Search results for: security and protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4798

Search results for: security and protection

3328 Unaccompanied Children: An Overview on National and European Law

Authors: Cinzia Valente

Abstract:

Over the last few years, national legislators have been forced to deal with social changes that have had important repercussions in family law and children’s law. This growing focus on minors has provoked important reforms, specifically on issues relating to the welfare and protection of children. My presentation focuses on the issue of migrant children in particular I refer to unaccompanied children, or ‘children on the move’, or separate children or any other term defining migrant minors who cross national borders seeking protection or better opportunities. They arrive often illegally, on the European territory without a responsible adult who take care of them. There is a common assumption that migrants are running away from conflicts, poverty and human rights abuse and they arrive in a foreign country hoping a better life; children without persons who takes care of them encounter some difficulties in their integration in the host country. The migration flows recorded in recent decades towards EU countries, and Italy in particular, have imposed an intense pressure to modernize institutions, services and specific legal frameworks, with the aim of responding adequately to the needs of foreign individuals, as well as ensuring a good level of living standards and facilitating integration, especially for migrant children. The object of my paper is the analysis of the Italian rules, practices and services existing in favor of unaccompanied children (foster care, reunification, acquisition of citizenship and other) in comparison with other European legal systems on the same thematic with a comparative method. Highlighting European standards to find common principles for the best solution to children's problems is the conclusive aim of my presentation.

Keywords: Children , Family Law, Migration , Uniform Law

Procedia PDF Downloads 138
3327 Study of Cathodic Protection for Trunk Pipeline of Al-Garraf Oil Field

Authors: Maysoon Khalil Askar

Abstract:

The delineation of possible areas of corrosion along the external face of an underground oil pipeline in Trunk line of Al- Garraf oil field was investigated using the horizontal electrical resistivity profiling technique and study the contribution of pH, Moisture Content in Soil and Presence chlorides, sulfates and total dissolve salts in soil and water. The test sites represent a physical and chemical properties of soils. The hydrogen-ion concentration of soil and groundwater range from 7.2 to 9.6, and the resistivity values of the soil along the pipeline were obtained using the YH302B model resistivity meter having values between 1588 and 720 Ohm-cm. the chloride concentration in soil and groundwater is high (more than 1000 ppm), total soulable salt is more than 5000 ppm, and sulphate range from 0.17% and 0.98% in soil and more than 600 ppm in groundwater. The soil is poor aeration, the soil texture is fine (clay and silt soil), the water content is high (the groundwater is close to surface), the chloride and sulphate is high in the soil and groundwater, the total soulable salt is high in ground water and finally the soil electric resistivity is low that the soil is very corrosive and there is the possibility of the pipeline failure. These methods applied in the study are quick, economic and efficient for detecting along buried pipelines which need to be protected. Routine electrical geophysical investigations along buried oil pipelines should be undertaken for the early detection and prevention of pipeline failure with its attendant environmental, human and economic consequences.

Keywords: soil resistivity, corrosion, cathodic protection, chloride concentration, water content

Procedia PDF Downloads 433
3326 Multisignature Schemes for Reinforcing Trust in Cloud Software-As-A-Service Services

Authors: Mustapha Hedabou, Ali Azougaghe, Ahmed Bentajer, Hicham Boukhris, Mourad Eddiwani, Zakaria Igarramen

Abstract:

Software-as-a-service (SaaS) is emerging as a dominant approach to delivering software. It encompasses a range of business, technical opportunities, issue, and challenges. Trustiness in the cloud services regarding the security and the privacy of the delivered data is the most critical issue with the SaaS model. In this paper, we survey the security concerns related to the SaaS model, and we propose the design of a trusted SaaS model that gives users more confidence into SaaS services by leveraging a trust in a neutral source code certifying authority. The proposed design is based on the use of the multisignature mechanism for signing the source code of the application service. In our model, the cloud provider acts as a root of trust by ensuring the integrity of the application service when it was running on its platform. The proposed design prevents insider attacks from tampering with application service before and after it was launched in a cloud provider platform.

Keywords: cloud computing, SaaS Platform, TPM, trustiness, code source certification, multi-signature schemes

Procedia PDF Downloads 271
3325 Geothermal Resources to Ensure Energy Security During Climate Change

Authors: Debasmita Misra, Arthur Nash

Abstract:

Energy security and sufficiency enables the economic development and welfare of a nation or a society. Currently, the global energy system is dominated by fossil fuels, which is a non-renewable energy resource, which renders vulnerability to energy security. Hence, many nations have begun augmenting their energy system with renewable energy resources, such as solar, wind, biomass and hydro. However, with climate change, how sustainable are some of the renewable energy resources in the future is a matter of concern. Geothermal energy resources have been underexplored or underexploited in global renewable energy production and security, although it is gaining attractiveness as a renewable energy resource. The question is, whether geothermal energy resources are more sustainable than other renewable energy resources. High-temperature reservoirs (> 220 °F) can produce electricity from flash/dry steam plants as well as binary cycle production facilities. Most of the world’s high enthalpy geothermal resources are within the seismo-tectonic belt. However, exploration for geothermal energy is of great importance in conventional geothermal systems in order to improve its economic viability. In recent years, there has been an increase in the use and development of several exploration methods for geo-thermal resources, such as seismic or electromagnetic methods. The thermal infrared band of the Landsat can reflect land surface temperature difference, so the ETM+ data with specific grey stretch enhancement has been used to explore underground heat water. Another way of exploring for potential power is utilizing fairway play analysis for sites without surface expression and in rift zones. Utilizing this type of analysis can improve the success rate of project development by reducing exploration costs. Identifying the basin distribution of geologic factors that control the geothermal environment would help in identifying the control of resource concentration aside from the heat flow, thus improving the probability of success. The first step is compiling existing geophysical data. This leads to constructing conceptual models of potential geothermal concentrations which can then be utilized in creating a geodatabase to analyze risk maps. Geospatial analysis and other GIS tools can be used in such efforts to produce spatial distribution maps. The goal of this paper is to discuss how climate change may impact renewable energy resources and how could a synthesized analysis be developed for geothermal resources to ensure sustainable and cost effective exploitation of the resource.

