Search results for: cyber-physical security
1028 Study of the Phenomenon of Collapse and Buckling the Car Body Frame
Authors: Didik Sugiyanto
Abstract:
Conditions that often occur in the framework of a particular vehicle at a car is a collision or collision with another object, an example of such damage is to the frame or chassis for the required design framework that is able to absorb impact energy. Characteristics of the material are influenced by the value of the stiffness of the material that need to be considered in choosing the material properties of the material. To obtain material properties that can be adapted to the experimental conditions tested the tensile and compression testing. In this study focused on the chassis at an angle of 150, 300, and 450. It is based on field studies that vehicle primarily for freight cars have a point of order light between 150 to 450. Research methods include design tools, design framework, procurement of materials and experimental tools, tool-making, the manufacture of the test framework, and the testing process, experiment is testing the power of the press to know the order. From this test obtained the maximum force on the corner of 150 was 569.76 kg at a distance of 16 mm, angle 300 is 370.3 kg at a distance of 15 mm, angle 450 is 391.71 kg at a distance of 28 mm. After reaching the maximum force the order will occur collapse, followed by a decrease in the next distance. It can be concluded that the greatest strain energy occurs at an angle of 150. So it is known that the frame at an angle of 150 produces the best level of security.Keywords: buckling, collapse, body frame, vehicle
Procedia PDF Downloads 5781027 An Intelligent Watch-Over System Using an IoT Device, for Elderly People Living by Themselves
Authors: Hideo Suzuki, Yuya Kiyonobu, Kotaro Matsushita, Masaki Hanada, Rie Suzuki, Noriko Niijima, Noriko Uosaki, Tadao Nakamura
Abstract:
People often worry about their elderly family members who are living by themselves or staying alone somewhere. An intelligent watch-over system for such elderly people, using a Raspberry Pi IoT device, has been newly developed to monitor those who live or stay separately from their families and alert them if a problem occurs. The system consists of motion sensors and temperature-humidity combined sensors that are located at seven points within an elderly person's home. The intelligent algorithms of the system detect signs and the possibility of unhealthy situations arising for the elderly relative; e.g., an unusually long bathing time, or a visit to a restroom, too high a room temperature, etc., by using data cached by the sensors above, at seven points within their house. The system gives more consideration to the elderly person's privacy, by using the sensors above, instead of using cameras and microphones placed around the house. The system invented and described here, can send a Twitter direct message to designated family members when an elderly relative is possibly in an unhealthy condition. Thus the system helps decrease family members' anxieties regarding their elderly relatives and increases their sense of security.Keywords: elderly person, IoT device, Raspberry Pi, watch-over system
Procedia PDF Downloads 2231026 ISIS after the Defeat of the Islamic Caliphate: The Rise of Cyber-Jihad
Authors: Spyridon Plakoudas
Abstract:
After the capture of Al-Raqqah and the defeat of the short-lived Islamic Caliphate in 2017, everyone predicted the end of ISIS. However, ISIS proved far more resilient than initially thought. The militant group quickly regrouped from its defeat and started a low-intensity guerrilla campaign in central Iraq (near Kirkuk and Mosul) and north-eastern Syria (near Deir ez-Zorr). At the same time, ISIS doubled down on its cyber-campaign; actually, ISIS is as active on the cyber-domain as during the peak of its power in 2015. This paper, a spin-off paper from a co-authored book on the Syrian Civil War (due to be published by Rowman and Littlefield), intends to examine how ISIS operates in the cyber-domain and how this "Cyber-Caliphate" under re-construction is associated with its post-2017 strategy. This paper will draw on the discipline of War Studies (with an emphasis on Cyber-Security and Insurgency / Counter-Insurgency) and will benefit from the insights of interviewed experts on the field (e.g., Hassan Hasssan). This paper will explain how the successful operation of ISIS in the cyber-space preserves the myth of the “caliphate” amongst its worldwide followers (against the odds) and sustains the group’s ongoing insurgency in Syria and Iraq; in addition, this paper will suggest how this cyber-threat can be countered best.Keywords: ISIS, cyber-jihad, Syrian Civil War, cyber-terrorism, insurgency and counter-insurgency
Procedia PDF Downloads 1341025 Implications of Agricultural Subsidies Since Green Revolution: A Case Study of Indian Punjab
Authors: Kriti Jain, Sucha Singh Gill
Abstract:
Subsidies have been a major part of agricultural policies around the world, and more extensively since the green revolution in developing countries, for the sake of attaining higher agricultural productivity and achieving food security. But entrenched subsidies lead to distorted incentives and promote inefficiencies in the agricultural sector, threatening the viability of these very subsidies and sustainability of the agricultural production systems, posing a threat to the livelihood of farmers and laborers dependent on it. This paper analyzes the economic and ecological sustainability implications of prolonged input and output subsidies in agriculture by studying the case of Indian Punjab, an agriculturally developed state responsible for ensuring food security in the country when it was facing a major food crisis. The paper focuses specifically on the environmentally unsustainable cropping pattern changes as a result of Minimum Support Price (MSP) and assured procurement and on the resource use efficiency and cost implications of power subsidy for irrigation in Punjab. The study is based on an analysis of both secondary and primary data sources. Using secondary data, a time series analysis was done to capture the changes in Punjab’s cropping pattern, water table depth, fertilizer consumption, and electrification of agriculture. This has been done to examine the role of price and output