers get information about potential security and privacy challenges they may face in m commerce and measures that can be used to limit the risk. Encourage the development of security measures and built security features. To encourage mobile operators to implement data security policies and measures to prevent unauthorized transactions. Provide appropriate methods both time and effectiveness of redress when consumers suffer financial loss.

Keywords: mobile commerce, legal protection, consumer, effectiveness

Procedia PDF Downloads 351
7889 Understanding Seismic Behavior of Masonry Buildings in Earthquake

Authors: Alireza Mirzaee, Soosan Abdollahi, Mohammad Abdollahi

Abstract:

Unreinforced Masonry (URM) wall is vulnerable in resisting horizontal load such as wind and seismic loading. It is due to the low tensile strength of masonry, the mortar connection between the brick units. URM structures are still widely used in the world as an infill wall and commonly constructed with door and window openings. This research aimed to investigate the behavior of URM wall with openings when horizontal load acting on it and developed load-drift relationship of the wall. The finite element (FE) method was chosen to numerically simulate the behavior of URM with openings. In this research, ABAQUS, commercially available FE software with explicit solver was employed. In order to ensure the numerical model can accurately represent the behavior of an URM wall, the model was validated for URM wall without openings using available experimental results. Load-displacement relationship of numerical model is well agreed with experimental results. Evidence shows the same load displacement curve shape obtained from the FE model. After validating the model, parametric study conducted on URM wall with openings to investigate the influence of area of openings and pre-compressive load on the horizontal load capacity of the wall. The result showed that the increasing of area of openings decreases the capacity of the wall in resisting horizontal loading. It is also well observed from the result that capacity of the wall increased with the increasing of pre-compressive load applied on the top of the walls.

Keywords: masonry constructions, performance at earthquake, MSJC-08 (ASD), bearing wall, tie-column

Procedia PDF Downloads 235
7888 A User Identification Technique to Access Big Data Using Cloud Services

Authors: A. R. Manu, V. K. Agrawal, K. N. Balasubramanya Murthy

Abstract:

Authentication is required in stored database systems so that only authorized users can access the data and related cloud infrastructures. This paper proposes an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. The proposed technique is likely to be more robust as the probability of breaking the password is extremely low. This framework uses a multi-modal biometric approach and SMS to enforce additional security measures with the conventional Login/password system. The robustness of the technique is demonstrated mathematically using a statistical analysis. This work presents the authentication system along with the user authentication architecture diagram, activity diagrams, data flow diagrams, sequence diagrams, and algorithms.

Keywords: design, implementation algorithms, performance, biometric approach

Procedia PDF Downloads 457
7887 Species Diversity of Migratory Birds along Boat Touring Routes in Klong Kone Sub-District, Muang District, Samut Songkram Province, Thailand

Authors: P. Chitman, N. Charoenpokaraj

Abstract:

This research aims to study the species, feeding behavior and activity characteristics of birds which reap benefits from the research area in boat touring routes in Klong Kone Sub-district, Muang District, Samut Songkram Province, Thailand from October 2013 – May 2014. The results from the survey of birds on all three routes found that there are 11 families and 22 species. Route 1 (Klong Kone canal) had the most species, 20 species. According to feeding behavior, there were insectivorous, piscivorous and aquatic invertebrate feeder birds. Activity characteristics of birds which reap benefits from the research were finding food, nesting and raise nestlings along boat touring routes.

Keywords: bird species diversity, boat touring routes, Samut Songkram, feeding behavior

Procedia PDF Downloads 311
7886 High Speed Rail vs. Other Factors Affecting the Tourism Market in Italy

Authors: F. Pagliara, F. Mauriello

Abstract:

The objective of this paper is to investigate the relationship between the increase of accessibility brought by high speed rail (HSR) systems and the tourism market in Italy. The impacts of HSR projects on tourism can be quantified in different ways. In this manuscript, an empirical analysis has been carried out with the aid of a dataset containing information both on tourism and transport for 99 Italian provinces during the 2006-2016 period. Panel data regression models have been considered, since they allow modelling a wide variety of correlation patterns. Results show that HSR has an impact on the choice of a given destination for Italian tourists while the presence of a second level hub mainly affects foreign tourists. Attraction variables are also significant for both categories and the variables concerning security, such as number of crimes registered in a given destination, have a negative impact on the choice of a destination.

Keywords: tourists, overnights, high speed rail, attractions, security

Procedia PDF Downloads 142
7885 Full Analytical Procedure to Derive P-I Diagram of a Steel Beam under Blast Loading

Authors: L. Hamra, J. F. Demonceau, V. Denoël

Abstract:

The aim of this paper is to study a beam extracted from a frame and subjected to blast loading. The demand of ductility depends on six dimensionless parameters: two related to the blast loading, two referring to the bending behavior of the beam and two corresponding to the dynamic behavior of the rest of the structure. We develop a full analytical procedure that provides the ductility demand as a function of these six dimensionless parameters.