Keywords: exploration, geothermal, renewable energy, sustainable

Procedia PDF Downloads 149
3324 The Construction of Women’s Leadership in the Swedish Armed Forces in the Context of the Women, Peace and Security Agenda

Authors: Sofia Sutera

Abstract:

Despite the introduction of the Women, Peace, and Security (WPS) Agenda in 2000, thanks to the UNSCR 1325 and subsequent resolutions, and the clear stance of the UN towards the support of increased participation of women in peace and security processes, women’s leadership in this context remains very low. Considering specifically the framework of peacekeeping operations, the aim of this paper is to analyze the way women’s leadership is constructed in the Swedish Armed Forces (SAF). In the context of the WPS Agenda, Sweden has been chosen as a case study because of the relevance of its singular feminist policies (the statement in 2014 from Wallström, previous and current Minister for Foreign Affairs and Deputy Prime Minister, that Sweden is pursuing a feminist foreign policy is a clear example). Moreover, the SAF adopted in 2016 the Handbok Gender. This policy addresses explicitly the gender perspective embraced by the Swedish military institution, a sui-generis organization even in the Scandinavian reality. Indeed, the SAF has assumed a clear commitment to represent its institution as gender aware and gender equal. The theoretical perspective utilized in this research, which focuses specifically on women, is feminism and particularly a feminist constructivist approach, with an institutional focus on the military institution, has been chosen. Taking into account the specificity of the feminist research, the above-mentioned gender policy has been examined by means of a critical discourse analysis (CDA) whose main aim is to investigate the social structures of discourse and the power relationships inherent to it. Thus, CDA appears to be quite relevant in order to understand the construction of women’s leadership in the Handbok Gender. Nevertheless, even in a country which officially identifies as feminist and which is characterized by a peculiar military institution, the conclusions of this analysis revealed that women’s leadership in peacekeeping operations remains very low.

Keywords: feminism, peacekeeping operations, swedish armed forces, UNSCR 1325, women's leadership, WPS agenda

Procedia PDF Downloads 131
3323 Redefining Doctors' Role in Terms of Medical Errors and Consumer Protection Act to Be in Line with Medical Ethics

Authors: Manushi Srivastava

Abstract:

Introduction: Doctor’s role, and relation with respect to patient care is at the core of medical ethics. The rapid pace of medical advances along with increasing consumer awareness about their rights and hike in cost of effective health care demand a robust, transparent and patient-friendly medical care system. However, doctors’ role performance is still in the frame of activity-passivity model of Doctor-Patient Relationship (DPR) where doctors act as parent and use to instruct their patients, without their consensus that is not going to help in the 21st century. Thus the current situation is a new challenge for traditional doctor-patient relationship after the introduction of Consumer Protection Act (CPA) in medical profession and the same is evidenced by increasing cases of medical litigation. To strengthen this system of medical services, the doctor plays a vital role, and the same should be reviewed in the present context. Objective: To understand the opinion of consultants regarding medical negligence and effect of Consumer Protection Act in terms of current practices of patient care. Method: This is a cross-sectional study in which both quantitative and qualitative methods are applied. Total 69 consultants were selected from multi-specialty hospitals of densely populated Varanasi city catering a population of about 1.8 million. Two-stage sampling was used for selection of respondents. At the first stage, selection of major wards (Medicine, Surgery, Ophthalmology, Gynaecology, Orthopaedics, and Paediatrics) was carried out, which are more susceptible to medical negligence. At the second stage, selection of consultants from the respective wards was carried out. In-depth Interviews were conducted with the help of semi-structured schedule. Two case studies of medical negligence were also carried out as part of the qualitative study. Analysis: Data were analyzed with the help of SPSS software (21.0 trial version). Semi-structured research tool was used to know consultant’s opinion about the pattern of medical negligence cases, litigations and claims made by patient community and inclusion of government medical services in CPA. Statistical analysis was done to describe data, and non-parametric test was used to observe the association between the variables. Analysis of Verbatim was used in case-study. Findings and Conclusion: Majority (92.8%) of consultants felt changes in the behaviour of community (patient) after implementation of CPA, as it had increased awareness about their rights. Less than half of the consultants opined that Medical Negligence is an Unintentional act of doctors and generally occurs due to communication gap and behavioural problem between doctor and patients. Experienced consultants ( > 10 years) pointed out that unethical practice by doctors and mal-intention of patient to harass doctors were additional reasons of Medical Negligence. In-depth interview revealed that now patients’ community expects more transparency and hence they demand cafeteria approach in diagnosis and management of cases. Thus as study results, we propose ‘Agreement Model’ of DPR to re-ensure ethical practice in medical profession.

Keywords: doctors, communication, consumer protection act (CPA), medical error

Procedia PDF Downloads 157
3322 Identity and Access Management for Medical Cyber-Physical Systems: New Technology and Security Solutions

Authors: Abdulrahman Yarali, Machica McClain

Abstract:

In the context of the increasing use of Cyber-Physical Systems (CPS) across critical infrastructure sectors, this paper addresses a crucial and emerging topic: the integration of Identity and Access Management (IAM) with Internet of Things (IoT) devices in Medical Cyber-Physical Systems (MCPS). It underscores the significance of robust IAM solutions in the expanding interconnection of IoT devices in healthcare settings, leveraging AI, ML, DL, Zero Trust Architecture (ZTA), biometric authentication advancements, and blockchain technologies. The paper advocates for the potential benefits of transitioning from traditional, static IAM frameworks to dynamic, adaptive solutions that can effectively counter sophisticated cyber threats, ensure the integrity and reliability of CPS, and significantly bolster the overall security posture. The paper calls for strategic planning, collaboration, and continuous innovation to harness these benefits. By emphasizing the importance of securing CPS against evolving threats, this research contributes to the ongoing discourse on cybersecurity and advocates for a collaborative approach to foster innovation and enhance the resilience of critical infrastructure in the digital era.