support adopted to encourage the adoption of green revolution technology in changing the cropping structure of the state, resulting in increased input use intensities (especially groundwater and fertilizers), which harms the ecological balance and decreases factor productivity. Evaluation of electrification of Punjab agriculture helped evaluate the trend in electricity productivity of agriculture and how free power imposed further pressure on the extant agricultural ecosystem. Using data collected from a primary survey of 320 farmers in Punjab, the extent of wasteful application of groundwater irrigation, water productivity of output, electricity usage, and cost of irrigation driven electricity subsidy to the exchequer were estimated for the dominant cropping pattern amongst farmers. The main findings of the study revealed how because of a subsidy has driven agricultural framework, Punjab has lost area under agro climatically suitable and staple crops and moved towards a paddy-wheat cropping system, that is gnawing away the state’s natural resources like water table has been declining at a significant rate of 25 cms per year since 1975-76, and excessive and imbalanced fertilizer usage has led to declining soil fertility in the state. With electricity-driven tubewells as the major source of irrigation within a regime of free electricity and water-intensive crop cultivation, there is both wasteful application of irrigation water and electricity in the cultivation of paddy crops, burning an unproductive hole in the exchequer’s pocket. There is limited access to both agricultural extension services and water-conserving technology, along with policy imbalance, keeping farmers in an intensive and unsustainable production system. Punjab agriculture is witnessing diminishing returns to factor, which under the business-as-usual scenario, will soon enter the phase of negative returns to factor.Keywords: cropping pattern, electrification, subsidy, sustainability
Procedia PDF Downloads 1861024 Content Based Video Retrieval System Using Principal Object Analysis
Authors: Van Thinh Bui, Anh Tuan Tran, Quoc Viet Ngo, The Bao Pham
Abstract:
Video retrieval is a searching problem on videos or clips based on content in which they are relatively close to an input image or video. The application of this retrieval consists of selecting video in a folder or recognizing a human in security camera. However, some recent approaches have been in challenging problem due to the diversity of video types, frame transitions and camera positions. Besides, that an appropriate measures is selected for the problem is a question. In order to overcome all obstacles, we propose a content-based video retrieval system in some main steps resulting in a good performance. From a main video, we process extracting keyframes and principal objects using Segmentation of Aggregating Superpixels (SAS) algorithm. After that, Speeded Up Robust Features (SURF) are selected from those principal objects. Then, the model “Bag-of-words” in accompanied by SVM classification are applied to obtain the retrieval result. Our system is performed on over 300 videos in diversity from music, history, movie, sports, and natural scene to TV program show. The performance is evaluated in promising comparison to the other approaches.Keywords: video retrieval, principal objects, keyframe, segmentation of aggregating superpixels, speeded up robust features, bag-of-words, SVM
Procedia PDF Downloads 3011023 Hydro-Gravimetric Ann Model for Prediction of Groundwater Level
Authors: Jayanta Kumar Ghosh, Swastik Sunil Goriwale, Himangshu Sarkar
Abstract:
Groundwater is one of the most valuable natural resources that society consumes for its domestic, industrial, and agricultural water supply. Its bulk and indiscriminate consumption affects the groundwater resource. Often, it has been found that the groundwater recharge rate is much lower than its demand. Thus, to maintain water and food security, it is necessary to monitor and management of groundwater storage. However, it is challenging to estimate groundwater storage (GWS) by making use of existing hydrological models. To overcome the difficulties, machine learning (ML) models are being introduced for the evaluation of groundwater level (GWL). Thus, the objective of this research work is to develop an ML-based model for the prediction of GWL. This objective has been realized through the development of an artificial neural network (ANN) model based on hydro-gravimetry. The model has been developed using training samples from field observations spread over 8 months. The developed model has been tested for the prediction of GWL in an observation well. The root means square error (RMSE) for the test samples has been found to be 0.390 meters. Thus, it can be concluded that the hydro-gravimetric-based ANN model can be used for the prediction of GWL. However, to improve the accuracy, more hydro-gravimetric parameter/s may be considered and tested in future.Keywords: machine learning, hydro-gravimetry, ground water level, predictive model
Procedia PDF Downloads 1271022 Small Businesses as Vehicles for Job Creation in North-West Nigeria
Authors: Mustapha Shitu Suleiman, Francis Neshamba, Nestor Valero-Silva
Abstract:
Small businesses are considered as engine of economic growth, contributing to employment generation, wealth creation, and poverty alleviation and food security in both developed and developing countries. Nigeria is facing many socio-economic problems and it is believed that by supporting small business development, as propellers of new ideas and more effective users of resources, often driven by individual creativity and innovation, Nigeria would be able to address some of its economic and social challenges, such as unemployment and economic diversification. Using secondary literature, this paper examines the role small businesses can play in the creation of jobs in North-West Nigeria to overcome issues of unemployment, which is the most devastating economic challenge facing the region. Most studies in this area have focused on Nigeria as a whole and only a few studies provide a regional focus, hence, this study will contribute to knowledge by filling this gap by concentrating on North-West Nigeria. It is hoped that with the present administration’s determination to improve the economy, small businesses would be used as vehicles for diversification of the economy away from crude oil to create jobs that would lead to a reduction in the country’s high unemployment level.Keywords: job creation, north-west, Nigeria, small business, unemployment
