Search results for: toxicity service standard
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9139

Search results for: toxicity service standard

7639 Gas Transmission Pipeline Integrity Management System Through Corrosion Mitigation and Inspection Strategy: A Case Study of Natural Gas Transmission Pipeline from Wafa Field to Mellitah Gas Plant in Libya

Authors: Osama Sassi, Manal Eltorki, Iftikhar Ahmad

Abstract:

Poor integrity is one of the major causes of leaks and accidents in gas transmission pipelines. To ensure safe operation, it is must to have efficient and effective pipeline integrity management (PIM) system. The corrosion management is one of the important aspects of successful pipeline integrity management program together design, material selection, operations, risk evaluation and communication aspects to maintain pipelines in a fit-for-service condition. The objective of a corrosion management plan is to design corrosion mitigation, monitoring, and inspection strategy, and for maintenance in a timely manner. This paper presents the experience of corrosion management of a gas transmission pipeline from Wafa field to Mellitah gas plant in Libya. The pipeline is 525.5 km long and having 32 inches diameter. It is a buried pipeline. External corrosion on pipeline is controlled with a combination of coatings and cathodic protection while internal corrosion is controlled with a combination of chemical inhibitors, periodic cleaning and process control. The monitoring and inspection techniques provide a way to measure the effectiveness of corrosion control systems and provide an early warning when changing conditions may be causing a corrosion problem. This paper describes corrosion management system used in Mellitah Oil & Gas BV for its gas transmission pipeline based on standard practices of corrosion mitigation and inspection.

Keywords: corrosion mitigation on gas transmission pipelines, pipeline integrity management, corrosion management of gas pipelines, prevention and inspection of corrosion

Procedia PDF Downloads 67
7638 Patten of Heparin Dosing as Venous Thromboembolism Prophylaxis in Adult Underweight Patients Admitted to Critical Care Units at a Tertiary Hospital

Authors: Nouf Al Harthi

Abstract:

Venous thromboembolism (VTE) is one of the most common causes of hospital-related deaths in critically ill patients. Guidelines recommended VTE prophylaxis with standardized, fixed doses for most patients. The underweight population has limited data to guide the appropriate drug and dosing regimen. The aim of this study was to describe the pattern of VTE prophylaxis dose regimens for underweighted critically ill adult patients and the prevalence of associated VTE and bleeding. This study is a retrospective cohort study, conducted in King Abdulaziz Medical City, Saudi Arabia. It included all critical patients admitted to the intensive care units and were above 14 years old with weight less than 50 kg or BMI of 18.5 kg/m2 or less and were on heparin as VTE prophylaxis for more than 72 hours from January 2016 until January 2020. After screening 270 patients, only 40 patients were included in this study according to our inclusion and exclusion criteria. Only 6 patients (15%) received VTE prophylaxis as an adjusted dose of heparin 2500 U Q12, while the rest of the patients were taking standard dosing of heparin, 5000 U Q12 was given to 21 (52.50%) patients and 5000 U Q8 was given to 13 (32.50%) patients. None of the adjusted doses developed any complications such as VTE or bleeding. There was no significant difference compared with the standard dose group. This study focused on describing the pattern of heparin doses as VTE prophylaxis in underweight patients. We also compared the standard dosing and adjusted dosage of VTE prophylaxis on underweight patients and any complications. There was no significant difference in the complication’s outcome or benefits between the two groups.

Keywords: venous thromboembolism prophylaxis, heparin, underweight patients, adult, critical care units

Procedia PDF Downloads 88
7637 Assessment of Access to Water, Sanitation and Hygiene, in Relation to the SDG 6, in Small Towns in Senegal: The Case of the Town of Foundiougne

Authors: Elhadji Mamadou Sonko, Ndiogou Sankhare, Jean Birane Gning, Cheikh Diop

Abstract:

In Senegal, small towns have problems of access to water, hygiene, and sanitation. This study aims to assess the situation in Foundiougne. The methodology includes a literature review, semi-structured interviews with stakeholders, surveys of 100 households, and observation. The results show that 35% of households have unimproved water services, 46% have limited service, and 19% have basic service. Regarding sanitation, 77% of households have basic sanitation services, and 23% have limited sanitation services. Manual emptying alone is practiced by 4% of households, while 17% combine it with mechanical emptying. Household wastewater is disposed of in streets, vacant land, and concession yards. The emptied sludge is discharged into the environment without treatment. Hand washing is practiced by 98% of households. These results show that there is real work to be done at the small towns level to close the water and sanitation gap in order to achieve SDG 6 targets in Senegal.

