Search results for: data integrity challenges
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 29277

Search results for: data integrity challenges

29127 Challenges for Adult English to Speakers of Other Language Learners

Authors: Halima Zaman

Abstract:

This paper identifies real-life challenges faced by non-English-speaking learners. The author focuses on challenges both inside and outside the classroom. A qualitative approach has been applied to conduct the study with two different groups of ESOL (English to Speakers of Other Languages) learners. The author pays attention to the reasons behind the difficulties in controlling the learners’ focus within the classroom. Learners’ lifestyles, motivations, and previous educational backgrounds have been considered while determining the challenges they face within the classroom. Some existing challenges of teaching English to adults have been discussed in this paper; however, the primary focus is to observe those two groups of learners to identify their challenges. In this paper, the author has applied the academic knowledge of her Master of Arts in English Language teaching program to support and strengthen the observation of this case study. The paper ends with a number of recommendations that can be beneficial for newcomers to ESOL teaching and a scope of further exploratory research.

Keywords: ESOL, challenges, classroom, motivation, adult learners, teaching

Procedia PDF Downloads 83
29126 The Implementation of the Human Right of Self-Determination: the Example of Nagorno-Karabakh Republic

Authors: S. Vlasyan

Abstract:

The article deals with the implementation of the right to self-determination of peoples on the example of Nagorno-Karabakh Republic. The problem of correlation of two fundamental principles of international law i. e. territorial integrity and the right to self-determination of peoples is considered to be one of the vital issues in the field of international law for several decades. So, in this article, the author analyzes the decision of the Supreme Court of Canada regarding specific issues of secession of Quebec from Canada, as well as the decision of the International Court of Justice in the case concerning East Timor (Portugal v. Australia), and in the case of Western Sahara. The author formulates legal conditions of Nagorno-Karabakh secession.

Keywords: right of self-determination, territorial integrity, the principles of International Law, Nagorno-Karabakh Republic

Procedia PDF Downloads 408
29125 Regulating Issues concerning Data Protection in Cloud Computing: Developing a Saudi Approach

Authors: Jumana Majdi Qutub

Abstract:

Rationale: Cloud computing has rapidly developed the past few years. Because of the importance of providing protection for personal data used in cloud computing, the role of data protection in promoting trust and confidence in users’ data has become an important policy priority. This research examines key regulatory challenges rose by the growing use and importance of cloud computing with focusing on protection of individuals personal data. Methodology: Describing and analyzing governance challenges facing policymakers and industry in Saudi Arabia, with an account of anticipated governance responses. The aim of the research is to describe and define the regulatory challenges on cloud computing for policy making in Saudi Arabia and comparing it with potential complied issues rose in respect of transported data to EU member state. In addition, it discusses information privacy issues. Finally, the research proposes policy recommendation that would resolve concerns surrounds the privacy and effectiveness of clouds computing frameworks for data protection. Results: There are still no clear regulation in Saudi Arabia specialized in legalizing cloud computing and specialty regulations in transferring data internationally and locally. Decision makers need to review the applicable law in Saudi Arabia that protect information in cloud computing. This should be from an international and a local view in order to identify all requirements surrounding this area. It is important to educate cloud computing users about their information value and rights before putting it in the cloud to avoid further legal complications, such as making an educational program to prevent giving personal information to a bank employee. Therefore, with many kinds of cloud computing services, it is important to have it covered by the law in all aspects.

Keywords: cloud computing, cyber crime, data protection, privacy

Procedia PDF Downloads 260
29124 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 358
29123 Signal Integrity Performance Analysis in Capacitive and Inductively Coupled Very Large Scale Integration Interconnect Models

Authors: Mudavath Raju, Bhaskar Gugulothu, B. Rajendra Naik

Abstract:

The rapid advances in Very Large Scale Integration (VLSI) technology has resulted in the reduction of minimum feature size to sub-quarter microns and switching time in tens of picoseconds or even less. As a result, the degradation of high-speed digital circuits due to signal integrity issues such as coupling effects, clock feedthrough, crosstalk noise and delay uncertainty noise. Crosstalk noise in VLSI interconnects is a major concern and reduction in VLSI interconnect has become more important for high-speed digital circuits. It is the most effectively considered in Deep Sub Micron (DSM) and Ultra Deep Sub Micron (UDSM) technology. Increasing spacing in-between aggressor and victim line is one of the technique to reduce the crosstalk. Guard trace or shield insertion in-between aggressor and victim is also one of the prominent options for the minimization of crosstalk. In this paper, far end crosstalk noise is estimated with mutual inductance and capacitance RLC interconnect model. Also investigated the extent of crosstalk in capacitive and inductively coupled interconnects to minimizes the same through shield insertion technique.

