Search results for: safety and security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5897

Search results for: safety and security

4277 Cybersecurity Protection Structures: The Case of Lesotho

Authors: N. N. Mosola, K. F. Moeketsi, R. Sehobai, N. Pule

Abstract:

The Internet brings increasing use of Information and Communications Technology (ICT) services and facilities. Consequently, new computing paradigms emerge to provide services over the Internet. Although there are several benefits stemming from these services, they pose several risks inherited from the Internet. For example, cybercrime, identity theft, malware etc. To thwart these risks, this paper proposes a holistic approach. This approach involves multidisciplinary interactions. The paper proposes a top-down and bottom-up approach to deal with cyber security concerns in developing countries. These concerns range from regulatory and legislative areas, cyber awareness, research and development, technical dimensions etc. The main focus areas are highlighted and a cybersecurity model solution is proposed. The paper concludes by combining all relevant solutions into a proposed cybersecurity model to assist developing countries in enhancing a cyber-safe environment to instill and promote a culture of cybersecurity.

Keywords: cybercrime, cybersecurity, computer emergency response team, computer security incident response team

Procedia PDF Downloads 163
4276 Modeling and Stability Analysis of Viral Propagation in Wireless Mesh Networking

Authors: Haowei Chen, Kaiqi Xiong

Abstract:

This paper aims to answer how malware will propagate in Wireless Mesh Networks (WMNs) and how communication radius and distributed density of nodes affects the process of spreading. The above analysis is essential for devising network-wide strategies to counter malware. We answer these questions by developing an improved dynamical system that models malware propagation in the area where nodes were uniformly distributed. The proposed model captures both the spatial and temporal dynamics regarding the malware spreading process. Equilibrium and stability are also discussed based on the threshold of the system. If the threshold is less than one, the infected nodes disappear, and if the threshold is greater than one, the infected nodes asymptotically stabilize at the endemic equilibrium. Numerical simulations are investigated about communication radius and distributed density of nodes in WMNs, which allows us to draw various insights that can be used to guide security defense.

Keywords: Bluetooth security, malware propagation, wireless mesh networks, stability analysis

Procedia PDF Downloads 104
4275 Factors Affecting Sense of Community in Residential Communities Case Study: Residential Communities in Tehran, Iran

Authors: Parvin Foroughifar

Abstract:

The concept of sense of community refers to residents’ sense of attachment and commitment to the other residents in a residential community. It is implicitly indicative of the mental image of a physical environment in which the residents enjoy strong social ties. Sense of community, a crucial factor in improving quality of life and social welfare, leads to life satisfaction in a residential community. Despite the important functions of such a notion, few empirical studies, to the best of the authors' knowledge, have been so far carried out in Iran to investigate the effective factors in sharpening the sense of community in residential communities. This survey research examined sense of community in 360 above 20-year old residents of three residential communities in Tehran, Iran using cluster sampling and questionnaire. The study yielded the result that variables of local social ties, social control and trust, sense of security, length of residence, use of public spaces, and mixed land use have a significant relationship with sense of community.

Keywords: sense of community, local social ties, sense of security, public space, residential community, Tehran

Procedia PDF Downloads 196
4274 Safety Evaluation of Intramuscular Administration of Zuprevo® Compared to Draxxin® in the Treatment of Swine Respiratory Disease at Weaning Age

Authors: Josine Beek, S. Agten, R. Del Pozo, B. Balis

Abstract:

The objective of the present study was to compare the safety of intramuscular administration of Zuprevo® (tildipirosin, 40 mg/mL) with Draxxin® (tulathromycin, 100 mg/mL) in the treatment of swine respiratory disease at weaning age. The trial was carried out in two farrow-to-finish farms with 300 sows (farm A) and 500 sows (farm B) in a batch-production system. Farm A had no history of respiratory problems, whereas farm B had a history of respiratory outbreaks with increased mortality ( > 2%) in the nursery. Both farms were positive to Pasteurella multocida, Bordetella bronchiseptica, Actinobacillus pleuropneumoniae and Haemophilus parasuis. From each farm, one batch of piglets was included (farm A: 644 piglets; farm B: 963 piglets). One day before weaning (day 0; 18-21 days of age), piglets were identified by an individual ear tag and randomly assigned to a treatment group. At day 0, Group 1 was treated with a single intramuscular injection with Zuprevo® (tildipirosin, 40 mg/mL; 1 mL/10 kg) and group 2 with Draxxin® (tulathromycin, 100 mg/mL; 1 mL/40 kg). For practical reasons, dosage of the product was adjusted according to three weight categories: < 4 kg, 4-6 kg and > 6 kg. Within each farm, piglets of both groups were comingled at weaning and subsequently managed and located in the same facilities and with identical environmental conditions. Our study involved the period from day 0 until 10 weeks of age. Safety of treatment was evaluated by 1) visual examination for signs of discomfort directly after treatment and after 15 min, 1 h and 24 h and 2) mortality rate within 24 h after treatment. Efficacy of treatment was evaluated based on mortality rate from day 0 until 10 weeks of age. Each piglet that died during the study period was necropsied by the herd veterinarian to determine the probable cause of death. Data were analyzed using binary logistic regression and differences were considered significant if p < 0.05. The pig was the experimental unit. In total, 848 piglets were treated with tildipirosin and 759 piglets with tulathromycin. In farm A, one piglet with retarded growth ( < 1 kg at 18 days of age) showed an adverse reaction after injection of tildipirosin: lateral recumbence and dullness for ± 30 sec. The piglet recovered after 1-2 min. This adverse reaction was probably due to overdosing (12 mg/kg). No adverse effect of treatment was observed in any other piglet. There was no mortality within 24 h after treatment. No significant difference was found in mortality rate between both groups from day 0 until 10 weeks of age. In farm A, overall mortality rate was 0.3% (2/644). In farm B, mortality rate was 0.2% (1/502) in group 1 (tildipirosin) and 0.9% (4/461) in group 2 (tulathromycin)(p=0.60). The necropsy of piglets that died during the study period revealed no macroscopic lesions of the respiratory tract. In conclusion, Zuprevo® (tildipirosin, 40 mg/mL) was shown to be a safe and efficacious alternative to Draxxin® (tulathromycin, 100 mg/mL) for the early treatment of swine respiratory disease at weaning age.