Keywords: foundiougne, SDG 6, senegal, small towns, water sanitation ang hygiene

Procedia PDF Downloads 121
7636 Mobi Navi Tour for Rescue Operations

Authors: V. R. Sadasivam, M. Vipin, P. Vineeth, M. Sajith, G. Sathiskumar, R. Manikandan, N. Vijayarangan

Abstract:

Global positioning system technology is what leads to such things as navigation systems, GPS tracking devices, GPS surveying and GPS mapping. All that GPS does is provide a set of coordinates which represent the location of GPS units with respect to its latitude, longitude and elevation on planet Earth. It also provides time, which is accurate. The tracking devices themselves come in different flavors. They will contain a GPS receiver, and GPS software, along with some way of transmitting the resulting coordinates. GPS in mobile tend to use radio waves to transmit their location to another GPS device. The purpose of this prototype “Mobi Navi Tour for Rescue Operation” timely communication, and lightning fast decision-making with a group of people located in different places with a common goal. Timely communication and tracking the people are a critical issue in many situations, environments. Expedited can find missing person by sending the location and other related information to them through mobile. Information must be drawn from the caller and entered into the system by the administrator or a group leader and transferred to the group leader. This system will locate the closest available person, a group of people working in an organization/company or vehicle to determine availability and their position to track them. Misinformation cannot lead to the wrong decision in the rapidly paced environment in a normal and an abnormal situation. In “Mobi Navi Tour for Rescue Operation” we use Google Cloud Messaging for android (GCM) which is a service that helps developers send data from servers to their android applications on android devices. The service provides a simple, lightweight mechanism that servers can use to tell mobile applications to contact the server directly, to fetch updated application or user data.

Keywords: android, gps, tour, communication, service

Procedia PDF Downloads 393
7635 Using Lean-Six Sigma Philosophy to Enhance Revenues and Improve Customer Satisfaction: Case Studies from Leading Telecommunications Service Providers in India

Authors: Senthil Kumar Anantharaman

Abstract:

Providing telecommunications based network services in developing countries like India which has a population of 1.5 billion people, so that these services reach every individual, is one of the greatest challenges the country has been facing in its journey towards economic growth and development. With growing number of telecommunications service providers in the country, a constant challenge that has been faced by these providers is in providing not only quality but also delightful customer experience while simultaneously generating enhanced revenues and profits. Thus, the role played by process improvement methodologies like Six Sigma cannot be undermined and specifically in telecom service provider based operations, it has provided substantial benefits. Therefore, it advantages are quite comparable to its applications and advantages in other sectors like manufacturing, financial services, information technology-based services and Healthcare services. One of the key reasons that this methodology has been able to reap great benefits in telecommunications sector is that this methodology has been combined with many of its competing process improvement techniques like Theory of Constraints, Lean and Kaizen to give the maximum benefit to the service providers thereby creating a winning combination of organized process improvement methods for operational excellence thereby leading to business excellence. This paper discusses about some of the key projects and areas in the end to end ‘Quote to Cash’ process at big three Indian telecommunication companies that have been highly assisted by applying Six Sigma along with other process improvement techniques. While the telecommunication companies which we have considered, is primarily in India and run by both private operators and government based setups, the methodology can be applied equally well in any other part of developing countries around the world having similar context. This study also compares the enhanced revenues that can arise out of appropriate opportunities in emerging market scenarios, that Six Sigma as a philosophy and methodology can provide if applied with vigour and robustness. Finally, the paper also comes out with a winning framework in combining Six Sigma methodology with Kaizen, Lean and Theory of Constraints that will enhance both the top-line as well as the bottom-line while providing the customers a delightful experience.

Keywords: emerging markets, lean, process improvement, six sigma, telecommunications, theory of constraints

Procedia PDF Downloads 160
7634 Point-of-Interest Recommender Systems for Location-Based Social Network Services

Authors: Hoyeon Park, Yunhwan Keon, Kyoung-Jae Kim

Abstract:

Location Based Social Network services (LBSNs) is a new term that combines location based service and social network service (SNS). Unlike traditional SNS, LBSNs emphasizes empirical elements in the user's actual physical location. Point-of-Interest (POI) is the most important factor to implement LBSNs recommendation system. POI information is the most popular spot in the area. In this study, we would like to recommend POI to users in a specific area through recommendation system using collaborative filtering. The process is as follows: first, we will use different data sets based on Seoul and New York to find interesting results on human behavior. Secondly, based on the location-based activity information obtained from the personalized LBSNs, we have devised a new rating that defines the user's preference for the area. Finally, we have developed an automated rating algorithm from massive raw data using distributed systems to reduce advertising costs of LBSNs.

Keywords: location-based social network services, point-of-interest, recommender systems, business analytics

Procedia PDF Downloads 225
7633 A Review of the Long Term Effects of In-Service Training Towards Inclusive Education

Authors: Meenakshi Srivastava, Anke A. De Boer, Sip Jan Pij

Abstract:

Teacher’s preparedness towards special educational needs (SEN) of the students in regular schools is an important factor in making education inclusive as a goal to provide education for all. The current study measured the long term effects of an in-service teacher training programme which focused on the inclusion of students with a range of SEN. The programme was on three particular aspects: teachers’ attitudes, their knowledge about SEN and knowledge about teaching methods. A refresher course was also organized for participants of the initial training programme. The long term effects were examined by teachers using a self-report questionnaire (n = 38). The wider effects of the initial training were recorded by interviewing school principals (n = 4). Repeated measures of ANOVA revealed significant effects: more positive attitudes and increased knowledge about SEN among teachers who took the refresher course (n = 18) compared to those who had not (n = 19). Principals also found a more positive attitude, sensitivity and increased awareness about SEN among the participants.

