Search results for: digital infrastructure
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4480

Search results for: digital infrastructure

2740 Building Resilience to El Nino Related Flood Events in Northern Peru Using a Structured Facilitation Approach to Interdisciplinary Problem Solving

Authors: Roger M. Wall, David G. Proverbs, Yamina Silva, Danny Scipion

Abstract:

This paper critically reviews the outcomes of a 4 day workshop focused on building resilience to El Niño related Flood Events in northern Perú. The workshop was run jointly by Birmingham City University (BCU) in partnership with Instituto Geofísico del Perú (IGP) and was hosted by the Universidad de Piura (UDEP). The event took place in August 2018 and was funded by the Newton-Paulet fund administered by the British Council. The workshop was a response to the severe flooding experienced in Piura during the El Niño event of March 2017 which damaged over 100,000 homes and destroyed much local infrastructure including around 100 bridges. El Niño is a recurrent event and there is concern that its frequency and intensity may change in the future as a consequence of climate change. A group of 40 early career researchers and practitioners from the UK and Perú were challenged with working together across disciplines to identify key cross-cutting themes and make recommendations for building resilience to similar future events. Key themes identified on day 1 of the workshop were governance; communities; risk information; river management; urban planning; health; and infrastructure. A field study visit took place on day 2 so that attendees could gain first-hand experience of affected and displaced communities. Each of the themes was then investigated in depth on day 3 by small interdisciplinary teams drawing on their own expertise, local knowledge and the experiences of the previous day’s field trip. Teams were responsible for developing frameworks for analysis of their chosen theme and presenting their findings to the whole group. At this point, teams worked together to develop links between the different themes so that an integrated approach could be developed and presented on day 4. This paper describes the approaches taken by each team and the way in which these were integrated to form an holistic picture of the whole system. The findings highlighted the importance of risk-related information and the need for strong governance structures to enforce planning regulations and development. The structured facilitation approach proved to be very effective and it is recommended that the process be repeated with a broader group of stakeholders from across the region.

Keywords: El Niño, integrated flood risk management, Perú, structured facilitation, systems approach, resilience

Procedia PDF Downloads 134
2739 SAFECARE: Integrated Cyber-Physical Security Solution for Healthcare Critical Infrastructure

Authors: Francesco Lubrano, Fabrizio Bertone, Federico Stirano

Abstract:

Modern societies strongly depend on Critical Infrastructures (CI). Hospitals, power supplies, water supplies, telecommunications are just few examples of CIs that provide vital functions to societies. CIs like hospitals are very complex environments, characterized by a huge number of cyber and physical systems that are becoming increasingly integrated. Ensuring a high level of security within such critical infrastructure requires a deep knowledge of vulnerabilities, threats, and potential attacks that may occur, as well as defence and prevention or mitigation strategies. The possibility to remotely monitor and control almost everything is pushing the adoption of network-connected devices. This implicitly introduces new threats and potential vulnerabilities, posing a risk, especially to those devices connected to the Internet. Modern medical devices used in hospitals are not an exception and are more and more being connected to enhance their functionalities and easing the management. Moreover, hospitals are environments with high flows of people, that are difficult to monitor and can somehow easily have access to the same places used by the staff, potentially creating damages. It is therefore clear that physical and cyber threats should be considered, analysed, and treated together as cyber-physical threats. This means that an integrated approach is required. SAFECARE, an integrated cyber-physical security solution, tries to respond to the presented issues within healthcare infrastructures. The challenge is to bring together the most advanced technologies from the physical and cyber security spheres, to achieve a global optimum for systemic security and for the management of combined cyber and physical threats and incidents and their interconnections. Moreover, potential impacts and cascading effects are evaluated through impact propagation models that rely on modular ontologies and a rule-based engine. Indeed, SAFECARE architecture foresees i) a macroblock related to cyber security field, where innovative tools are deployed to monitor network traffic, systems and medical devices; ii) a physical security macroblock, where video management systems are coupled with access control management, building management systems and innovative AI algorithms to detect behavior anomalies; iii) an integration system that collects all the incoming incidents, simulating their potential cascading effects, providing alerts and updated information regarding assets availability.

Keywords: cyber security, defence strategies, impact propagation, integrated security, physical security

Procedia PDF Downloads 150
2738 Radio Frequency Energy Harvesting Friendly Self-Clocked Digital Low Drop-Out for System-On-Chip Internet of Things

Authors: Christos Konstantopoulos, Thomas Ussmueller

Abstract:

Digital low drop-out regulators, in contrast to analog counterparts, provide an architecture of sub-1 V regulation with low power consumption, high power efficiency, and system integration. Towards an optimized integration in the ultra-low-power system-on-chip Internet of Things architecture that is operated through a radio frequency energy harvesting scheme, the D-LDO regulator should constitute the main regulator that operates the master-clock and rest loads of the SoC. In this context, we present a D-LDO with linear search coarse regulation and asynchronous fine regulation, which incorporates an in-regulator clock generation unit that provides an autonomous, self-start-up, and power-efficient D-LDO design. In contrast to contemporary D-LDO designs that employ ring-oscillator architecture which start-up time is dependent on the frequency, this work presents a fast start-up burst oscillator based on a high-gain stage with wake-up time independent of coarse regulation frequency. The design is implemented in a 55-nm Global Foundries CMOS process. With the purpose to validate the self-start-up capability of the presented D-LDO in the presence of ultra-low input power, an on-chip test-bench with an RF rectifier is implemented as well, which provides the RF to DC operation and feeds the D-LDO. Power efficiency and load regulation curves of the D-LDO are presented as extracted from the RF to regulated DC operation. The D-LDO regulator presents 83.6 % power efficiency during the RF to DC operation with a 3.65 uA load current and voltage regulator referred input power of -27 dBm. It succeeds 486 nA maximum quiescent current with CL 75 pF, the maximum current efficiency of 99.2%, and 1.16x power efficiency improvement compared to analog voltage regulator counterpart oriented to SoC IoT loads. Complementary, the transient performance of the D-LDO is evaluated under the transient droop test, and the achieved figure-of-merit is compared with state-of-art implementations.