Keywords: antibiotic treatment, safety, swine respiratory disease, tildipirosin

Procedia PDF Downloads 400
4273 Development of Terrorist Threat Prediction Model in Indonesia by Using Bayesian Network

Authors: Hilya Mudrika Arini, Nur Aini Masruroh, Budi Hartono

Abstract:

There are more than 20 terrorist threats from 2002 to 2012 in Indonesia. Despite of this fact, preventive solution through studies in the field of national security in Indonesia has not been conducted comprehensively. This study aims to provide a preventive solution by developing prediction model of the terrorist threat in Indonesia by using Bayesian network. There are eight stages to build the model, started from literature review, build and verify Bayesian belief network to what-if scenario. In order to build the model, four experts from different perspectives are utilized. This study finds several significant findings. First, news and the readiness of terrorist group are the most influent factor. Second, according to several scenarios of the news portion, it can be concluded that the higher positive news proportion, the higher probability of terrorist threat will occur. Therefore, the preventive solution to reduce the terrorist threat in Indonesia based on the model is by keeping the positive news portion to a maximum of 38%.

Keywords: Bayesian network, decision analysis, national security system, text mining

Procedia PDF Downloads 395
4272 Personnel Training of Automotive Manufacturers in Virtual Reality

Authors: Mirza Ahsan Baig, Paul Evans

Abstract:

Due to the high demand for automobiles, manufacturers have to run their production lines non-stop for long periods. At such a scale, unplanned downtime could cost up to $50 billion annually. Improper training of new hires could lead to safety issues causing unplanned downtimes. The project developed a virtual reality simulation that could train personnel for key operations on an automobile manufacturing floor, reducing the risk of unplanned downtime while eliminating any disruption (due to training) on the assembly line. An automation firm sponsored it to explore the possibilities the likes of Jaguar and BMW are yet to achieve! The project was inspired by Bentley, the only company that succeeded in simulation training scenarios within virtual space. The project aims to inspire other significant firms to do the same. It was increasing employee safety, eliminating downtimes, and improving efficiency. The developed prototype uncovered various limitations within existing simulation providers and was able to simulate state-of-the-art training scenarios. It also explored the possibility of a multiuser interface and resolved complex issues such as lack of movement space within the training area.

Keywords: virtual reality, scenario training, limited movement, multiuser

Procedia PDF Downloads 90
4271 Impure CO₂ Solubility Trapping in Deep Saline Aquifers: Role of Operating Conditions

Authors: Seyed Mostafa Jafari Raad, Hassan Hassanzadeh

Abstract:

Injection of impurities along with CO₂ into saline aquifers provides an exceptional prospect for low-cost carbon capture and storage technologies and can potentially accelerate large-scale implementation of geological storage of CO₂. We have conducted linear stability analyses and numerical simulations to investigate the effects of permitted impurities in CO₂ streams on the onset of natural convection and dynamics of subsequent convective mixing. We have shown that the rate of dissolution of an impure CO₂ stream with H₂S highly depends on the operating conditions such as temperature, pressure, and composition of impurity. Contrary to findings of previous studies, our results show that an impurity such as H₂S can potentially reduce the onset time of natural convection and can accelerate the subsequent convective mixing. However, at the later times, the rate of convective dissolution is adversely affected by the impurities. Therefore, the injection of an impure CO₂ stream can be engineered to improve the rate of dissolution of CO₂, which leads to higher storage security and efficiency. Accordingly, we have identified the most favorable CO₂ stream compositions based on the geophysical properties of target aquifers. Information related to the onset of natural convection such as the scaling relations and the most favorable operating conditions for CO₂ storage developed in this study are important in proper design, site screening, characterization and safety of geological storage. This information can be used to either identify future geological candidates for acid gas disposal or reviewing the current operating conditions of licensed injection sites.