Keywords: inclusion, students with special educational needs, teacher training, follow-up, attitudes change

Procedia PDF Downloads 120
7632 The Level of Satisfaction of the Training Program from the ASEAN Camp II: A Camp to Prepare Human Resources for AEC 2015

Authors: Tanakom Potjanapitak, Kevin Wongleedee

Abstract:

The purpose of this research study was to study the level of satisfaction of the faculty members who participated in the ASEAN camp which aimed to prepare them for the readiness of AEC 2015. The population of this study included all the faculty members who participated in the activities of the ASEAN camp during April, 2014. Based on the survey of 120 faculty members who answered the questionnaire, the data was complied by using SPSS. Mean and standard deviation were utilized in analyzing the data. The findings revealed that the average mean of satisfaction was 4.41, and standard deviation was 0.7188. Moreover, the average mean can be used to rank the level of satisfaction from each of the following factors: helpful knowledge, understandable knowledge, proper materials, suitable knowledge, schedule of activities, staff, and advertising.

Keywords: ASEAN camp, training, satisfaction, human resources

Procedia PDF Downloads 418
7631 The Internet of Things: A Survey of Authentication Mechanisms, and Protocols, for the Shifting Paradigm of Communicating, Entities

Authors: Nazli Hardy

Abstract:

Multidisciplinary application of computer science, interactive database-driven web application, the Internet of Things (IoT) represents a digital ecosystem that has pervasive technological, social, and economic, impact on the human population. It is a long-term technology, and its development is built around the connection of everyday objects, to the Internet. It is estimated that by 2020, with billions of people connected to the Internet, the number of connected devices will exceed 50 billion, and thus IoT represents a paradigm shift in in our current interconnected ecosystem, a communication shift that will unavoidably affect people, businesses, consumers, clients, employees. By nature, in order to provide a cohesive and integrated service, connected devices need to collect, aggregate, store, mine, process personal and personalized data on individuals and corporations in a variety of contexts and environments. A significant factor in this paradigm shift is the necessity for secure and appropriate transmission, processing and storage of the data. Thus, while benefits of the applications appear to be boundless, these same opportunities are bounded by concerns such as trust, privacy, security, loss of control, and related issues. This poster and presentation look at a multi-factor authentication (MFA) mechanisms that need to change from the login-password tuple to an Identity and Access Management (IAM) model, to the more cohesive to Identity Relationship Management (IRM) standard. It also compares and contrasts messaging protocols that are appropriate for the IoT ecosystem.

Keywords: Internet of Things (IoT), authentication, protocols, survey

Procedia PDF Downloads 291
7630 National Core Indicators - Aging and Disabilities: A Person-Centered Approach to Understanding Quality of Long-Term Services and Supports

Authors: Stephanie Giordano, Rosa Plasencia

Abstract:

In the USA, in 2013, public service systems such as Medicaid, aging, and disability systems undertook an effort to measure the quality of service delivery by examining the experiences and outcomes of those receiving public services. The goal of this effort was to develop a survey to measure the experiences and outcomes of those receiving public services, with the goal of measuring system performance for quality improvement. The performance indicators were developed through with input from directors of state aging and disability service systems, along with experts and stakeholders in the field across the United States. This effort, National Core Indicators –Aging and Disabilities (NCI-AD), grew out of National Core Indicators –Intellectual and Developmental Disabilities, an effort to measure developmental disability (DD) systems across the States. The survey tool and administration protocol underwent multiple rounds of testing and revision between 2013 and 2015. The measures in the final tool – called the Adult Consumer Survey (ACS) – emphasize not just important indicators of healthcare access and personal safety but also includes indicators of system quality based on person-centered outcomes. These measures indicate whether service systems support older adults and people with disabilities to live where they want, maintain relationships and engage in their communities and have choice and control in their everyday lives. Launched in 2015, the NCI-AD Adult Consumer Survey is now used in 23 states in the US. Surveys are conducted by NCI-AD trained surveyors via direct conversation with a person receiving public long-term services and supports (LTSS). Until 2020, surveys were only conducted in person. However, after a pilot to test the reliability of videoconference and telephone survey modes, these modes were adopted as an acceptable practice. The nature of the survey is that of a “guided conversation” survey administration allows for surveyor to use wording and terminology that is best understand by the person surveyed. The survey includes a subset of questions that may be answered by a proxy respondent who knows the person well if the person is receiving services in unable to provide valid responses on their own. Surveyors undergo a standardized training on survey administration to ensure the fidelity of survey administration. In addition to the main survey section, a Background Information section collects data on personal and service-related characteristics of the person receiving services; these data are typically collected through state administrative record. This information is helps provide greater context around the characteristics of people receiving services. It has also been used in conjunction with outcomes measures to look at disparity (including by race and ethnicity, gender, disability, and living arrangements). These measures of quality are critical for public service delivery systems to understand the unique needs of the population of older adults and improving the lives of older adults as well as people with disabilities. Participating states may use these data to identify areas for quality improvement within their service delivery systems, to advocate for specific policy change, and to better understand the experiences of specific populations of people served.