Procedia PDF Downloads 3071021 Different Approaches to the Study of Territorial Dispute between China and India
Authors: Albina Muratbekova
Abstract:
One of the main tensions and challenges in the development of Sino-Indian relation is the demarcation of its frontiers. The fact that throughout the history borders had never been demarcated on ground occur a dispute between China and India after receiving sovereignty. Boundaries of India and China are divided into three sectors: Eastern, Middle and Western. The middle sector runs from India’s Uttar Pradesh to the Punjab, 545 km length of the Line of Actual Control, the lines of which was confirmed at the 9th meeting of the Expert Group held in 2001, in New Delhi. Other two sectors are still not determined and cause disputes. A western sector of the frontier is the Aksai Chin plateau, covers areas of Ladakh, Tibet, and Sinkiang. Another disputed area lies in the Eastern sector in the Himalayan region, which after 1986 became the Indian state called Arunachal Pradesh. There are two different approaches in the ways of resolving the border dispute. Chinese side keeps an opinion that the border dispute must be resolved in a timely matter unless it is favorable for China, the resolution can be left to a later generation. While India’s government due to security reasons is eager to demarcate the border. In order to study this conflict was used as a descriptive-comparative-analytical method. Also, it was done a profound analyze of conflict nature.Keywords: border dispute, China, India, territorial claim
Procedia PDF Downloads 3081020 A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques
Authors: Zhang Xingnan, Huang Jingjia, Feng Yue, Burra Venkata Durga Kumar
Abstract:
This paper proposes a comprehensive approach to mitigate ROP (Return-Oriented Programming) attacks by combining internal operating system protection mechanisms and hardware-assisted techniques. Through extensive literature review, we identify the effectiveness of ASLR (Address Space Layout Randomization) and LBR (Last Branch Record) in preventing ROP attacks. We present a process involving buffer overflow detection, hardware-assisted ROP attack detection, and the use of Turing detection technology to monitor control flow behavior. We envision a specialized tool that views and analyzes the last branch record, compares control flow with a baseline, and outputs differences in natural language. This tool offers a graphical interface, facilitating the prevention and detection of ROP attacks. The proposed approach and tool provide practical solutions for enhancing software security.Keywords: operating system, ROP attacks, returning-oriented programming attacks, ASLR, LBR, CFI, DEP, code randomization, hardware-assisted CFI
Procedia PDF Downloads 951019 Jordan Water District Interactive Billing and Accounting Information System
Authors: Adrian J. Forca, Simeon J. Cainday III
Abstract:
The Jordan Water District Interactive Billing and Accounting Information Systems is designed for Jordan Water District to uplift the efficiency and effectiveness of its services to its customers. It is designed to process computations of water bills in accurate and fast way through automating the manual process and ensures that correct rates and fees are applied. In addition to billing process, a mobile app will be integrated into it to support rapid and accurate water bill generation. An interactive feature will be incorporated to support electronic billing to customers who wish to receive water bills through the use of electronic mail. The system will also improve, organize and avoid data inaccuracy in accounting processes because data will be stored in a database which is designed logically correct through normalization. Furthermore, strict programming constraints will be plunged to validate account access privilege based on job function and data being stored and retrieved to ensure data security, reliability, and accuracy. The system will be able to cater the billing and accounting services of Jordan Water District resulting in setting forth the manual process and adapt to the modern technological innovations.Keywords: accounting, bill, information system, interactive
Procedia PDF Downloads 2511018 Media Coverage of the Turkish Armenian Journalist Hrant Dink Assassination: The Analysis of Media News in the Aftermath of the Assassination
Authors: Nusret Mesut Sahin
Abstract:
Hrant Dink, a prominent Turkish-Armenian journalist, and editor-in-chief of the bilingual Turkish-Armenian newspaper Agos, was assassinated in Istanbul on January 19th, 2007 by a nationalist extremist, Ogun Samast. Dink had been voicing the atrocities against the Armenians between 1915 and 1922 during the Ottoman rule, and his comments on the issue appeared in the Turkish media many times before his assassination. Despite intensive media coverage of his assassination, there is not enough research analyzing how national and international media presented Dink’s assassination. In this research, a content analysis of national and international news articles (N= 139) is conducted to identify whether there is a significant difference in national and international media’s coverage of the assassination. The content of the newspaper articles is categorized and coded according to the topics covered. The findings of this research suggested that Dink’s assassination wounded Turkey’s image as a democratic country. It has also been found that the Turkish media focused on security forces and their responsibility in Dink’s assassination, whereas international media focused more on the Article 301 of the Turkish penal code, freedom of expression, and atrocities against the Armenians during the Ottoman rule.Keywords: Hrant Dink, Armenian, journalist, assassination
Procedia PDF Downloads 1521017 Criminal Liability for Copyright and Related Rights Infringement: Albania Legislation Perspective
Authors: Ilda Muçmataj, Anjeza Liçenji, Borana Kalemi
Abstract:
Copyright and related rights have been pivotal in driving the economic growth of nations worldwide and fostering culture and new forms of entertainment. The introduction of the internet and technological advancement has significantly expanded the opportunities for creators and rights holders to promote their works and boost their revenues. However, this digital era has also brought about complex challenges, leading to a more extensive range of copyright infringement, primarily due to the substantial surge in piracy and counterfeiting. Despite being reported internationally, the mechanisms to tackle and the responsibility for enforcing copyright infringements often remain rooted in national jurisdictions, resulting in a gap between the scale of the problem and the efficacy of enforcement measures. Thus, it is essential to ensure adequate legal protection, a vital safeguard for authors' economic and moral interests, information security, innovative development promotion, and intellectual creativity preservation. This paper describes Albanian criminal law-based copyright enforcement legislation, focusing on doctrinal guidance and practical judicial considerations. Lastly, the paper offers recommendations for enhancing copyright protection and related rights.Keywords: author, copyright infringement, copyright, criminal liability, intellectual property, piracy
Procedia PDF Downloads 361016 Privacy Preserving in Association Rule Mining on Horizontally Partitioned Database
Authors: Manvar Sagar, Nikul Virpariya
Abstract:
The advancement in data mining techniques plays an important role in many applications. In context of privacy and security issues, the problems caused by association rule mining technique are investigated by many research scholars. It is proved that the misuse of this technique may reveal the database owner’s sensitive and private information to others. Many researchers have put their effort to preserve privacy in Association Rule Mining. Amongst the two basic approaches for privacy preserving data mining, viz. Randomization based and Cryptography based, the later provides high level of privacy but incurs higher computational as well as communication overhead. Hence, it is necessary to explore alternative techniques that improve the over-heads. In this work, we propose an efficient, collusion-resistant cryptography based approach for distributed Association Rule mining using Shamir’s secret sharing scheme. As we show from theoretical and practical analysis, our approach is provably secure and require only one time a trusted third party. We use secret sharing for privately sharing the information and code based identification scheme to add support against malicious adversaries.Keywords: Privacy, Privacy Preservation in Data Mining (PPDM), horizontally partitioned database, EMHS, MFI, shamir secret sharing
Procedia PDF Downloads 4081015 Displacement Situation in Federally Administered Tribal Areas of Pakistan: Issues and Challenges
Authors: Sohail Ahmad, Inayat Kaleem
Abstract:
Federally Administered Tribal Area(FATA) of Pakistan is one of the most neglected regions in the world as far as development is concerned. It has been the hub of all sorts of illegal activities including militancy and export of terrorism. Therefore, it became inevitable for the government of Pakistan to take action against militants through military operations. Small and large scale military operations are being taken against the non-state actors in FATA with continuity. Over the years, hundreds of thousands have been displaced from the tribal areas of the country. Moreover, military operation Zarb-e-Azb has been launched in North Waziristan Agency in June 2014 to counter militancy across the Af-Pak border region. Though successful in curbing militancy, the operation has displaced around 0.5 million people from the area. Most of them opt to take shelter in the government installed shelter camps, some of them take refuge outside tent villages in the country while some of them prefer to cross into Afghanistan rather their own country Pakistan. This paper will evaluate how the influx of these internally displaced persons in the country is influencing the socio-economic situation of not only the displaced but of the hosting areas as well. Secondly, attention would be given to gauge the impact of such a huge number of displaced population on the law and order and security situation in the host areas.Keywords: Af-Pak, federally administered tribal area, IDPs, internal displacement, Pakistan
Procedia PDF Downloads 3141014 The Effect of Job Insecurity on Attitude towards Change and Organizational Citizenship Behavior: Moderating Role of Islamic Work Ethics
Authors: Khurram Shahzad, Muhammad Usman
Abstract:
The main aim of this study is to examine the direct and interactive effects of job insecurity and Islamic work ethics on employee’s attitude towards change and organizational citizenship behavior. Design/methodology/approach: The data was collected from 171 male and female university teachers of Pakistan. Self administered, close ended questionnaires were used to collect the data. Data was analyzed through correlation and regression analysis. Findings: Through the analysis of data, it was found that job insecurity has a strong negative effect on the attitude towards change of university teachers. On the contrary, job insecurity has no significant effect on organizational citizenship behavior of university teachers. Our results also show that Islamic work ethics does not moderate the relationship of job insecurity and attitude towards change, while a strong moderation effect of Islamic wok ethics is found on the relationship of job insecurity and organizational citizenship behavior. Originality/value: This study for the first time examines the relationship of job insecurity with employee’s attitude towards change and organizational citizenship behavior with the moderating effect of Islamic work ethics.Keywords: job security, islamic work ethics, attitude towards change, organizational citizenship behavior
Procedia PDF Downloads 4751013 Tokenization of Blue Bonds to Scale Blue Carbon Projects
Authors: Rodrigo Buaiz Boabaid
Abstract:
Tokenization of Blue Bonds is an emerging Green Finance tool that has the potential to scale Blue Carbon Projects to fight climate change. This innovative solution has a huge potential to democratize the green finance market and catalyze innovations in the climate change finance sector. Switzerland has emerged as a leader in the Green Finance space and is well-positioned to drive the adoption of Tokenization of Blue & Green Bonds. This unique approach has the potential to unlock new sources of capital and enable global investors to participate in the financing of sustainable blue carbon projects. By leveraging the power of blockchain technology, Tokenization of Blue Bonds can provide greater transparency, efficiency, and security in the investment process while also reducing transaction costs. Investments are in line with the highest regulations and designed according to the stringent legal framework and compliance standards set by Switzerland. The potential benefits of Tokenization of Blue Bonds are significant and could transform the way that sustainable projects are financed. By unlocking new sources of capital, this approach has the potential to accelerate the deployment of Blue Carbon projects and create new opportunities for investors to participate in the fight against climate change.Keywords: blue bonds, blue carbon, tokenization, green finance
Procedia PDF Downloads 871012 CSRFDtool: Automated Detection and Prevention of a Reflected Cross-Site Request Forgery
Authors: Alaa A. Almarzuki, Nora A. Farraj, Aisha M. Alshiky, Omar A. Batarfi
Abstract:
The number of internet users is dramatically increased every year. Most of these users are exposed to the dangers of attackers in one way or another. The reason for this lies in the presence of many weaknesses that are not known for native users. In addition, the lack of user awareness is considered as the main reason for falling into the attackers’ snares. Cross Site Request Forgery (CSRF) has placed in the list of the most dangerous threats to security in OWASP Top Ten for 2013. CSRF is an attack that forces the user’s browser to send or perform unwanted request or action without user awareness by exploiting a valid session between the browser and the server. When CSRF attack successes, it leads to many bad consequences. An attacker may reach private and personal information and modify it. This paper aims to detect and prevent a specific type of CSRF, called reflected CSRF. In a reflected CSRF, a malicious code could be injected by the attackers. This paper explores how CSRF Detection Extension prevents the reflected CSRF by checking browser specific information. Our evaluation shows that the proposed solution succeeds in preventing this type of attack.Keywords: CSRF, CSRF detection extension, attackers, attacks
Procedia PDF Downloads 4141011 High-Value Health System for All: Technologies for Promoting Health Education and Awareness
Authors: M. P. Sebastian
Abstract:
Health for all is considered as a sign of well-being and inclusive growth. New healthcare technologies are contributing to the quality of human lives by promoting health education and awareness, leading to the prevention, early diagnosis and treatment of the symptoms of diseases. Healthcare technologies have now migrated from the medical and institutionalized settings to the home and everyday life. This paper explores these new technologies and investigates how they contribute to health education and awareness, promoting the objective of high-value health system for all. The methodology used for the research is literature review. The paper also discusses the opportunities and challenges with futuristic healthcare technologies. The combined advances in genomics medicine, wearables and the IoT with enhanced data collection in electronic health record (EHR) systems, environmental sensors, and mobile device applications can contribute in a big way to high-value health system for all. The promise by these technologies includes reduced total cost of healthcare, reduced incidence of medical diagnosis errors, and reduced treatment variability. The major barriers to adoption include concerns with security, privacy, and integrity of healthcare data, regulation and compliance issues, service reliability, interoperability and portability of data, and user friendliness and convenience of these technologies.Keywords: big data, education, healthcare, information communication technologies (ICT), patients, technologies
Procedia PDF Downloads 2101010 The Effects of European Union’s Bordering Process
Authors: Ebru Dalgakiran
Abstract:
Border and bordering studies have come to the forefront in recent years especially with parallel to increase in international migratory movements. Although conceptualizations of the border and bordering are quite contested within academia, the general point of view is that borders are politically and socially constructed. It means that borders have always their own ‘us vs. them’, and bordering process produce separate identities as well. In that case, Turkey and Greece are notable examples since these two nation-states constructed their borders upon each other’s for years although the Turkish-Greek border was drawn with the Lausanne Treaty of 1923. Nevertheless, on the other hand, The European Union (EU) has been externalized of border management policies to build a stronger area of freedom, security, and justice within the borders. Thus, Turkish-Greek border has become one of the significant external borders of the EU. In this context, this study aims to understand whether the EU’s bordering process through externalizing border management policies can affect Turkey’s and Greece’s bordering processes. By examining official documents of the EU and conducting in-depth interviews with local actors of the border management policies of the EU in Edirne, where is the border city of Turkey with Greece, this study’s main finding is that the EU’s bordering process to control migration at the external borders affects Turkey’s and Greece’s bordering processes. It seems that Turkey and Greece construct their borders upon a common Other, ‘irregular migrants’ now.Keywords: border, bordering, the European Union, externalization
Procedia PDF Downloads 2371009 Global City Typologies: 300 Cities and Over 100 Datasets
Authors: M. Novak, E. Munoz, A. Jana, M. Nelemans
Abstract:
Cities and local governments the world over are interested to employ circular strategies as a means to bring about food security, create employment and increase resilience. The selection and implementation of circular strategies is facilitated by modeling the effects of strategies locally and understanding the impacts such strategies have had in other (comparable) cities and how that would translate locally. Urban areas are heterogeneous because of their geographic, economic, social characteristics, governance, and culture. In order to better understand the effect of circular strategies on urban systems, we create a dataset for over 300 cities around the world designed to facilitate circular strategy scenario modeling. This new dataset integrates data from over 20 prominent global national and urban data sources, such as the Global Human Settlements layer and International Labour Organisation, as well as incorporating employment data from over 150 cities collected bottom up from local departments and data providers. The dataset is made to be reproducible. Various clustering techniques are explored in the paper. The result is sets of clusters of cities, which can be used for further research, analysis, and support comparative, regional, and national policy making on circular cities.Keywords: data integration, urban innovation, cluster analysis, circular economy, city profiles, scenario modelling
Procedia PDF Downloads 1801008 Analysis of Detection Concealed Objects Based on Multispectral and Hyperspectral Signatures
Authors: M. Kastek, M. Kowalski, M. Szustakowski, H. Polakowski, T. Sosnowski
Abstract:
Development of highly efficient security systems is one of the most urgent topics for science and engineering. There are many kinds of threats and many methods of prevention. It is very important to detect a threat as early as possible in order to neutralize it. One of the very challenging problems is detection of dangerous objects hidden under human’s clothing. This problem is particularly important for safety of airport passengers. In order to develop methods and algorithms to detect hidden objects it is necessary to determine the thermal signatures of such objects of interest. The laboratory measurements were conducted to determine the thermal signatures of dangerous tools hidden under various clothes in different ambient conditions. Cameras used for measurements were working in spectral range 0.6-12.5 μm An infrared imaging Fourier transform spectroradiometer was also used, working in spectral range 7.7-11.7 μm. Analysis of registered thermograms and hyperspectral datacubes has yielded the thermal signatures for two types of guns, two types of knives and home-made explosive bombs. The determined thermal signatures will be used in the development of method and algorithms of image analysis implemented in proposed monitoring systems.Keywords: hyperspectral detection, nultispectral detection, image processing, monitoring systems
Procedia PDF Downloads 3481007 Optimized and Secured Digital Watermarking Using Entropy, Chaotic Grid Map and Its Performance Analysis
Authors: R. Rama Kishore, Sunesh
Abstract:
This paper presents an optimized, robust, and secured watermarking technique. The methodology used in this work is the combination of entropy and chaotic grid map. The proposed methodology incorporates Discrete Cosine Transform (DCT) on the host image. To improve the imperceptibility of the method, the host image DCT blocks, where the watermark is to be embedded, are further optimized by considering the entropy of the blocks. Chaotic grid is used as a key to reorder the DCT blocks so that it will further increase security while selecting the watermark embedding locations and its sequence. Without a key, one cannot reveal the exact watermark from the watermarked image. The proposed method is implemented on four different images. It is concluded that the proposed method is giving better results in terms of imperceptibility measured through PSNR and found to be above 50. In order to prove the effectiveness of the method, the performance analysis is done after implementing different attacks on the watermarked images. It is found that the methodology is very strong against JPEG compression attack even with the quality parameter up to 15. The experimental results are confirming that the combination of entropy and chaotic grid map method is strong and secured to different image processing attacks.Keywords: digital watermarking, discreate cosine transform, chaotic grid map, entropy
Procedia PDF Downloads 2531006 A Comprehensive Review of Electronic Health Records Implementation in Healthcare
Authors: Lateefat Amao, Misagh Faezipour
Abstract:
Implementing electronic health records (EHR) in healthcare is a pivotal transition aimed at digitizing and optimizing patient health information management. The expectations associated with this transition are high, even towards other health information systems (HIS) and health technology. This multifaceted process involves careful planning and execution to improve the quality and efficiency of patient care, especially as healthcare technology is a sensitive niche. Key considerations include a thorough needs assessment, judicious vendor selection, robust infrastructure development, and training and adaptation of healthcare professionals. Comprehensive training programs, data migration from legacy systems and models, interoperability, as well as security and regulatory compliance are imperative for healthcare staff to navigate EHR systems adeptly. The purpose of this work is to offer a comprehensive review of the literature on EHR implementation. It explores the impact of this health technology on health practices, highlights challenges and barriers to its successful utility, and offers practical strategies that can impact its success in healthcare. This paper provides a thorough review of studies on the adoption of EHRs, emphasizing the wide range of experiences and results connected to EHR use in the medical field, especially across different types of healthcare organizations.Keywords: healthcare, electronic health records, EHR implementation, patient care, interoperability
Procedia PDF Downloads 811005 The Impact of Developing Tourism on the Spatial Pattern in Jordan
Authors: Khries Sawsan
Abstract:
the phenomenon of urbanization is considered as one of the most important tourism resources that differ from one country to another and from one region to another in the same country. Our concern in tourism accommodation is explained by the fact that their location is directly related to the movement to tourist sites .Besides, these constructions comport security considered as the most important motivation for tourists in their choice of any destination. Hotels are the most representative expression of tourism. This is due to their physical prominence in the landscape and being the sole urban component totally unique to tourism. This study sheds light on the impact of tourism development on the spatial pattern in Jordan. It describes the linkages between existing tourism development policies and the spatial development patterns that have occurred as a result throughout Jordan, particularly looking at the impact that tourism has had on the physical environment of major tourism destinations. It puts an illustrative plan of the impact of the augmentation of tourism accommodations in Jordan in the past 40 years ago. The findings of this study help us to understand better the operation of Jordan’ dynamic changes in the location An intensive analysis is then applied on a representative case study in three regions: Amman, Petra and Aqaba. The study proceeds from an historical perspective to, show the evolution of the current development patterns an increase of tourism’s impact on spatial, in the presence of factors as political and economic stability, is expected.Keywords: spatial patterns, urbanisation, spatial transformations, tourism planning, Jordan
Procedia PDF Downloads 5481004 Climate Policy Actions for Sustaining International Agricultural Development Projects: The Role of Non-State, Sub-National Stakeholder Engagements, and Monitoring and Evaluation
Authors: EMMANUEL DWAMENA SASU
Abstract:
International climate policy actions require countries under Paris Agreement to design instruments, provide support (financial and technical), and strengthen institutional capacity with tendency to transcending policy formulation to implementation and sustainability. Changes associated with moisture depletion has been a growing phenomenon; especially in developing countries with projected global GDP drop from 7% to 2% between 2005 and 2050. These developments have potential to adversely affect food production in feeding the growing world population, with corresponding rise in global hunger. Incongruously, there is global absence of a harmonized policy direction; capable of providing the required indicators on climate policies for monitoring sustainability of international agricultural development projects. We conduct extensive review and synthesis on existing limitations on global climate policy governance, agricultural food security and sustainability of international agricultural development projects, and conjecture the role of non-state and sub-national climate stakeholder engagements, and monitoring and evaluation strategies for improved climate policy action for sustaining international agricultural development projects.Keywords: climate policy, agriculture, development projects, sustainability
Procedia PDF Downloads 1251003 Influence of Vesicular Arbuscular Mycorrhiza on Growth of Cucumis myriocarpus Indigenous Leafy Vegetable
Authors: Pontsho E. Tseke, Phatu W. Mashela
Abstract:
Climate-smart agriculture dictates that underusilised indigenous plant, which served as food for local marginalized communities, be assessed for introduction into mainstream agriculture. Most of the underutilised indigenous plants had survived adverse conditions in the wild; with limited information on how the interact with most abiotic and biotic factors. Cucumis myriocarpus leafy vegetable has nutritional, pharmacological and industrial applications, with limited information on how it interacts with effective microorganisms. The objective of this study was to determine the effects vesicular arbuscular mycorrhiza (VAM) on the growth of C. myriocarpus indigenous leafy vegetable under greenhouse conditions. Four-weeks-old seedlings of C. myriocarpus were transplanted into 20-cm-diameter plastic pots. Two weeks after transplanting, VAM was applied at 0, 10, 20, 30, 40, 50, 60 and 70 g Biocult-VAM plant. At 56 days after treatments, plant growth variables of C. myriocarpus with increase Biocult-VAM levels exhibited positive quadratic relations. Plant variables and increasing concentrations of salinity exhibited positive quadric relations, with 95 to 99% associations. Inclusion, Biocult-VAM can be used in sustainable production of C. myriocarpus for functional food security.Keywords: abiotic, biotic, rhizasphere, sustainable agriculture
Procedia PDF Downloads 2791002 Organic Tuber Production Fosters Food Security and Soil Health: A Decade of Evidence from India
Authors: G. Suja, J. Sreekumar, A. N. Jyothi, V. S. Santhosh Mithra
Abstract:
Worldwide concerns regarding food safety, environmental degradation and threats to human health have generated interest in alternative systems like organic farming. Tropical tuber crops, cassava, sweet potato, yams, and aroids are food-cum-nutritional security-cum climate resilient crops. These form stable or subsidiary food for about 500 million global population. Cassava, yams (white yam, greater yam, and lesser yam) and edible aroids (elephant foot yam, taro, and tannia) are high energy tuberous vegetables with good taste and nutritive value. Seven on-station field experiments at ICAR-Central Tuber Crops Research Institute, Thiruvananthapuram, India and seventeen on-farm trials in three districts of Kerala, were conducted over a decade (2004-2015) to compare the varietal response, yield, quality and soil properties under organic vs conventional system in these crops and to develop a learning system based on the data generated. The industrial, as well as domestic varieties of cassava, the elite and local varieties of elephant foot yam and taro and the three species of Dioscorea (yams), were on a par under both systems. Organic management promoted yield by 8%, 20%, 9%, 11% and 7% over conventional practice in cassava, elephant foot yam, white yam, greater yam and lesser yam respectively. Elephant foot yam was the most responsive to organic management followed by yams and cassava. In taro, slight yield reduction (5%) was noticed under organic farming with almost similar tuber quality. The tuber quality was improved with higher dry matter, starch, crude protein, K, Ca and Mg contents. The anti-nutritional factors, oxalate content in elephant foot yam and cyanogenic glucoside content in cassava were lowered by 21 and 12.4% respectively. Organic