Keywords: D-LDO, Internet of Things, RF energy harvesting, voltage regulators

Procedia PDF Downloads 124
2737 Metamorphosis of Teaching-Learning During COVID-19 Crisis and Challenges of Education in India

Authors: Saroj Pandey

Abstract:

COVID-19, declared by the World Health Organization a pandemic (WHO,2020), has created an unprecedented crisis world over endangering the human survival itself. Corona induced lockdowns forced approximately 140 million students of 190 countries at various levels of education from preprimary to higher education to remain confined to their homes. In India, approximately 360 million students were affected by the forced shut down of schools due to the countrywide lockdown in March 2020 and resultant disruption of education. After the initial shock and anxiety the Indian polity and education system bounced back with a number of initiatives, and online education came as a major rescuer for the education system of the country. The distance and online mode of learning that was treated as the poor cousin of conventional mode and often criticized for its quality became the major crusader overnight changing the entire ecosystem of traditional teaching -leaning towards the virtual mode. Teachers who were averse to technology were forced to remodel their educational pedagogies and reorient themselves overnight to use various online platforms such as Zoom, Google meet, and other such platforms to reach the learners. This metamorphosis through ensured students was meaningfully engaged in their studies during the lockdown period but it has its own set of challenges. This paper deals with the government initiatives, and teachers' self-efforts to keep the channel of teaching learning on providing academic and socio emotional support to students during the most difficult period of their life as well as the digital divide between the rich and poor, rural and urban, and boys and girls in India and resultant challenges. It also provides an overview of few significant self-initiatives of teachers to reach their students during the crisis period, who did not have internet and smartphone facilities as well as the initiatives being taken at the government level to address the learning needs and mitigate the learning gaps of learners, bridge the digital divide, strategic planning and upskilling of teachers to overcome the effect of COVID-19 crisis.

Keywords: COVID-19, online education, initiatives, challenges

Procedia PDF Downloads 100
2736 Analysis of Determinants of Growth of Small and Medium Enterprises in Kwara State, Nigeria

Authors: Hussaini Tunde Subairu

Abstract:

Small and Medium Enterprises (SMEs) sectors serve as catalyst for employment generation, national growth, poverty reduction and economic development in developing and developed countries. However, in Nigeria despite copious and plethora of government policies and stimulus schemes directed at SMEs, the sector is still characterized by high rate of failure and discontinuities. This study therefore investigated owners/managers profile, firms characteristics and external factors as possible determinants of SMEs growth from selected SMEs in Kwara State. Primary data were sourced from 200 SMEs respondents registered with the National Association of Small and Medium Enterprises (NASMES) in Kwara State Central Senatorial District. Multiple Regressions Analysis (MRA) was used to analyze the relationship between dependent and independent variables, and pair wise correlation was employed to examine the relationship among independent variables. The Analysis of Variable (ANOVA) was employed to indicate the overall significant of the model The findings revealed that Analysis of variance (ANOVA) put the value of F-statistics at 420.45 and p-value at 0.000 was significant. The values of R2 and Adjusted R2 of 0.9643 and 0.9620 respectively suggested that 96 percent of variations in employment growth were explained by the explanatory variables. The level of technical and managerial education has t- value of 24.14 and p-value of 0.001, length of managers/owners experience in similar trade with t- value of 21.37 and p-value of 0.001, age of managers/owners with t- value of 42.98 and p-value of 0.001, firm age with t- value of 25.91 and p-value of 0.001, numbers of firms in a cluster with t- value of 7.20 and p-value of 0.001, access to formal finance with t-value of 5.56 and p-value of 0.001, firm technology innovation with t- value of 25.32 and p-value of 0.01, institutional support with t- value of 18.89 and p-value of 0.01, globalization with t- value of 9.78 and p-value of 0.01, and infrastructure with t-value of 10.75 and p-value of 0.01. The result also indicated that initial size has t-value of -1.71 and p-value of 0.090 which is consistent with Gibrat’s Law. The study concluded that owners/managers profile, firm specific characteristics and external factors substantially influenced employment growths of SMEs in the study area. Therefore, policy implication should enhance human capital development of SMEs owners/managers, and strengthen fiscal policy thrust through imposition on tariff regime to minimize effect of globalization. Governments at all level must support SMEs growth radically and enhance institutional support for SMEs growth and radically and significantly upgrading key infrastructure as rail/roads, rail, telecommunications, water and power.

Keywords: external factors, firm specific characteristics, owners / manager profile, small and medium enterprises

Procedia PDF Downloads 227
2735 Information and Communication Technology Learning between Parents and High School Students

Authors: Yu-Mei Tseng, Chih-Chun Wu

Abstract:

As information and communication technology (ICT) has become a part of people’s lives, most teenagers born after the 1980s and grew up in internet generation are called digital natives. Meanwhile, those teenagers’ parents are called digital immigrants. They need to keep learning new skills of ICT. This study investigated that high school students helped their parents set up social network services (SNS) and taught them how to use ICT. This study applied paper and pencil anonymous questionnaires that asked the ICT learning and ICT products using in high school students’ parents. The sample size was 2,621 high school students, including 1,360 (51.9%) males and 1,261 (48.1%) females. The sample was from 12 high school and vocational high school in central Taiwan. Results from paired sample t-tests demonstrated regardless genders, both male and female high school students help mothers set up Facebook and LINE more often than fathers. In addition, both male and female high school students taught mothers to use ICT more often than fathers. Meanwhile, both male and female high school students teach mothers to use SNS more often than fathers. The results showed that intergenerational ICT teaching occurred more often between mothers and her children than fathers. It could imply that mothers play a more important role in family ICT learning than fathers, or it could be that mothers need more help regarding ICT than fathers. As for gender differences, results from the independent t-tests showed that female high school students were more likely than male ones to help their parents setup Facebook and LINE. In addition, compared to male high school students, female ones were more likely to teach their parents to use smartphone, Facebook and LINE. However, no gender differences were detected in teaching mothers. The gender differences results suggested that female teenagers offer more helps to their parents regarding ICT learning than their male counterparts. As for area differences, results from the independent t-tests showed that the high school in remote area students were more likely than metropolitan ones to teach parents to use computer, search engine and download files of audio and video. The area differences results might indicate that remote area students were more likely to teach their parents how to use ICT. The results from this study encourage children to help and teach their parents with ICT products.