Keywords: CPS, IAM, IoT, AI, ML, authentication, models, policies, healthcare

Procedia PDF Downloads 11
3321 Application of Carbon Nanotubes as Cathodic Corrosion Protection of Steel Reinforcement

Authors: M. F. Perez, Ysmael Verde, B. Escobar, R. Barbosa, J. C. Cruz

Abstract:

Reinforced concrete is one of the most important materials in the construction industry. However, in recent years the durability of concrete structures has been a worrying problem, mainly due to corrosion of reinforcing steel; the consequences of corrosion in all cases lead to shortening of the life of the structure and decrease in quality of service. Since the emergence of this problem, they have implemented different methods or techniques to reduce damage by corrosion of reinforcing steel in concrete structures; as the use of polymeric materials as coatings for the steel rod, spiked inhibitors of concrete during mixing, among others, presenting different limitations in the application of these methods. Because of this, it has been used a method that has proved effective, cathodic protection. That is why due to the properties attributed to carbon nanotubes (CNT), these could act as cathodic corrosion protection. Mounting a three-electrode electrochemical cell, carbon steel as working electrode, saturated calomel electrode (SCE) as the reference electrode, and a graphite rod as a counter electrode to close the system is performed. Samples made were subjected to a cycling process in order to compare the results in the corrosion performance of a coating composed of CNT and the others based on an anticorrosive commercial painting. The samples were tested at room temperature using an electrolyte consisting NaCl and NaOH simulating the typical pH of concrete, ranging from 12.6 to 13.9. Three test samples were made of steel rod, white, with commercial anticorrosive paint and CNT based coating; delimiting the work area to a section of 0.71 cm2. Tests cyclic voltammetry and linear voltammetry electrochemical spectroscopy each impedance of the three samples were made with a window of potential vs SCE 0.7 -1.7 a scan rate of 50 mV / s and 100 mV / s. The impedance values were obtained by applying a sine wave of amplitude 50 mV in a frequency range of 100 kHz to 100 MHz. The results obtained in this study show that the CNT based coating applied to the steel rod considerably decreased the corrosion rate compared to the commercial coating of anticorrosive paint, because the Ecorr was passed increase as the cycling process. The samples tested in all three cases were observed by light microscopy throughout the cycling process and micrographic analysis was performed using scanning electron microscopy (SEM). Results from electrochemical measurements show that the application of the coating containing carbon nanotubes on the surface of the steel rod greatly increases the corrosion resistance, compared to commercial anticorrosive coating.

Keywords: anticorrosive, carbon nanotubes, corrosion, steel

Procedia PDF Downloads 474
3320 Cultivation of High-value Patent from the Perspective of Knowledge Diffusion: A Case Study of the Power Semiconductor Field

Authors: Lin Qing

Abstract:

[Objective/Significance] The cultivation of high-value patents is the focus and difficulty of patent work, which is of great significance to the construction of a powerful country with intellectual property rights. This work should not only pay attention to the existing patent applications, but also start from the pre-application to explore the high-value technical solutions as the core of high-value patents. [Methods/processes] Comply with the principle of scientific and technological knowledge diffusion, this study studies the top academic conference papers and their cited patent applications, taking the power semiconductor field as an example, using facts date show the feasibility and rationality of mining technology solutions from high quality research results to foster high value patents, stating the actual benefits of these achievements to the industry, giving patent protection suggestions for Chinese applicants comparative with field situation. [Results/Conclusion] The research shows that the quality of citation applications of ISPSD papers is significantly higher than the field average level, and the ability of Chinese applicants to use patent protection related achievements needs to be improved. This study provides a practical and highly targeted reference idea for patent administrators and researchers, and also makes a positive exploration for the practice of the spirit of breaking the five rules.

Keywords: high-value patents cultivation, technical solutions, knowledge diffusion, top academic conference papers, intellectual property information analysis

Procedia PDF Downloads 123
3319 Analysis of Veterinary Drug Residues and Pesticide Residues in Beehive Products

Authors: Alba Luna Jimenez, Maria Dolores Hernando

Abstract:

The administration of veterinary treatments at higher doses than the recommended Varroa mite control in beehive matrices has the potential to generate residues in the honeybee colony and in the derived products for consumption. Honeybee colonies can also be indirectly exposed to residues of plant protection products when foraging in crops, wildflowers near the crops, or in urban gardens just after spraying. The study evaluates the presence of both types of residues, veterinary treatments, and pesticides in beeswax, bee bread, and honey. The study was carried out in apiaries located in agricultural zones and forest areas in Andalusia, Spain. Up to nineteen residues were identified above LOQ using gas chromatography-triple quadrupole-mass spectrometry analysis (GC-MS/MS). Samples were extracted by a modified QuEChERs method. Chlorfenvinphos was detected in beeswax and bee bread despite its use is not authorized for Varroa mite control. Residues of fluvalinate-tau, authorized as veterinary treatment, were detected in most of the samples of beeswax and bee bread, presumably due to overdose or also to its potential for accumulation associated with its marked liposolubility. Residues of plant protection products were also detected in samples of beeswax and bee bread. Pesticide residues were detected above the LOQ that was established at 5 µg.kg⁻¹, which is the minimum concentration that can be quantified with acceptable accuracy and precision, as described in the European guidelines for pesticide residue analysis SANTE/11945/2015. No residues of phytosanitary treatments used in agriculture were detected in honey.

Keywords: honeybee colony, mass spectrometry analysis, pesticide residues, Varroa destructor, veterinary treatment

Procedia PDF Downloads 155
3318 Profiling Risky Code Using Machine Learning

Authors: Zunaira Zaman, David Bohannon

Abstract:

This study explores the application of machine learning (ML) for detecting security vulnerabilities in source code. The research aims to assist organizations with large application portfolios and limited security testing capabilities in prioritizing security activities. ML-based approaches offer benefits such as increased confidence scores, false positives and negatives tuning, and automated feedback. The initial approach using natural language processing techniques to extract features achieved 86% accuracy during the training phase but suffered from overfitting and performed poorly on unseen datasets during testing. To address these issues, the study proposes using the abstract syntax tree (AST) for Java and C++ codebases to capture code semantics and structure and generate path-context representations for each function. The Code2Vec model architecture is used to learn distributed representations of source code snippets for training a machine-learning classifier for vulnerability prediction. The study evaluates the performance of the proposed methodology using two datasets and compares the results with existing approaches. The Devign dataset yielded 60% accuracy in predicting vulnerable code snippets and helped resist overfitting, while the Juliet Test Suite predicted specific vulnerabilities such as OS-Command Injection, Cryptographic, and Cross-Site Scripting vulnerabilities. The Code2Vec model achieved 75% accuracy and a 98% recall rate in predicting OS-Command Injection vulnerabilities. The study concludes that even partial AST representations of source code can be useful for vulnerability prediction. The approach has the potential for automated intelligent analysis of source code, including vulnerability prediction on unseen source code. State-of-the-art models using natural language processing techniques and CNN models with ensemble modelling techniques did not generalize well on unseen data and faced overfitting issues. However, predicting vulnerabilities in source code using machine learning poses challenges such as high dimensionality and complexity of source code, imbalanced datasets, and identifying specific types of vulnerabilities. Future work will address these challenges and expand the scope of the research.