Keywords: analytical procedure, blast loading, membrane force, P-I diagram

Procedia PDF Downloads 411
7884 Nonlinear Analysis in Investigating the Complexity of Neurophysiological Data during Reflex Behavior

Authors: Juliana A. Knocikova

Abstract:

Methods of nonlinear signal analysis are based on finding that random behavior can arise in deterministic nonlinear systems with a few degrees of freedom. Considering the dynamical systems, entropy is usually understood as a rate of information production. Changes in temporal dynamics of physiological data are indicating evolving of system in time, thus a level of new signal pattern generation. During last decades, many algorithms were introduced to assess some patterns of physiological responses to external stimulus. However, the reflex responses are usually characterized by short periods of time. This characteristic represents a great limitation for usual methods of nonlinear analysis. To solve the problems of short recordings, parameter of approximate entropy has been introduced as a measure of system complexity. Low value of this parameter is reflecting regularity and predictability in analyzed time series. On the other side, increasing of this parameter means unpredictability and a random behavior, hence a higher system complexity. Reduced neurophysiological data complexity has been observed repeatedly when analyzing electroneurogram and electromyogram activities during defence reflex responses. Quantitative phrenic neurogram changes are also obvious during severe hypoxia, as well as during airway reflex episodes. Concluding, the approximate entropy parameter serves as a convenient tool for analysis of reflex behavior characterized by short lasting time series.

Keywords: approximate entropy, neurophysiological data, nonlinear dynamics, reflex

Procedia PDF Downloads 289
7883 Reliable and Error-Free Transmission through Multimode Polymer Optical Fibers in House Networks

Authors: Tariq Ahamad, Mohammed S. Al-Kahtani, Taisir Eldos

Abstract:

Optical communications technology has made enormous and steady progress for several decades, providing the key resource in our increasingly information-driven society and economy. Much of this progress has been in finding innovative ways to increase the data carrying capacity of a single optical fiber. In this research article we have explored basic issues in terms of security and reliability for secure and reliable information transfer through the fiber infrastructure. Conspicuously, one potentially enormous source of improvement has however been left untapped in these systems: fibers can easily support hundreds of spatial modes, but today’s commercial systems (single-mode or multi-mode) make no attempt to use these as parallel channels for independent signals. Bandwidth, performance, reliability, cost efficiency, resiliency, redundancy, and security are some of the demands placed on telecommunications today. Since its initial development, fiber optic systems have had the advantage of most of these requirements over copper-based and wireless telecommunications solutions. The largest obstacle preventing most businesses from implementing fiber optic systems was cost. With the recent advancements in fiber optic technology and the ever-growing demand for more bandwidth, the cost of installing and maintaining fiber optic systems has been reduced dramatically. With so many advantages, including cost efficiency, there will continue to be an increase of fiber optic systems replacing copper-based communications. This will also lead to an increase in the expertise and the technology needed to tap into fiber optic networks by intruders. As ever before, all technologies have been subject to hacking and criminal manipulation, fiber optics is no exception. Researching fiber optic security vulnerabilities suggests that not everyone who is responsible for their networks security is aware of the different methods that intruders use to hack virtually undetected into fiber optic cables. With millions of miles of fiber optic cables stretching across the globe and carrying information including but certainly not limited to government, military, and personal information, such as, medical records, banking information, driving records, and credit card information; being aware of fiber optic security vulnerabilities is essential and critical. Many articles and research still suggest that fiber optics is expensive, impractical and hard to tap. Others argue that it is not only easily done, but also inexpensive. This paper will briefly discuss the history of fiber optics, explain the basics of fiber optic technologies and then discuss the vulnerabilities in fiber optic systems and how they can be better protected. Knowing the security risks and knowing the options available may save a company a lot embarrassment, time, and most importantly money.

Keywords: in-house networks, fiber optics, security risk, money

Procedia PDF Downloads 408
7882 Household Accounting for Expense Behavior Changing of Sufficiency Economy Philosophy in Samut Songkhram Province

Authors: Khajeerat Phumphruk

Abstract:

This research aims to study the knowledge, attitude toward household accounting philosophy of sufficiency economy and study the Expense Behavior Changing of household accounting in Banbolang Samut Songkhram Province. The samples of this research are chief of villages and householders in Banbolang Samut Songkhram. The sampling revealed that chief of villages and 60 of householders. The random sampling was used to collect the data. Tools of this research are structure interview and questionnaires that verified by specialist as the content validity and reliability. The result found that the reasons of doing the household accounting are finding the revenue and expenditure in order to in develop the wealthy of the family and follow the philosophy of sufficiency economy of His Majesty. The reasons of not doing the household accounting are less understanding of the household accounting, less time and useless. Moreover, there are householders who interesting in training about household accounting.