Keywords: quality of life, long term services and supports, person-centered practices, aging and disability research, survey methodology

Procedia PDF Downloads 110
7629 Arithmetic Operations Based on Double Base Number Systems

Authors: K. Sanjayani, C. Saraswathy, S. Sreenivasan, S. Sudhahar, D. Suganya, K. S. Neelukumari, N. Vijayarangan

Abstract:

Double Base Number System (DBNS) is an imminent system of representing a number using two bases namely 2 and 3, which has its application in Elliptic Curve Cryptography (ECC) and Digital Signature Algorithm (DSA).The previous binary method representation included only base 2. DBNS uses an approximation algorithm namely, Greedy Algorithm. By using this algorithm, the number of digits required to represent a larger number is less when compared to the standard binary method that uses base 2 algorithms. Hence, the computational speed is increased and time being reduced. The standard binary method uses binary digits 0 and 1 to represent a number whereas the DBNS method uses binary digit 1 alone to represent any number (canonical form). The greedy algorithm uses two ways to represent the number, one is by using only the positive summands and the other is by using both positive and negative summands. In this paper, arithmetic operations are used for elliptic curve cryptography. Elliptic curve discrete logarithm problem is the foundation for most of the day to day elliptic curve cryptography. This appears to be a momentous hard slog compared to digital logarithm problem. In elliptic curve digital signature algorithm, the key generation requires 160 bit of data by usage of standard binary representation. Whereas, the number of bits required generating the key can be reduced with the help of double base number representation. In this paper, a new technique is proposed to generate key during encryption and extraction of key in decryption.

Keywords: cryptography, double base number system, elliptic curve cryptography, elliptic curve digital signature algorithm

Procedia PDF Downloads 392
7628 Technological Ensuring of the Space Reflector Antennas Manufacturing Process from Carbon Fiber Reinforced Plastics

Authors: Pyi Phyo Maung

Abstract:

In the study, the calculations of the permeability coefficient, values of the volume and porosity of a unit cell of a woven fabric before and after deformation based on the geometrical parameters are presented. Two types of carbon woven fabric structures were investigated: standard type, which integrated the filament, has a cross sectional shape of a cylinder and spread tow type, which has a rectangular cross sectional shape. The space antennas reflector, which distinctive feature is the presence of the surface of double curvature, is considered as the object of the research. Modeling of the kinetics of the process of impregnation of the reflector for the two types of carbon fabric’s unit cell structures was performed using software RAM-RTM. This work also investigated the influence of the grid angle between warp and welt of the unit cell on the duration of impregnation process. The results showed that decreasing the angle between warp and welt of the unit cell, the decreasing of the permeability values were occurred. Based on the results of calculation samples of the reflectors, their quality was determined. The comparisons of the theoretical and experimental results have been carried out. Comparison of the two textile structures (standard and spread tow) showed that the standard textiles with circular cross section were impregnated faster than spread tows, which have a rectangular cross section.

Keywords: vacuum assistant resin infusion, impregnation time, shear angle, reflector and modeling

Procedia PDF Downloads 268
7627 Context, Challenges, Constraints and Strategies of Non-Profit Organisations in Responding to the Needs of Asylum Seekers and Refugees in Cape Town, South Africa

Authors: C. O’Brien, Chloe Reiss

Abstract:

While South Africa has been the chosen host country for over 1,2 million asylum seekers/refugees it has at the same time, been struggling to address the needs of its own people who are still trapped in poverty with little prospects of employment. This limited exploratory, qualitative study was undertaken in Cape Town with a purposive sample of 21 key personnel from various NPOs providing a service to asylum seekers/refugees. Individual in-depth face to face interviews were carried out and the main findings were: Some of the officials at the Department of Home Affairs, health personnel, landlords, school principals, employers, bank officials and police officers were prejudicial in their practices towards asylum seekers/ refugees. The major constraints experienced by NPOs in this study were linked to a lack of funding and minimal government support, strained relationship with the Department of Home Affairs and difficulties in accessing refugees. And finally, the strategies adopted by these NPOs included networking with other service providers, engaging in advocacy, raising community awareness and liaising with government. Thus, more focused intervention strategies are needed to build social cohesion, address prejudices which fuels xenophobic attacks and raise awareness/educate various sectors about refugee rights. Given this burgeoning global problem, social work education and training should include curriculum content on migrant issues. Furthermore, larger studies using mixed methodology approaches would yield more nuanced data and provide for more strategic interventions.

Keywords: refugees and asylum seekers, constraints of service delivery, non-profit organisations, refugee challenges

Procedia PDF Downloads 200
7626 Authority and Function of Administrative Organs According to the Constitution: A Construction of Democracy in the Administrative Law of Indonesia

Authors: Andhika Danesjvara, Nur Widyastanti

Abstract:

The constitution regulates the forms, types, and powers of sState organs in a government. The powers of the organs are then regulated in more detail in the legislation. One of these organs is a government organ, headed by a president or by another name that serves as the main organizer of government. The laws and regulations will govern how the organs of government shall exercise their authority and functions. In a modern state, the function of enacting laws or called executive power does not exercise the functions of government alone, but there are other organs that help the government run the country. These organs are often called government agencies, government accelerating bodies, independent regulatory bodies, commissions, councils or other similar names. The legislation also limits the power of officials within the organs to keep from abusing its authority. The main question in this paper is whether organs are the implementation of a democratic country, or as a form of compromise with the power of stakeholders. It becomes important to see how the administrative organs perform their functions. The administrative organs that are bound by government procedures work in the public service; therefore the next question is how far the function of public service is appropriate and not contradictory to the constitution.

