Search results for: fully homomorphic encryption (FHE)
1847 Colour Characteristics of Dried Cocoa Using Shallow Box Fermentation Technique
Authors: Khairul Bariah Sulaiman, Tajul Aris Yang
Abstract:
Fermentation is well known as an essential process in cocoa beans. Besides to develop the precursor of cocoa flavour, it also induce the colour changes in the beans.The fermentation process is reported to be influenced by duration of pod storage and fermentation. Therefore, this study was conducted to evaluate colour of Malaysian cocoa beans and how the pods storage and fermentation duration using shallow box technique will effect on it characteristics. There are two factors being studied ie duration of cocoa pod storage (0, 2, 4, and 6 days) and duration of cocoa fermentation (0, 1, 2, 3, 4 and 5 days). The experiment is arranged in 4 x 6 factorial design with 24 treatments and arrangement is in a Completely Randomised Design (CRD). The produced beans is inspected for colour changes under artificial light during cut test and divided into four groups of colour namely fully brown, purple brown, fully purple and slaty. Cut tests indicated that cocoa beans which are directly dried without undergone fermentation has the highest slaty percentage. However, application of pods storage before fermentation process is found to decrease the slaty percentage. In contrast, the percentages of fully brown beans start to dominate after two days of fermentation, especially from four and six days of pods storage batch. Whereas, almost all batch have percentage of fully purple less than 20%. Interestingly, the percentage of purple brown beans are scattered in the entire beans batch regardless any specific trend. Meanwhile, statistical analysis using General Linear Model showed that the pods storage has a significant effect on the colour characteristic of the Malaysian dried beans compared to fermentation duration.Keywords: cocoa beans, colour, fermentation, shallow box
Procedia PDF Downloads 4901846 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection
Authors: Mahshid Arabi
Abstract:
With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.Keywords: data protection, digital technologies, information security, modern management
Procedia PDF Downloads 281845 A Hill Cipher Based on the Kish-Sethuraman Protocol
Authors: Kondwani Magamba
Abstract:
In the idealized Kish-Sethuraman (KS) protocol,messages are sent between Alice and Bob each using a secret personal key. This protocol is said to be perfectly secure because both Bob and Alice keep their keys undisclosed so that at all times the message is encrypted by at least one key, thus no information is leaked or shared. In this paper, we propose a realization of the KS protocol through the use of the Hill Cipher.Keywords: Kish-Sethuraman Protocol, Hill Cipher, MDS Matrices, encryption
Procedia PDF Downloads 3541844 Cybersecurity Challenges in the Era of Open Banking
Authors: Krish Batra
Abstract:
The advent of open banking has revolutionized the financial services industry by fostering innovation, enhancing customer experience, and promoting competition. However, this paradigm shift towards more open and interconnected banking ecosystems has introduced complex cybersecurity challenges. This research paper delves into the multifaceted cybersecurity landscape of open banking, highlighting the vulnerabilities and threats inherent in sharing financial data across a network of banks and third-party providers. Through a detailed analysis of recent data breaches, phishing attacks, and other cyber incidents, the paper assesses the current state of cybersecurity within the open banking framework. It examines the effectiveness of existing security measures, such as encryption, API security protocols, and authentication mechanisms, in protecting sensitive financial information. Furthermore, the paper explores the regulatory response to these challenges, including the implementation of standards such as PSD2 in Europe and similar initiatives globally. By identifying gaps in current cybersecurity practices, the research aims to propose a set of robust, forward-looking strategies that can enhance the security and resilience of open banking systems. This includes recommendations for banks, third-party providers, regulators, and consumers on how to mitigate risks and ensure a secure open banking environment. The ultimate goal is to provide stakeholders with a comprehensive understanding of the cybersecurity implications of open banking and to outline actionable steps for safeguarding the financial ecosystem in an increasingly interconnected world.Keywords: open banking, financial services industry, cybersecurity challenges, data breaches, phishing attacks, encryption, API security protocols, authentication mechanisms, regulatory response, PSD2, cybersecurity practices