Keywords: VLSI, interconnects, signal integrity, crosstalk, shield insertion, guard trace, deep sub micron

Procedia PDF Downloads 185
29122 Review of Speech Recognition Research on Low-Resource Languages

Authors: XuKe Cao

Abstract:

This paper reviews the current state of research on low-resource languages in the field of speech recognition, focusing on the challenges faced by low-resource language speech recognition, including the scarcity of data resources, the lack of linguistic resources, and the diversity of dialects and accents. The article reviews recent progress in low-resource language speech recognition, including techniques such as data augmentation, end to-end models, transfer learning, and multi-task learning. Based on the challenges currently faced, the paper also provides an outlook on future research directions. Through these studies, it is expected that the performance of speech recognition for low resource languages can be improved, promoting the widespread application and adoption of related technologies.

Keywords: low-resource languages, speech recognition, data augmentation techniques, NLP

Procedia PDF Downloads 12
29121 A Framework for Secure Information Flow Analysis in Web Applications

Authors: Ralph Adaimy, Wassim El-Hajj, Ghassen Ben Brahim, Hazem Hajj, Haidar Safa

Abstract:

Huge amounts of data and personal information are being sent to and retrieved from web applications on daily basis. Every application has its own confidentiality and integrity policies. Violating these policies can have broad negative impact on the involved company’s financial status, while enforcing them is very hard even for the developers with good security background. In this paper, we propose a framework that enforces security-by-construction in web applications. Minimal developer effort is required, in a sense that the developer only needs to annotate database attributes by a security class. The web application code is then converted into an intermediary representation, called Extended Program Dependence Graph (EPDG). Using the EPDG, the provided annotations are propagated to the application code and run against generic security enforcement rules that were carefully designed to detect insecure information flows as early as they occur. As a result, any violation in the data’s confidentiality or integrity policies is reported. As a proof of concept, two PHP web applications, Hotel Reservation and Auction, were used for testing and validation. The proposed system was able to catch all the existing insecure information flows at their source. Moreover and to highlight the simplicity of the suggested approaches vs. existing approaches, two professional web developers assessed the annotation tasks needed in the presented case studies and provided a very positive feedback on the simplicity of the annotation task.

Keywords: web applications security, secure information flow, program dependence graph, database annotation

Procedia PDF Downloads 471
29120 Evaluation and Analysis of ZigBee-Based Wireless Sensor Network: Home Monitoring as Case Study

Authors: Omojokun G. Aju, Adedayo O. Sule

Abstract:

ZigBee wireless sensor and control network is one of the most popularly deployed wireless technologies in recent years. This is because ZigBee is an open standard lightweight, low-cost, low-speed, low-power protocol that allows true operability between systems. It is built on existing IEEE 802.15.4 protocol and therefore combines the IEEE 802.15.4 features and newly added features to meet required functionalities thereby finding applications in wide variety of wireless networked systems. ZigBee‘s current focus is on embedded applications of general-purpose, inexpensive, self-organising networks which requires low to medium data rates, high number of nodes and very low power consumption such as home/industrial automation, embedded sensing, medical data collection, smart lighting, safety and security sensor networks, and monitoring systems. Although the ZigBee design specification includes security features to protect data communication confidentiality and integrity, however, when simplicity and low-cost are the goals, security is normally traded-off. A lot of researches have been carried out on ZigBee technology in which emphasis has mainly been placed on ZigBee network performance characteristics such as energy efficiency, throughput, robustness, packet delay and delivery ratio in different scenarios and applications. This paper investigate and analyse the data accuracy, network implementation difficulties and security challenges of ZigBee network applications in star-based and mesh-based topologies with emphases on its home monitoring application using the ZigBee ProBee ZE-10 development boards for the network setup. The paper also expose some factors that need to be considered when designing ZigBee network applications and suggest ways in which ZigBee network can be designed to provide more resilient to network attacks.

Keywords: home monitoring, IEEE 802.14.5, topology, wireless security, wireless sensor network (WSN), ZigBee

Procedia PDF Downloads 382
29119 The Needs Programme and Poverty Reduction for National Development of Nigeria at 53

Authors: Owulo Thomas

Abstract:

Despite Nigeria’s ranking as the 6th among oil producing countries, the country faces great challenges. One of such challenges is how to reduce poverty or eradicating it in the land that promises milk and honey to enhance national development. The government of Nigeria initiated various programmes including the NEEDS programme in which it committed her to meeting these challenges. This paper is an attempt to discuss the concept of National Development, the Nigerian poverty profile and its implication for national development, the NEEDS programmes and the extent to which it has addressed the poverty problem in Nigeria at 53.