Keywords: administrative organs, constitution, democracy, government

Procedia PDF Downloads 287
7625 T3P® -DMSO Mediated One-Pot Tandem Approach for the Synthesis of 3,4-Dihydropyrimidin-2(1H)-Ones/Thiones from Alcohols

Authors: Vinaya Kambappa

Abstract:

Propylphosphonic anhydride (T3P®)-DMSO is used as an efficient and mild reagent for the one-pot synthesis of 3,4-dihydropyrimidin-2(1H)-ones/thiones from aromatic alcohols. Alcohols are oxidized in situ to aldehydes under mild conditions, which in turn undergo a three-component reaction with β-ketoester and urea/thiourea to afford 3,4-dihydropyrimidin-2(1H)-ones/thiones. The synthesis of 3,4-dihydropyrimidin-2(1H)-ones/thiones directly from alcohols has been reported for the first time best to our knowledge, under mild reaction conditions in good yield. The easy work-up procedure, low cost and less toxicity of the reagent are the main advantages of this protocol.

Keywords: β-ketoester, propylphosphonic anhydride, three-component reaction, pyrimidine

Procedia PDF Downloads 142
7624 Neural Network Based Approach of Software Maintenance Prediction for Laboratory Information System

Authors: Vuk M. Popovic, Dunja D. Popovic

Abstract:

Software maintenance phase is started once a software project has been developed and delivered. After that, any modification to it corresponds to maintenance. Software maintenance involves modifications to keep a software project usable in a changed or a changing environment, to correct discovered faults, and modifications, and to improve performance or maintainability. Software maintenance and management of software maintenance are recognized as two most important and most expensive processes in a life of a software product. This research is basing the prediction of maintenance, on risks and time evaluation, and using them as data sets for working with neural networks. The aim of this paper is to provide support to project maintenance managers. They will be able to pass the issues planned for the next software-service-patch to the experts, for risk and working time evaluation, and afterward to put all data to neural networks in order to get software maintenance prediction. This process will lead to the more accurate prediction of the working hours needed for the software-service-patch, which will eventually lead to better planning of budget for the software maintenance projects.

Keywords: laboratory information system, maintenance engineering, neural networks, software maintenance, software maintenance costs

Procedia PDF Downloads 346
7623 The Economic Benefits of the Graduates of Higher Education in Philippines

Authors: Christia C. Baltar

Abstract:

Everybody goes to primary education but not all proceed to secondary education because of poverty and it is evident in the Philippines. Moreover, the number goes down when they reach higher education. The researcher believes that higher education may improve the standard of living of the family looking at the economic benefits of it. Once one graduated from a particular degree, one may employ with higher wage than those who are non-degree holder. Every year the Philippines produce more than five hundred thousand graduates of higher education and it keeps on increasing every year. Thus, the competition in the employment is really high. It is then important to pursue higher education than settling to a high school graduate because a degree is what most of the employer is looking for. The Philippine government through the Department of Labor and Employment is offering job fairs to all cities as much as possible just to cater employment for those graduates away from urban areas like in Manila and even the privates sectors also proposing for job fairs. Researcher conducted a survey in her institution and she further used secondary information to strengthen the findings of her survey. Researcher used descriptive measures, chi-square test for independence, and the correlation coefficient to analyze the data in her survey. In the survey conducted results show that there was an increase on the income of the family of the graduates of higher education. The graduates believed that their standard of living improved because they were able to work in a better job. The data were analyzed and the results show that there was no significant relationship on sex, age and marital status of the graduates to their economic status but the degree program they enrolled in the tertiary education affects their economic status. The impact of earning higher education can be seen indirectly to the economic growth of the Philippines. Finally, researcher concludes that there is direct and indirect impact of the higher education to the economic status of the graduates.

Keywords: economic, economic benefits, higher education, standard of living

Procedia PDF Downloads 292
7622 Secure Cryptographic Operations on SIM Card for Mobile Financial Services

Authors: Kerem Ok, Serafettin Senturk, Serdar Aktas, Cem Cevikbas

Abstract:

Mobile technology is very popular nowadays and it provides a digital world where users can experience many value-added services. Service Providers are also eager to offer diverse value-added services to users such as digital identity, mobile financial services and so on. In this context, the security of data storage in smartphones and the security of communication between the smartphone and service provider are critical for the success of these services. In order to provide the required security functions, the SIM card is one acceptable alternative. Since SIM cards include a Secure Element, they are able to store sensitive data, create cryptographically secure keys, encrypt and decrypt data. In this paper, we design and implement a SIM and a smartphone framework that uses a SIM card for secure key generation, key storage, data encryption, data decryption and digital signing for mobile financial services. Our frameworks show that the SIM card can be used as a controlled Secure Element to provide required security functions for popular e-services such as mobile financial services.