Keywords: code embeddings, neural networks, natural language processing, OS command injection, software security, code properties

Procedia PDF Downloads 102
3317 Encapsulation and Protection of Bioactive Nutrients Based on Ligand-Binding Property of Milk Proteins

Authors: Hao Cheng, Yingzhou Ni, Amr M. Bakry, Li Liang

Abstract:

Functional foods containing bioactive nutrients offer benefits beyond basic nutrition and hence the possibility of delaying and preventing chronic diseases. However, many bioactive nutrients degrade rapidly under food processing and storage conditions. Encapsulation can be used to overcome these limitations. Food proteins have been widely used as carrier materials for the preparation of nano/micro-particles because of their ability to form gels and emulsions and to interact with polysaccharides. The mechanisms of interaction between bioactive nutrients and proteins must be understood in order to develop protein-based lipid-free delivery systems. Beta-lactoglobulin, a small globular protein in milk whey, exhibits an affinity to a wide range of compounds. Alfa-tocopherol, resveratrol and folic acid were respectively bound to the central cavity, the outer surface near Trp19–Arg124 and the hydrophobic pocket in the groove between the alfa-helix and the beta-barrel of the protein. Beta-lactoglobulin could thus bind the three bioactive nutrients simultaneously to form protein-multi-ligand complexes. Beta-casein, an intrinsically unstructured but major milk protein, could also interact with resveratrol and folic acid to form complexes. These results suggest the potential to develop milk-protein-based complex carrier systems for encapsulation of multiple bioactive nutrients for functional food application and also pharmaceutical and medical uses.

Keywords: milk protein, bioactive nutrient, interaction, protection

Procedia PDF Downloads 405
3316 Conditionality in the European Union as a New Instrument to Guarantee the Principle of Separation of Powers

Authors: Ana Neves

Abstract:

The European Union’s multi-level constitutionalism is grounded in an intricate network of vertical and horizontal legal relationships among different levels and types of public authorities. In a very significant way since the 2008 crisis, evolving institutional arrangements and institutional dynamics in the European Union have been progressively impacting Member States and the terms under which national public authorities are organised, interact and exercise their powers. This impact occurs in both macro and micro dimensions. Several examples are relevant here, such as the involvement of national Parliaments in the activities of the European Union, the enhanced integration of public administrations, the side effects of the Council framework decision on the European Arrest Warrant, the European Union Justice Scoreboard, the protection of whistle-blowers regulation, the enhanced cooperation on the establishment of the European Public Prosecutor’s Office, the regime for the protection of the Union budget and the European Rule of Law Mechanism. A common trend or denominator underlies the deepening of institutional interdependence and the increased interactions between the European Union, Member States, and public authorities at different levels. This seems to be conditionality as a general principle. The European multi-level constitutionalism must be considered in the light of this conditionality principle, which does not “imply a relationship of command and obedience”. Nevertheless, it might be more effective or be a very compelling principle. It is as if the extension of the shared rule is being accompanied by a contrapuntal dialogue. The different public authorities at various levels are being called to rethink and readjust themselves within a broader and more plural framework concerning understanding the limitation of power.

Keywords: european union -, multi-level hierarchy, conditionality, separation of powers

Procedia PDF Downloads 103
3315 Investigation and Research on Construction Technology of Tenon and Mortise in Traditional Chinese Architecture

Authors: Liang Zhang

Abstract:

Chinese traditional architecture has developed a school of its own in the world. It has a different structure and construction technology from western architecture. Tenon and mortise structure and construction technology, as the key to the construction of traditional Chinese architecture, have been inherited for thousands of years by traditional craftsmen in various regions of China. However, the traditional architecture varies greatly in different times and regional cultures in China. It is still a lack of research whether this difference extends to mortise and tenon technology. In this study, we measured the mortise and tenon of traditional buildings in Fujian province, Yunnan province, and Northern China; Interviewed some old craftsmen about their traditional construction methods, And compared the today's traditional mortise and tenon technology with that of Song and Qing Dynasties. The results showed that although Chinese traditional architecture has the same origin, the mortise and tenon construction technology systems have been developed at different times, regions, and cultures. For example, tenon and mortise technology in Yunnan Province needs to ensure the ability of buildings to resist earthquakes, while that in Fujian Province needs to ensure the ability of buildings to withstand typhoons. People in different regions, cultures, and times have a different understanding of architectural aesthetics, and the evolution of tools also has different effects on mortise and tenon technology. This study explains the manifestations and causes of these differences. At the same time, due to the impact of modern architectural technology, mortise, and tenon, traditional technology is also rapidly disappearing. As a sorting and collection of mortise and tenon techniques of traditional Chinese architecture, this paper puts forward the corresponding traditional technology protection strategy, to guide the protection and maintenance of local traditional buildings.

Keywords: tenon and mortise, traditional Chinese architecture, traditional craftsmen, construction technology

Procedia PDF Downloads 146
3314 Protective Effect of Protocatechuic Acid Alone and in Combination with Ascorbic Acid in Aniline Hydrochloride Induced Spleen Toxicity in Rats

Authors: Aman Upaganlawar, Upasana Khairnar, Chandrashekhar Upasani

Abstract:

The present study was designed to evaluate the protective effects of protocatechuic acid alone and in combination with ascorbic acid in aniline hydrochloride-induced spleen toxicity in rats. Male Wistar rats of either sex (200-250g) were used and divided into different groups. Spleen toxicity was induced by aniline hydrochloride (100 ppm) in drinking water for 28 days. Treatment group received protocatechuic acid (40 mg/kg/day, p.o), ascorbic acid (40 mg/kg/day, p.o), and combination of protocatechuic acid (20 mg/kg/day, p.o) and ascorbic acid (20 mg/kg/day, p.o) followed by aniline hydrochloride. At the end of treatment period, serum and tissue parameters were evaluated. Rats supplemented with aniline hydrochloride showed a significant alteration in body weight, spleen weight, feed consumption, water intake, hematological parameters (Hemoglobin content, Red Blood Cells, White Blood Cells and Total iron content), tissue parameters (Lipid peroxidation, Reduced glutathione, Nitric oxide content) compared to control group. Histopathology of aniline hydrochloride-induced spleen showed significant damage compared to control rats. Treatment with Protocatechuic acid along with ascorbic acid showed better protection as compared to protocatechuic acid or ascorbic acid alone in aniline hydrochloride-induced spleen toxicity. In conclusion Treatment with protocatechuic acid and ascorbic acid in combination showed significant protection in aniline hydrochloride-induced splenic toxicity in rats.