Procedia PDF Downloads 581843 Seismic Performance of Reinforced Concrete Frames Infilled by Masonry Walls with Different Heights
Authors: Ji-Wook Mauk, Yu-Suk Kim, Hyung-Joon Kim
Abstract:
This study carried out comparative seismic performance of reinforced concrete frames infilled by masonry walls with different heights. Partial and fully infilled RC frames were modeled for the research objectives and the analysis model for a bare reinforced concrete frame was established for comparison. Non-linear static analyses for the studied frames were performed to investigate their structural behavior under extreme loading conditions and to find out their collapse mechanism. It was observed from analysis results that the strengths of the partial infilled RC frames are increased and their ductility is reduced, as infilled masonry walls are higher. Especially, Reinforced concrete frames with a higher partial infilled masonry wall would experience shear failures. Non-linear dynamic analyses using 10 earthquake records show that the bare and fully infilled reinforced concrete frames present stable collapse mechanism while the reinforced concrete frames with a partially infilled masonry wall collapse in more brittle manner due to short-column effects.Keywords: fully infilled RC frame, partially infilled RC frame, masonry wall, short-column effect
Procedia PDF Downloads 4201842 Transverse Vibration of Non-Homogeneous Rectangular Plates of Variable Thickness Using GDQ
Abstract:
The effect of non-homogeneity on the free transverse vibration of thin rectangular plates of bilinearly varying thickness has been analyzed using generalized differential quadrature (GDQ) method. The non-homogeneity of the plate material is assumed to arise due to linear variations in Young’s modulus and density of the plate material with the in-plane coordinates x and y. Numerical results have been computed for fully clamped and fully simply supported boundary conditions. The solution procedure by means of GDQ method has been implemented in a MATLAB code. The effect of various plate parameters has been investigated for the first three modes of vibration. A comparison of results with those available in literature has been presented.Keywords: rectangular, non-homogeneous, bilinear thickness, generalized differential quadrature (GDQ)
Procedia PDF Downloads 3821841 Secure Network Coding against Content Pollution Attacks in Named Data Network
Authors: Tao Feng, Xiaomei Ma, Xian Guo, Jing Wang
Abstract:
Named Data Network (NDN) is one of the future Internet architecture, all nodes (i.e., hosts, routers) are allowed to have a local cache, used to satisfy incoming requests for content. However, depending on caching allows an adversary to perform attacks that are very effective and relatively easy to implement, such as content pollution attack. In this paper, we use a method of secure network coding based on homomorphic signature system to solve this problem. Firstly ,we use a dynamic public key technique, our scheme for each generation authentication without updating the initial secret key used. Secondly, employing the homomorphism of hash function, intermediate node and destination node verify the signature of the received message. In addition, when the network topology of NDN is simple and fixed, the code coefficients in our scheme are generated in a pseudorandom number generator in each node, so the distribution of the coefficients is also avoided. In short, our scheme not only can efficiently prevent against Intra/Inter-GPAs, but also can against the content poisoning attack in NDN.Keywords: named data networking, content polloution attack, network coding signature, internet architecture
Procedia PDF Downloads 3361840 Phosphorus Reduction in Plain and Fully Formulated Oils Using Fluorinated Additives
Authors: Gabi N. Nehme
Abstract:
The reduction of phosphorus and sulfur in engine oil are the main topics of this paper. Very reproducible boundary lubrication tests were conducted as part of Design of Experiment software (DOE) to study the behavior of fluorinated catalyst iron fluoride (FeF3), and polutetrafluoroethylene or Teflon (PTFE) in developing environmentally friendly (reduced P and S) anti-wear additives for future engine oil formulations. Multi-component Chevron fully formulated oil (GF3) and Chevron plain oil were used with the addition of PTFE and catalyst to characterize and analyze their performance. Lower phosphorus blends were the goal of the model solution. Experiments indicated that new sub-micron FeF3 catalyst played an important role in preventing breakdown of the tribofilm.Keywords: wear, SEM, EDS, friction, lubricants
Procedia PDF Downloads 2841839 Review of the Legislative and Policy Issues in Promoting Infrastructure Development to Promote Automation in Telecom Industry
