Search results for: pension scheme
1252 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme
Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara
Abstract:
This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme
Procedia PDF Downloads 4801251 An Indoor Positioning System in Wireless Sensor Networks with Measurement Delay
Authors: Pyung Soo Kim, Eung Hyuk Lee, Mun Suck Jang
Abstract:
In the current paper, an indoor positioning system is proposed with consideration of measurement delay. Firstly, an estimation filter with a measurement delay is designed for the indoor positioning mechanism under a weighted least square criterion, which utilizes only finite measurements on the most recent window. The proposed estimation filtering based scheme gives the filtered estimates for position, velocity and acceleration of moving target in real-time, while removing undesired noisy effects and preserving desired moving positions. Secondly, the proposed scheme is shown to have good inherent properties such as unbiasedness, efficiency, time-invariance, deadbeat, and robustness due to the finite memory structure. Finally, computer simulations shows that the performance of the proposed estimation filtering based scheme can outperform to the existing infinite memory filtering based mechanism.Keywords: indoor positioning system, wireless sensor networks, measurement delay
Procedia PDF Downloads 4821250 Secret Sharing in Visual Cryptography Using NVSS and Data Hiding Techniques
Authors: Misha Alexander, S. B. Waykar
Abstract:
Visual Cryptography is a special unbreakable encryption technique that transforms the secret image into random noisy pixels. These shares are transmitted over the network and because of its noisy texture it attracts the hackers. To address this issue a Natural Visual Secret Sharing Scheme (NVSS) was introduced that uses natural shares either in digital or printed form to generate the noisy secret share. This scheme greatly reduces the transmission risk but causes distortion in the retrieved secret image through variation in settings and properties of digital devices used to capture the natural image during encryption / decryption phase. This paper proposes a new NVSS scheme that extracts the secret key from randomly selected unaltered multiple natural images. To further improve the security of the shares data hiding techniques such as Steganography and Alpha channel watermarking are proposed.Keywords: decryption, encryption, natural visual secret sharing, natural images, noisy share, pixel swapping
Procedia PDF Downloads 4041249 A New Bound on the Average Information Ratio of Perfect Secret-Sharing Schemes for Access Structures Based on Bipartite Graphs of Larger Girth
Authors: Hui-Chuan Lu
Abstract:
In a perfect secret-sharing scheme, a dealer distributes a secret among a set of participants in such a way that only qualified subsets of participants can recover the secret and the joint share of the participants in any unqualified subset is statistically independent of the secret. The access structure of the scheme refers to the collection of all qualified subsets. In a graph-based access structures, each vertex of a graph G represents a participant and each edge of G represents a minimal qualified subset. The average information ratio of a perfect secret-sharing scheme realizing a given access structure is the ratio of the average length of the shares given to the participants to the length of the secret. The infimum of the average information ratio of all possible perfect secret-sharing schemes realizing an access structure is called the optimal average information ratio of that access structure. We study the optimal average information ratio of the access structures based on bipartite graphs. Based on some previous results, we give a bound on the optimal average information ratio for all bipartite graphs of girth at least six. This bound is the best possible for some classes of bipartite graphs using our approach.Keywords: secret-sharing scheme, average information ratio, star covering, deduction, core cluster
Procedia PDF Downloads 3611248 The Prospect of Income Contingent Loan in Malaysia Higher Education Financing Using Deterministic and Stochastic Methods in Modelling Income
Authors: Syaza Isma, Timothy Higgins
Abstract:
In Malaysia, increased take-up rates of tertiary student borrowing, and reliance on retirement savings to fund children's education show the importance of public higher education financing schemes (PTPTN). PTPTN has been operating for 2 decades now; however, there are some critical issues and challenges that include low loan recovery and loan default that suggest a detailed consideration of student loan/financing scheme alternatives is crucial. In addition, the decline in funding level per student following introduction of the new PTPTN full and partial loan scheme has raised ongoing concerns over the sustainability of the scheme to provide continuous financial assistance to students in tertiary education. This research seeks to assess these issues that put greater efficiency in an effort to ensure equitable access to student funding for current