Keywords: aniline, spleen toxicity, protocatechuic acid, ascorbic acid, antioxidants

Procedia PDF Downloads 350
3313 Overview on Sustainable Coastal Protection Structures

Authors: Suresh Reddi, Mathew Leslie, Vishnu S. Das

Abstract:

Sustainable design is a prominent concept across all sectors of engineering and its importance is widely recognized within the Arabian Gulf region. Despite that sustainable or soft engineering options are not widely deployed in coastal engineering projects and a preference for utilizing ‘hard engineering’ solutions remain. The concept of soft engineering lies in “working together” with the nature to manage the coastline. This approach allows hard engineering options, such as breakwaters or sea walls, to be minimized or even eliminated altogether. Hard structures provide a firm barrier to wave energy or flooding, but in doing so they often have a significant impact on the natural processes of the coastline. This may affect the area locally or impact on neighboring zones. In addition, they often have a negative environmental impact and may create a sense of disconnect between the marine environment and local users. Soft engineering options, seek to protect the coastline by working in harmony with the natural process of sediment transport/budget. They often consider new habitat creation and creating usable spaces that will increase the sense of connection with nature. Often soft engineering options, where appropriately deployed can provide a low-maintenance, aesthetically valued, natural line of coastal protection. This paper deals with an overview of the following: The widely accepted soft engineering practices across the world; How this approach has been considered by Ramboll in some recent projects in Middle East and Asia; Challenges and barriers to use in using soft engineering options in the region; Way forward towards more widespread adoption.

Keywords: coastline, hard engineering, low maintenance, soft engineering options

Procedia PDF Downloads 135
3312 Cloud Monitoring and Performance Optimization Ensuring High Availability

Authors: Inayat Ur Rehman, Georgia Sakellari

Abstract:

Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.

Keywords: cloud computing, cloud monitoring, performance optimization, high availability, scalability, resource allocation, load balancing, auto-scaling, data security, data privacy

Procedia PDF Downloads 52
3311 Nanocomplexes on the Base of Triterpene Saponins Isolated from Glycyrrhiza glabra and Saponaria officinalis Plants as an Efficient Adjuvants for Influenza Vaccine Use

Authors: Vladimir Berezin, Andrey Bogoyavlenskiy, Pavel Alexyuk, Madina Alexyuk, Aizhan Turmagambetova, Irina Zaitseva, Nadezhda Sokolova, Elmira Omirtaeva

Abstract:

Introduction: Triterpene saponins of plant origin are one of the most promising candidates for elaboration of novel adjuvants. Due to the combination of immunostimulating activity and the capacity interact with amphipathic molecules with formation of highly immunogenic nanocomplexes, triterpene saponins could serve as a good adjuvant/delivery system for vaccine use. In the research presented adjuvants on the base of nanocomplexes contained triterpene saponins isolated from Glycyrrhiza glabra and Saponaria officinalis plants indigenous to Kazakhstan were elaborated for influenza vaccine use. Methods: Purified triterpene saponins 'Glabilox' and 'SO1' with low toxicity and high immunostimulatory activity were isolated from plants Glycyrrhiza glabra L. and Saponaria officinalis L. by high-performance liquid chromatography (HPLC) and identified using electrospray ionization mass spectrometry (ESI-MS). Influenza virus A/St-Petersburg/5/09 (H1N1) propagated in 9-days old chicken embryos was concentrated and purified by centrifugation in sucrose gradient. Nanocomplexes contained lipids, and triterpene saponins Glabilox or SO1 were prepared by dialysis technique. Immunostimulating activity of experimental vaccine preparations was studied in vaccination/challenge experiments in mice. Results: Humoral and cellular immune responses and protection against influenza virus infection were examined after single subcutaneous and intranasal immunization. Mice were immunized subunit influenza vaccine (HA+NA) or whole virus inactivated influenza vaccine in doses 3.0/5.0/10.0 µg antigen/animal mixed with adjuvant in dose 15.0 µg/animal. Sera were taken 14-21 days following single immunization and mice challenged by A/St-Petersburg/5/09 influenza virus in dose 100 EID₅₀. Study of experimental influenza vaccine preparations in animal immunization experiments has shown that subcutaneous and intranasal immunization with subunit influenza vaccine mixed with nanocomplexes contained Glabilox or SO1 saponins stimulated high levels of humoral immune response (IgM, IgA, IgG1, IgG2a, and IgG2b antibody) and cellular immune response (IL-2, IL-4, IL-10, and IFN-γ cytokines) and resulted 80-90% protection against lethal influenza infection. Also, single intranasal and single subcutaneous immunization with whole virus inactivated influenza vaccine mixed with nanoparticulated adjuvants stimulated high levels of humoral and cellular immune responses and provided 100% protection against lethal influenza infection. Conclusion: The results of study have shown that nanocomplexes contained purified triterpene saponins Glabilox and SO1 isolated from plants indigenous to Kazakhstan can stimulate a broad spectrum of humoral and cellular immune responses and induce protection against lethal influenza infection. Both elaborated adjuvants are promising for incorporation to influenza vaccine intended for subcutaneous and intranasal routes of immunization.

Keywords: influenza vaccine, adjuvants, triterpene saponins, immunostimulating activity

Procedia PDF Downloads 136
3310 The Confiscation of Ill-Gotten Gains in Pollution: The Taiwan Experience and the Interaction between Economic Analysis of Law and Environmental Economics Perspectives

Authors: Chiang-Lead Woo

Abstract:

In reply to serious environmental problems, the Taiwan government quickly adjusted some articles to suit the needs of environmental protection recently, such as the amendment to article 190-1 of the Taiwan Criminal Code. The transfer of legislation comes as an improvement which canceled the limitation of ‘endangering public safety’. At the same time, the article 190-1 goes from accumulative concrete offense to abstract crime of danger. Thus, the public looks forward to whether environmental crime following the imposition of fines or penalties works efficiently in anti-pollution by the deterrent effects. However, according to the addition to article 38-2 of the Taiwan Criminal Code, the confiscation system seems controversial legislation to restrain ill-gotten gains. Most prior studies focused on comparisons with the Administrative Penalty Law and the Criminal Code in environmental issue in Taiwan; recently, more and more studies emphasize calculations on ill-gotten gains. Hence, this paper try to examine the deterrent effect in environmental crime by economic analysis of law and environmental economics perspective. This analysis shows that only if there is an extremely high probability (equal to 100 percent) of an environmental crime case being prosecuted criminally by Taiwan Environmental Protection Agency, the deterrent effects will work. Therefore, this paper suggests deliberating the confiscation system from supplementing the System of Environmental and Economic Accounting, reasonable deterrent fines, input management, real-time system for detection of pollution, and whistleblower system, environmental education, and modernization of law.