Keywords: adult ICT learning, family ICT learning, ICT learning, urban-rural gap

Procedia PDF Downloads 171
2734 Analysis of Barbell Kinematics of Snatch Technique among Women Weightlifters in India

Authors: Manish Kumar Pillai, Madhavi Pathak Pillai, Rajender Lal, Dinesh P. Sharma

Abstract:

India has not yet been able to produce many weightlifters in the past years. Karnam Malleshwari is the only woman to win a medal for India in Olympics. When we try to introspect, there seem to be different reasons. One of the probable cause could be the lack of biomechanical analysis for technique improvements. The analysis of motion in sports has gained prime importance for technical improvement. It helps an athlete to develop a better understanding of his own skills and increasing the rate of technical learning process. Kinematics is concerned with describing and quantifying both the linear and angular position of bodies and their time derivatives. The techniques analysis of barbell movement is very important in weightlifting. But women weightlifting has a shorter history than men’s. Research on women weightlifting based on video analysis is less; there is a lack of scientific evidence based on kinematic analysis of especially on Indian weightlifters at national level are limited. Hence, the present investigation was aimed to analyze the barbell kinematics of women weightlifters in India. The study was delimited to the medal winners of 69-kilogram weight category in the All India Inter-University Competition, age ranging between 18 and 28 years. The variables selected for the mechanical analysis of Barbell kinematics included barbell trajectory, velocity, acceleration, potential energy, kinetic energy, mechanical energy, and average power output. The performance was captured during the competition by two DV PC-60 Digital cameras (Panasonic Company, Ltd). Two cameras were placed 6-meters perpendicular to the plane of the motion, 130 cm. above the ground to record/capture the frontal and lateral view of the lifters simultaneously. Video recordings were analyzed by using Dartfish software, and barbell kinematics were analyzed with the information derived with the help of software. The result documented on the basis of the finding of the study clearly states that there are differences in the selected kinematic variables in all three lifters in respect to their technique in five phases during snatch technique using by them.

Keywords: dartfish, digital camera, kinematic, snatch, weightlifting

Procedia PDF Downloads 120
2733 A Review on Building Information Modelling in Nigeria and Its Potentials

Authors: Mansur Hamma-Adama, Tahar Kouider

Abstract:

Construction Industry has been evolving since the development of Building Information Modelling (BIM). This technological process is unstoppable; it is out to the market with remarkable case studies of solving the long industry’s history of fragmentation. This industry has been changing over time; United States has recorded the most significant development in construction digitalization, Australia, United Kingdom and some other developed nations are also amongst promoters of BIM process and its development. Recently, a developing country like China and Malaysia are keying into the industry’s digital shift, while very little move is seen in South Africa whose development is considered higher and perhaps leader in the digital transition amongst the African countries. To authors’ best knowledge, Nigerian construction industry has never engaged in BIM discussions hence has no attention at national level. Consequently, Nigeria has no “Noteworthy BIM publications.” Decision makers and key stakeholders need to be informed on the current trend of the industry’s development (BIM in specific) and the opportunities of adopting this digitalization trend in relation to the identified challenges. BIM concept can be traced mostly in Architectural practices than engineering practices in Nigeria. A superficial BIM practice is found to be at organisational level only and operating a model based - “BIM stage 1.” Research to adopting this innovation has received very little attention. This piece of work is literature review based, aimed at exploring BIM in Nigeria and its prospects. The exploration reveals limitations in the literature availability as to extensive research in the development of BIM in the country. Numerous challenges were noticed including building collapse, inefficiencies, cost overrun and late project delivery. BIM has potentials to overcome the above challenges and even beyond. Low level of BIM adoption with reasonable level of awareness is noticed. However, lack of policy and guideline as well as serious lack of experts in the field are amongst the major barriers to BIM adoption. The industry needs to embrace BIM to possibly compete with its global counterpart.

Keywords: adoption, BIM, CAD, construction industry, Nigeria, opportunities

Procedia PDF Downloads 141
2732 A Holistic Approach to Institutional Cyber Security

Authors: Mehmet Kargaci

Abstract:

It is more important to access information than to get the correct information and to transform it to the knowledge in a proper way. Every person, organizations or governments who have the knowledge now become the target. Cyber security involves the range of measures to be taken from individual to the national level. The National institutions refer to academic, military and major public and private institutions, which are very important for the national security. Thus they need further cyber security measures. It appears that the traditional cyber security measures in the national level are alone not sufficient, while the individual measures remain in a restricted level. It is evaluated that the most appropriate method for preventing the cyber vulnerabilities rather than existing measures are to develop institutional measures. This study examines the cyber security measures to be taken, especially in the national institutions.

Keywords: cyber defence, information, critical infrastructure, security

Procedia PDF Downloads 519
2731 Health Transformation Program and Effects on Health Expenditures

Authors: Zeynep Karacor, Rahime Hulya Ozturk

Abstract:

In recent years, the rise of population density and the problem of aging population took attention to the health expenditures. In Turkey, some regulations and infrastructure changes in health sector have occurred. These changes are called Health Transformation Program. The productivity of health services, patient satisfaction, quality of services are tried to be improved with this program. Some radical changes are applied in Turkish economy in this context. The aim of this paper is to present the effects of Health Transformation Program on health expenditures. In the first part of the paper, some information’s about health system and applications in Turkey are discussed. In the second part, the aims of Health Transformation Program are explained. And in the third part the effects of Health Transformation Program on health expenditures are examined.

Keywords: health transformation program, Turkey, health services, health expenditures

Procedia PDF Downloads 372
2730 Using Vulnerability to Reduce False Positive Rate in Intrusion Detection Systems

Authors: Nadjah Chergui, Narhimene Boustia

Abstract:

Intrusion Detection Systems are an essential tool for network security infrastructure. However, IDSs have a serious problem which is the generating of massive number of alerts, most of them are false positive ones which can hide true alerts and make the analyst confused to analyze the right alerts for report the true attacks. The purpose behind this paper is to present a formalism model to perform correlation engine by the reduction of false positive alerts basing on vulnerability contextual information. For that, we propose a formalism model based on non-monotonic JClassicδє description logic augmented with a default (δ) and an exception (є) operator that allows a dynamic inference according to contextual information.

Keywords: context, default, exception, vulnerability

Procedia PDF Downloads 249
2729 Check Factors Contributing to the Increase or Decrease in Labor Productivity in Employees Applied Science Center Municipal Andimeshk

Authors: Hossein Boromandfar, Ahmad Ghalavandi

Abstract:

This paper examines the importance of human resources as a strategic resource and the factors that lead to increased Labor productivity in Applied Science Center Andimeshk pay. First, the concepts and definitions of productivity and factors affecting it, and then determine the center Recommendations for improving the productivity of the university at a high level its improvement. What leads to increased productivity of labor is worth. The most competent human resources infrastructure is set, because by moving towards the development and promotion. The use of qualified employees in the university with a focus on specific objectives can be effective on its promotion.