Keywords: SIM card, mobile financial services, cryptography, secure data storage

Procedia PDF Downloads 303
7621 X-Ray Diffraction Technique as a Means for Degradation Assessment of Welded Joints

Authors: Jaroslav Fiala, Jaroslav Kaiser, Pavel Zlabek, Vaclav Mentl

Abstract:

The X-ray diffraction technique was recognized as a useful tool for the assessment of material degradation degree after a long-time service. In many industrial applications materials are subjected to degradation of mechanical properties as a result of real service conditions. The assessment of the remnant lifetime of components and structures is commonly based on correlated procedures including numerous destructive, non-destructive and mathematical techniques that should guarantee reasonable precise assessment of the current damage extent of materials in question and the remnant lifetime assessment. This paper summarizes results of an experimental programme concentrated on mechanical properties degradation of welded components. Steel an Al-alloy test specimens of base metal, containing welds and simple weldments were fatigue loaded at room temperature to obtain Woehler S-N curve. X-ray diffraction technique was applied to assess the degradation degree of material as a result of cyclic loading.

Keywords: fatigue loading, material degradation, steels, AL-alloys, X-ray diffraction

Procedia PDF Downloads 433
7620 Implementation and Performance Analysis of Data Encryption Standard and RSA Algorithm with Image Steganography and Audio Steganography

Authors: S. C. Sharma, Ankit Gambhir, Rajeev Arya

Abstract:

In today’s era data security is an important concern and most demanding issues because it is essential for people using online banking, e-shopping, reservations etc. The two major techniques that are used for secure communication are Cryptography and Steganography. Cryptographic algorithms scramble the data so that intruder will not able to retrieve it; however steganography covers that data in some cover file so that presence of communication is hidden. This paper presents the implementation of Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) Algorithm with Image and Audio Steganography and Data Encryption Standard (DES) Algorithm with Image and Audio Steganography. The coding for both the algorithms have been done using MATLAB and its observed that these techniques performed better than individual techniques. The risk of unauthorized access is alleviated up to a certain extent by using these techniques. These techniques could be used in Banks, RAW agencies etc, where highly confidential data is transferred. Finally, the comparisons of such two techniques are also given in tabular forms.

Keywords: audio steganography, data security, DES, image steganography, intruder, RSA, steganography

Procedia PDF Downloads 282
7619 Production of Biodiesel from Melon Seed Oil Using Sodium Hydroxide as a Catalyst

Authors: Ene Rosemary Ndidiamaka, Nwangwu Florence Chinyere

Abstract:

The physiochemical properties of the melon seed oil was studied to determine its potentials as viable feed stock for biodisel production. The melon seed was extracted by solvent extraction using n-hexane as the extracting solvent. In this research, methanol was the alcohol used in the production of biodiesel, although alcohols like ethanol, propanol may also be used. Sodium hydroxide was employed for the catalysis. The melon seed oil was characterized for specific gravity, pH, ash content, iodine value, acid value, saponification value, peroxide value, free fatty acid value, flash point, viscosity, and refractive index using standard methods. The melon seed oil had very high oil content. Specific gravity and flash point of the oil is satisfactory. However, moisture content of the oil exceeded the stipulated ASRTM standard for biodiesel production. The overall results indicates that the melon seed oil is suitable for single-stage transesterification process to biodiesel production.

Keywords: biodiesel, catalyst, melon seed, transesterification

Procedia PDF Downloads 357
7618 Embryotoxicity of Nano-Iron Oxide (Fe2O3) to Bio-Indicator of Pollution of Land Helix Aspersa

Authors: S. Besnaci, S. Bensoltane, H. Locif, S. Saadi

Abstract:

To validate an ecotoxicological approach to assessing toxicological effects caused by the oxide powder of nano-iron Fe2O3, we searched in the ecotoxicology laboratory cell bodies bio accumulators and bio-indicators of soil pollution the snail Helix aspersa. In this study, we evaluated the toxicity of nano Fe2O3 during a very sensitive phase of development H.aspersa (embryonic stage). During embryonic development, we observed in treated with various concentrations of nano Fe2O3 (1.25 g/l, 1.5 g/l, and 2 g/l) compared to control, the deformation of the membrane of the egg and accumulation of this molecule at the rear of the egg proven by the photographs, as with the influence on the hatching percentage.

Keywords: eggs, embryotoxicity, Fe2O3, Helix aspersa, nanoparticles

Procedia PDF Downloads 372
7617 An Investigation of the Effectiveness and Quality Service of Thai Labor Fund

Authors: Chutikarn Sriviboon

Abstract:

The objectives of this research were to study the operation of the Labor Fund and to investigate the needs for money and assistance from Thai laborers both from within the system and out of the system and to compare between the assistance from domestic and international funds. The population of this study included three labor groups: group one was laborer in the system who were the members of saving cooperative, group two was laborer in the system who were not the members of saving cooperative, and group three was laborer who were not in the system. This was a mixed research of quantitative and qualitative methods. The findings can be categorized into four parts. First, the labor fund was beneficial to Thai laborers by giving access to government funds but the weakness was found to be poor public relations. Second, the labor funds should extend their assistance to laborer in the system who was not the members of saving cooperative. Third, the comparison between domestic labor funds and international labor funds revealed that there were no international funds which provided assistance the same way as Thai labor funds. Finally, there was a need to improve the management of labor funds and to provide long term assistance to Thai labors.