Keywords: expense behavior changing, household accounting, samut songkhram province, sufficiency economy philosophy

Procedia PDF Downloads 179
7881 Assessing Justice, Security and Human Rights Violations in Crisis Situations: The Case of Cameroon

Authors: Forbah Julius Ajamah

Abstract:

The protection of human rights and respect of the rule of law in Sub-Saharan African is a constant challenge due to ongoing and protracted conflict situations, political instability, shrinking democratic space and allegations of large-scale corruption in some countries. Conflict and/or crisis is most often resulting from constant violations of individual rights, with the risk increasing when many human rights are violated in a systematic or widespread fashion. Violations related to economic, social and cultural rights at times are as significant as violations of civil and political rights. Cameroon a country in Sub-Saharan African, for many years now has been confronted by numerous crises across different regions. Despite measures carried out, it has been reported that lesser and lesser attention has been placed on various conflict/crisis across Cameroon. To reach a common understanding of how both the economic, social and cultural rights has been violated and related impact on the quality of life, this paper evaluates justice, security and human rights violations in the present crisis situations. Without the prevention of human rights violations, wider conflict and/or crisis, will continue to have a negative impact in the lives of the inhabitants. This paper aims at providing evidence to support the fact that effective prevention requires early identification of risks that could allow for preventive and/or mitigatory measures to be designed and implemented.

Keywords: justice, security, human rights abuses, conflicts, crisis

Procedia PDF Downloads 70
7880 The Effect of AMBs Number of a Dynamics Behavior of a Spur Gear Reducer in Non-Stationary Regime

Authors: Najib Belhadj Messaoud, Slim Souissi

Abstract:

The non-linear dynamic behavior of a single stage spur gear reducer is studied in this paper in transient regime. Driving and driver rotors are, respectively, powered by a motor torque Cm and loaded by a resistive torque Cr. They are supported by two identical Active Magnetic Bearings (AMBs). Gear excitation is induced by the motor torque and load variation in addition to the fluctuation of meshing stiff-ness due to the variation of input rotational speed. Three models of AMBs were used with four, six and eight magnets. They are operated by P.D controller and powered by control and bias currents. The dynamic parameters of the AMBs are modeled by stiffness and damping matrices computed by the derivation of the electromagnetic forces. The equations of motion are solved iteratively using Newmark time integration method. In the first part of the study, the model is powered by an electric motor and by a four strokes four cylinders diesel engine in the second part. The numerical results of the dynamic responses of the system come to confirm the significant effect of the transient regime on the dynamic behavior of a gear set, particularly in the case of engine acyclism condition. Results also confirm the influence of the magnet number by AMBs on the dynamic behavior of the system. Indeed, vibrations were more important in the case of gear reducer supported by AMBs with four magnets.

Keywords: motor, stiffness, gear, acyclism, fluctuation, torque

Procedia PDF Downloads 445
7879 Sexual Health and Sexual Risk Behavior of the Youth with HIV Positive in Northeastern Part, Thailand

Authors: Orathai Srithongtham, Ubonsri Thabuddha

Abstract:

The youth with HIV positive is not difference from the general youth in term of sexual needs. Sexual health is crucial the most to support the youth with HIV positive to be sexual well-being. This study aims to elucidate the sexual health on protection from STDs (Sexual Transmitted Diseases) and HIV transmission and to explain sexual risk behavior of the youth with HIV positive. The target group was the youth with HIV positive about 23 cases from two provinces in northeastern part of Thailand. Qualitative method was applied for collecting data by in-depth interview. Content analysis was use for data analysis. The youth with HIV positive was protection from STDs and HIV transmission by using the condom during sexual activity. The reason to deny the condom use were ashamed, condom is not a part of life, no have fit size, and the youth fear to stigmatized as a mental disorder and fear to stigmatized as going to fuck someone. The youth who trust with nurse in clinic was dare to request the condom by face. Sexual activity without condom use is sexual risk behavior. The major causes were couple trust and the sexual enjoyment first and sexual active competition with friend without condom use. The concern on HIV was the boyfriend or girlfriend not accepts the HIV positive people, worry about the HIV transmutation, and finally not compliance to ARV drug. The youth with HIV positive was lacking of the knowledge on sexual health on the issues of access to condom and the concern to keep on relationship with the boyfriend or girlfriend. This concern issues was led to the non-adherence of ARV drug and HIV distribution. To provide the sexual health service is more essential to the youth with HIV positive.

Keywords: sexual health, sexual risk behavior, youth, HIV

Procedia PDF Downloads 456