Keywords: productivity, manage, human resources, center for applied science

Procedia PDF Downloads 406
2728 WhatsApp as a Public Health Management Tool in India

Authors: Drishti Sharma, Mona Duggal

Abstract:

Background: WhatsApp can serve as a cost-effective, scalable, convenient, and popular medium for public health management related communication in the developing world where the existing system of communication is top-down and slow. The product supports sending and receiving a variety of media: text, photos, videos, documents, and location, as well as voice/video calls. With growing number of users of smartphones and improving access and penetration of internet, the scope of information technology remains immense in resolving the hurdles faced by traditional public health system. Poor infrastructure, gap in digital literacy, faulty documentation, strict organizational hierarchy and slow movement of information across desks and offices- all these, make WhatsApp an efficient prospect to complement the existing system for communication, feedback and leadership for public health system in India. Objective: This study investigates the benefits, challenges and limitations associated with WhatsApp usage as a public health management tool. Methods: The study was conducted within the Chandigarh Union Territory. We used a qualitative approach and conducted individual semi-structured interviews and group interviews (n = 10). Participants included medical officers (n 20), Program managers (n = 4), academicians (n=2) and administrators (n=2). Thematic and content qualitative analyses were conducted. Message log of the WhatsApp group of one of the health program was assessed. Results: Medical Officers said that WhatsApp helped them remain in touch with the program officer. They could easily give feedback and highlight those challenges which needed immediate intervention from the program managers, hence they felt supported. Also, the application helped them share pictures of their activities (meetings and field activities) with the group which they thought inspired others and gave themselves immense satisfaction. Also, it helped build stronger relationships and better coordination among themselves, the same being important in team events. For program managers, it had become a portal for coordinating large scale campaigns. Its reach and the fact that the feedback is real-time make WhatsApp ideal for district level events. Though the easy informal connectivity made them answerable to their staff but it also provided them with flexibility in operations. It turned out to be an important portal for sharing outcome and goals related feedback (both positive and negative) to the team. To be sure, using WhatsApp for the purpose of public health program presents considerable challenges, including technological barriers, organizational challenges, gender issues, confidentiality concerns and unplanned aftereffects. Nevertheless, its advantages in a low-cost setting make it an efficient alternative. Conclusion: WhatsApp has become an integral part of our lives. Use of this app for public health program management within closed groups looks promising and useful. At the same time, addressing the challenges involved would make its usage safer.

Keywords: communication, mobile technology, public health management, WhatsApp

Procedia PDF Downloads 157
2727 From Makers to Maker Communities: A Survey on Turkish Makerspaces

Authors: Dogan Can Hatunoglu, Cengiz Hakan Gurkanlı, Hatice Merve Demirci

Abstract:

Today, the maker movement is regarded as a socio-cultural movement that represents designing and building objects for innovations. In these creativity-based activities of the movement, individuals from different backgrounds such as; inventors, programmers, craftspeople, DIY’ers, tinkerers, engineers, designers, and hackers, form a community and work collaboratively for mutual, open-source innovations. Today, with the accessibility of recently emerged technologies and digital fabrication tools, the Maker Movement is continuously expanding its scope and has evolved into a new experience, and for many, it is now considered as new kind of industrial revolution. In this new experience, makers create new things within their community by using new digital tools and technologies in spots called makerspaces. In these makerspaces, activities of learning, experience sharing, and mentoring are evolved into maker events. Makers who share common interests in making benefit from makerspaces as meeting and working spots. In literature, there are many sources on Maker Movement, maker communities, and their activities, especially in the field of business administration. However, there is a gap in the literature about the maker communities in Turkey. This research aims to be an information source on the dynamics and process design of “making” activities in Turkish maker communities and also aims to provide insights to sustain and enhance local maker communities in the future. Within this aim, semi-structured interviews were conducted with founders and facilitators from selected Turkish maker communities. (1) The perception towards Maker Movement, makers, activity of making, and current situation of maker communities, (2) motivations of individuals who participate the maker communities, and (3) key drivers (collaboration and decision-making in design processes) of maker activities from the perspectives of main actors (founders, facilitators) are all examined deeply with question on personal experiences and perspectives. After a qualitative approached data analysis concerning the maker communities in Turkey, this research reveals that there are two main conclusions regarding (1) the foundation of the Turkish maker mindset and (2) emergence of self-sustaining communities.

Keywords: Maker Movement, maker community, makerspaces, open-source design, sustainability

Procedia PDF Downloads 130
2726 Feasibility and Acceptability of an Emergency Department Digital Pain Self-Management Intervention: An Randomized Controlled Trial Pilot Study

Authors: Alexandria Carey, Angela Starkweather, Ann Horgas, Hwayoung Cho, Jason Beneciuk

Abstract:

Background/Significance: Over 3.4 million acute axial low back pain (aLBP) cases are treated annually in the United States (US) emergency departments (ED). ED patients with aLBP receive varying verbal and written discharge routine care (RC), leading to ineffective patient self-management. Ineffective self-management increase chronic low back pain (cLPB) transition risks, a chief cause of worldwide disability, with associated costs >$60 million annually. This research addresses this significant problem by evaluating an ED digital pain self-management intervention (EDPSI) focused on improving self-management through improved knowledge retainment, skills, and self-efficacy (confidence) (KSC) thus reducing aLBP to cLBP transition in ED patients discharged with aLBP. The research has significant potential to increase self-efficacy, one of the most potent mechanisms of behavior change and improve health outcomes. Focusing on accessibility and usability, the intervention may reduce discharge disparities in aLBP self-management, especially with low health literacy. Study Questions: This research will answer the following questions: 1) Will an EDPSI focused on improving KSC progress patient self-management behaviors and health status?; 2) Is the EDPSI sustainable to improve pain severity, interference, and pain recurrence?; 3) Will an EDPSI reduce aLBP to cLBP transition in patients discharged with aLBP? Aims: The pilot randomized-controlled trial (RCT) study’s objectives assess the effects of a 12-week digital self-management discharge tool in patients with aLBP. We aim to 1) Primarily assess the feasibility [recruitment, enrollment, and retention], and [intervention] acceptability, and sustainability of EDPSI on participant’s pain self-management; 2) Determine the effectiveness and sustainability of EDPSI on pain severity/interference among participants. 3) Explore patient preferences, health literacy, and changes among participants experiencing the transition to cLBP. We anticipate that EDPSI intervention will increase likelihood of achieving self-management milestones and significantly improve pain-related symptoms in aLBP. Methods: The study uses a two-group pilot RCT to enroll 30 individuals who have been seen in the ED with aLBP. Participants are randomized into RC (n=15) or RC + EDPSI (n=15) and receive follow-up surveys for 12-weeks post-intervention. EDPSI innovative content focuses on 1) highlighting discharge education; 2) provides self-management treatment options; 3) actor demonstration of ergonomics, range of motion movements, safety, and sleep; 4) complementary alternative medicine (CAM) options including acupuncture, yoga, and Pilates; 5) combination therapies including thermal application, spinal manipulation, and PT treatments. The intervention group receives Booster sessions via Zoom to assess and reinforce their knowledge retention of techniques and provide return demonstration reinforcing ergonomics, in weeks two and eight. Outcome Measures: All participants are followed for 12-weeks, assessing pain severity/ interference using the Brief Pain Inventory short-form (BPI-sf) survey, self-management (measuring KSC) using the short 13-item Patient Activation Measure (PAM), and self-efficacy using the Pain Self-Efficacy Questionnaire (PSEQ) weeks 1, 6, and 12. Feasibility is measured by recruitment, enrollment, and retention percentages. Acceptability and education satisfaction are measured using the Education-Preference and Satisfaction Questionnaire (EPSQ) post-intervention. Self-management sustainment is measured including PSEQ, PAM, and patient satisfaction and healthcare utilization (PSHU) requesting patient overall satisfaction, additional healthcare utilization, and pain management related to continued back pain or complications post-injury.