Keywords: effectiveness, quality, labor funds, service

Procedia PDF Downloads 348
7616 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches

Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar

Abstract:

Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.

Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework

Procedia PDF Downloads 109
7615 Library on the Cloud: Universalizing Libraries Based on Virtual Space

Authors: S. Vanaja, P. Panneerselvam, S. Santhanakarthikeyan

Abstract:

Cloud Computing is a latest trend in Libraries. Entering in to cloud services, Librarians can suit the present information handling and they are able to satisfy needs of the knowledge society. Libraries are now in the platform of universalizing all its information to users and they focus towards clouds which gives easiest access to data and application. Cloud computing is a highly scalable platform promising quick access to hardware and software over the internet, in addition to easy management and access by non-expert users. In this paper, we discuss the cloud’s features and its potential applications in the library and information centers, how cloud computing actually works is illustrated in this communication and how it will be implemented. It discuss about what are the needs to move to cloud, process of migration to cloud. In addition to that this paper assessed the practical problems during migration in libraries, advantages of migration process and what are the measures that Libraries should follow during migration in to cloud. This paper highlights the benefits and some concerns regarding data ownership and data security on the cloud computing.

Keywords: cloud computing, cloud-service, cloud based-ILS, cloud-providers, discovery service, IaaS, PaaS, SaaS, virtualization, Web scale access

Procedia PDF Downloads 648
7614 Determinants of Standard Audit File for Tax Purposes Accounting Legal Obligation Compliance Costs: Empirical Study for Portuguese SMEs of Leiria District

Authors: Isa Raquel Alves Soeiro, Cristina Isabel Branco de Sá

Abstract:

In Portugal, since 2008, there has been a requirement to export the Standard Audit File for Tax Purposes (SAF-T) standard file (in XML format). This file thus gathers tax-relevant information from a company relating to a specific period of taxation. There are two types of SAF-T files that serve different purposes: the SAF-T of revenues and the SAF-T of accounting, which requires taxpayers and accounting firms to invest in order to adapt the accounting programs to the legal requirements. The implementation of the SAF-T accounting file aims to facilitate the collection of relevant tax data by tax inspectors as support of taxpayers' tax returns for the analysis of accounting records or other information with tax relevance (Portaria No. 321-A/2007 of March 26 and Portaria No. 302/2016 of December 2). The main objective of this research project is to verify, through quantitative analysis, what is the cost of compliance of Small and Medium Enterprises (SME) in the district of Leiria in the introduction and implementation of the tax obligation of SAF-T - Standard Audit File for Tax Purposes of accounting. The information was collected through a questionnaire sent to a population of companies selected through the SABI Bureau Van Dijk database in 2020. Based on the responses obtained to the questionnaire, the companies were divided into two groups: Group 1 -companies who are self-employed and whose main activity is accounting services; and Group 2 -companies that do not belong to the accounting sector. In general terms, the conclusion is that there are no statistically significant differences in the costs of complying with the accounting SAF-T between the companies in Group 1 and Group 2 and that, on average, the internal costs of both groups represent the largest component of the total cost of compliance with the accounting SAF-T. The results obtained show that, in both groups, the total costs of complying with the SAF-T of accounting are regressive, which appears to be similar to international studies, although these are related to different tax obligations. Additionally, we verified that the variables volume of business, software used, number of employees, and legal form explain the differences in the costs of complying with accounting SAF-T in the Leiria district SME.

Keywords: compliance costs, SAF-T accounting, SME, Portugal

Procedia PDF Downloads 73
7613 Helping the Helper: Impact of Teaching Assistantship Program among Psychology Alumni

Authors: Clarissa Delariarte

Abstract:

With the aim of helping the poorest of the poor achieve quality education, Psychology students supported and served as teacher assistants to its Early Childhood Education Center in two barangays since the program began in 1999. Making use of qualitative approach, the impact of the program to 29 alumni who served as teacher assistants between 2000-2014 was assessed. Results show that the impact to the alumni is in cognitive as well as social-emotional in terms of feelings of deep satisfaction and sense of volunteerism which is being carried out in their respective workspaces. They also expressed positive feelings of inspiration, gratefulness and happiness. A wider perspective in life, being confident, creative and resourceful was also articulated as concrete impacts. It is concluded that the program had an impact on helping the helper and is a concrete manifestation of the academe being successful in its commitment of forming individuals into becoming integrated and compassionate in the service of the Church and Society. It implies that more opportunities of helping others be provided to students since, in the final analysis, is actually an opportunity of helping the helper be of better service to others.