and future generations. We explore the extent of repayment hardship under the current loan arrangements that presumably led to low recovery from the borrowers, particularly low-income graduates. The concept of manageable debt exists in the design of income-contingent repayment schemes, as practiced in Australia, New Zealand, UK, Hungary, USA (in limited form), the Netherlands, and South Korea. Can Income Contingent Loans (ICL) offer the best practice for an education financing scheme, and address the issue of repayment hardship and concurrently, can a properly designed ICL scheme provide a solution to the current issues and challenges facing Malaysia student financing? We examine the different potential ICL models using deterministic and stochastic approach to simulate income of graduates.Keywords: deterministic, income contingent loan, repayment burden, simulation, stochastic
Procedia PDF Downloads 2291247 Impact of Financial and Non-Financial Motivation on Motivating Employees
Authors: Al-Yaqdhan Al-Rawahi, Kaneez Fatima Sadriwala
Abstract:
The purpose of this paper is to discover the readiness of Civil Service Employee Pension Fund (CSEPF), a governmental organization, in motivating its staff. Exploratory survey has been conducted in order to extract needed information. For this purpose we proposed a questionnaire to understand staff viewpoint of motivation. Data was analyzed by using SPSS 15.0 for Windowsand Excel. Major results prove that good working conditions is the most important factor of staff and sympathetic help with personal problem is the least important one. Also the relationship between financial motivation and employee motivation is very weak, whereas with non-financial motivation and employee motivation is moderate. Future research may focus on studying all departments of CSEPF.Keywords: financial motivation, non-financial motivation, employee motivation
Procedia PDF Downloads 3861246 Dynamic Fault Diagnosis for Semi-Batch Reactor Under Closed-Loop Control via Independent RBFNN
Authors: Abdelkarim M. Ertiame, D. W. Yu, D. L. Yu, J. B. Gomm
Abstract:
In this paper, a new robust fault detection and isolation (FDI) scheme is developed to monitor a multivariable nonlinear chemical process called the Chylla-Haase polymerization reactor when it is under the cascade PI control. The scheme employs a radial basis function neural network (RBFNN) in an independent mode to model the process dynamics and using the weighted sum-squared prediction error as the residual. The recursive orthogonal Least Squares algorithm (ROLS) is employed to train the model to overcome the training difficulty of the independent mode of the network. Then, another RBFNN is used as a fault classifier to isolate faults from different features involved in the residual vector. The several actuator and sensor faults are simulated in a nonlinear simulation of the reactor in Simulink. The scheme is used to detect and isolate the faults on-line. The simulation results show the effectiveness of the scheme even the process is subjected to disturbances and uncertainties including significant changes in the monomer feed rate, fouling factor, impurity factor, ambient temperature and measurement noise. The simulation results are presented to illustrate the effectiveness and robustness of the proposed method.Keywords: Robust fault detection, cascade control, independent RBF model, RBF neural networks, Chylla-Haase reactor, FDI under closed-loop control
Procedia PDF Downloads 4961245 Automatic Detection of Proliferative Cells in Immunohistochemically Images of Meningioma Using Fuzzy C-Means Clustering and HSV Color Space
Authors: Vahid Anari, Mina Bakhshi
Abstract:
Visual search and identification of immunohistochemically stained tissue of meningioma was performed manually in pathologic laboratories to detect and diagnose the cancers type of meningioma. This task is very tedious and time-consuming. Moreover, because of cell's complex nature, it still remains a challenging task to segment cells from its background and analyze them automatically. In this paper, we develop and test a computerized scheme that can automatically identify cells in microscopic images of meningioma and classify them into positive (proliferative) and negative (normal) cells. Dataset including 150 images are used to test the scheme. The scheme uses Fuzzy C-means algorithm as a color clustering method based on perceptually uniform hue, saturation, value (HSV) color space. Since the cells are distinguishable by the human eye, the accuracy and stability of the algorithm are quantitatively compared through application to a wide variety of real images.Keywords: positive cell, color segmentation, HSV color space, immunohistochemistry, meningioma, thresholding, fuzzy c-means
Procedia PDF Downloads 2101244 Hydraulic Design of Proposed Ranney Well for Water Supply Scheme in Kurukshetra
Authors: Gaurav Kumar, Baldev Setia
Abstract:
Water is essential for sustenance of life and the ecosystem. Among the various uses of water, the water required for drinking and domestics has the priority over other needs. Water that is required for human consumption must be available in sufficient quantity and should be of good quality. Keeping in view the futuristic needs of water of Kurukshetra town, a durable and cost-effective water supply system with the help of Ranney well has been proposed. This has been proposed on the premise that Brahmsarovar, the largest static water body in the state of Haryana provides sufficient recharge to the groundwater aquifer. In the study, a 30 year design period has been adopted and the water demand up to the year 2050 has been computed. The proposed Ranney well to be constructed in the vicinity of the Brahmsarovar will have a caisson of diameter of 12 m and will be laid at a depth of 30 m below MSL. The laterals, 20 in number, 300 mm in diameter and 15 m in length will be located in two layer separated by 1.5 m. the impact on environment because of the construction and working of the Ranney well is also studied and it has been found that there are no adverse impacts of the proposed scheme. However, the present study is limited to the hydraulics design of the scheme and does not address the structural design of components of Ranney well and the cost involved.Keywords: drawdown, Ranney well, LPCD, MSL, transmissibility, storativity
Procedia PDF Downloads 3001243 Enhancing Power System Resilience: An Adaptive Under-Frequency Load Shedding Scheme Incorporating PV Generation and Fast Charging Stations
Authors: Sami M. Alshareef
Abstract:
In the rapidly evolving energy landscape, the integration of renewable energy sources and the electrification of transportation are essential steps toward achieving sustainability goals. However, these advancements introduce new challenges, particularly in maintaining frequency stability due to variable photovoltaic (PV) generation and the growing demand for fast charging stations. The variability of photovoltaic (PV) generation due to weather conditions can disrupt the balance between generation and load, resulting in frequency deviations. To ensure the stability of power systems, it is imperative to develop effective under frequency load-shedding schemes. This research proposal presents an adaptive under-frequency load shedding scheme based on the power swing equation, designed explicitly for the IEEE-9 Bus Test System, that includes PV generation and fast charging stations. This research aims to address these challenges by developing an advanced scheme that dynamically disconnects fast charging stations based on power imbalances. The scheme prioritizes the disconnection of stations near affected areas to expedite system frequency stabilization. To achieve these goals, the research project will leverage the power swing equation, a widely recognized model for analyzing system dynamics during under-frequency events. By utilizing this equation, the proposed scheme will adaptively adjust the load-shedding process in real-time to maintain frequency stability and prevent power blackouts. The research findings will support the transition towards sustainable energy systems by ensuring a reliable and uninterrupted electricity supply while enhancing the resilience and stability of power systems during under-frequency events.Keywords: load shedding, fast charging stations, pv generation, power system resilience
Procedia PDF Downloads 811242 The Optimization of Decision Rules in Multimodal Decision-Level Fusion Scheme
Authors: Andrey V. Timofeev, Dmitry V. Egorov
Abstract:
This paper introduces an original method of parametric optimization of the structure for multimodal decision-level fusion scheme which combines the results of the partial solution of the classification task obtained from assembly of the mono-modal classifiers. As a result, a multimodal fusion classifier which has the minimum value of the total error rate has been obtained.Keywords: classification accuracy, fusion solution, total error rate, multimodal fusion classifier
Procedia PDF Downloads 4661241 Storm-water Management for Greenfield Area Using Low Impact Development Concept for Town Planning Scheme Mechanism
Authors: Sahil Patel
Abstract:
Increasing urbanization leads to a concrete forest. The effects of new development practices occur in the natural hydrologic cycle. Here the concerns have been raised about the groundwater recharge in sufficient quantity. With further development, porous surfaces reduce rapidly. A city like Ahmedabad, with a non-perennial river, is 100% dependent on groundwater. The Ahmedabad city receives its domestic use water from the Narmada river, located about 200 km away. The expenses to bring water is much higher. Ahmedabad city receives annually 800 mm rainfall, and mostly this water increases the local level waterlogging problems; after that, water goes to the Sabarmati river and merges into the sea. The existing developed area of Ahmedabad city is very dense, and does not offer many chances to change the built form and increase porous surfaces to absorb storm-water. Therefore, there is a need to plan upcoming areas with more effective solutions to manage storm-water. This paper is focusing on the management of stormwater for new development by retaining natural hydrology. The Low