Keywords: digital, pain self-management, education, tool

Procedia PDF Downloads 31
2725 The Application of Hellomac Rockfall Alert System in Rockfall Barriers: An Explainer

Authors: Kinjal Parmar, Matteo Lelli

Abstract:

The usage of IoT technology as a rockfall alert system is relatively new. This paper explains the potential of such an alert system called HelloMac from Maccaferri which provides transportation infrastructure asset owners the way to effectively utilize their resources in the detection of boulder impacts on rockfall barriers. This would ensure a faster assessment of the impacted barrier and subsequently facilitates the implementation of remedial works in an effective and timely manner. In addition, the HelloMac can also be integrated with another warning system to alert vehicle users of the unseen dangers ahead. HelloMac is developed to work also in remote areas, where cell coverage is not available. User gets notified when a rockfall even occurs via mobile app, SMS and email. Using such alarming systems effectively, we can reduce the risk of rockfall hazard.

Keywords: rockfall, barrier, HelloMac, rockfall alert system

Procedia PDF Downloads 35
2724 A Study on the Quantitative Evaluation Method of Asphalt Pavement Condition through the Visual Investigation

Authors: Sungho Kim, Jaechoul Shin, Yujin Baek

Abstract:

In recent years, due to the environmental impacts and time factor, etc., various type of pavement deterioration is increasing rapidly such as crack, pothole, rutting and roughness degradation. The Ministry of Land, Infrastructure and Transport maintains regular pavement condition of the highway and the national highway using the pavement condition survey equipment and structural survey equipment in Korea. Local governments that maintain local roads, farm roads, etc. are difficult to maintain the pavement condition using the pavement condition survey equipment depending on economic conditions, skills shortages and local conditions such as narrow roads. This study presents a quantitative evaluation method of the pavement condition through the visual inspection to overcome these problems of roads managed by local governments. It is difficult to evaluate rutting and roughness with the naked eye. However, the condition of cracks can be evaluated with the naked eye. Linear cracks (m), area cracks (m²) and potholes (number, m²) were investigated with the naked eye every 100 meters for survey the cracks. In this paper, crack ratio was calculated using the results of the condition of cracks and pavement condition was evaluated by calculated crack ratio. The pavement condition survey equipment also investigated the pavement condition in the same section in order to evaluate the reliability of pavement condition evaluation by the calculated crack ratio. The pavement condition was evaluated through the SPI (Seoul Pavement Index) and calculated crack ratio using results of field survey. The results of a comparison between 'the SPI considering only crack ratio' and 'the SPI considering rutting and roughness either' using the equipment survey data showed a margin of error below 5% when the SPI is less than 5. The SPI 5 is considered the base point to determine whether to maintain the pavement condition. It showed that the pavement condition can be evaluated using only the crack ratio. According to the analysis results of the crack ratio between the visual inspection and the equipment survey, it has an average error of 1.86%(minimum 0.03%, maximum 9.58%). Economically, the visual inspection costs only 10% of the equipment survey and will also help the economy by creating new jobs. This paper advises that local governments maintain the pavement condition through the visual investigations. However, more research is needed to improve reliability. Acknowledgment: The author would like to thank the MOLIT (Ministry of Land, Infrastructure, and Transport). This work was carried out through the project funded by the MOLIT. The project name is 'development of 20mm grade for road surface detecting roadway condition and rapid detection automation system for removal of pothole'.

Keywords: asphalt pavement maintenance, crack ratio, evaluation of asphalt pavement condition, SPI (Seoul Pavement Index), visual investigation

Procedia PDF Downloads 156
2723 Modelling Volatility of Cryptocurrencies: Evidence from GARCH Family of Models with Skewed Error Innovation Distributions

Authors: Timothy Kayode Samson, Adedoyin Isola Lawal

Abstract:

The past five years have shown a sharp increase in public interest in the crypto market, with its market capitalization growing from $100 billion in June 2017 to $2158.42 billion on April 5, 2022. Despite the outrageous nature of the volatility of cryptocurrencies, the use of skewed error innovation distributions in modelling the volatility behaviour of these digital currencies has not been given much research attention. Hence, this study models the volatility of 5 largest cryptocurrencies by market capitalization (Bitcoin, Ethereum, Tether, Binance coin, and USD Coin) using four variants of GARCH models (GJR-GARCH, sGARCH, EGARCH, and APARCH) estimated using three skewed error innovation distributions (skewed normal, skewed student- t and skewed generalized error innovation distributions). Daily closing prices of these currencies were obtained from Yahoo Finance website. Finding reveals that the Binance coin reported higher mean returns compared to other digital currencies, while the skewness indicates that the Binance coin, Tether, and USD coin increased more than they decreased in values within the period of study. For both Bitcoin and Ethereum, negative skewness was obtained, meaning that within the period of study, the returns of these currencies decreased more than they increased in value. Returns from these cryptocurrencies were found to be stationary but not normality distributed with evidence of the ARCH effect. The skewness parameters in all best forecasting models were all significant (p<.05), justifying of use of skewed error innovation distributions with a fatter tail than normal, Student-t, and generalized error innovation distributions. For Binance coin, EGARCH-sstd outperformed other volatility models, while for Bitcoin, Ethereum, Tether, and USD coin, the best forecasting models were EGARCH-sstd, APARCH-sstd, EGARCH-sged, and GJR-GARCH-sstd, respectively. This suggests the superiority of skewed Student t- distribution and skewed generalized error distribution over the skewed normal distribution.