Keywords: applied psychology, life skill, qualitative research, quality education

Procedia PDF Downloads 183
7612 Privacy-Preserving Location Sharing System with Client/Server Architecture in Mobile Online Social Network

Authors: Xi Xiao, Chunhui Chen, Xinyu Liu, Guangwu Hu, Yong Jiang

Abstract:

Location sharing is a fundamental service in mobile Online Social Networks (mOSNs), which raises significant privacy concerns in recent years. Now, most location-based service applications adopt client/server architecture. In this paper, a location sharing system, named CSLocShare, is presented to provide flexible privacy-preserving location sharing with client/server architecture in mOSNs. CSLocShare enables location sharing between both trusted social friends and untrusted strangers without the third-party server. In CSLocShare, Location-Storing Social Network Server (LSSNS) provides location-based services but do not know the users’ real locations. The thorough analysis indicates that the users’ location privacy is protected. Meanwhile, the storage and the communication cost are saved. CSLocShare is more suitable and effective in reality.

Keywords: mobile online social networks, client/server architecture, location sharing, privacy-preserving

Procedia PDF Downloads 318
7611 Innovation Management in E-Health Care: The Implementation of New Technologies for Health Care in Europe and the USA

Authors: Dariusz M. Trzmielak, William Bradley Zehner, Elin Oftedal, Ilona Lipka-Matusiak

Abstract:

The use of new technologies should create new value for all stakeholders in the healthcare system. The article focuses on demonstrating that technologies or products typically enable new functionality, a higher standard of service, or a higher level of knowledge and competence for clinicians. It also highlights the key benefits that can be achieved through the use of artificial intelligence, such as relieving clinicians of many tasks and enabling the expansion and greater specialisation of healthcare services. The comparative analysis allowed the authors to create a classification of new technologies in e-health according to health needs and benefits for patients, doctors, and healthcare systems, i.e., the main stakeholders in the implementation of new technologies and products in healthcare. The added value of the development of new technologies in healthcare is diagnosed. The work is both theoretical and practical in nature. The primary research methods are bibliographic analysis and analysis of research data and market potential of new solutions for healthcare organisations. The bibliographic analysis is complemented by the author's case studies of implemented technologies, mostly based on artificial intelligence or telemedicine. In the past, patients were often passive recipients, the end point of the service delivery system, rather than stakeholders in the system. One of the dangers of powerful new technologies is that patients may become even more marginalised. Healthcare will be provided and delivered in an increasingly administrative, programmed way. The doctor may also become a robot, carrying out programmed activities - using 'non-human services'. An alternative approach is to put the patient at the centre, using technologies, products, and services that allow them to design and control technologies based on their own needs. An important contribution to the discussion is to open up the different dimensions of the user (carer and patient) and to make them aware of healthcare units implementing new technologies. The authors of this article outline the importance of three types of patients in the successful implementation of new medical solutions. The impact of implemented technologies is analysed based on: 1) "Informed users", who are able to use the technology based on a better understanding of it; 2) "Engaged users" who play an active role in the broader healthcare system as a result of the technology; 3) "Innovative users" who bring their own ideas to the table based on a deeper understanding of healthcare issues. The authors' research hypothesis is that the distinction between informed, engaged, and innovative users has an impact on the perceived and actual quality of healthcare services. The analysis is based on case studies of new solutions implemented in different medical centres. In addition, based on the observations of the Polish author, who is a manager at the largest medical research institute in Poland, with analytical input from American and Norwegian partners, the added value of the implementations for patients, clinicians, and the healthcare system will be demonstrated.

Keywords: innovation, management, medicine, e-health, artificial intelligence

Procedia PDF Downloads 5
7610 Durian Marker Kit for Durian (Durio zibethinus Murr.) Identity

Authors: Emma K. Sales

Abstract:

Durian is the flagship fruit of Mindanao and there is an abundance of several cultivars with many confusing identities/ names. The project was conducted to develop procedure for reliable and rapid detection and sorting of durian planting materials. Moreover, it is also aimed to establish specific genetic or DNA markers for routine testing and authentication of durian cultivars in question. The project developed molecular procedures for routine testing. SSR primers were also screened and identified for their utility in discriminating durian cultivars collected. Results of the study showed the following accomplishments; 1. Twenty (29) SSR primers were selected and identified based on their ability to discriminate durian cultivars, 2. Optimized and established standard procedure for identification and authentication of Durian cultivars 3. Genetic profile of durian is now available at Biotech Unit. Our results demonstrate the relevance of using molecular techniques in evaluating and identifying durian clones. The most polymorphic primers tested in this study could be useful tools for detecting variation even at the early stage of the plant especially for commercial purposes. The process developed combines the efficiency of the microsatellites development process with the optimization of non-radioactive detection process resulting in a user-friendly protocol that can be performed in two (2) weeks and easily incorporated into laboratories about to start microsatellite development projects. This can be of great importance to extend microsatellite analyses to other crop species where minimal genetic information is currently available. With this, the University can now be a service laboratory for routine testing and authentication of durian clones.

Keywords: DNA, SSR analysis, genotype, genetic diversity, cultivars

Procedia PDF Downloads 446