Keywords: challenges, poverty, national development, NEEDS programme

Procedia PDF Downloads 382
29118 Investigating the Effects of Hydrogen on Wet Cement for Underground Hydrogen Storage Applications in Oil and Gas Wells

Authors: Hamoud Al-Hadrami, Hossein Emadi, Athar Hussain

Abstract:

Green hydrogen is quickly emerging as a new source of renewable energy for the world. Hydrogen production using water electrolysis is deemed as an environmentally friendly and safe source of energy for transportation and other industries. However, storing a high volume of hydrogen seems to be a significant challenge. Abandoned hydrocarbon reservoirs are considered as viable hydrogen storage options because of the availability of the required infrastructure such as wells and surface facilities. However, long-term wellbore integrity in these wells could be a serious challenge. Hydrogen reduces the compressive strength of a set cement if it gets in contact with the cement slurry. Also, mixing hydrogen with cement slurry slightly increases its density and rheological properties, which need to be considered to have a successful primary cementing operation.

Keywords: hydrogen, well bore integrity, clean energy, cementing

Procedia PDF Downloads 213
29117 Cryoinjuries in Sperm Cells: Effect of Adaptation of Steps in Cryopreservation Protocol for Boar Semen upon Post-Thaw Sperm Quality

Authors: Aftab Ali

Abstract:

Cryopreservation of semen is one of the key factors for a successful breeding business along with other factors. To achieve high fertility in boar, one should know about spermatozoa response to different treatments proceeds during cryopreservation. The running project is highly focused on cryopreservation and its effects on sperm quality parameters in both boar and bull semen. Semen sample from A, B, C, and D, were subjected to different thawing conditions and were analyzed upon different treatments in the study. Parameters like sperm cell motility, viability, acrosome, DNA integrity, and phospholipase C zeta were detected by different established methods. Different techniques were used to assess different parameters. Motility was detected using computer assisted sperm analysis, phospholipase C zeta using luminometry while viability, acrosome integrity, and DNA integrity were analyzed using flow cytometry. Thawing conditions were noted to have an effect on sperm quality parameters with motility being the most critical parameter. The results further indicated that the most critical step during cryopreservation of boar semen is when sperm cells are subjected to freezing and thawing. The findings of the present study provide insight that; boar semen cryopreservation is still suboptimal in comparison to bull semen cryopreservation. Thus, there is a need to conduct more research to improve the fertilizing potential of cryopreserved boar semen.

Keywords: cryopreservation, computer assisted sperm, flow cytometry, luminometry

Procedia PDF Downloads 148
29116 Strategies for the Oral Delivery of Oligonucleotides

Authors: Venkat Garigapati

Abstract:

To date, more than a dozen oligonucleotide products are approved as injectable products for clinical use. However, there is no single oligo nucleotide product approved for clinical use. Oral delivery of oligo nucleotides is patient friendly administration however, many challenges involved in the development of oral formulation. Over the course of last twenty plus years, the research in this space aimed to address these challenges. This paper describes the issues involved in solubility, stability, enzymatic (nuclease) induced degradation, and permeation of nucleotides in the Gastrointestinal (GI) and how to overcome these challenges. Also, the translation of in vitro data to in vivo models hinders the formulation development. This paper describes the challenges involved in the development of Oligo Nucleotide products for oral administration. It also discusses the chemistry and formulation strategies for oral administration of oligonucleotides.

Keywords: oral adminstration, oligo nucleotides, stability, permeation, gastrointestinal tract

Procedia PDF Downloads 85
29115 Multisignature Schemes for Reinforcing Trust in Cloud Software-As-A-Service Services

Authors: Mustapha Hedabou, Ali Azougaghe, Ahmed Bentajer, Hicham Boukhris, Mourad Eddiwani, Zakaria Igarramen

Abstract:

Software-as-a-service (SaaS) is emerging as a dominant approach to delivering software. It encompasses a range of business, technical opportunities, issue, and challenges. Trustiness in the cloud services regarding the security and the privacy of the delivered data is the most critical issue with the SaaS model. In this paper, we survey the security concerns related to the SaaS model, and we propose the design of a trusted SaaS model that gives users more confidence into SaaS services by leveraging a trust in a neutral source code certifying authority. The proposed design is based on the use of the multisignature mechanism for signing the source code of the application service. In our model, the cloud provider acts as a root of trust by ensuring the integrity of the application service when it was running on its platform. The proposed design prevents insider attacks from tampering with application service before and after it was launched in a cloud provider platform.

Keywords: cloud computing, SaaS Platform, TPM, trustiness, code source certification, multi-signature schemes

Procedia PDF Downloads 275
29114 Critical Review of Web Content Mining Extraction Mechanisms

Authors: Rabia Bashir, Sajjad Akbar

Abstract:

There is an inevitable demand of web mining due to rapid increase of huge information on the Internet, but the striking variety of web structures has made required content retrieval a difficult task. To counter this issue, Web Content Mining (WCM) emerges as a potential candidate which extracts and integrates suitable resources of data to users. In past few years, research has been done on several extraction techniques for WCM i.e. agent-based, template-based, assumption-based, statistic-based, wrapper-based and machine learning. However, it is still unclear that either these approaches are efficiently tackling the significant challenges of WCM or not. To answer this question, this paper identifies these challenges such as language independency, structure flexibility, performance, automation, dynamicity, redundancy handling, intelligence, relevant content retrieval, and privacy. Further, mapping of these challenges is done with existing extraction mechanisms which helps to adopt the most suitable WCM approach, given some conditions and characteristics at hand.