Keywords: skewed generalized error distribution, skewed normal distribution, skewed student t- distribution, APARCH, EGARCH, sGARCH, GJR-GARCH

Procedia PDF Downloads 84
2722 Using ePortfolios to Mapping Social Work Graduate Competencies

Authors: Cindy Davis

Abstract:

Higher education is changing globally and there is increasing pressure from professional social work accreditation bodies for academic programs to demonstrate how students have successfully met mandatory graduate competencies. As professional accreditation organizations increase their demand for evidence of graduate competencies, strategies to document and recording learning outcomes becomes increasingly challenging for academics and students. Studies in higher education have found support for the pedagogical value of ePortfolios, a flexible personal learning space that is owned by the student and include opportunity for assessment, feedback and reflection as well as a virtual space to store evidence of demonstration of professional competencies and graduate attributes. Examples of institutional uses of ePortfolios include e-administration of a diverse student population, assessment of student learning, and the demonstration of graduate attributes attained and future student career preparation. The current paper presents a case study on the introduction of ePortfolios for social work graduates in Australia as part of an institutional approach to technology-enhanced learning and e-learning. Social work graduates were required to submit an ePortfolio hosted on PebblePad. The PebblePad platform was selected because it places the student at the center of their learning whilst providing powerful tools for staff to structure, guide and assess that learning. The ePortofolio included documentation and evidence of how the student met each graduate competency as set out by the social work accreditation body in Australia (AASW). This digital resource played a key role in the process of external professional accreditation by clearly documenting and evidencing how students met required graduate competencies. In addition, student feedback revealed a positive outcome on how this resource provided them with a consolidation of their learning experiences and assisted them in obtaining employment post-graduation. There were also significant institutional factors that were key to successful implementation such as investment in the digital technology, capacity building amongst academics, and technical support for staff and students.

Keywords: accreditation, social work, teaching, technology

Procedia PDF Downloads 125
2721 Geographic Information System and Ecotourism Sites Identification of Jamui District, Bihar, India

Authors: Anshu Anshu

Abstract:

In the red corridor famed for the Left Wing Extremism, lies small district of Jamui in Bihar, India. The district lies at 24º20´ N latitude and 86º13´ E longitude, covering an area of 3,122.8 km2 The undulating topography, with widespread forests provides pristine environment for invigorating experience of tourists. Natural landscape in form of forests, wildlife, rivers, and cultural landscape dotted with historical and religious places is highly purposive for tourism. The study is primarily related to the identification of potential ecotourism sites, using Geographic Information System. Data preparation, analysis and finally identification of ecotourism sites is done. Secondary data used is Survey of India Topographical Sheets with R.F.1:50,000 covering the area of Jamui district. District Census Handbook, Census of India, 2011; ERDAS Imagine and Arc View is used for digitization and the creation of DEM’s (Digital Elevation Model) of the district, depicting the relief and topography and generate thematic maps. The thematic maps have been refined using the geo-processing tools. Buffer technique has been used for the accessibility analysis. Finally, all the maps, including the Buffer maps were overlaid to find out the areas which have potential for the development of ecotourism sites in the Jamui district. Spatial data - relief, slopes, settlements, transport network and forests of Jamui District were marked and identified, followed by Buffer Analysis that was used to find out the accessibility of features like roads, railway stations to the sites available for the development of ecotourism destinations. Buffer analysis is also carried out to get the spatial proximity of major river banks, lakes, and dam sites to be selected for promoting sustainable ecotourism. Overlay Analysis is conducted using the geo-processing tools. Digital Terrain Model (DEM) generated and relevant themes like roads, forest areas and settlements were draped on the DEM to make an assessment of the topography and other land uses of district to delineate potential zones of ecotourism development. Development of ecotourism in Jamui faces several challenges. The district lies in the portion of Bihar that is part of ‘red corridor’ of India. The hills and dense forests are the prominent hideouts and training ground for the extremists. It is well known that any kind of political instability, war, acts of violence directly influence the travel propensity and hinders all kind of non-essential travels to these areas. The development of ecotourism in the district can bring change and overall growth in this area with communities getting more involved in economically sustainable activities. It is a known fact that poverty and social exclusion are the main force that pushes people, resorting towards violence. All over the world tourism has been used as a tool to eradicate poverty and generate good will among people. Tourism, in sustainable form should be promoted in the district to integrate local communities in the development process and to distribute fruits of development with equity.

Keywords: buffer analysis, digital elevation model, ecotourism, red corridor

Procedia PDF Downloads 248
2720 Performance Evaluation of DSR and OLSR Routing Protocols in MANET Using Varying Pause Time

Authors: Yassine Meraihi, Dalila Acheli, Rabah Meraihi

Abstract:

MANET for Mobile Ad hoc NETwork is a collection of wireless mobile nodes that communicates with each other without using any existing infrastructure, access point or centralized administration, due to the higher mobility and limited radio transmission range, routing is an important issue in ad hoc network, so in order to ensure reliable and efficient route between to communicating nodes quickly, an appropriate routing protocol is needed. In this paper, we present the performance analysis of two mobile ad hoc network routing protocols namely DSR and OLSR using NS2.34, the performance is determined on the basis of packet delivery ratio, throughput, average jitter and end to end delay with varying pause time.

Keywords: DSR, OLSR, quality of service, routing protocols, MANET

Procedia PDF Downloads 537
2719 The Development of Encrypted Near Field Communication Data Exchange Format Transmission in an NFC Passive Tag for Checking the Genuine Product

Authors: Tanawat Hongthai, Dusit Thanapatay

Abstract:

This paper presents the development of encrypted near field communication (NFC) data exchange format transmission in an NFC passive tag for the feasibility of implementing a genuine product authentication. We propose a research encryption and checking the genuine product into four major categories; concept, infrastructure, development and applications. This result shows the passive NFC-forum Type 2 tag can be configured to be compatible with the NFC data exchange format (NDEF), which can be automatically partially data updated when there is NFC field.