Keywords: confiscation, ecosystem services, environmental crime, ill-gotten gains, the deterrent effect, the system of environmental and economic accounting

Procedia PDF Downloads 163
3309 A Comparison of Methods for Neural Network Aggregation

Authors: John Pomerat, Aviv Segev

Abstract:

Recently, deep learning has had many theoretical breakthroughs. For deep learning to be successful in the industry, however, there need to be practical algorithms capable of handling many real-world hiccups preventing the immediate application of a learning algorithm. Although AI promises to revolutionize the healthcare industry, getting access to patient data in order to train learning algorithms has not been easy. One proposed solution to this is data- sharing. In this paper, we propose an alternative protocol, based on multi-party computation, to train deep learning models while maintaining both the privacy and security of training data. We examine three methods of training neural networks in this way: Transfer learning, average ensemble learning, and series network learning. We compare these methods to the equivalent model obtained through data-sharing across two different experiments. Additionally, we address the security concerns of this protocol. While the motivating example is healthcare, our findings regarding multi-party computation of neural network training are purely theoretical and have use-cases outside the domain of healthcare.

Keywords: neural network aggregation, multi-party computation, transfer learning, average ensemble learning

Procedia PDF Downloads 157
3308 Protective Role of Curcumin against Ionising Radiation of Gamma Ray

Authors: Turban Kar, Maitree Bhattacharyya

Abstract:

Curcumin, a dietary antioxidant has been identified as a wonder molecule to possess therapeutic properties protecting the cellular macromolecules from oxidative damage. In our experimental study, we have explored the effectiveness of curcumin in protecting the structural paradigm of Human Serum Albumin (HSA) when exposed to gamma irradiation. HSA, being an important transport protein of the circulatory system, is involved in binding of variety of metabolites, drugs, dyes and fatty acids due to the presence of hydrophobic pockets inside the structure. HSA is also actively involved in the transportation of drugs and metabolites to their targets, because of its long half-life and regulation of osmotic blood pressure. Gamma rays, in its increasing concentration, results in structural alteration of the protein and superoxide radical generation. Curcumin, on the other hand, mitigates the damage, which has been evidenced in the following experiments. Our study explores the possibility for protection by curcumin during the molecular and conformational changes of HSA when exposed to gamma irradiation. We used a combination of spectroscopic methods to probe the conformational ensemble of the irradiated HSA and finally evaluated the extent of restoration by curcumin. SDS - PAGE indicated the formation of cross linked aggregates as a consequence of increasing exposure of gamma radiation. CD and FTIR spectroscopy inferred significant decrease in alpha helix content of HSA from 57% to 15% with increasing radiation doses. Steady state and time resolved fluorescence studies complemented the spectroscopic measurements when lifetime decay was significantly reduced from 6.35 ns to 0.37 ns. Hydrophobic and bityrosine study showed the effectiveness of curcumin for protection against radiation induced free radical generation. Moreover, bityrosine and hydrophobic profiling of gamma irradiated HSA in presence and absence of curcumin provided light on the formation of ROS species generation and the protective (magical) role of curcumin. The molecular mechanism of curcumin protection to HSA from gamma irradiation is yet unknown, though a possible explanation has been proposed in this work using Thioflavin T assay. It was elucidated, that when HSA is irradiated at low dose of gamma radiation in presence of curcumin, it is capable of retaining the native characteristic properties to a greater extent indicating stabilization of molecular structure. Thus, curcumin may be utilized as a therapeutic strategy to protect cellular proteins.

Keywords: Bityrosine content, conformational change, curcumin, gamma radiation, human serum albumin

Procedia PDF Downloads 152
3307 The Role of an Independent Children’s Lawyer in Child Inclusive Mediation in Complex Parenting Disputes

Authors: Neisha Shepherd

Abstract:

In Australia, an independent children's lawyer is appointed to represent a child in parenting disputes in the Federal Circuit and Family Court of Australia, where there are complex issues such as child protection, family violence, high conflict, relocation, and parental alienation. The appointment of an Independent Children's Lawyer is to give effect in the family law proceedings of the United Nations Convention on the Rights of the Child, in particular Article 3.1, 12.1, and 12.2. There is a strong focus on alternative dispute resolution in the Australian Family Law jurisdiction in matters that are before the Court that has formed part of the case management pathways. An Independent Children's Lawyer's role is even more crucial in assisting families in resolving the most complex parenting disputes through mediation as they are required to act impartial and be independent of the Court and the parties. A child has the right to establish a professional relationship with the Independent Children's Lawyer. This relationship is usually established over a period of time, and the child is afforded the opportunity to talk about their views and wishes and participate in decisions that affect them. In considering the views and wishes of the child, the Independent Children's lawyer takes into account the different emotional, cognitive, and intellectual developmental levels, family structures, family dynamics, sibling relationships, religious and cultural backgrounds; and that children are vulnerable to external pressures when caught in disputes involving their parents. With the increase of child-inclusive mediations being used to resolve family disputes in the best interests of a child, an Independent Children's Lawyer can have a critical role in this process with the specialised skills that they have working with children in the family law jurisdiction. This paper will discuss how inclusive child mediation with the assistance of an Independent Children's Lawyer can assist in the resolution of some of the most complex parenting disputes by examining through case studies: the effectiveness and challenges of such an approach; strategies to work with child clients, adolescents, and sibling groups; ways to provide feedback regarding a child's views and wishes and express a child's understanding, actual experiences and perspective to parties in a mediation and whether it is appropriate to do so; strategies and examples to assist in developing parenting plans or orders that are in the best interest of a child that is workable and achievable; how to deal with cases that involve serious child protection and family violence and strategies to ensure that child safety is paramount; the importance of feedback to the child client. Finally this paper will explore some of the challenges for Independent Children's Lawyers in relation to child-inclusive mediations where matters do not resolve.