Impact Development (LID) concept is used to manage storm-water efficiently. Ahmedabad city has a tool called the “Town Planning Scheme,” which helps the local body drive new development by land pooling mechanism. This paper gives a detailed analysis of the selected area (proposed Town Planning Scheme area by the local authority) in Ahmedabad. Here the development control regulations for individual developers and some physical elements for public places are presented to manage storm-water. There is a different solution for the Town Planning scheme than that of the conventional way. A local authority can use it for any area, but it can be site-specific. In the end, there are benefits to locals with some financial analysis and comparisons.Keywords: water management, green field development, low impact development, town planning scheme
Procedia PDF Downloads 1301240 APPLE: Providing Absolute and Proportional Throughput Guarantees in Wireless LANs
Authors: Zhijie Ma, Qinglin Zhao, Hongning Dai, Huan Zhang
Abstract:
This paper proposes an APPLE scheme that aims at providing absolute and proportional throughput guarantees, and maximizing system throughput simultaneously for wireless LANs with homogeneous and heterogenous traffic. We formulate our objectives as an optimization problem, present its exact and approximate solutions, and prove the existence and uniqueness of the approximate solution. Simulations validate that APPLE scheme is accurate, and the approximate solution can well achieve the desired objectives already.Keywords: IEEE 802.11e, throughput guarantee, priority, WLANs
Procedia PDF Downloads 3621239 Lightweight and Seamless Distributed Scheme for the Smart Home
Authors: Muhammad Mehran Arshad Khan, Chengliang Wang, Zou Minhui, Danyal Badar Soomro
Abstract:
Security of the smart home in terms of behavior activity pattern recognition is a totally dissimilar and unique issue as compared to the security issues of other scenarios. Sensor devices (low capacity and high capacity) interact and negotiate each other by detecting the daily behavior activity of individuals to execute common tasks. Once a device (e.g., surveillance camera, smart phone and light detection sensor etc.) is compromised, an adversary can then get access to a specific device and can damage daily behavior activity by altering the data and commands. In this scenario, a group of common instruction processes may get involved to generate deadlock. Therefore, an effective suitable security solution is required for smart home architecture. This paper proposes seamless distributed Scheme which fortifies low computational wireless devices for secure communication. Proposed scheme is based on lightweight key-session process to upheld cryptic-link for trajectory by recognizing of individual’s behavior activities pattern. Every device and service provider unit (low capacity sensors (LCS) and high capacity sensors (HCS)) uses an authentication token and originates a secure trajectory connection in network. Analysis of experiments is revealed that proposed scheme strengthens the devices against device seizure attack by recognizing daily behavior activities, minimum utilization memory space of LCS and avoids network from deadlock. Additionally, the results of a comparison with other schemes indicate that scheme manages efficiency in term of computation and communication.Keywords: authentication, key-session, security, wireless sensors
Procedia PDF Downloads 3171238 A New IFO Estimation Scheme for Orthogonal Frequency Division Multiplexing Systems
Authors: Keunhong Chae, Seokho Yoon
Abstract:
We address a new integer frequency offset (IFO) estimation scheme with an aid of a pilot for orthogonal frequency division multiplexing systems. After correlating each continual pilot with a predetermined scattered pilot, the correlation value is again correlated to alleviate the influence of the timing offset. From numerical results, it is demonstrated that the influence of the timing offset on the IFO estimation is significantly decreased.Keywords: estimation, integer frequency offset, OFDM, timing offset
Procedia PDF Downloads 5681237 Secure Network Coding against Content Pollution Attacks in Named Data Network
Authors: Tao Feng, Xiaomei Ma, Xian Guo, Jing Wang
Abstract:
Named Data Network (NDN) is one of the future Internet architecture, all nodes (i.e., hosts, routers) are allowed to have a local cache, used to satisfy incoming requests for content. However, depending on caching allows an adversary to perform attacks that are very effective and relatively easy to implement, such as content pollution attack. In this paper, we use a method of secure network coding based on homomorphic signature system to solve this problem. Firstly ,we use a dynamic public key technique, our scheme for each generation authentication without updating the initial secret key used. Secondly, employing the homomorphism of hash function, intermediate node and destination node verify the signature of the received message. In addition, when the network topology of NDN is simple and fixed, the code coefficients in our scheme are generated in a pseudorandom number generator in each node, so the distribution of the coefficients is also avoided. In short, our scheme not only can efficiently prevent against Intra/Inter-GPAs, but also can against the content poisoning attack in NDN.Keywords: named data networking, content polloution attack, network coding signature, internet architecture