Keywords: CO₂ storage, solubility trapping, convective dissolution, storage efficiency

Procedia PDF Downloads 208
4270 Safety of Ports, Harbours, Marine Terminals: Application of Quantitative Risk Assessment

Authors: Dipak Sonawane, Sudarshan Daga, Somesh Gupta

Abstract:

Quantitative risk assessment (QRA) is a very precise and consistent approach to defining the likelihood, consequence and severity of a major incident/accident. A variety of hazardous cargoes in bulk, such as hydrocarbons and flammable/toxic chemicals, are handled at various ports. It is well known that most of the operations are hazardous, having the potential of damaging property, causing injury/loss of life and, in some cases, the threat of environmental damage. In order to ensure adequate safety towards life, environment and property, the application of scientific methods such as QRA is inevitable. By means of these methods, comprehensive hazard identification, risk assessment and appropriate implementation of Risk Control measures can be carried out. In this paper, the authors, based on their extensive experience in Risk Analysis for ports and harbors, have exhibited how QRA can be used in practice to minimize and contain risk to tolerable levels. A specific case involving the operation for unloading of hydrocarbon at a port is presented. The exercise provides confidence that the method of QRA, as proposed by the authors, can be used appropriately for the identification of hazards and risk assessment of Ports and Terminals.

Keywords: quantitative risk assessment, hazard assessment, consequence analysis, individual risk, societal risk

Procedia PDF Downloads 84
4269 To Determine the Effects of Regulatory Food Safety Inspections on the Grades of Different Categories of Retail Food Establishments across the Dubai Region

Authors: Shugufta Mohammad Zubair

Abstract:

This study explores the Effect of the new food System Inspection system also called the new inspection color card scheme on reduction of critical & major food safety violations in Dubai. Data was collected from all retail food service establishments located in two zones in the city. Each establishment was visited twice, once before the launch of the new system and one after the launch of the system. In each visit, the Inspection checklist was used as the evaluation tool for observation of the critical and major violations. The old format of the inspection checklist was concerned with scores based on the violations; but the new format of the checklist for the new inspection color card scheme is divided into administrative, general major and critical which gives a better classification for the inspectors to identify the critical and major violations of concerned. The study found that there has been a better and clear marking of violations after the launch of new inspection system wherein the inspectors are able to mark and categories the violations effectively. There had been a 10% decrease in the number of food establishment that was previously given A grade. The B & C grading were also considerably dropped by 5%.

Keywords: food inspection, risk assessment, color card scheme, violations

Procedia PDF Downloads 325
4268 Traffic Management Using Artificial Intelligence

Authors: Vamsi Krishna Movva

Abstract:

Artificial intelligence (AI) has revolutionized traffic management in modern cities by enhancing efficiency, safety, and sustainability. This study explores the transformative role of AI-driven systems, including adaptive traffic lights, real-time incident detection, and coordinated signals, in improving urban traffic flow. Additionally, AI-powered navigation systems utilizing real-time GPS and sensor data offer more efficient and safer travel options. This study employs a mixed-methods approach combining quantitative traffic data analysis and qualitative surveys from traffic management authorities. The study also delves into AI’s application in law enforcement, monitoring traffic violations, detecting distracted driving, and reconstructing accidents to analyze causes and responsibilities. Furthermore, the research highlights the environmental and economic benefits of AI in traffic management, such as reduced emissions and energy savings, while addressing challenges like data privacy concerns and high implementation costs. Ultimately, this paper emphasizes AI’s potential to shape sustainable traffic systems and promote efficient transportation networks.

Keywords: artificial intelligence, traffic management, urban congestion, traffic safety, real-time data

Procedia PDF Downloads 10
4267 A Hybrid Model for Secure Protocol Independent Multicast Sparse Mode and Dense Mode Protocols in a Group Network

Authors: M. S. Jimah, A. C. Achuenu, M. Momodu

Abstract:

Group communications over public infrastructure are prone to a lot of security issues. Existing network protocols like Protocol Independent Multicast Sparse Mode (PIM SM) and Protocol Independent Multicast Dense Mode (PIM DM) do not have inbuilt security features. Therefore, any user or node can easily access the group communication as long as the user can send join message to the source nodes, the source node then adds the user to the network group. In this research, a hybrid method of salting and hashing to encrypt information in the source and stub node was designed, and when stub nodes need to connect, they must have the appropriate key to join the group network. Object oriented analysis design (OOAD) was the methodology used, and the result shows that no extra controlled bandwidth overhead cost was added by encrypting and the hybrid model was more securing than the existing PIM SM, PIM DM and Zhang secure PIM SM.

Keywords: group communications, multicast, PIM SM, PIM DM, encryption

Procedia PDF Downloads 165
4266 Measurement and Evaluation of Outdoor Lighting Environment at Night in Residential Community in China: A Case Study of Hangzhou

Authors: Jiantao Weng, Yujie Zhao

Abstract:

With the improvement of living quality and demand for nighttime activities in China, the current situation of outdoor lighting environment at night needs to be assessed. Lighting environment at night plays an important role to guarantee night safety. Two typical residential communities in Hangzhou were selected. A comprehensive test method of outdoor lighting environment at night was established. The road, fitness area, landscape, playground and entrance were included. Field measurements and questionnaires were conducted in these two residential communities. The characteristics of residents’ habits and the subjective evaluation on different aspects of outdoor lighting environment at night were collected via questionnaire. A safety evaluation system on the outdoor lighting environment at night in the residential community was established. The results show that there is a big difference in illumination in different areas. The lighting uniformities of roads cannot meet the requirement of lighting standard in China. Residents pay more attention to the lighting environment of the fitness area and road than others. This study can provide guidance for the design and management of outdoor lighting environment at night.