Keywords: content mining challenges, web content mining, web content extraction approaches, web information retrieval

Procedia PDF Downloads 548
29113 Humanising Digital Healthcare to Build Capacity by Harnessing the Power of Patient Data

Authors: Durhane Wong-Rieger, Kawaldip Sehmi, Nicola Bedlington, Nicole Boice, Tamás Bereczky

Abstract:

Patient-generated health data should be seen as the expression of the experience of patients, including the outcomes reflecting the impact a treatment or service had on their physical health and wellness. We discuss how the healthcare system can reach a place where digital is a determinant of health - where data is generated by patients and is respected and which acknowledges their contribution to science. We explore the biggest barriers facing this. The International Experience Exchange with Patient Organisation’s Position Paper is based on a global patient survey conducted in Q3 2021 that received 304 responses. Results were discussed and validated by the 15 patient experts and supplemented with literature research. Results are a subset of this. Our research showed patient communities want to influence how their data is generated, shared, and used. Our study concludes that a reasonable framework is needed to protect the integrity of patient data and minimise abuse, and build trust. Results also demonstrated a need for patient communities to have more influence and control over how health data is generated, shared, and used. The results clearly highlight that the community feels there is a lack of clear policies on sharing data.

Keywords: digital health, equitable access, humanise healthcare, patient data

Procedia PDF Downloads 82
29112 Visible Light Communication and Challenges

Authors: Hamid Sharif, Nazish Saleem Abbas, Muhammad Haris Jamil

Abstract:

Visible light communication is an emerging technology for almost a decade now; there is a growing need for VLC systems to overcome the challenges faced by radio frequency RF communication systems. With the advancement in the development of solid-state sources, in the future would replace incandescent and fluorescent light sources. These solid-state devices are not only to be used for illumination but can also be employed for communication and navigational purposes. The replacement of conventional illumination sources with highly efficient light-emitting diodes (LED's) (generally white light) will reduce energy consumption as well as environmental pollution. White LEDs dissipate very less power as compared to conventional light sources. The use of LED's is not only beneficial in terms of power consumption, but it also has an intrinsic capability for indoor wireless communication as compared to indoor RF communication. It is considerably low in cost to operate than the RF systems such as Wi-Fi routers, allows convenient means of reusing the bandwidth, and there is a huge potential for high data rate transmissions with enhanced data security. This paper provides an overview of some of the current challenges with VLC and proposes a possible solution to deal with these challenges; it also examines some joint protocols to optimize the joint illumination and communication functionality.

Keywords: visible light communication, line of sight, root mean square delay spread, light emitting diodes

Procedia PDF Downloads 71
29111 Supplementation of Citrulline with Lactic Acid Bacteria Protects Foodborne Pathogens Adhesion and Improves the Cell Integrity on the Intestinal Epithelial Cell

Authors: Sze Wing Ho, Nagendra P. Shah

Abstract:

Lactic acid bacteria (LAB) have shown the beneficial effects on human gastrointestinal tract, such as protects diarrhea induced by lactose intolerance or enteric pathogens. Citrulline is a non-protein amino acid and also the precursors of arginine and nitric oxide, it has shown to enhance intestinal barrier function. Citrulline has shown to improve the growth of some strains of LAB, it is important for LAB to have a sufficient cell concentration to contribute the effects. Therefore, the aims of this study were to investigate the effect of combining citrulline with LAB on the anti-adhesion effect against pathogens and the effect on the cell integrity. The effect of citrulline on selected LAB was determined by incubating in 0%, 0.1% or 0.2% citrulline enriched MRS broth for 18 h. The adhesion ability of LAB and the anti-adhesion effect of LAB and citrulline against pathogens were performed on IPEC-J2 cell line. Transepithelial electrical resistance (TEER) assay was used to measure the tight junction (TJ) integrity. TJ proteins (claudin-1, occludin and zonula occluden-1 (ZO-1)) were determined by western blot analysis. It found that the growth of Lactobacillus helveticus ASCC 511 was significantly stimulated by 0.2% citrulline compared with control during 18 h fermentation. The adhesion of L. helveticus ASCC 511 and Lactobacillus delbrueckii ssp. bulgaricus (L. bulgaricus) ASCC 756 was increased when supplemented with citrulline. Citrulline has shown significant inhibitory effect on the adhesion of Escherichia coli PELI0480 (O157:H7), Shigella sonnei ATCC 25931, Staphyloccocus aureus CMCC26003 and Cronobacter sakazakii ATCC 29544. The anti-adhesion effect of L. helveticus ASCC 511, L. bulgaricus ASCC 756 and Lactobacillus paracasei ASCC 276 against Cronobacter sakazakii ATCC 29544 was significantly enhanced with citrulline supplementation. Treatments with citrulline and LAB were able to maintain the TEER of IPEC-J2 cell and shown the positive effect on the TJ proteins. In conclusion, citrulline had stimulating effect on some strains of LAB and determined to improve the adhesion of LAB on intestinal epithelial cell, to enhance the inhibitory effect on enteric pathogens adhesion as well as had beneficial effects on maintaining cell integrity. It implied LAB supplemented with citrulline might have advantageous effects on gastrointestinal tracts.