Procedia PDF Downloads 3371236 Verification and Application of Finite Element Model Developed for Flood Routing in Rivers
Authors: A. L. Qureshi, A. A. Mahessar, A. Baloch
Abstract:
Flood wave propagation in river channel flow can be enunciated by nonlinear equations of motion for unsteady flow. However, it is difficult to find analytical solution of these complex non-linear equations. Hence, verification of the numerical model should be carried out against field data and numerical predictions. This paper presents the verification of developed finite element model applying for unsteady flow in the open channels. The results of a proposed model indicate a good matching with both Preissmann scheme and HEC-RAS model for a river reach of 29 km at both sites (15 km from upstream and at downstream end) for discharge hydrographs. It also has an agreeable comparison with the Preissemann scheme for the flow depth (stage) hydrographs. The proposed model has also been applying to forecast daily discharges at 400 km downstream from Sukkur barrage, which demonstrates accurate model predictions with observed daily discharges. Hence, this model may be utilized for predicting and issuing flood warnings about flood hazardous in advance.Keywords: finite element method, Preissmann scheme, HEC-RAS, flood forecasting, Indus river
Procedia PDF Downloads 5011235 Unsteady Three-Dimensional Adaptive Spatial-Temporal Multi-Scale Direct Simulation Monte Carlo Solver to Simulate Rarefied Gas Flows in Micro/Nano Devices
Authors: Mirvat Shamseddine, Issam Lakkis
Abstract:
We present an efficient, three-dimensional parallel multi-scale Direct Simulation Monte Carlo (DSMC) algorithm for the simulation of unsteady rarefied gas flows in micro/nanosystems. The algorithm employs a novel spatiotemporal adaptivity scheme. The scheme performs a fully dynamic multi-level grid adaption based on the gradients of flow macro-parameters and an automatic temporal adaptation. The computational domain consists of a hierarchical octree-based Cartesian grid representation of the flow domain and a triangular mesh for the solid object surfaces. The hybrid mesh, combined with the spatiotemporal adaptivity scheme, allows for increased flexibility and efficient data management, rendering the framework suitable for efficient particle-tracing and dynamic grid refinement and coarsening. The parallel algorithm is optimized to run DSMC simulations of strongly unsteady, non-equilibrium flows over multiple cores. The presented method is validated by comparing with benchmark studies and then employed to improve the design of micro-scale hotwire thermal sensors in rarefied gas flows.Keywords: DSMC, oct-tree hierarchical grid, ray tracing, spatial-temporal adaptivity scheme, unsteady rarefied gas flows
Procedia PDF Downloads 2991234 Reduced Complexity of ML Detection Combined with DFE
Authors: Jae-Hyun Ro, Yong-Jun Kim, Chang-Bin Ha, Hyoung-Kyu Song
Abstract:
In multiple input multiple output-orthogonal frequency division multiplexing (MIMO-OFDM) systems, many detection schemes have been developed to improve the error performance and to reduce the complexity. Maximum likelihood (ML) detection has optimal error performance but it has very high complexity. Thus, this paper proposes reduced complexity of ML detection combined with decision feedback equalizer (DFE). The error performance of the proposed detection scheme is higher than the conventional DFE. But the complexity of the proposed scheme is lower than the conventional ML detection.Keywords: detection, DFE, MIMO-OFDM, ML
Procedia PDF Downloads 6101233 Reliable Multicast Communication in Next Generation Networks
Authors: Muazzam Ali Khan Khattak
Abstract:
Next Generation Network is combination of different networks having different technologies. Due to mobile nature of nodes the movement of nodes occurs from one network to another network. Multicasting in such networks is still a hot issue of research because the user in today's world wants reliable communication wherever it lies. Due to heterogeneity of NGN it is very difficult to handle reliable multicast communication. In this paper we proposed an improved scheme for reliable multicast communication in next generation networks. Because multicast communication is very important to deliver same data packets to multiple receivers and minimize the network traffic. This new scheme will make the multicast communication in NGN more reliable and efficient.Keywords: next generation networks, route request, IPT, NACK, ARQ, DTN
Procedia PDF Downloads 5031232 Local Differential Privacy-Based Data-Sharing Scheme for Smart Utilities
Authors: Veniamin Boiarkin, Bruno Bogaz Zarpelão, Muttukrishnan Rajarajan
Abstract:
The manufacturing sector is a vital component of most economies, which leads to a large number of cyberattacks on organisations, whereas disruption in operation may lead to significant economic consequences. Adversaries aim to disrupt the production processes of manufacturing companies, gain financial advantages, and steal intellectual property by getting unauthorised access to sensitive data. Access to sensitive data helps organisations to enhance the production and management processes. However, the majority of the existing data-sharing mechanisms are either susceptible to different cyber attacks or heavy in terms of computation overhead. In this paper, a privacy-preserving data-sharing scheme for smart utilities is proposed. First, a customer’s privacy adjustment mechanism is proposed to make sure that end-users have control over their privacy, which is required by the latest government regulations, such as the General Data Protection Regulation. Secondly, a local differential privacy-based mechanism is proposed to ensure the privacy of the end-users by hiding real data based on the end-user preferences. The proposed scheme may be applied to different industrial control systems, whereas in this study, it is validated for energy utility use cases consisting of smart, intelligent devices. The results show that the proposed scheme may guarantee the required level of privacy with an expected relative error in utility.Keywords: data-sharing, local differential privacy, manufacturing, privacy-preserving mechanism, smart utility
Procedia PDF Downloads 761231 Hybrid MIMO-OFDM Detection Scheme for High Performance
Authors: Young-Min Ko, Dong-Hyun Ha, Chang-Bin Ha, Hyoung-Kyu Song
Abstract:
In recent years, a multi-antenna system is actively used to improve the performance of the communication. A MIMO-OFDM system can provide multiplexing gain or diversity gain. These gains are obtained in proportion to the increase of the number of antennas. In order to provide the optimal gain of the MIMO-OFDM system, various transmission and reception schemes are presented. This paper aims to propose a hybrid scheme that base station provides both diversity gain and multiplexing gain at the same time.Keywords: DFE, diversity gain, hybrid, MIMO, multiplexing gain.
Procedia PDF Downloads 6851230 Foil Bearing Stiffness Estimation with Pseudospectral Scheme
Authors: Balaji Sankar, Sadanand Kulkarni
Abstract:
Compliant foil gas lubricated bearings are used for the support of light loads in the order of few kilograms at high speeds, in the order of 50,000 RPM. The stiffness of the foil bearings depends both on the stiffness of the compliant foil and on the lubricating gas film. The stiffness of the bearings plays a crucial role in the stable operation of the supported rotor over a range of speeds. This paper describes a numerical approach to estimate the stiffness of the bearings using pseudo spectral scheme. Methodology to obtain the stiffness of the foil bearing as a function of weight of the shaft is given and the results are presented.Keywords: foil bearing, simulation, numerical, stiffness estimation
Procedia PDF Downloads 3421229 Protecting the Financial Rights of Non-Member Spouses: Addressing the Exploitation of Retirement Benefits in South African Divorce Law
Authors: Ronelle Prinsloo
Abstract:
In South Africa, married retirement fund members can manipulate the legal framework to prevent their spouses from accessing shared retirement benefits during divorce proceedings. The current legal structure allows retirement fund members to accelerate the accrual of their benefits, often by resigning or purchasing living annuities before the finalization of a divorce. This action effectively places these benefits beyond the reach of their spouses, leading to substantial financial prejudice, particularly for financially weaker spouses, typically women. The research highlights that South African courts, including the Supreme Court of Appeal (SCA), have not adequately scrutinized the implications of these actions. Specifically, the SCA has ruled that the capital and proceeds from living annuities are not subject to division during divorce, which undermines the financial rights of non-member spouses. The court's failure to consider the source of the money used to purchase these annuities and its potential inclusion in the joint estate or accrual system is a significant concern. The South African Law Reform Commission has recognized this issue, noting the negative impact on financially weaker spouses. The article critiques the lack of legislative response to this problem despite its significant implications for the equitable distribution of marital assets. The current legal framework, particularly the definition of "pension interest" and the provisions under sections 7(7) and 7(8) of the Divorce Act, is inadequate in addressing the complexities surrounding the sharing of retirement benefits in divorce cases. The article argues for a comprehensive review and reform of the law to ensure that retirement benefits are treated as patrimonial assets, subject to division upon the occurrence of any trigger event, such as resignation, retirement, or retrenchment. The need for such reform is urgent to prevent economically disadvantaged spouses from being unjustly deprived of their fair share of retirement benefits. In conclusion, the article advocates for legislative amendments to the Divorce Act, specifically section 7(7), to clarify that pension interests automatically form part of the joint estate, regardless of whether divorce proceedings are underway. This change would safeguard the financial rights of non-member spouses and ensure a more equitable distribution of retirement benefits during divorce. Failure to address this issue perpetuates economic inequality and leaves financially weaker spouses vulnerable during divorce proceedings.Keywords: Constitution of South Africa, non-member spouse, retirement benefits, spouse