Keywords: near field communication, NFC data exchange format, checking the genuine product, encrypted NFC

Procedia PDF Downloads 264
2718 Visual Representation of Ancient Chinese Rites with Digitalization Technology: A Case of Confucius Worship Ceremony

Authors: Jihong Liang, Huiling Feng, Linqing Ma, Tianjiao Qi

Abstract:

Confucius is the first sage in Chinese culture. Confucianism, the theories represented by Confucius, has long been at the core of Chinese traditional society, as the dominating political ideology of centralized feudal monarchy for more than two thousand years. Confucius Worship Ceremony held in the Confucian Temple in Qufu (Confucius’s birthplace), which is dedicated to commemorate Confucius and other 170 elites in Confucianism with a whole set of formal rites, pertains to “Auspicious Rites”, which worship heaven and earth, humans and ghosts. It was first a medium-scaled ritual activity but then upgraded to the supreme one at national level in the Qing Dynasty. As a national event, it was celebrated by Emperor as well as common intellectuals in traditional China. The Ceremony can be solemn and respectful, with prescribed and complicated procedures, well-prepared utensil and matched offerings operated in rhythm with music and dances. Each participant has his place, and everyone follows the specified rules. This magnificent ritual Ceremony, while embedded with rich culture connotation, actually symbolizes the social acknowledgment for orthodox culture represented by Confucianism. Rites reflected in this Ceremony, is one of the most important features of Chinese culture, serving as the key bond in the identification and continuation of Chinese culture. These rites and ritual ceremonies, as culture memories themselves, are not only treasures of China, but of the whole world. However, while the ancient Chinese Rite has been one of the thorniest and most complicated topics for academics, the more regrettable is that due to their interruption in practice and historical changes, these rites and ritual ceremonies have already become a vague language in today’s academic discourse and strange terms of the past for common people. Luckily, we, today, by virtue of modern digital technology, may be able to reproduce these ritual ceremonies, as most of them can still be found in ancient manuscripts, through which Chinese ancestors tell the beauty and gravity of their dignified rites and more importantly, their spiritual pursuits with vivid language and lively pictures. This research, based on review and interpretation of the ancient literature, intends to construct the ancient ritual ceremonies, with the Confucius Worship Ceremony as a case and by use of digital technology. Using 3D technology, the spatial scenes in the Confucian Temple can be reconstructed by virtual reality; the memorial tablet exhibited in the temple by GIS and different rites in the ceremonies by animation technology. With reference to the lyrics, melodies and lively pictures recorded in ancient scripts, it is also possible to reproduce the live dancing site. Also, image rendering technology can help to show the life experience and accomplishments of Confucius. Finally, lining up all the elements in a multimedia narrative form, a complete digitalized Confucius Worship Ceremony can be reproduced, which will provide an excellent virtual experience that goes beyond time and space by bringing its audience back to that specific historical time. This digital project, once completed, will play an important role in the inheritance and dissemination of cultural heritage.

Keywords: Confucius worship ceremony, multimedia narrative form, GIS, visual representation

Procedia PDF Downloads 238
2717 A Study of Topical and Similarity of Sebum Layer Using Interactive Technology in Image Narratives

Authors: Chao Wang

Abstract:

Under rapid innovation of information technology, the media plays a very important role in the dissemination of information, and it has a totally different analogy generations face. However, the involvement of narrative images provides more possibilities of narrative text. "Images" through the process of aperture, a camera shutter and developable photosensitive processes are manufactured, recorded and stamped on paper, displayed on a computer screen-concretely saved. They exist in different forms of files, data, or evidence as the ultimate looks of events. By the interface of media and network platforms and special visual field of the viewer, class body space exists and extends out as thin as sebum layer, extremely soft and delicate with real full tension. The physical space of sebum layer of confuses the fact that physical objects exist, needs to be established under a perceived consensus. As at the scene, the existing concepts and boundaries of physical perceptions are blurred. Sebum layer physical simulation shapes the “Topical-Similarity" immersing, leading the contemporary social practice communities, groups, network users with a kind of illusion without the presence, i.e. a non-real illusion. From the investigation and discussion of literatures, digital movies editing manufacture and produce the variability characteristics of time (for example, slices, rupture, set, and reset) are analyzed. Interactive eBook has an unique interaction in "Waiting-Greeting" and "Expectation-Response" that makes the operation of image narrative structure more interpretations functionally. The works of digital editing and interactive technology are combined and further analyze concept and results. After digitization of Interventional Imaging and interactive technology, real events exist linked and the media handing cannot be cut relationship through movies, interactive art, practical case discussion and analysis. Audience needs more rational thinking about images carried by the authenticity of the text.

Keywords: sebum layer, topical and similarity, interactive technology, image narrative

Procedia PDF Downloads 376
2716 Cognitive Models of Health Marketing Communication in the Digital Era: Psychological Factors, Challenges, and Implications

Authors: Panas Gerasimos, Kotidou Varvara, Halkiopoulos Constantinos, Gkintoni Evgenia

Abstract:

As a result of growing technology and briefing by the internet, users resort to the internet and subsequently to the opinion of an expert. In many cases, they take control of their health in their hand and make a decision without the contribution of a doctor. According to that, this essay intends to analyze the confidence of searching health issues on the internet. For the fulfillment of this study, there has been a survey among doctors in order to find out the reasons a patient uses the internet about their health problems and the consequences that health information could lead by searching on the internet, as well. Specifically, the results regarding the research of the users demonstrate: a) the majority of users make use of the internet about health issues once or twice a month, b) individuals that possess chronic disease make health search on the internet more frequently, c) the most important topics that the majority of users usually search are pathological, dietary issues and the search of issues that are associated with doctors and hospitals. However, it observed that topic search varies depending on the users’ age, d) the most common sources of information concern the direct contact with doctors, as there is a huge preference from the majority of users over the use of the electronic form for their briefing and e) it has been observed that there is large lack of knowledge about e-health services. From the doctor's point of view, the following conclusions occur: a) almost all doctors use the internet as their main source of information, b) the internet has great influence over doctors’ relationship with the patients, c) in many cases a patient first makes a visit to the internet and then to the doctor, d) the internet significantly has a psychological impact on patients in order to for them to reach a decision, e) the most important reason users choose the internet instead of the health professional is economic, f) the negative consequence that emerges is inaccurate information, g) and the positive consequences are about the possibility of online contact with the doctor and contributes to the easy comprehension of the doctor, as well. Generally, it’s observed from both sides that the use of the internet in health issues is intense, which declares that the new means the doctors have at their disposal, produce the conditions for radical changes in the way of providing services and in the doctor-patient relationship.