Keywords: residential community, lighting environment, night, field measurement

Procedia PDF Downloads 169
4265 The Comparison of the Reliability Margin Measure for the Different Concepts in the Slope Analysis

Authors: Filip Dodigovic, Kreso Ivandic, Damir Stuhec, S. Strelec

Abstract:

The general difference analysis between the former and new design concepts in geotechnical engineering is carried out. The application of new regulations results in the need for real adaptation of the computation principles of limit states, i.e. by providing a uniform way of analyzing engineering tasks. Generally, it is not possible to unambiguously match the limit state verification procedure with those in the construction engineering. The reasons are the inability to fully consistency of the common probabilistic basis of the analysis, and the fundamental effect of material properties on the value of actions and the influence of actions on resistance. Consequently, it is not possible to apply separate factorization with partial coefficients, as in construction engineering. For the slope stability analysis design procedures problems in the light of the use of limit states in relation to the concept of allowable stresses is detailed in. The quantifications of the safety margins in the slope stability analysis for both approaches is done. When analyzing the stability of the slope, by the strict application of the adopted forms from the new regulations for significant external temporary and/or seismic actions, the equivalent margin of safety is increased. The consequence is the emergence of more conservative solutions.

Keywords: allowable pressure, Eurocode 7, limit states, slope stability

Procedia PDF Downloads 341
4264 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016

Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto

Abstract:

The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.

Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss

Procedia PDF Downloads 145
4263 Detecting and Secluding Route Modifiers by Neural Network Approach in Wireless Sensor Networks

Authors: C. N. Vanitha, M. Usha

Abstract:

In a real world scenario, the viability of the sensor networks has been proved by standardizing the technologies. Wireless sensor networks are vulnerable to both electronic and physical security breaches because of their deployment in remote, distributed, and inaccessible locations. The compromised sensor nodes send malicious data to the base station, and thus, the total network effectiveness will possibly be compromised. To detect and seclude the Route modifiers, a neural network based Pattern Learning predictor (PLP) is presented. This algorithm senses data at any node on present and previous patterns obtained from the en-route nodes. The eminence of any node is upgraded by their predicted and reported patterns. This paper propounds a solution not only to detect the route modifiers, but also to seclude the malevolent nodes from the network. The simulation result proves the effective performance of the network by the presented methodology in terms of energy level, routing and various network conditions.

Keywords: neural networks, pattern learning, security, wireless sensor networks

Procedia PDF Downloads 408
4262 Coordinative Remote Sensing Observation Technology for a High Altitude Barrier Lake

Authors: Zhang Xin

Abstract:

Barrier lakes are lakes formed by storing water in valleys, river valleys or riverbeds after being blocked by landslide, earthquake, debris flow, and other factors. They have great potential safety hazards. When the water is stored to a certain extent, it may burst in case of strong earthquake or rainstorm, and the lake water overflows, resulting in large-scale flood disasters. In order to ensure the safety of people's lives and property in the downstream, it is very necessary to monitor the barrier lake. However, it is very difficult and time-consuming to manually monitor the barrier lake in high altitude areas due to the harsh climate and steep terrain. With the development of earth observation technology, remote sensing monitoring has become one of the main ways to obtain observation data. Compared with a single satellite, multi-satellite remote sensing cooperative observation has more advantages; its spatial coverage is extensive, observation time is continuous, imaging types and bands are abundant, it can monitor and respond quickly to emergencies, and complete complex monitoring tasks. Monitoring with multi-temporal and multi-platform remote sensing satellites can obtain a variety of observation data in time, acquire key information such as water level and water storage capacity of the barrier lake, scientifically judge the situation of the barrier lake and reasonably predict its future development trend. In this study, The Sarez Lake, which formed on February 18, 1911, in the central part of the Pamir as a result of blockage of the Murgab River valley by a landslide triggered by a strong earthquake with magnitude of 7.4 and intensity of 9, is selected as the research area. Since the formation of Lake Sarez, it has aroused widespread international concern about its safety. At present, the use of mechanical methods in the international analysis of the safety of Lake Sarez is more common, and remote sensing methods are seldom used. This study combines remote sensing data with field observation data, and uses the 'space-air-ground' joint observation technology to study the changes in water level and water storage capacity of Lake Sarez in recent decades, and evaluate its safety. The situation of the collapse is simulated, and the future development trend of Lake Sarez is predicted. The results show that: 1) in recent decades, the water level of Lake Sarez has not changed much and remained at a stable level; 2) unless there is a strong earthquake or heavy rain, it is less likely that the Lake Sarez will be broken under normal conditions, 3) lake Sarez will remain stable in the future, but it is necessary to establish an early warning system in the Lake Sarez area for remote sensing of the area, 4) the coordinative remote sensing observation technology is feasible for the high altitude barrier lake of Sarez.