Authors: Marvin Ricardo Awarab
Abstract:
There has never been a greater need for telecom services. The Internet of Things (IoT), 5G networking, and edge computing are the driving forces behind this increased demand. The fierce demand offers communications service providers significant income opportunities. The telecom sector is centered on automation, and realizing a digital operation that functions as a real-time business will be crucial for the industry as a whole. Automation in telecom refers to the application of technology to create a more effective, quick, and scalable alternative to the conventional method of operating the telecom industry. With the promotion of 5G and the Internet of Things (IoT), telecom companies will continue to invest extensively in telecom automation technology. Automation offers benefits in the telecom industry; developing countries such as Namibia may not fully tap into such benefits because of the lack of funds and infrastructural resources to invest in automation. This paper fully investigates the benefits of automation in the telecom industry. Furthermore, the paper identifies hiccups that developing countries such as Namibia face in their quest to fully introduce automation in the telecom industry. Additionally, the paper proposes possible avenues that Namibia, as a developing country, adopt investing in automation infrastructural resources with the aim of reaping the full benefits of automation in the telecom industry.Keywords: automation, development, internet, internet of things, network, telecom, telecommunications policy, 5G
Procedia PDF Downloads 611838 Intrusion Detection Techniques in NaaS in the Cloud: A Review
Authors: Rashid Mahmood
Abstract:
The network as a service (NaaS) usage has been well-known from the last few years in the many applications, like mission critical applications. In the NaaS, prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in NaaS. The authentication and encryption are considered the first solution of the NaaS problem whereas now these are not sufficient as NaaS use is increasing. In this paper, we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in NaaS and aim to compare in some important fields.Keywords: IDS, cloud, naas, detection
Procedia PDF Downloads 3181837 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security
Authors: D. Pugazhenthi, B. Sree Vidya
Abstract:
Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification
Procedia PDF Downloads 2591836 Time-Domain Simulations of the Coupled Dynamics of Surface Riding Wave Energy Converter
Authors: Chungkuk Jin, Moo-Hyun Kim, HeonYong Kang
Abstract:
A surface riding (SR) wave energy converter (WEC) is designed and its feasibility and performance are numerically simulated by the author-developed floater-mooring-magnet-electromagnetics fully-coupled dynamic analysis computer program. The biggest advantage of the SR-WEC is that the performance is equally effective even in low sea states and its structural robustness is greatly improved by simply riding along the wave surface compared to other existing WECs. By the numerical simulations and actuator testing, it is clearly demonstrated that the concept works and through the optimization process, its efficiency can be improved.Keywords: computer simulation, electromagnetics fully-coupled dynamics, floater-mooring-magnet, optimization, performance evaluation, surface riding, WEC
Procedia PDF Downloads 1441835 Winged Test Rocket with Fully Autonomous Guidance and Control for Realizing Reusable Suborbital Vehicle
Authors: Koichi Yonemoto, Hiroshi Yamasaki, Masatomo Ichige, Yusuke Ura, Guna S. Gossamsetti, Takumi Ohki, Kento Shirakata, Ahsan R. Choudhuri, Shinji Ishimoto, Takashi Mugitani, Hiroya Asakawa, Hideaki Nanri
Abstract:
This paper presents the strategic development plan of winged rockets WIRES (WInged REusable Sounding rocket) aiming at unmanned suborbital winged rocket for demonstrating future fully reusable space transportation technologies, such as aerodynamics, Navigation, Guidance and Control (NGC), composite structure, propulsion system, and cryogenic tanks etc., by universities in collaboration with government and industries, as well as the past and current flight test results.Keywords: autonomous guidance and control, reusable rocket, space transportation system, suborbital vehicle, winged rocket
Procedia PDF Downloads 3621834 Design, Prototyping, Integration, Flight Testing of a 20 cm Span Fully Autonomous Fixed Wing Micro Air Vehicle
Authors: Vivek Paul, Abel Nelly, Shoeb A Adeel, R. Tilak, S. Maheshwaran, S. Pulikeshi, Roshan Antony, C. S. Suraj
Abstract:
This paper presents the complete design and development cycle of a 20 cm span fixed wing micro air vehicle that was developed at CSIR-NAL, under the micro air vehicle development program. The design is a cropped delta flying wing MAV with a modified N22 airfoil of 12.3% thickness. The design was fabricated using the fused deposition method- RPT technique. COTS components were procured and integrated into this RPT prototype. A commercial autopilot that was proven in the earlier MAV designs was used for this MAV. The MAV was flown fully autonomous for 14mins at an open field. The flight data showed good performance as expected from the MAV design. The paper also describes about the process involved in the design of MAVs.Keywords: autopilot, autonomous mode, flight testing, MAV, RPT
Procedia PDF Downloads 5171833 Inverter Based Gain-Boosting Fully Differential CMOS Amplifier
Authors: Alpana Agarwal, Akhil Sharma
Abstract:
This work presents a fully differential CMOS amplifier consisting of two self-biased gain boosted inverter stages, that provides an alternative to the power hungry operational amplifier. The self-biasing avoids the use of external biasing circuitry, thus reduces the die area, design efforts, and power consumption. In the present work, regulated cascode technique has been employed for gain boosting. The Miller compensation is also applied to enhance the phase margin. The circuit has been designed and simulated in 1.8 V 0.18 µm CMOS technology. The simulation results show a high DC gain of 100.7 dB, Unity-Gain Bandwidth of 107.8 MHz, and Phase Margin of 66.7o with a power dissipation of 286 μW and makes it suitable candidate for the high resolution pipelined ADCs.Keywords: CMOS amplifier, gain boosting, inverter-based amplifier, self-biased inverter
Procedia PDF Downloads 3001832 An Implicit Methodology for the Numerical Modeling of Locally Inextensible Membranes
Authors: Aymen Laadhari
Abstract:
We present in this paper a fully implicit finite element method tailored for the numerical modeling of inextensible fluidic membranes in a surrounding Newtonian fluid. We consider a highly simplified version of the Canham-Helfrich model for phospholipid membranes, in which the bending force and spontaneous curvature are disregarded. The coupled problem is formulated in a fully Eulerian framework and the membrane motion is tracked using the level set method. The resulting nonlinear problem is solved by a Newton-Raphson strategy, featuring a quadratic convergence behavior. A monolithic solver is implemented, and we report several numerical experiments aimed at model validation and illustrating the accuracy of the proposed method. We show that stability is maintained for significantly larger time steps with respect to an explicit decoupling method.Keywords: finite element method, level set, Newton, membrane
Procedia PDF Downloads 3281831 A Review of In-Vehicle Network for Cloud Connected Vehicle
Authors: Hanbhin Ryu, Ilkwon Yun
Abstract:
Automotive industry targets to provide an improvement in safety and convenience through realizing fully autonomous vehicle. For partially realizing fully automated driving, Current vehicles already feature varieties of advanced driver assistance system (ADAS) for safety and infotainment systems for the driver’s convenience. This paper presents Cloud Connected Vehicle (CCV) which connected vehicles with cloud data center via the access network to control the vehicle for achieving next autonomous driving form and describes its features. This paper also describes the shortcoming of the existing In-Vehicle Network (IVN) to be a next generation IVN of CCV and organize the 802.3 Ethernet, the next generation of IVN, related research issue to verify the feasibility of using Ethernet. At last, this paper refers to additional considerations to adopting Ethernet-based IVN for CCV.Keywords: autonomous vehicle, cloud connected vehicle, ethernet, in-vehicle network
Procedia PDF Downloads 4761830 Use of Personal Rhythm to Authenticate Encrypted Messages
Authors: Carlos Gonzalez
Abstract:
When communicating using private and secure keys, there is always the doubt as to the identity of the message creator. We introduce an algorithm that uses the personal typing rhythm (keystroke dynamics) of the message originator to increase the trust of the authenticity of the message originator by the message recipient. The methodology proposes the use of a Rhythm Certificate Authority (RCA) to validate rhythm information. An illustrative example of the communication between Bob and Alice and the RCA is included. An algorithm of how to communicate with the RCA is presented. This RCA can be an independent authority or an enhanced Certificate Authority like the one used in public key infrastructure (PKI).Keywords: authentication, digital signature, keystroke dynamics, personal rhythm, public-key encryption