Keywords: child inclusive mediation, independent children's lawyer, family violence, child protection

Procedia PDF Downloads 112
3306 Technological Challenges for First Responders in Civil Protection; the RESPOND-A Solution

Authors: Georgios Boustras, Cleo Varianou Mikellidou, Christos Argyropoulos

Abstract:

Summer 2021 was marked by a number of prolific fires in the EU (Greece, Cyprus, France) as well as outside the EU (USA, Turkey, Israel). This series of dramatic events have stretched national civil protection systems and first responders in particular. Despite the introduction of National, Regional and International frameworks (e.g. rescEU), a number of challenges have arisen, not only related to climate change. RESPOND-A (funded by the European Commission by Horizon 2020, Contract Number 883371) introduces a unique five-tier project architectural structure for best associating modern telecommunications technology with novel practices for First Responders of saving lives, while safeguarding themselves, more effectively and efficiently. The introduced architecture includes Perception, Network, Processing, Comprehension, and User Interface layers, which can be flexibly elaborated to support multiple levels and types of customization, so, the intended technologies and practices can adapt to any European Environment Agency (EEA)-type disaster scenario. During the preparation of the RESPOND-A proposal, some of our First Responder Partners expressed the need for an information management system that could boost existing emergency response tools, while some others envisioned a complete end-to-end network management system that would offer high Situational Awareness, Early Warning and Risk Mitigation capabilities. The intuition behind these needs and visions sits on the long-term experience of these Responders, as well, their smoldering worry that the evolving threat of climate change and the consequences of industrial accidents will become more frequent and severe. Three large-scale pilot studies are planned in order to illustrate the capabilities of the RESPOND-A system. The first pilot study will focus on the deployment and operation of all available technologies for continuous communications, enhanced Situational Awareness and improved health and safety conditions for First Responders, according to a big fire scenario in a Wildland Urban Interface zone (WUI). An important issue will be examined during the second pilot study. Unobstructed communication in the form of the flow of information is severely affected during a crisis; the flow of information between the wider public, from the first responders to the public and vice versa. Call centers are flooded with requests and communication is compromised or it breaks down on many occasions, which affects in turn – the effort to build a common operations picture for all firstr esponders. At the same time the information that reaches from the public to the operational centers is scarce, especially in the aftermath of an incident. Understandably traffic if disrupted leaves no other way to observe but only via aerial means, in order to perform rapid area surveys. Results and work in progress will be presented in detail and challenges in relation to civil protection will be discussed.

Keywords: first responders, safety, civil protection, new technologies

Procedia PDF Downloads 138
3305 Adopting the Community Health Workers Master List Registry for Community Health Workforce in Kenya

Authors: Gikunda Aloise, Mjema Saida, Barasa Herbert, Wanyungu John, Kimani Maureen

Abstract:

Background: Community Health Workforce (CHW) is health care providers at the community level (Level 1) and serves as a bridge between the community and the formal healthcare system. This human resource has enormous potential to extend healthcare services and ensures that the vulnerable, marginalized, and hard-to-reach populations have access to quality healthcare services at the community and primary health facility levels. However, these cadres are neither recognized, remunerated, nor in most instances, registered in a master list. Management and supervision of CHWs is not easy if their individual demographics, training capacity and incentives is not well documented through a centralized registry. Description: In February 2022, Amref supported the Kenya Ministry of Health in developing a community health workforce database called Community Health Workers Master List Registry (CHWML), which is hosted in Kenya Health Information System (KHIS) tracker. CHW registration exercise was through a sensitization meeting conducted by the County Community Health Focal Person for the Sub-County Community Health Focal Person and Community Health Assistants who uploaded information on individual demographics, training undertaken and incentives received by CHVs. Care was taken to ensure compliance with Kenyan laws on the availability and use of personal data as prescribed by the Data Protection Act, 2019 (DPA). Results and lessons learnt: By June 2022, 80,825 CHWs had been registered in the system; 78,174 (96%) CHVs and 2,636 (4%) CHAs. 25,235 (31%) are male, 55,505 (68%) are female & 85 (1%) are transgender. 39,979. (49%) had secondary education and 2500 (3%) had no formal education. Only 27 641 (34%) received a monthly stipend. 68,436 CHVs (85%) had undergone basic training. However, there is a need to validate the data to align with the current situation in the counties. Conclusions/Next steps: The use of CHWML will unlock opportunities for building more resilient and sustainable health systems and inform financial planning, resource allocation, capacity development, and quality service delivery. The MOH will update the CHWML guidelines in adherence to the data protection act which will inform standard procedures for maintaining, updating the registry and integrate Community Health Workforce registry with the HRH system.

Keywords: community health registry, community health volunteers (CHVs), community health workers masters list (CHWML), data protection act

Procedia PDF Downloads 123
3304 Scenario Analysis to Assess the Competitiveness of Hydrogen in Securing the Italian Energy System

Authors: Gianvito Colucci, Valeria Di Cosmo, Matteo Nicoli, Orsola Maria Robasto, Laura Savoldi

Abstract:

The hydrogen value chain deployment is likely to be boosted in the near term by the energy security measures planned by European countries to face the recent energy crisis. In this context, some countries are recognized to have a crucial role in the geopolitics of hydrogen as importers, consumers and exporters. According to the European Hydrogen Backbone Initiative, Italy would be part of one of the 5 corridors that will shape the European hydrogen market. However, the set targets are very ambitious and require large investments to rapidly develop effective hydrogen policies: in this regard, scenario analysis is becoming increasingly important to support energy planning, and energy system optimization models appear to be suitable tools to quantitively carry on that kind of analysis. The work aims to assess the competitiveness of hydrogen in contributing to the Italian energy security in the coming years, under different price and import conditions, using the energy system model TEMOA-Italy. A wide spectrum of hydrogen technologies is included in the analysis, covering the production, storage, delivery, and end-uses stages. National production from fossil fuels with and without CCS, as well as electrolysis and import of low-carbon hydrogen from North Africa, are the supply solutions that would compete with other ones, such as natural gas, biomethane and electricity value chains, to satisfy sectoral energy needs (transport, industry, buildings, agriculture). Scenario analysis is then used to study the competition under different price and import conditions. The use of TEMOA-Italy allows the work to catch the interaction between the economy and technological detail, which is much needed in the energy policies assessment, while the transparency of the analysis and of the results is ensured by the full accessibility of the TEMOA open-source modeling framework.