Keywords: cognitive models, health marketing, e-health, psychological factors, digital marketing, e-health services

Procedia PDF Downloads 190
2715 Feeling Sorry for Some Creditors

Authors: Hans Tjio, Wee Meng Seng

Abstract:

The interaction of contract and property has always been a concern in corporate and commercial law, where there are internal structures created that may not match the externally perceived image generated by the labels attached to those structures. We will focus, in particular, on the priority structures created by affirmative asset partitioning, which have increasingly come under challenge by those attempting to negotiate around them. The most prominent has been the AT1 bonds issued by Credit Suisse which were wiped out before its equity when the troubled bank was acquired by UBS. However, this should not have come as a surprise to those whose “bonds” had similarly been “redeemed” upon the occurrence of certain reference events in countries like Singapore, Hong Kong and Taiwan during their Minibond crisis linked to US sub-prime defaults. These were derivatives classified as debentures and sold as such. At the same time, we are again witnessing “liabilities” seemingly ranking higher up the balance sheet ladder, finding themselves lowered in events of default. We will examine the mechanisms holders of perpetual securities or preference shares have tried to use to protect themselves. This is happening against a backdrop that sees a rise in the strength of private credit and inter-creditor conflicts. The restructuring regime of the hybrid scheme in Singapore now, while adopting the absolute priority rule in Chapter 11 as the quid pro quo for creditor cramdown, does not apply to shareholders and so exempts them from cramdown. Complicating the picture further, shareholders are not exempted from cramdown in the Dutch scheme, but it adopts a relative priority rule. At the same time, the important UK Supreme Court decision in BTI 2014 LLC v Sequana [2022] UKSC 25 has held that directors’ duties to take account of creditor interests are activated only when a company is almost insolvent. All this has been complicated by digital assets created by businesses. Investors are quite happy to have them classified as property (like a thing) when it comes to their transferability, but then when the issuer defaults to have them seen as a claim on the business (as a choice in action), that puts them at the level of a creditor. But these hidden interests will not show themselves on an issuer’s balance sheet until it is too late to be considered and yet if accepted, may also prevent any meaningful restructuring.

Keywords: asset partitioning, creditor priority, restructuring, BTI v Sequana, digital assets

Procedia PDF Downloads 63
2714 Automatic Identification of Pectoral Muscle

Authors: Ana L. M. Pavan, Guilherme Giacomini, Allan F. F. Alves, Marcela De Oliveira, Fernando A. B. Neto, Maria E. D. Rosa, Andre P. Trindade, Diana R. De Pina

Abstract:

Mammography is a worldwide image modality used to diagnose breast cancer, even in asymptomatic women. Due to its large availability, mammograms can be used to measure breast density and to predict cancer development. Women with increased mammographic density have a four- to sixfold increase in their risk of developing breast cancer. Therefore, studies have been made to accurately quantify mammographic breast density. In clinical routine, radiologists perform image evaluations through BIRADS (Breast Imaging Reporting and Data System) assessment. However, this method has inter and intraindividual variability. An automatic objective method to measure breast density could relieve radiologist’s workload by providing a first aid opinion. However, pectoral muscle is a high density tissue, with similar characteristics of fibroglandular tissues. It is consequently hard to automatically quantify mammographic breast density. Therefore, a pre-processing is needed to segment the pectoral muscle which may erroneously be quantified as fibroglandular tissue. The aim of this work was to develop an automatic algorithm to segment and extract pectoral muscle in digital mammograms. The database consisted of thirty medio-lateral oblique incidence digital mammography from São Paulo Medical School. This study was developed with ethical approval from the authors’ institutions and national review panels under protocol number 3720-2010. An algorithm was developed, in Matlab® platform, for the pre-processing of images. The algorithm uses image processing tools to automatically segment and extract the pectoral muscle of mammograms. Firstly, it was applied thresholding technique to remove non-biological information from image. Then, the Hough transform is applied, to find the limit of the pectoral muscle, followed by active contour method. Seed of active contour is applied in the limit of pectoral muscle found by Hough transform. An experienced radiologist also manually performed the pectoral muscle segmentation. Both methods, manual and automatic, were compared using the Jaccard index and Bland-Altman statistics. The comparison between manual and the developed automatic method presented a Jaccard similarity coefficient greater than 90% for all analyzed images, showing the efficiency and accuracy of segmentation of the proposed method. The Bland-Altman statistics compared both methods in relation to area (mm²) of segmented pectoral muscle. The statistic showed data within the 95% confidence interval, enhancing the accuracy of segmentation compared to the manual method. Thus, the method proved to be accurate and robust, segmenting rapidly and freely from intra and inter-observer variability. It is concluded that the proposed method may be used reliably to segment pectoral muscle in digital mammography in clinical routine. The segmentation of the pectoral muscle is very important for further quantifications of fibroglandular tissue volume present in the breast.

Keywords: active contour, fibroglandular tissue, hough transform, pectoral muscle

Procedia PDF Downloads 337
2713 ISIS and Its Impact on Geographical Change in Iraq’s Population

Authors: Pshtiwan Shafiq Ahmed

Abstract:

The invasion of Iraq was a turning point in Iraq, destroying the economic infrastructure of several important strategic and historic cities, including Mosul, Anbar and Diyala, which will take decades to rebuild It left 18,805 people dead and 37,000 injured, destroying hundreds of villages and cities, displacing 2.3 million people, and increasing the number of orphans The increase in the number of windows and the destruction of society and the structure of the population so that the number of children, women and the elderly has increased. Religious clashes have increased and religious cleansing has begun, trying to eradicate Christianity, Yazidis and Kakais from the whole of Iraq, causing the largest number of Christians, Yazidis and Kakais to leave Iraq and many of them went missing.

Keywords: ISIS, population change, geographical change, Iraq

Procedia PDF Downloads 81
2712 Security Analysis of SIMSec Protocol

Authors: Kerem Ok, Cem Cevikbas, Vedat Coskun, Mohammed Alsadi, Busra Ozdenizci

Abstract:

Un-keyed SIM cards do not contain the required security infrastructure to provide end-to-end encryption with Service Providers. Hence, new, emerging, or smart services those require end-to-end encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform end-to-end data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol.

Keywords: End-to-end encryption, key exchange, SIM card, smart card

Procedia PDF Downloads 269
2711 Investigating the Problems in Landscape Design Education in Selcuk University Agriculture Faculty Landscape Architecture Department (Konya-Turkey)

Authors: Banu Ozturk Kurtaslan, Ruhugul Ozge Ocak

Abstract:

In this study, educational problems related to landscape design education which is an important study area of landscape architecture discipline. It is important to research about the problems in S.U. Agriculture Faculty Landscape Architecture Department which is a new department, started its B.Sc. education in 2011; and developing some suggestions on this issue in terms of future of the department. In the context of the study a questionnaire has been developed to conduct to the B.Sc. students. The questions has been prepared under the topics of education program, instructor, student, physical infrastructure and other problems.

Keywords: landscape design, landscape design education, problems, Selcuk University Landscape Architecture Department

Procedia PDF Downloads 480