Procedia PDF Downloads 3031829 Intrusion Detection Techniques in Mobile Adhoc Networks: A Review
Authors: Rashid Mahmood, Muhammad Junaid Sarwar
Abstract:
Mobile ad hoc networks (MANETs) use has been well-known from the last few years in the many applications, like mission critical applications. In the (MANETS) prevention method is not adequate as the security concerned, so the detection method should be added to the security issues in (MANETs). The authentication and encryption is considered the first solution of the MANETs problem where as now these are not sufficient as MANET use is increasing. In this paper we are going to present the concept of intrusion detection and then survey some of major intrusion detection techniques in MANET and aim to comparing in some important fields.Keywords: MANET, IDS, intrusions, signature, detection, prevention
Procedia PDF Downloads 3771828 Numerical Prediction of Entropy Generation in Heat Exchangers
Authors: Nadia Allouache
Abstract:
The concept of second law is assumed to be important to optimize the energy losses in heat exchangers. The present study is devoted to the numerical prediction of entropy generation due to heat transfer and friction in a double tube heat exchanger partly or fully filled with a porous medium. The goal of this work is to find the optimal conditions that allow minimizing entropy generation. For this purpose, numerical modeling based on the control volume method is used to describe the flow and heat transfer phenomena in the fluid and the porous medium. Effects of the porous layer thickness, its permeability, and the effective thermal conductivity have been investigated. Unexpectedly, the fully porous heat exchanger yields a lower entropy generation than the partly porous case or the fluid case even if the friction increases the entropy generation.Keywords: heat exchangers, porous medium, second law approach, turbulent flow
Procedia PDF Downloads 2991827 Non-Homogeneity in a Thick Walled Rotating Circular Cylinder under Varying Pressure
Authors: Jatinder Kaur, Pankaj Thakur
Abstract:
The effect of pressure and temperature in non-homogeneous circular cylinder by taking non-homogeneity of material in terms of compressibility c=c₀r⁻ᵏ has been observed. From the results, it could be seen that for K<0, high pressure is required in the initial yielding state than for the case K >0. Under thermal conditions for value K<0, lesser amount of pressure is required for initial yielding, and further, the amount keeps on decreasing with an increase in temperature. Curves are drawn between pressure and radii ratio for initial and fully plastic state with and without temperature conditions. Further graphs between stresses (hoop and radial) and radii ratio for fully plastic state with and without temperature conditions are also drawn and concluded that hoop stresses become minimum with the increase in temperature as compared to radial stresses.Keywords: cylinder, elastic, plastic, copper, steel, stresses, pressure, load
Procedia PDF Downloads 781826 Security Threats on Wireless Sensor Network Protocols
Authors: H. Gorine, M. Ramadan Elmezughi
Abstract:
In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issues of security in wireless sensor networks in an attempt to encourage more research into this area.Keywords: wireless sensor networks, network security, light weight encryption, threats
Procedia PDF Downloads 5231825 Various Modification of Electrochemical Barrier Layer Thinning of Anodic Aluminum Oxide
Authors: W. J. Stępniowski, W. Florkiewicz, M. Norek, M. Michalska-Domańska, E. Kościuczyk, T. Czujko
Abstract:
In this paper, two options of anodic alumina barrier layer thinning have been demonstrated. The approaches varied with the duration of the voltage step. It was found that too long step of the barrier layer thinning process leads to chemical etching of the nanopores on their top. At the bottoms pores are not fully opened what is disadvantageous for further applications in nanofabrication. On the other hand, while the duration of the voltage step is controlled by the current density (value of the current density cannot exceed 75% of the value recorded during previous voltage step) the pores are fully opened. However, pores at the bottom obtained with this procedure have smaller diameter, nevertheless this procedure provides electric contact between the bare aluminum (substrate) and electrolyte, what is suitable for template assisted electrodeposition, one of the most cost-efficient synthesis method in nanotechnology.Keywords: anodic aluminum oxide, anodization, barrier layer thinning, nanopores
Procedia PDF Downloads 3201824 Comparative Study of Globalization and Homogenous Society: South Korea and Greek Society Reaction to Foreign Culture
Authors: Putri Mentari Racharjo
Abstract:
The development of current technology is simplifying globalization process. An easier globalization process and mobilization are increasing interactions among individuals and societies in different countries. It is also easier for foreign culture to enter a country and create changes to the society. Differences brought by foreign culture will most likely affect any society. It will be easier for heterogeneous society to accept new culture, considering that they have various cultures, and they are used to differences. So it will be easier for a heterogeneous society to accept new culture as long as the culture is not contrary to their essential values. However for a homogenous society, where they have only one language and culture, it will take a longer adjustment time to fully accept the new culture. There will be a tendency for homogenous societies to react in a more negative way to new culture. Greece and South Korea are the examples for homogeneous societies. Greece, a destination country for immigrants, is having a hard time adjusting themselves to accept many immigrants with many cultures. There are various discrimination cases of immigrants in Greece, when the Greek society cannot fully accept the new culture brought by immigrants. South Korea, a newly popular country with K-pop and K-dramas, is attracting people from all over the world to come to South Korea. However a homogenous South Korean society is also having a hard time to fully accept foreign cultures, resulting in many discrimination cases based on race and culture in South Korea. With a qualitative method through a case study and literature review, this article will discuss about Greek and South Korean societies reaction to new cultures as an effect of globalization.Keywords: foreign culture, globalization, greece, homogenous society, South Korea
Procedia PDF Downloads 3321823 The Challenges of Implementing Building Information Modeling in Small-Medium Enterprises Architecture Firms in Indonesia
Authors: Furry A. Wilis, Dewi Larasati, Suhendri
Abstract:
Around 96% of architecture firms in Indonesia are classified as small-medium enterprises (SME). This number shows that the SME firms have an important role in architecture, engineering, and construction (AEC) industry in Indonesia. Some of them are still using conventional system (2D based) in arranging construction project documents. This system is fragmented and not fully well-coordinated, so causes many changes in the whole project cycle. Building information modeling (BIM), as a new developed system in Indonesian construction industry, has been assumed can decrease changes in the project. But BIM has not fully implemented in Indonesian AEC industry, especially in SME architecture firms. This article identifies the challenges of implementing BIM in SME architecture firms in Indonesia. Quantitative-explorative research with questionnaire was chosen to achieve the goal of this article. The scarcity of skilled BIM user, low demand from client, high investment cost, and the unwillingness of the firm to switch into BIM were found as the result of this paper.Keywords: architecture consultants, BIM, SME, Indonesia
Procedia PDF Downloads 3381822 Modified Montgomery for RSA Cryptosystem
Authors: Rupali Verma, Maitreyee Dutta, Renu Vig
Abstract:
Encryption and decryption in RSA are done by modular exponentiation which is achieved by repeated modular multiplication. Hence, efficiency of modular multiplication directly determines the efficiency of RSA cryptosystem. This paper designs a Modified Montgomery Modular multiplication in which addition of operands is computed by 4:2 compressor. The basic logic operations in addition are partitioned over two iterations such that parallel computations are performed. This reduces the critical path delay of proposed Montgomery design. The proposed design and RSA are implemented on Virtex 2 and Virtex 5 FPGAs. The two factors partitioning and parallelism have improved the frequency and throughput of proposed design.Keywords: RSA, montgomery modular multiplication, 4:2 compressor, FPGA
Procedia PDF Downloads 4111821 Implicit Eulerian Fluid-Structure Interaction Method for the Modeling of Highly Deformable Elastic Membranes
Authors: Aymen Laadhari, Gábor Székely
Abstract:
This paper is concerned with the development of a fully implicit and purely Eulerian fluid-structure interaction method tailored for the modeling of the large deformations of elastic membranes in a surrounding Newtonian fluid. We consider a simplified model for the mechanical properties of the membrane, in which the surface strain energy depends on the membrane stretching. The fully Eulerian description is based on the advection of a modified surface tension tensor, and the deformations of the membrane are tracked using a level set strategy. The resulting nonlinear problem is solved by a Newton-Raphson method, featuring a quadratic convergence behavior. A monolithic solver is implemented, and we report several numerical experiments aimed at model validation and illustrating the accuracy of the presented method. We show that stability is maintained for significantly larger time steps.Keywords: finite element method, implicit, level set, membrane, Newton method