plots had significantly higher water holding capacity, pH, available K, Fe, Mn and Cu, higher soil organic matter, available N, P, exchangeable Ca and Mg, dehydrogenase enzyme activity and microbial count. Organic farming scored significantly higher soil quality index (1.93) than conventional practice (1.46). The soil quality index was driven by water holding capacity, pH and available Zn followed by soil organic matter. Organic management enhanced net profit by 20-40% over chemical farming. A case in point is the cost-benefit analysis in elephant foot yam which indicated that the net profit was 28% higher and additional income of Rs. 47,716 ha-1 was obtained due to organic farming. Cost-effective technologies were field validated. The on-station technologies developed were validated and popularized through on-farm trials in 10 sites (5 ha) under National Horticulture Mission funded programme in elephant foot yam and seven sites in yams and taro. The technologies are included in the Package of Practices Recommendations for crops of Kerala Agricultural University. A learning system developed using artificial neural networks (ANN) predicted the performance of elephant foot yam organic system. Use of organically produced seed materials, seed treatment in cow-dung, neem cake, bio-inoculant slurry, farmyard manure incubated with bio-inoculants, green manuring, use of neem cake, bio-fertilizers and ash formed the strategies for organic production. Organic farming is an eco-friendly management strategy that enables 10-20% higher yield, quality tubers and maintenance of soil health in tuber crops.Keywords: eco-agriculture, quality, root crops, healthy soil, yield
Procedia PDF Downloads 3351001 A Technique for Image Segmentation Using K-Means Clustering Classification
Authors: Sadia Basar, Naila Habib, Awais Adnan
Abstract:
The paper presents the Technique for Image Segmentation Using K-Means Clustering Classification. The presented algorithms were specific, however, missed the neighboring information and required high-speed computerized machines to run the segmentation algorithms. Clustering is the process of partitioning a group of data points into a small number of clusters. The proposed method is content-aware and feature extraction method which is able to run on low-end computerized machines, simple algorithm, required low-quality streaming, efficient and used for security purpose. It has the capability to highlight the boundary and the object. At first, the user enters the data in the representation of the input. Then in the next step, the digital image is converted into groups clusters. Clusters are divided into many regions. The same categories with same features of clusters are assembled within a group and different clusters are placed in other groups. Finally, the clusters are combined with respect to similar features and then represented in the form of segments. The clustered image depicts the clear representation of the digital image in order to highlight the regions and boundaries of the image. At last, the final image is presented in the form of segments. All colors of the image are separated in clusters.Keywords: clustering, image segmentation, K-means function, local and global minimum, region
Procedia PDF Downloads 3761000 From Shock to Self-Determination: Igbo Responses to the 1966 Pogrom and the Rise of Biafra Nationalism
Authors: Nnaemeka Enemchukwu
Abstract:
In modern-day Nigeria, the spirit of Biafra, the defunct secessionist state of former Eastern Nigeria, endures. While some attempt to downplay the historical factors that led to its creation, this paper aims to demonstrate that the 1966 pogroms in Nigeria, which claimed the lives of over 30,000 Igbo people, shattered their faith in the nation's ability to provide security and acceptance. This loss of faith led to a mass exodus from various regions of the country back to their homeland in Eastern Nigeria. Utilizing primary sources such as interviews and archival reports, and secondary sources like books, journals, and websites, this paper will argue that the trauma and terror of the 1966 massacres were the primary drivers of secessionist sentiment and self-determination among the Igbo people, ultimately leading to the declaration of Biafra. By drawing parallels with other historical incidents across the globe, this paper will establish the theoretical connection between shocking events, identity questioning among traumatized groups, and the subsequent rise of nationalistic sentiments seeking to ensure group preservation. To achieve its objective, this paper will employ descriptive, narrative, and chronological methods of analysis to present and discuss its findings.Keywords: Igbo, pogrom, shock, trauma, nationalism, Biafra
Procedia PDF Downloads 69999 Sarvathobhadram-Organic Initiative: Cooperative Model for Resilient Agriculture by Adopting System of Rice Intensification
Authors: Sreeni K. R.
Abstract:
Sarvathobhadram-Organic–Farmers Cooperative was helpful in supporting small and marginal farmers in customizing, adapting, and tailoring the system to their specific requirements. The Farmers Club, which has 50 members, was founded in May 2020 to create additional cash while also encouraging farmers to shift to organic farming. The club's mission is to ensure food security, livelihood, and entrepreneurship in the Anthikad Block Panchayat. The project addressed climate change and resilience, collaborating with government departments and utilizing convergence to maximize the schemes accessible to farmers in panchayath. The transformation was sluggish initially, but it accelerated over time, indicating that farmers have variable levels of satisfaction based on a variety of circumstances. This paper examines the changing trend in the area after adopting organic farming using the SRI method, the increase in production, and the success of the convergence method. It also attempts to find out various constraints faced by farmers during the paradigm shift from conventional methods to organic, and the results have proven that SRI should be considered as a potential cultivation method for all farmer's groups (Padasekharam).Keywords: Sarvathobhadram-Organic, Thanniyam gram Panchayat, organic Joythi rice, convergence method, Jeevamirtham, natural methods, system of rice intensification
Procedia PDF Downloads 143