Keywords: energy security, energy system optimization models, hydrogen, natural gas, open-source modeling, scenario analysis, TEMOA

Procedia PDF Downloads 109
3303 A Proposed Optimized and Efficient Intrusion Detection System for Wireless Sensor Network

Authors: Abdulaziz Alsadhan, Naveed Khan

Abstract:

In recent years intrusions on computer network are the major security threat. Hence, it is important to impede such intrusions. The hindrance of such intrusions entirely relies on its detection, which is primary concern of any security tool like Intrusion Detection System (IDS). Therefore, it is imperative to accurately detect network attack. Numerous intrusion detection techniques are available but the main issue is their performance. The performance of IDS can be improved by increasing the accurate detection rate and reducing false positive. The existing intrusion detection techniques have the limitation of usage of raw data set for classification. The classifier may get jumble due to redundancy, which results incorrect classification. To minimize this problem, Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), and Local Binary Pattern (LBP) can be applied to transform raw features into principle features space and select the features based on their sensitivity. Eigen values can be used to determine the sensitivity. To further classify, the selected features greedy search, back elimination, and Particle Swarm Optimization (PSO) can be used to obtain a subset of features with optimal sensitivity and highest discriminatory power. These optimal feature subset used to perform classification. For classification purpose, Support Vector Machine (SVM) and Multilayer Perceptron (MLP) used due to its proven ability in classification. The Knowledge Discovery and Data mining (KDD’99) cup dataset was considered as a benchmark for evaluating security detection mechanisms. The proposed approach can provide an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.

Keywords: Particle Swarm Optimization (PSO), Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), Local Binary Pattern (LBP), Support Vector Machine (SVM), Multilayer Perceptron (MLP)

Procedia PDF Downloads 359
3302 Investigating the Performance of Power Industry in a Developing Nation for Industrialization and Environmental Security

Authors: Abel Edeowede Abhulimen

Abstract:

Due to supply irregularity and frequent outages, the need for reliability in power supply has grown unsatisfactorily over time in developing nations, impeding industrialization and fueling insecurity. This article attempts to break down the Nigerian power issue into its numerous sub-sectors in order to pinpoint the industry's ailment and suggest a viable fix. Monthly average performance data were obtained for the various sub-sectors across the industry for eight consecutive quarters. Whereas the amount of energy generated was found to be insufficient to engender industrialization in a nation like Nigeria, the transmission infrastructure was inadequate for the amount of power needed to be wheeled. Additionally, the distribution sub-sector was plagued with problems such as revenue collection inefficiency, severe enough to impede the growth of the entire industry. The country's goal of attaining energy sufficiency and industrialization would significantly be closer to reality with a conscious effort to increase the base of power generation through aggressive investment in Combined Cycle Gas Turbines (CCGT), decentralization of the transmission infrastructure, and strict monitoring of the distribution sub-sector for improved accountability and system reliability.

Keywords: performance, power industry, industrialization, security, energy

Procedia PDF Downloads 66
3301 An Empirical Study of Factors that Impact Government E-Services Acceptance by Citizens: Case Study from UAE

Authors: Emad Bataineh, Sara Al-Mutawa

Abstract:

The primary focus of this study is to investigate and identify the perceptions of potential end users relating to factors which impact on e-services acceptance. Technology Acceptance Model (TAM) has been adopted in this study as it can be extended when technologies are introduced. This research validates the developed TAM model and evaluates the variance of the outcome variable (acceptance of e-services). Five factors were adopted as determinants of acceptance of e-services: ease of use, security, trust, web skills, and language. The study was undertaken in the General Directorate of Residency and Foreigners Affairs (GDRFA) in the UAE. A quantitative survey methodology was adopted in this study, which surveyed 466 customers who use the GDRFA e-services. The overall findings revealed that security language, web skills and support significantly affected ease of use and perceived usefulness. However, the trust doesn’t affect the ease of use. Further, ease of use significantly affects intention to use and perceived usefulness while in turn intention to use was influenced by perceived usefulness. This study offers an understanding of people’s adoption of e-government services with the help of established theories such as TAM and various factors that influence the e-government adoption with reference to UAE.

Keywords: e-government portal, e-service, usability, TAM model

Procedia PDF Downloads 426
3300 Study of the Protection of Induction Motors

Authors: Bencheikh Abdellah

Abstract:

In this paper, we present a mathematical model dedicated to the simulation breaks bars in a three-phase cage induction motor. This model is based on a mesh circuit representing the rotor cage. The tested simulation allowed us to demonstrate the effectiveness of this model to describe the behavior of the machine in a healthy state, failure.

Keywords: AC motors, squirrel cage, diagnostics, MATLAB, SIMULINK

Procedia PDF Downloads 432
3299 An Analysis of Non-Elliptic Curve Based Primality Tests

Authors: William Wong, Zakaria Alomari, Hon Ching Lai, Zhida Li

Abstract:

Modern-day information security depends on implementing Diffie-Hellman, which requires the generation of prime numbers. Because the number of primes is infinite, it is impractical to store prime numbers for use, and therefore, primality tests are indispensable in modern-day information security. A primality test is a test to determine whether a number is prime or composite. There are two types of primality tests, which are deterministic tests and probabilistic tests. Deterministic tests are adopting algorithms that provide a definite answer whether a given number is prime or composite. While in probabilistic tests, a probabilistic result would be provided, there is a degree of uncertainty. In this paper, we review three probabilistic tests: the Fermat Primality Test, the Miller-Rabin Test, and the Baillie-PSW Test, as well as one deterministic test, the Agrawal-Kayal-Saxena (AKS) Test. Furthermore, we do an analysis of these tests. All of the reviews discussed are not based on the Elliptic Curve. The analysis demonstrates that, in the majority of real-world scenarios, the Baillie- PSW test’s favorability stems from its typical operational complexity of O(log 3n) and its capacity to deliver accurate results for numbers below 2^64.

Keywords: primality tests, Fermat’s primality test, Miller-Rabin primality test, Baillie-PSW primality test, AKS primality test

Procedia PDF Downloads 84