Procedia PDF Downloads 201228 Reducing the Negative Effects of Infrastructure Deficit through Continuity in Governance
Authors: Edoghogho Ogbeifun, Charles Mbohwa, J. H. C. Pretorius
Abstract:
Effective infrastructure development scheme planned and executed has positive influence on the quantity of available stock of infrastructure to meet the immediate and expansion needs of an organization, as well as contribute to the overall economic development of a nation, community or the local entity where the infrastructure is hosted. It is noteworthy, however, that infrastructure development scheme spans a long time frame, usually longer than the political life of the administration that initiates the scheme. In the majority of circumstances, execution may start and achieve different levels of completion; at best, only limited numbers are completed and put into functional use during the life of the administration that initiated the infrastructure scheme. When there is a change in leadership, many of the uncompleted projects are usually abandoned. The new administration repeats the circle of its predecessors and develops another set of infrastructure scheme which will suffer similar fate as the ones developed by their predecessors; thus doting the landscape with many uncompleted projects, which leads to infrastructure deficit. These circle will continue unless each succeeding leader sees governance as single continuum. Therefore, infrastructure projects not completed by one administration should be continued by succeeding administration, in order to increase the stock of relevant infrastructure available for the smooth operations organization and enhance the needed developments, as well as reduce the negative effects of infrastructure deficit. The single case study of qualitative research method was adopted to investigate the actions of the administration of three successive Vice-Chancellors, in a higher education institution in Nigeria, over a longitudinal period of twelve years. This is with a view to exploring the effects of each administration on the development and execution of infrastructure projects, with particular interest on abandoned projects. The findings revealed that although two of Vice-Chancellors were committed to infrastructure upgrade, they executed more new projects than completing abandoned ones, while the current leader has shown more pragmatism in completing abandoned projects alongside constructing new ones; thus demonstrating the importance of the continuity of governance. In this regard, there is a steady increase in the stock of infrastructure to accommodate the expansion of existing academic programmes, host new ones as well as reduce the negative effects of infrastructure deficit caused by abandoned projects.Keywords: abandoned projects, continuity of governance, infrastructure development scheme, long time frame
Procedia PDF Downloads 1831227 Wireless Transmission of Big Data Using Novel Secure Algorithm
Authors: K. Thiagarajan, K. Saranya, A. Veeraiah, B. Sudha
Abstract:
This paper presents a novel algorithm for secure, reliable and flexible transmission of big data in two hop wireless networks using cooperative jamming scheme. Two hop wireless networks consist of source, relay and destination nodes. Big data has to transmit from source to relay and from relay to destination by deploying security in physical layer. Cooperative jamming scheme determines transmission of big data in more secure manner by protecting it from eavesdroppers and malicious nodes of unknown location. The novel algorithm that ensures secure and energy balance transmission of big data, includes selection of data transmitting region, segmenting the selected region, determining probability ratio for each node (capture node, non-capture and eavesdropper node) in every segment, evaluating the probability using binary based evaluation. If it is secure transmission resume with the two- hop transmission of big data, otherwise prevent the attackers by cooperative jamming scheme and transmit the data in two-hop transmission.Keywords: big data, two-hop transmission, physical layer wireless security, cooperative jamming, energy balance
Procedia PDF Downloads 4901226 Assessment of Drainage Water Quality in South Africa: Case Study of Vaal-Harts Irrigation Scheme
Authors: Josiah A. Adeyemo, Fred A. O. Otieno, Olumuyiwa I. Ojo
Abstract:
South Africa is water-stressed being a semi-arid country with limited annual rainfall supply and a lack of perennial streams. The future implications of population growth combined with the uncertainty of climate change are likely to have significant financial, human and ecological impacts on already scarce water resources. The waste water from the drainage canals of the Vaal-Harts irrigation scheme (VHS) located in Jan Kempdorp, a farming community in South Africa, were investigated for possible irrigation re-use and their effects on the immediate environment. Three major drains within the scheme were identified and sampled. Drainage water samples were analysed to determine its characteristics. The water samples analyzed had pH values in the range of 5.5 and 6.4 which is below the normal range for irrigation water and very low to moderate salinity (electrical conductivity 0.09-0.82 dS/m). The adjusted sodium adsorption ratio values in all the samples were also very low (<0.2), indicating very low sodicity hazards. The nitrate concentration in most of the samples was high, ranging from 4.8 to 53 mg/l. The reuse of the drainage water for irrigation is possible, but with further treatment. Some suggestions were offered in the safe management of drainage water in VHS.Keywords: drainage canal, water quality, irrigation, pollutants, environment
Procedia PDF Downloads 3351225 Static Priority Approach to Under-Frequency Based Load Shedding Scheme in Islanded Industrial Networks: Using the Case Study of Fatima Fertilizer Company Ltd - FFL
Authors: S. H. Kazmi, T. Ahmed, K. Javed, A. Ghani
Abstract:
In this paper static scheme of under-frequency based load shedding is considered for chemical and petrochemical industries with islanded distribution networks relying heavily on the primary commodity to ensure minimum production loss, plant downtime or critical equipment shutdown. A simplistic methodology is proposed for in-house implementation of this scheme using underfrequency relays and a step by step guide is provided including the techniques to calculate maximum percentage overloads, frequency decay rates, time based frequency response and frequency based time response of the system. Case study of FFL electrical system is utilized, presenting the actual system parameters and employed load shedding settings following the similar series of steps. The arbitrary settings are then verified for worst overload conditions (loss of a generation source in this case) and comprehensive system response is then investigated.Keywords: islanding, under-frequency load shedding, frequency rate of change, static UFLS
Procedia PDF Downloads 4861224 Application of Chinese Remainder Theorem to Find The Messages Sent in Broadcast
Authors: Ayubi Wirara, Ardya Suryadinata
Abstract:
Improper application of the RSA algorithm scheme can cause vulnerability to attacks. The attack utilizes the relationship between broadcast messages sent to the user with some fixed polynomial functions that belong to each user. Scheme attacks carried out by applying the Chinese Remainder Theorem to obtain a general polynomial equation with the same modulus. The formation of the general polynomial becomes a first step to get back the original message. Furthermore, to solve these equations can use Coppersmith's theorem.Keywords: RSA algorithm, broadcast message, Chinese Remainder Theorem, Coppersmith’s theorem
Procedia PDF Downloads 3411223 Variance-Aware Routing and Authentication Scheme for Harvesting Data in Cloud-Centric Wireless Sensor Networks
Authors: Olakanmi Oladayo Olufemi, Bamifewe Olusegun James, Badmus Yaya Opeyemi, Adegoke Kayode
Abstract:
The wireless sensor network (WSN) has made a significant contribution to the emergence of various intelligent services or cloud-based applications. Most of the time, these data are stored on a cloud platform for efficient management and sharing among different services or users. However, the sensitivity of the data makes them prone to various confidentiality and performance-related attacks during and after harvesting. Various security schemes have been developed to ensure the integrity and confidentiality of the WSNs' data. However, their specificity towards particular attacks and the resource constraint and heterogeneity of WSNs make most of these schemes imperfect. In this paper, we propose a secure variance-aware routing and authentication scheme with two-tier verification to collect, share, and manage WSN data. The scheme is capable of classifying WSN into different subnets, detecting any attempt of wormhole and black hole attack during harvesting, and enforcing access control on the harvested data stored in the cloud. The results of the analysis showed that the proposed scheme has more security functionalities than other related schemes, solves most of the WSNs and cloud security issues, prevents wormhole and black hole attacks, identifies the attackers during data harvesting, and enforces access control on the harvested data stored in the cloud at low computational, storage, and communication overheads.Keywords: data block, heterogeneous IoT network, data harvesting, wormhole attack, blackhole attack access control
Procedia PDF Downloads 84