Keywords: coordinative observation, disaster, remote sensing, geographic information system, GIS

Procedia PDF Downloads 132
4261 Treadmill Negotiation: The Stagnation of the Israeli – Palestinian Peace Process

Authors: Itai Kohavi, Wojciech Nowiak

Abstract:

This article explores the stagnation of the Israeli -Palestinian peace negotiation process, and the reasons behind the failure of more than 12 international initiatives to resolve the conflict. Twenty-seven top members of the Israeli national security elite (INSE) were interviewed, including heads of the negotiation teams, the National Security Council, the Mossad, and other intelligence and planning arms. The interviewees provided their insights on the Israeli challenges in reaching a sustainable and stable peace agreement and in dealing with the international pressure on Israel to negotiate a peace agreement while preventing anti-Israeli UN decisions and sanctions. The findings revealed a decision tree, with red herring deception strategies implemented to postpone the negotiation process and to delay major decisions during the negotiation process. Beyond the possible applications for the Israeli – Palestinian conflict, the findings shed more light on the phenomenon of rational deception of allies in a negotiation process, a subject less frequently researched as compared with deception of rivals.

Keywords: deception, Israeli-Palestinian conflict, negotiation, red herring, terrorist state, treadmill negotiation

Procedia PDF Downloads 307
4260 Design and Analysis of Formula One Car Halo

Authors: Indira priyadarshini, B. Tulja Lal, K. Anusha, P. Sai Varun

Abstract:

Formula One cars are the fastest road course racing cars in the world, owing to very high cornering speeds achieved through the generation of large amounts of aerodynamic downforce. The main intentions and goals of this paper are to reduce the accidents and improving the safety without affecting the visibility of the driver by redesigning Halo that was developed by Mercedes in conjunction with the FIA to deflect flying debris, such as a loose wheel, away from a driver’s head while the hinged locking mechanism can quickly be removed for easy access. Halo design has been modified in order to reduce the weight without affecting the aerodynamics of the car. CFD simulation is carried out to observe the flow over the Halo. The velocity profile and pressure contours were analyzed. Halo is designed using SOLIDWORKS Furthermore, using the software ANSYS FLUENT 3D simulation of the airflow contour around the Halo in order to make changes in the geometry to improve the design by reducing air resistance and improving aerodynamics. According to our assumption, new 3D Halo model has better aerodynamic properties in order to analyse possible improvements compared to the initial design. Structural analysis is also done by using ANSYS by making an F1 tire colliding with Halo at 225 kmph in order to know the deflections in the structure.

Keywords: aerodynamics, Halo, safety, visibility

Procedia PDF Downloads 379
4259 Stabilization of Fly Ash Slope Using Plastic Recycled Polymer and Finite Element Analysis Using Plaxis 3D

Authors: Tushar Vasant Salunkhe, Sariput M. Nawghare, Maheboobsab B. Nadaf, Sushovan Dutta, J. N. Mandal

Abstract:

The model tests were conducted in the laboratory without and with plastic recycled polymer in fly ash steep slopes overlaying soft foundation soils like fly ash and power soil in order to check the stability of steep slope. In this experiment, fly ash is used as a filling material, and Plastic Recycled Polymers of diameter = 3mm and length = 4mm were made from the waste plastic product (lower grade plastic product). The properties of fly ash and plastic recycled polymers are determined. From the experiments, load and settlement have measured. From these data, load–settlement curves have been reported. It has been observed from test results that the load carrying capacity of mixture fly ash with Plastic Recycled Polymers slope is more than that of fly ash slope. The deformation of Plastic Recycled Polymers slope is slightly more than that of fly ash slope. A Finite Element Method (F.E.M.) was also evaluated using PLAXIS 3D version. The failure pattern, deformations and factor of safety are reported based on analytical programme. The results from experimental data and analytical programme are compared and reported.

Keywords: factor of safety, finite element method (FEM), fly ash, plastic recycled polymer

Procedia PDF Downloads 431
4258 Border Security: Implementing the “Memory Effect” Theory in Irregular Migration

Authors: Iliuta Cumpanasu, Veronica Oana Cumpanasu

Abstract:

This paper focuses on studying the conjunction between the new emerged theory of “Memory Effect” in Irregular Migration and Related Criminality and the notion of securitization, and its impact on border management, bringing about a scientific advancement in the field by identifying the patterns corresponding to the linkage of the two concepts, for the first time, and developing a theoretical explanation, with respect to the effects of the non-military threats on border security. Over recent years, irregular migration has experienced a significant increase worldwide. The U.N.'s refugee agency reports that the number of displaced people is at its highest ever - surpassing even post-World War II numbers when the world was struggling to come to terms with the most devastating event in history. This is also the fresh reality within the core studied coordinate, the Balkan Route of Irregular Migration, which starts from Asia and Africa and continues to Turkey, Greece, North Macedonia or Bulgaria, Serbia, and ends in Romania, where thousands of migrants find themselves in an irregular situation concerning their entry to the European Union, with its important consequences concerning the related criminality. The data from the past six years was collected by making use of semi-structured interviews with experts in the field of migration and desk research within some organisations involved in border security, pursuing the gathering of genuine insights from the aforementioned field, which was constantly addressed the existing literature and subsequently subjected to the mixed methods of analysis, including the use of the Vector Auto-Regression estimates model. Thereafter, the analysis of the data followed the processes and outcomes in Grounded Theory, and a new Substantive Theory emerged, explaining how the phenomena of irregular migration and cross-border criminality are the decisive impetus for implementing the concept of securitization in border management by using the proposed pattern. The findings of the study are therefore able to capture an area that has not yet benefitted from a comprehensive approach in the scientific community, such as the seasonality, stationarity, dynamics, predictions, or the pull and push factors in Irregular Migration, also highlighting how the recent ‘Pandemic’ interfered with border security. Therefore, the research uses an inductive revelatory theoretical approach which aims at offering a new theory in order to explain a phenomenon, triggering a practically handy contribution for the scientific community, research institutes or Academia and also usefulness to organizational practitioners in the field, among which UN, IOM, UNHCR, Frontex, Interpol, Europol, or national agencies specialized in border security. The scientific outcomes of this study were validated on June 30, 2021, when the author defended his dissertation for the European Joint Master’s in Strategic Border Management, a two years prestigious program supported by the European Commission and Frontex Agency and a Consortium of six European Universities and is currently one of the research objectives of his pending PhD research at the West University Timisoara.