Keywords: citrulline, lactic acid bacteria, amino acid, anti-adhesion effect, cell integrity

Procedia PDF Downloads 238
29110 Data Analytics in Hospitality Industry

Authors: Tammy Wee, Detlev Remy, Arif Perdana

Abstract:

In the recent years, data analytics has become the buzzword in the hospitality industry. The hospitality industry is another example of a data-rich industry that has yet fully benefited from the insights of data analytics. Effective use of data analytics can change how hotels operate, market and position themselves competitively in the hospitality industry. However, at the moment, the data obtained by individual hotels remain under-utilized. This research is a preliminary research on data analytics in the hospitality industry, using an in-depth face-to-face interview on one hotel as a start to a multi-level research. The main case study of this research, hotel A, is a chain brand of international hotel that has been systematically gathering and collecting data on its own customer for the past five years. The data collection points begin from the moment a guest book a room until the guest leave the hotel premises, which includes room reservation, spa booking, and catering. Although hotel A has been gathering data intelligence on its customer for some time, they have yet utilized the data to its fullest potential, and they are aware of their limitation as well as the potential of data analytics. Currently, the utilization of data analytics in hotel A is limited in the area of customer service improvement, namely to enhance the personalization of service for each individual customer. Hotel A is able to utilize the data to improve and enhance their service which in turn, encourage repeated customers. According to hotel A, 50% of their guests returned to their hotel, and 70% extended nights because of the personalized service. Apart from using the data analytics for enhancing customer service, hotel A also uses the data in marketing. Hotel A uses the data analytics to predict or forecast the change in consumer behavior and demand, by tracking their guest’s booking preference, payment preference and demand shift between properties. However, hotel A admitted that the data they have been collecting was not fully utilized due to two challenges. The first challenge of using data analytics in hotel A is the data is not clean. At the moment, the data collection of one guest profile is meaningful only for one department in the hotel but meaningless for another department. Cleaning up the data and getting standards correctly for usage by different departments are some of the main concerns of hotel A. The second challenge of using data analytics in hotel A is the non-integral internal system. At the moment, the internal system used by hotel A do not integrate with each other well, limiting the ability to collect data systematically. Hotel A is considering another system to replace the current one for more comprehensive data collection. Hotel proprietors recognized the potential of data analytics as reported in this research, however, the current challenges of implementing a system to collect data come with a cost. This research has identified the current utilization of data analytics and the challenges faced when it comes to implementing data analytics.

Keywords: data analytics, hospitality industry, customer relationship management, hotel marketing

Procedia PDF Downloads 178
29109 The Promotion of a Risk Culture: a Descriptive Study of Ghanaian Banks

Authors: Gerhard Grebe, Johan Marx

Abstract:

The aim of the study is to assess the state of operational risk management and the adoption of an appropriate risk culture in Ghanaian banks. The Bank of Ghana (BoG) joined the Basel Consultative Group (BCG) of the Basel Committee on Bank Supervision (BCBS) in 2021 and is proceeding with the implementation of the Basel III international regulatory framework for banks. The BoG’s Directive about risk management encourages, inter alia, the creation of an appropriate risk culture by Ghanaian banks. However, it is not evident how the risk management staff of Ghanaian banks experience the risk culture and the implementation of operational risk management in the banks where they are employed. Ghana is a developing economy, and it is addressing challenges with its organisational culture. According to Transparency International, successive Ghanaian governments claim to be fighting corruption, but little success has been achieved so far. This points to a possible lack of accountability, transparency, and integrity in the environment in which Ghanaian banks operate and which could influence their risk culture negatively. Purposive sampling was used for the survey, and the questionnaire was completed byGhanaian bank personnel who specializesin operational risk management, risk governance, and compliance, bank supervision, risk analyses, as well as the implementation of the operational risk management requirements of the Basel regulatory frameworks. The respondents indicated that they are fostering a risk culture and implementing monitoring and reporting procedures; the three lines of defence (3LOD); compliance; internal auditing; disclosure of operational risk information; and receiving guidance from the bank supervisor in an attempt to improve their operational risk management practices. However, the respondents reported the following challenges with staff members who are not inside the risk management departments(in order of priority), namelydemonstrating a risk culture, training and development; communication; reporting and disclosure; roles and responsibilities; performance appraisal; and technological and environmental barriers. Recommendations to address these challenges are provided