Procedia PDF Downloads 3021820 Providing Security to Private Cloud Using Advanced Encryption Standard Algorithm
Authors: Annapureddy Srikant Reddy, Atthanti Mahendra, Samala Chinni Krishna, N. Neelima
Abstract:
In our present world, we are generating a lot of data and we, need a specific device to store all these data. Generally, we store data in pen drives, hard drives, etc. Sometimes we may loss the data due to the corruption of devices. To overcome all these issues, we implemented a cloud space for storing the data, and it provides more security to the data. We can access the data with just using the internet from anywhere in the world. We implemented all these with the java using Net beans IDE. Once user uploads the data, he does not have any rights to change the data. Users uploaded files are stored in the cloud with the file name as system time and the directory will be created with some random words. Cloud accepts the data only if the size of the file is less than 2MB.Keywords: cloud space, AES, FTP, NetBeans IDE
Procedia PDF Downloads 2041819 Fully Automated Methods for the Detection and Segmentation of Mitochondria in Microscopy Images
Authors: Blessing Ojeme, Frederick Quinn, Russell Karls, Shannon Quinn
Abstract:
The detection and segmentation of mitochondria from fluorescence microscopy are crucial for understanding the complex structure of the nervous system. However, the constant fission and fusion of mitochondria and image distortion in the background make the task of detection and segmentation challenging. In the literature, a number of open-source software tools and artificial intelligence (AI) methods have been described for analyzing mitochondrial images, achieving remarkable classification and quantitation results. However, the availability of combined expertise in the medical field and AI required to utilize these tools poses a challenge to its full adoption and use in clinical settings. Motivated by the advantages of automated methods in terms of good performance, minimum detection time, ease of implementation, and cross-platform compatibility, this study proposes a fully automated framework for the detection and segmentation of mitochondria using both image shape information and descriptive statistics. Using the low-cost, open-source python and openCV library, the algorithms are implemented in three stages: pre-processing, image binarization, and coarse-to-fine segmentation. The proposed model is validated using the mitochondrial fluorescence dataset. Ground truth labels generated using a Lab kit were also used to evaluate the performance of our detection and segmentation model. The study produces good detection and segmentation results and reports the challenges encountered during the image analysis of mitochondrial morphology from the fluorescence mitochondrial dataset. A discussion on the methods and future perspectives of fully automated frameworks conclude the paper.Keywords: 2D, binarization, CLAHE, detection, fluorescence microscopy, mitochondria, segmentation
Procedia PDF Downloads 3561818 Fully Printed Strain Gauges: A Comparison of Aerosoljet-Printing and Micropipette-Dispensing
Authors: Benjamin Panreck, Manfred Hild
Abstract:
Strain sensors based on a change in resistance are well established for the measurement of forces, stresses, or material fatigue. Within the scope of this paper, fully additive manufactured strain sensors were produced using an ink of silver nanoparticles. Their behavior was evaluated by periodic tensile tests. Printed strain sensors exhibit two advantages: Their measuring grid is adaptable to the use case and they do not need a carrier-foil, as the measuring structure can be printed directly onto a thin sprayed varnish layer on the aluminum specimen. In order to compare quality characteristics, the sensors have been manufactured using two different technologies, namely aerosoljet-printing and micropipette-dispensing. Both processes produce structures which exhibit continuous features (in contrast to what can be achieved with droplets during inkjet printing). Briefly summarized the results show that aerosoljet-printing is the preferable technology for specimen with non-planar surfaces whereas both technologies are suitable for flat specimen.Keywords: aerosoljet-printing, micropipette-dispensing, printed electronics, printed sensors, strain gauge
Procedia PDF Downloads 202