Keywords: migration, border, security, memory effect

Procedia PDF Downloads 95
4257 Probabilistic Fracture Evaluation of Reactor Pressure Vessel Subjected to Pressurized Thermal Shock

Authors: Jianguo Chen, Fenggang Zang, Yu Yang, Liangang Zheng

Abstract:

Reactor Pressure Vessel (RPV) is an important security barrier in nuclear power plant. Crack like defects may be produced on RPV during the whole operation lifetime due to the harsh operation condition and irradiation embrittlement. During the severe loss of coolant accident, thermal shock happened as the injection of emergency cooling water into RPV, which results in re-pressurization of the vessel and very high tension stress on the vessel wall, this event called Pressurized Thermal Shock (PTS). Crack on the vessel wall may propagate even penetrate the vessel, so the safety of the RPV would undergo great challenge. Many assumptions in structure integrity evaluation make the result of deterministic fracture mechanics very conservative, which affect the operation lifetime of the plant. Actually, many parameters in the evaluation process, such as fracture toughness and nil-ductility transition temperature, have statistical distribution characteristics. So it is necessary to assess the structural integrity of RPV subjected to PTS event by means of Probabilistic Fracture Mechanics (PFM). Structure integrity evaluation methods of RPV subjected to PTS event are summarized firstly, then evaluation method based on probabilistic fracture mechanics are presented by considering the probabilistic characteristics of material and structure parameters. A comprehensive analysis example is carried out at last. The results show that the probability of crack penetrates through wall increases gradually with the growth of fast neutron irradiation flux. The results give advice for reactor life extension.

Keywords: fracture toughness, integrity evaluation, pressurized thermal shock, probabilistic fracture mechanics, reactor pressure vessel

Procedia PDF Downloads 255
4256 Comparative Analysis of Smart City Development: Assessing the Resilience and Technological Advancement in Singapore and Bucharest

Authors: Sînziana Iancu

Abstract:

In an era marked by rapid urbanization and technological advancement, the concept of smart cities has emerged as a pivotal solution to address the complex challenges faced by urban centres. As cities strive to enhance the quality of life for their residents, the development of smart cities has gained prominence. This study embarks on a comparative analysis of two distinct smart city models, Singapore and Bucharest, to assess their resilience and technological advancements. The significance of this study lies in its potential to provide valuable insights into the strategies, strengths, and areas of improvement in smart city development, ultimately contributing to the advancement of urban planning and sustainability. Methodologies: This comparative study employs a multifaceted approach to comprehensively analyse the smart city development in Singapore and Bucharest: * Comparative Analysis: A systematic comparison of the two cities is conducted, focusing on key smart city indicators, including digital infrastructure, integrated public services, urban planning and sustainability, transportation and mobility, environmental monitoring, safety and security, innovation and economic resilience, and community engagement; * Case Studies: In-depth case studies are conducted to delve into specific smart city projects and initiatives in both cities, providing real-world examples of their successes and challenges; * Data Analysis: Official reports, statistical data, and relevant publications are analysed to gather quantitative insights into various aspects of smart city development. Major Findings: Through a comprehensive analysis of Singapore and Bucharest's smart city development, the study yields the following major findings: * Singapore excels in digital infrastructure, integrated public services, safety, and innovation, showcasing a high level of resilience across these domains; * Bucharest is in the early stages of smart city development, with notable potential for growth in digital infrastructure and community engagement.; * Both cities exhibit a commitment to sustainable urban planning and environmental monitoring, with room for improvement in integrating these aspects into everyday life; * Transportation and mobility solutions are a priority for both cities, with Singapore having a more advanced system, while Bucharest is actively working on improving its transportation infrastructure; * Community engagement, while important, requires further attention in both cities to enhance the inclusivity of smart city initiatives. Conclusion: In conclusion, this study serves as a valuable resource for urban planners, policymakers, and stakeholders in understanding the nuances of smart city development and resilience. While Singapore stands as a beacon of success in various smart city indicators, Bucharest demonstrates potential and a willingness to adapt and grow in this domain. As cities worldwide embark on their smart city journeys, the lessons learned from Singapore and Bucharest provide invaluable insights into the path toward urban sustainability and resilience in the digital age.

