Search results for: security safe
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4288

Search results for: security safe

2488 Seismic Performance of Nuclear Power Plant Structures Subjected to Korean Earthquakes

Authors: D. D. Nguyen, H. S. Park, S. W. Yang, B. Thusa, Y. M. Kim, T. H. Lee

Abstract:

Currently, the design response spectrum (i.e., Nuclear Regulatory Commission - NRC 1.60 spectrum) with the peak ground acceleration (PGA) 0.3g (for Safe Shutdown Earthquake level) is specified for designing the new nuclear power plant (NPP) structures in Korea. However, the recent earthquakes in the region such as the 2016 Gyeongju and the 2017 Pohang earthquake showed that the possible PGA of ground motions can be larger than 0.3g. Therefore, there is a need to analyze the seismic performance of the existing NPP structures under these earthquakes. An NPP model, APR-1400, which is designed and built in Korea was selected for a case study. The NPP structure is numerically modeled in terms of lumped-mass stick elements using OpenSees framework. The floor acceleration and displacement of components are measured to quantify the responses of components. The numerical results show that the floor spectral accelerations are significantly amplified in the components subjected to Korean earthquakes. A comparison between floor response spectra of Korean earthquakes and the NRC design motion highlights that the seismic design level of NPP components under an earthquake should be thoroughly reconsidered. Additionally, a seismic safety assessment of the equipment and relays attached to main structures is also required.

Keywords: nuclear power plant, floor response spectra, Korean earthquake, NRC spectrum

Procedia PDF Downloads 144
2487 The Enhancement of Training of Military Pilots Using Psychophysiological Methods

Authors: G. Kloudova, M. Stehlik

Abstract:

Optimal human performance is a key goal in the professional setting of military pilots, which is a highly challenging atmosphere. The aviation environment requires substantial cognitive effort and is rich in potential stressors. Therefore, it is important to analyze variables such as mental workload to ensure safe conditions. Pilot mental workload could be measured using several tools, but most of them are very subjective. This paper details research conducted with military pilots using psychophysiological methods such as electroencephalography (EEG) and heart rate (HR) monitoring. The data were measured in a simulator as well as under real flight conditions. All of the pilots were exposed to highly demanding flight tasks and showed big individual response differences. On that basis, the individual pattern for each pilot was created counting different EEG features and heart rate variations. Later on, it was possible to distinguish the most difficult flight tasks for each pilot that should be more extensively trained. For training purposes, an application was developed for the instructors to decide which of the specific tasks to focus on during follow-up training. This complex system can help instructors detect the mentally demanding parts of the flight and enhance the training of military pilots to achieve optimal performance.

Keywords: cognitive effort, human performance, military pilots, psychophysiological methods

Procedia PDF Downloads 219
2486 Contribution to the Study of the Microbiological Quality of Chawarma Sold in Biskra

Authors: Sara Boulmai̇z

Abstract:

In order to study the microbiological quality of chawarma sold in Biskra, a sampling through some fastfoods of the city was done, the parameters studied are highlighted according to the criteria required by the country's trade management. Microbiological analyzes revealed different levels of contamination by microorganisms. The 10 samples were of an overall view of unsatisfactory quality, and according to the standards, no sample was satisfactory. The range of total aerobic mesophilic flora found is between 105 and 1.2 × 10 7 CFU / g, that of fecal coliforms is 104 to 2.4 × 10 5 CFU / g. The suspected pathogenic staphylococci were between 3.103 and 2.7.106 CFU / g. Salmonellae were absent in all samples, whereas sulphite-reducing anaerobes were present in a single sample. The rate of E. cloacae was between 103 and 6.104 CFU / g. As for fungi and safe mice, their rate was 103 to 107 CFU / g. The study of the sensitivity of antibiotics showed multi-resistance to all the antibiotics tested, although there is a sensitivity towards others. All strains of Staphylococcus aureus tested demonstrated resistance against erythromycin, 30% against streptomycin, and 10% against tetracycline. While the strains of E. cloacae were resistant in all strains to amoxicillin, ceftazidime, cefotaxime, and erythromycin, while they were sensitive to fosfomycin, sulfamethoxazole trimethoperine, ciprofloxacin, and tetracycline. While against chlorophenicol and ofloxacin, the sensitivity was dominant, although there was intermediate resistance. In this study demonstrates that foodborne illnesses remain a problem that arises in addition to the increasingly observed bacterial resistance and that, after all, healthy eating is a right.

Keywords: chawarma, microbiological quality, pathogens., street food

Procedia PDF Downloads 95
2485 Kluyveromyces marxianus ABB S8 as Yeast-Based Technology to Manufacture Low FODMAP Baking Good

Authors: Jordi Cuñé, Carlos de Lecea, Laia Marti

Abstract:

Small molecules known as fermentable oligo-, di-, and monosaccharides and polyols (FODMAPs) are quickly fermented in the large intestine after being poorly absorbed in the small intestine. There is proof that individuals suffering from functional gastrointestinal disorders, like irritable bowel syndrome (IBS), observe an improvement while following a diet low in FODMAPs. Because wheat has a relatively high fructan content, it is a key source of FODMAPs in our diet. A yeast-based method was created in this study to lower the amounts of FODMAP in (whole wheat) bread. In contrast to fermentation by regular baker yeast, the combination of Kluyveromyces marxianus ABB S7 with Saccharomyces cerevisiae allowed a reduction of fructan content by 60% without implying the appearance of other substrates categorized as FODMAP (excess fructose or polyols). The final FODMAP content in the developed whole wheat bread would allow its classification as a safe product for sensitive people, according to international consensus. Cocultures of S. cerevisiae and K. marxianus were established in order to ensure sufficient CO₂ generation; larger quantities of gas were produced due to the strains' synergistic relationship. Thus, this method works well for lowering the levels of FODMAPs in bread.