Keywords: ghana, operational risk, risk culture, risk management

Procedia PDF Downloads 122
29108 Effect of CSL Tube Type on the Drilled Shaft Axial Load Carrying Capacity

Authors: Ali Motevalli, Shahin Nayyeri Amiri

Abstract:

Cross-Hole Sonic Logging (CSL) is a common type of Non-Destructive Testing (NDT) method, which is currently used to check the integrity of placed drilled shafts. CSL evaluates the integrity of the concrete inside the cage and between the access tubes based on propagation of ultrasonic waves between two or more access tubes. A number of access tubes are installed inside the reinforcing cage prior to concrete placement as guides for sensors. The access tubes can be PVC or steel galvanized based on ASTM6760. The type of the CSL tubes can affect the axial strength of the drilled shaft. The objective of this study is to compare the amount of axial load capacity of drilled shafts due to using a different type of CSL tubes inside the caging. To achieve this, three (3) large-scale drilled shaft samples were built and tested using a hydraulic actuator at the Florida International University’s (FIU) Titan America Structures and Construction Testing (TASCT) laboratory. During the static load test, load-displacement curves were recorded by the data acquisition system (MegaDAC). Three drilled shaft samples were built to evaluate the effect of the type of the CSL tube on the axial load capacity in drilled shaft foundations.

Keywords: drilled shaft foundations, axial load capacity, cage, PVC, galvanized tube, CSL tube

Procedia PDF Downloads 402
29107 Adoption and Use of an Electronic Voting System in Ghana

Authors: Isaac Kofi Mensah

Abstract:

The manual system of voting has been the most widely used system of electing representatives around the globe, particularly in Africa. Due to the known numerous problems and challenges associated with the manual system of voting, many countries are migrating to the electronic voting system as a suitable and credible means of electing representatives over the manual paper-based system. This research paper therefore investigated the factors influencing adoption and use of an electronic voting system in Ghana. A total of 400 Questionnaire Instruments (QI) were administered to potential respondents in Ghana, of which 387 responded representing a response rate of 96.75%. The Technology Acceptance Model was used as the theoretical framework for the study. The research model was tested using a simple linear regression analysis with SPSS. A little of over 71.1% of the respondents recommended the Electoral Commission (EC) of Ghana to adopt an electronic voting system in the conduct of public elections in Ghana. The results indicated that all the six predictors such as perceived usefulness (PU), perceived ease of use (PEOU), perceived free and fair elections (PFFF), perceived credible elections (PCE), perceived system integrity (PSI) and citizens trust in the election management body (CTEM) were all positively significant in predicting the readiness of citizens to adopt and use an electronic voting system in Ghana. However, jointly, the hypotheses tested revealed that apart from Perceived Free and Fair Elections and Perceived Credible and Transparent Elections, all the other factors such as PU, Perceived System Integrity and Security and Citizen Trust in the Election Management Body were found to be significant predictors of the Willingness of Ghanaians to use an electronic voting system. All the six factors considered in this study jointly account for about 53.1% of the reasons determining the readiness to adopt and use an electronic voting system in Ghana. The implications of this research finding on elections in Ghana are discussed.

Keywords: credible elections, Election Management Body (EMB), electronic voting, Ghana, Technology Acceptance Model (TAM)

Procedia PDF Downloads 397
29106 Big Data and Analytics in Higher Education: An Assessment of Its Status, Relevance and Future in the Republic of the Philippines

Authors: Byron Joseph A. Hallar, Annjeannette Alain D. Galang, Maria Visitacion N. Gumabay

Abstract:

One of the unique challenges provided by the twenty-first century to Philippine higher education is the utilization of Big Data. The higher education system in the Philippines is generating burgeoning amounts of data that contains relevant data that can be used to generate the information and knowledge needed for accurate data-driven decision making. This study examines the status, relevance and future of Big Data and Analytics in Philippine higher education. The insights gained from the study may be relevant to other developing nations similarly situated as the Philippines.

Keywords: big data, data analytics, higher education, republic of the philippines, assessment

Procedia PDF Downloads 348
29105 Health Monitoring of Concrete Assets in Refinery

Authors: Girish M. Bhatia

Abstract:

Most of the important structures in refinery complex are RCC Structures for which in-depth structural monitoring and inspection is required for incessant service. Reinforced concrete structures can be under threat from a combination of insidious challenges due to environmental conditions, including temperature and humidity that lead to accelerated deterioration mechanisms like carbonation, as well as marine exposure, above and below ground structures can experience ingress from aggressive ground waters carrying chlorides and sulphates leading to unexpected deterioration that threaten the integrity of a vital structural asset. By application of health monitoring techniques like corrosion monitoring with help of sensor probes, visual inspection of high rise structures with help of drones, it is possible to establish an early warning at the onset of these destructive processes.