Keywords: bucharest, resilience, Singapore, smart city

Procedia PDF Downloads 77
4255 Integrated Management System of Plant Genetic Resources: Collection, Conservation, Regeneration and Characterization of Cucurbitaceae and Solanaceae of DOA Genebank, Thailand

Authors: Kunyaporn Pipithsangchan, Alongkorn Korntong, Assanee Songserm, Phatchara Piriyavinit, Saowanee Dechakampoo

Abstract:

The Kingdom of Thailand is one of the South East Asian countries. From its area of 514,000 square kilometers (51 million ha), at least 18,000 plant species (8% of the world total) have been estimated to be found in the country. As a result, the conservation of plant genetic diversity, particularly food crops, is becoming important and is an assurance for the national food security. Department of Agriculture Genebank or DOA Genebank, Thailand is responsible for the conservation of plant germplasm by participating and accomplishing several collaborative projects both at national and international levels. Integrated Management System of Plant Genetic Resources or IMPGR is one of the most outstandingly successful cooperation. It is a multilateral project under the Asian Food and Agriculture Cooperation Initiative (AFACI) supported by the Rural Development Administration (RDA) of South Korea. The member countries under the project consist of 11 nations namely Bangladesh, Cambodia, Indonesia, Laos PDR, Mongolia, Nepal, Philippines, Sri Lanka, Thailand, Vietnam and South Korea. The project enabled the members to jointly address the global issues in plant genetic resource (PGR) conservation and strengthen their network in this aspect. The 1st phase of IMPGR project, entitled 'Collection, Conservation, Regeneration and Characterization of Cucurbitaceae and Solanaceae 2012-2014', comprises three main objectives that are: 1) To improve management in storage facilities, collection, and regeneration, 2) To improve linkage between Genebank and material sources (for regeneration), and 3) To improve linkage between Genebank and other field crop or/and horticultural research centers. The project was done for three years from 2012 to 2014. The activities of the project can be described as following details: In the 1st year, there were 9 target provinces for completing plant genetic resource survey and collection. 108 accessions of PGR were collected. In the 2nd year, PGR were continuously surveyed and collected from 9 provinces. The total number of collection was 140 accessions. In addition, the process of regeneration of 237 accessions collected from 1st and 2nd year was started at several sites namely Biotechnology Research and Development Office, Sukothai Horticultural Research Center, Tak Research, and Development Center and Nakhon Ratchasima Research and Development Center. In the 3rd year, besides survey and collection of 115 accessions from 9 target provinces, PGR characterization and evaluation were done for 206 accessions. Moreover, safety duplication of 253 PGR at the World Seed Vault, RDA, was also done according to Standard Agreement on Germplasm Safety Duplication between Department of Agriculture, Ministry of Agriculture and Cooperatives, the Kingdom of Thailand and the National Agrobiodiversity Center, Rural Development Administration of the Republic of Korea. The success of the 1st phase project led to the second phase which entitled 'Collection and Characterization for Effective Conservation of Local Capsicum spp., Solanum spp. and Lycopersicon spp. in Thailand 2015-2017'.

Keywords: characterization, conservation, DOA genebank, plant genetic resources

Procedia PDF Downloads 178
4254 Investigating the Vehicle-Bicyclists Conflicts using LIDAR Sensor Technology at Signalized Intersections

Authors: Alireza Ansariyar, Mansoureh Jeihani

Abstract:

Light Detection and Ranging (LiDAR) sensors are capable of recording traffic data including the number of passing vehicles and bicyclists, the speed of vehicles and bicyclists, and the number of conflicts among both road users. In order to collect real-time traffic data and investigate the safety of different road users, a LiDAR sensor was installed at Cold Spring Ln – Hillen Rd intersection in Baltimore City. The frequency and severity of collected real-time conflicts were analyzed and the results highlighted that 122 conflicts were recorded over a 10-month time interval from May 2022 to February 2023. By using an innovative image-processing algorithm, a new safety Measure of Effectiveness (MOE) was proposed to recognize the critical zones for bicyclists entering each zone. Considering the trajectory of conflicts, the results of the analysis demonstrated that conflicts in the northern approach (zone N) are more frequent and severe. Additionally, sunny weather is more likely to cause severe vehicle-bike conflicts.

Keywords: LiDAR sensor, post encroachment time threshold (PET), vehicle-bike conflicts, a measure of effectiveness (MOE), weather condition

Procedia PDF Downloads 243
4253 A Software Engineering Methodology for Developing Secure Obfuscated Software

Authors: Carlos Gonzalez, Ernesto Linan

Abstract:

We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software. There are four types of attackers: casual attackers, hackers, institution attack, and government attack. Depending on the level of threat, the methodology we propose uses five or six teams to accomplish this task. One Software Engineer Team and one or two software Obfuscation Teams, and Compiler Team, these four teams will develop and compile the secure obfuscated software, a Code Breakers Team will test the results of the previous teams to see if the software is not broken at the required security level, and an Intrusion Analysis Team will analyze the results of the Code Breakers Team and propose solutions to the development teams to prevent the detected intrusions. We also present an analytical model to prove that our methodology is no only easier to use, but generates an economical way of producing secure obfuscated software.

Keywords: development methodology, obfuscated software, secure software development, software engineering

Procedia PDF Downloads 256
4252 3D Frictionless Contact Case between the Structure of E-Bike and the Ground

Authors: Lele Zhang, Hui Leng Choo, Alexander Konyukhov, Shuguang Li

Abstract:

China is currently the world's largest producer and distributor of electric bicycle (e-bike). The increasing number of e-bikes on the road is accompanied by rising injuries and even deaths of e-bike drivers. Therefore, there is a growing need to improve the safety structure of e-bikes. This 3D frictionless contact analysis is a preliminary, but necessary work for further structural design improvement of an e-bike. The contact analysis between e-bike and the ground was carried out as follows: firstly, the Penalty method was illustrated and derived from the simplest spring-mass system. This is one of the most common methods to satisfy the frictionless contact case; secondly, ANSYS static analysis was carried out to verify finite element (FE) models with contact pair (without friction) between e-bike and the ground; finally, ANSYS transient analysis was used to obtain the data of the penetration p(u) of e-bike with respect to the ground. Results obtained from the simulation are as estimated by comparing with that from theoretical method. In the future, protective shell will be designed following the stability criteria and added to the frame of e-bike. Simulation of side falling of the improved safety structure of e-bike will be confirmed with experimental data.

Keywords: frictionless contact, penalty method, e-bike, finite element

Procedia PDF Downloads 280
4251 Effect in Animal Nutrition of Genetical Modified Plant(GM)

Authors: Abdullah Özbilgin, Oguzhan Kahraman, Mustafa Selçuk Alataş

Abstract:

Plant breeders have made and will continue to make important contributions toward meeting the need for more and better feed and food. The use of new techniques to modify the genetic makeup of plants to improve their properties has led to a new generation of crops, grains and their by-products for feed. Plant breeders have made and will continue to make important contributions toward meeting the need for more and better feed and food. The use of new techniques to modify the genetic makeup of plants to improve their properties has led to a new generation of crops, grains and their by-products for feed. The land area devoted to the cultivation of genetically modified (GM) plants has increased in recent years: in 2012 such plants were grown on over 170 million hectares globally, in 28 different countries, and are at resent used by 17.3 million farmers worldwide. The majority of GM plants are used as feed material for food-producing farm animals. Despite the facts that GM plants have been used as feed for years and a number of feeding studies have proved their safety for animals, they still give rise to emotional public discussion.

Keywords: crops, genetical modified plant(GM), plant, safety

Procedia PDF Downloads 569
4250 Structural Health Monitoring of Buildings and Infrastructure

Authors: Mojtaba Valinejadshoubi, Ashutosh Bagchi, Osama Moselhi

Abstract:

Structures such as buildings, bridges, dams, wind turbines etc. need to be maintained against various factors such as deterioration, excessive loads, environment, temperature, etc. Choosing an appropriate monitoring system is important for determining any critical damage to a structure and address that to avoid any adverse consequence. Structural Health Monitoring (SHM) has emerged as an effective technique to monitor the health of the structures. SHM refers to an ongoing structural performance assessment using different kinds of sensors attached to or embedded in the structures to evaluate their integrity and safety to help engineers decide on rehabilitation measures. Ability of SHM in identifying the location and severity of structural damages by considering any changes in characteristics of the structures such as their frequency, stiffness and mode shapes helps engineers to monitor the structures and take the most effective corrective actions to maintain their safety and extend their service life. The main objective of this study is to review the overall SHM process specifically determining the natural frequency of an instrumented simply-supported concrete beam using modal testing and finite element model updating.

Keywords: structural health monitoring, natural frequency, modal analysis, finite element model updating

Procedia PDF Downloads 345
4249 Analytical Study of Applying the Account Aggregation Approach in E-Banking Services

Authors: A. Al Drees, A. Alahmari, R. Almuwayshir

Abstract:

The advanced information technology is becoming an important factor in the development of financial services industry, especially the banking industry. It has introduced new ways of delivering banking to the customer, such as Internet Banking. Banks began to look at electronic banking (e-banking) as a means to replace some of their traditional branch functions using the Internet as a new distribution channel. Some consumers have at least more than one account, and across banks, and access these accounts using e-banking services. To look at the current net worth position, customers have to login to each of their accounts and get the details and work on consolidation. This not only takes ample time but it is a repetitive activity at a specified frequency. To address this point, an account aggregation concept is added as a solution. E-banking account aggregation, as one of the e-banking types, appeared to build a stronger relationship with customers. Account Aggregation Service generally refers to a service that allows customers to manage their bank accounts maintained in different institutions through a common Internet banking operating a platform, with a high concern to security and privacy. This paper presents an overview of an e-banking account aggregation approach as a new service in the e-banking field.

Keywords: e-banking, account aggregation, security, enterprise development

Procedia PDF Downloads 339
4248 Accelerating Mobile Innovation, Adoption, and Translational Science within a Large Research Enterprise and Healthcare System

Authors: Stephen Wheat

Abstract:

Institutional mobile application governance and distribution processes are essential to mobile app innovation. The absence of effective processes poses a significant barrier to the development and adoption of mobile apps for use within a research enterprise and also impedes the translational science of applying research apps in clinical and engineering settings. To accelerate mobile app innovation and adoption, Emory University and Emory Healthcare implemented a three-pronged strategy including. I) Mobile app review and distribution policies and processes. II) Mobile app management infrastructure and mobile app foundation components. III) A strategic sourcing strategy based on preferred mobile app development firms. The results have been an increase from five to 56 mobile apps in the pipeline over three years; increased engagement from technology transfer, legal counsel, compliance, and information security; articulation of a coordinated mobile app strategy; and allocation of more institutional resources toward specific mobile technology and mobile application goals.

Keywords: mobile app management, governance, distribution, information security

Procedia PDF Downloads 305