Keywords: concrete structures, corrosion sensors, drones, health monitoring

Procedia PDF Downloads 398
29104 Exploring Mtb-Mle Practices in Selected Schools in Benguet, Philippines

Authors: Jocelyn L. Alimondo, Juna O. Sabelo

Abstract:

This study explored the MTB-MLE implementation practices of teachers in one monolingual elementary school and one multilingual elementary school in Benguet, Philippines. It used phenomenological approach employing participant-observation, focus group discussion and individual interview. Data were gathered using a video camera, an audio recorder, and an FGD guide and were treated through triangulation and coding. From the data collected, varied ways in implementing the MTB-MLE program were noted. These are: Teaching using a hybrid first language, teaching using a foreign LOI, using translation and multilingual instruction, and using L2/L3 to unlock L1. However, these practices come with challenges such as the a conflict between the mandated LOI and what pupils need, lack of proficiency of teachers in the mandated LOI, facing unreceptive parents, stagnation of knowledge resulting from over-familiarity of input, and zero learning resulting from an incomprehensible language input. From the practices and challenges experienced by the teachers, a model of MTB-MLE approach, the 3L-in-one approach, to teaching was created to illustrate the practice which teachers claimed to be the best way to address the challenges besetting them while at the same time satisfying the academic needs of their pupils. From the findings, this paper concludes that despite the challenges besetting the teachers, they still displayed creativity in coming up with relevant teaching practices, the unreceptiveness of some teachers and parents sprung from the fact that they do not understand the real concept of MTB-MLE, greater challenges are being faced by teachers in multilingual school due to the diverse linguistic background of their clients, and the most effective approach in implementing MTB-MLE is the multilingual approach, allowing the use of the pupils’ mother tongue, L2 (Filipino), L3 (English), and other languages familiar to the students.

Keywords: MTB-MLE Philippines, MTB-MLE model, first language, multilingual instruction

Procedia PDF Downloads 424
29103 Image Steganography Using Least Significant Bit Technique

Authors: Preeti Kumari, Ridhi Kapoor

Abstract:

 In any communication, security is the most important issue in today’s world. In this paper, steganography is the process of hiding the important data into other data, such as text, audio, video, and image. The interest in this topic is to provide availability, confidentiality, integrity, and authenticity of data. The steganographic technique that embeds hides content with unremarkable cover media so as not to provoke eavesdropper’s suspicion or third party and hackers. In which many applications of compression, encryption, decryption, and embedding methods are used for digital image steganography. Due to compression, the nose produces in the image. To sustain noise in the image, the LSB insertion technique is used. The performance of the proposed embedding system with respect to providing security to secret message and robustness is discussed. We also demonstrate the maximum steganography capacity and visual distortion.

Keywords: steganography, LSB, encoding, information hiding, color image

Procedia PDF Downloads 474
29102 Structural Integrity Analysis of Baffle Former Assembly in Pressurized Water Reactors Considering Irradiation Aging

Authors: Jong-Sung Kim, Myung-Jo Jhung

Abstract:

BFA is one of the reactor internals components in PWR. The BFA has the intended functions to support fuel assembly, to keep structural integrity of upper/lower core support structures, and to secure reactor coolant flow path. Failure of the BFA may give rise to significant effect on reactor safety operation and stop. The BFA is subject to relatively high neutron irradiation dose due to location close to the core. Therefore, IASCC can occur on the BFA due to damage accumulation as operating year increases. In this study, IASCC susceptibility on the BFA was assessed via the FEA considering variations of mechanical material behaviors with neutron irradiation. As a result of the assessment, some points have susceptibility more than 0.2 to IASCC during design lifetime.

Keywords: baffle former assembly, finite element analysis, irradiation aging, nuclear power plant, pressurized water reactor

Procedia PDF Downloads 359
29101 Safeguarding the Cloud: The Crucial Role of Technical Project Managers in Security Management for Cloud Environments

Authors: Samuel Owoade, Zainab Idowu, Idris Ajibade, Abel Uzoka

Abstract:

Cloud computing adoption continues to soar, with 83% of enterprise workloads estimated to be in the cloud by 2022. However, this rapid migration raises security concerns, needing strong security management solutions to safeguard sensitive data and essential applications. This paper investigates the critical role of technical project managers in orchestrating security management initiatives for cloud environments, evaluating their responsibilities, challenges, and best practices for assuring the resilience and integrity of cloud infrastructures. Drawing from a comprehensive review of industry reports and interviews with cloud security experts, this research highlights the multifaceted landscape of security management in cloud environments. Despite the rapid adoption of cloud services, only 25% of organizations have matured their cloud security practices, indicating a pressing need for effective management strategies. This paper proposes a strategy framework adapted to the demands of technical project managers, outlining the important components of effective cloud security management. Notably, 76% of firms identify misconfiguration as a major source of cloud security incidents, underlining the significance of proactive risk assessment and constant monitoring. Furthermore, the study emphasizes the importance of technical project managers in facilitating cross-functional collaboration, bridging the gap between cybersecurity professionals, cloud architects, compliance officers, and IT operations teams. With 68% of firms seeing difficulties integrating security policies into their cloud systems, effective communication and collaboration are critical to success. Case studies from industry leaders illustrate the practical use of security management projects in cloud settings. These examples demonstrate the importance of technical project managers in using their expertise to address obstacles and generate meaningful outcomes, with 92% of firms reporting improved security practices after implementing proactive security management tactics. In conclusion, this research underscores the critical role of technical project managers in safeguarding cloud environments against evolving threats. By embracing their role as guardians of the cloud realm, project managers can mitigate risks, optimize resource utilization, and uphold the trust and integrity of cloud infrastructures in an era of digital transformation.

Keywords: cloud security, security management, technical project management, cybersecurity, cloud infrastructure, risk management, compliance

Procedia PDF Downloads 51
29100 Comparison of Security Challenges and Issues of Mobile Computing and Internet of Things

Authors: Aabiah Nayeem, Fariha Shafiq, Mustabshra Aftab, Rabia Saman Pirzada, Samia Ghazala

Abstract:

In this modern era of technology, the concept of Internet of Things is very popular in every domain. It is a widely distributed system of things in which the data collected from sensory devices is transmitted, analyzed locally/collectively then broadcasted to network where action can be taken remotely via mobile/web apps. Today’s mobile computing is also gaining importance as the services are provided during mobility. Through mobile computing, data are transmitted via computer without physically connected to a fixed point. The challenge is to provide services with high speed and security. Also, the data gathered from the mobiles must be processed in a secured way. Mobile computing is strongly influenced by internet of things. In this paper, we have discussed security issues and challenges of internet of things and mobile computing and we have compared both of them on the basis of similarities and dissimilarities.

Keywords: embedded computing, internet of things, mobile computing, wireless technologies

Procedia PDF Downloads 316
29099 Advanced Analytical Competency Is Necessary for Strategic Leadership to Achieve High-Quality Decision-Making

Authors: Amal Mohammed Alqahatni

Abstract:

This paper is a non-empirical analysis of existing literature on digital leadership competency, data-driven organizations, and dealing with AI technology (big data). This paper will provide insights into the importance of developing the leader’s analytical skills and style to be more effective for high-quality decision-making in a data-driven organization and achieve creativity during the organization's transformation to be digitalized. Despite the enormous potential that big data has, there are not enough experts in the field. Many organizations faced an issue with leadership style, which was considered an obstacle to organizational improvement. It investigates the obstacles to leadership style in this context and the challenges leaders face in coaching and development. The leader's lack of analytical skill with AI technology, such as big data tools, was noticed, as was the lack of understanding of the value of that data, resulting in poor communication with others, especially in meetings when the decision should be made. By acknowledging the different dynamics of work competency and organizational structure and culture, organizations can make the necessary adjustments to best support their leaders. This paper reviews prior research studies and applies what is known to assist with current obstacles. This paper addresses how analytical leadership will assist in overcoming challenges in a data-driven organization's work environment.

Keywords: digital leadership, big data, leadership style, digital leadership challenge

Procedia PDF Downloads 69
29098 Investigating the Challenges and Opportunities for M-Government Implementation in Saudi Arabia

Authors: Anan Alssbaiheen, Steve Love

Abstract:

Given the lack of research into potential opportunities and challenges which are likely to be associated with the implementation of mobile services in developing countries including Saudi Arabia, the research reported here investigated the challenges and opportunities which are associated with the implementation of mobile government services in Saudi Arabia. By collecting data through surveys from 103 Saudi citizens and 46 employees working at the Ministry of Communication and Information Technology Saudi Arabia, this study indicates that the high level of mobile penetration in the country offers an opportunity for Saudi Arabian government to offer mobile government services in the country. The results also suggest that though a large percentage of populations do not have access to mobile technologies, there is still a strong desire among users for the provision of mobile government services. Moreover, the results suggest that effective implementation of mobile government services would help to increase the technological development of Saudi Arabia. However, there are certain challenges which may prevent the effective implementation of such services. First, there does not appear to be a sufficient level of understanding among the Saudi Arabian population about the benefits which are associated with mobile government services. Secondly, the results suggest that the implementation of the services needs to be closely tailored and personalised to the individual needs of target users. Finally, the lack of access to mobile technologies would be a challenge to the successful introduction of these services.

Keywords: challenges, e-government, mobile government, opportunities

Procedia PDF Downloads 414