Keywords: Kluyveromyces marxianus, bakery, bread, FODMAP, IBS, functional gastro intestinal disorders

Procedia PDF Downloads 40
2484 Organized Crime-A Social Challenge for Kosovo towards European Union Integration

Authors: Samedin Mehmeti

Abstract:

Very tens political and economic situation, in particular armed conflicts that followed at the time of the destruction of the former Yugoslavia, influenced migrations and displacement of population. Especially setting international sanctions and embargo influenced the creation of organized criminal groups. A lot of members of the former Yugoslav security apparatus in collaboration with ordinary criminal groups engaged in: smuggling of goods, petroleum and arms, sale and transport of drugs, payable murder, damage to public property, kidnappings, extortion, racketeering, etc. This tradition of criminality, of course in other forms and with other methods, has continued after conflicts and continues with a high intensity even in nowadays. One of the most delicate problems of organized crime activity is the impact on the economic sphere, where organized crime opposes and severely damages national security and economy to criminalize it in certain sectors and directions. Organized crime groups including who find Kosovo as a place to develop their criminal activities are characterized by: loyalty of many people especially through family connections and kinship in carrying out criminal activities and the existence of powerful hierarchy of leadership which in many cases include the corrupt officials of state apparatus. Groups have clear hierarchy and flexible structure of command, each member within the criminal group knows his duties concrete. According to statistics presented in police reports its notable that Kosovo has a large number of cases of organized crime, cultivation, trafficking and possession of narcotics. As already is very well known that one of the primary conditions that must be fulfilled on track toward integration in the European Union is precisely to prevent and combat organized crime. Kosovo has serious problems with prosecutorial and judicial system. But the misuse of public funds, even those coming directly from EU budget or the budget of the European Union member states, have a negative impact on this process. The economic crisis that has gripped some of the EU countries has led to the creation of an environment in which there are far fewer resources and opportunities to invest in preventing and combating organized crime within member states. This automatically reduces the level of financial support for other countries in the fight against organized crime. Kosovo as a poor country, now has less likely benefiting from the support tools that will be eventually offered by Europe set of in this area.

Keywords: police, european integration, organized crime, narcotics

Procedia PDF Downloads 422
2483 Ultrasonographic Evaluation of Tars and Metatars Region of Dromedary Camel

Authors: Aboozar Dehghan, S. Sharifi, A. Ardeshiri, F. Jafari, F. Samani

Abstract:

Ultrasonography is a safe, particular, available and easy to use method to evaluate soft tissues. Tendons play the main role to body locomotors system. Ultrasonography performed in tarsus and metatarsus region of rare limb of eight adult, Dromedary camels (camelus dromedaries) in both sex. Clinical examination and gate analysis was performed before slaughtering. From the tarsus to the 1st phalanx was divided to 4 equal region include 1a, 2a, 1b and 2b. Flexor surface was clipped and covered by enough ultrasonography gel. Ultrasonography was performed by linear phased array 8-12 Mhz transducer in transverse and longitudinal section and Superficial digital flexor tendon (SDFT), deep digital flexor tendon (DDFT) and suspensory ligament (SL) were imaged. Echogenicity and diameter of these structures were recorded. Size of tendons and SL measured after necropsy too. statistical analysis obtained that SDFT diameter larger than others in all described regions and mean of DDFT diameter larger than suspensory ligament. Echogenicity of SL more than SDFT and DDFT. No Significant relationship was seen between left and right rare limb structures size. Between sex and tendons and SL diameter, significant relationship not seen.

Keywords: dromedary camel, tars and metatars, ultrasonography

Procedia PDF Downloads 548
2482 Building Safety Through Real-time Design Fire Protection Systems

Authors: Mohsin Ali Shaikh, Song Weiguo, Muhammad Kashan Surahio, Usman Shahid, Rehmat Karim

Abstract:

When the area of a structure that is threatened by a disaster affects personal safety, the effectiveness of disaster prevention, evacuation, and rescue operations can be summarized by three assessment indicators: personal safety, property preservation, and attribution of responsibility. These indicators are applicable regardless of the disaster that affects the building. People need to get out of the hazardous area and to a safe place as soon as possible because there's no other way to respond. The results of the tragedy are thus closely related to how quickly people are advised to evacuate and how quickly they are rescued. This study considers present fire prevention systems to address catastrophes and improve building safety. It proposes the methods of Prevention Level for Deployment in Advance and Spatial Transformation by Human-Machine Collaboration. We present and prototype a real-time fire protection system architecture for building disaster prevention, evacuation, and rescue operations. The design encourages the use of simulations to check the efficacy of evacuation, rescue, and disaster prevention procedures throughout the planning and design phase of the structure.

Keywords: prevention level, building information modeling, quality management system, simulated reality

Procedia PDF Downloads 49
2481 Prioritization in Modern Portfolio Management - An Action Design Research Approach to Method Development for Scaled Agility

Authors: Jan-Philipp Schiele, Karsten Schlinkmeier

Abstract:

Allocation of scarce resources is a core process of traditional project portfolio management. However, with the popularity of agile methodology, established concepts and methods of portfolio management are reaching their limits and need to be adapted. Consequently, the question arises of how the process of resource allocation can be managed appropriately in scaled agile environments. The prevailing framework SAFe offers Weightest Shortest Job First (WSJF) as a prioritization technique, butestablished companies are still looking for methodical adaptions to apply WSJF for prioritization in portfolios in a more goal-oriented way and aligned for their needs in practice. In this paper, the relevant problem of prioritization in portfolios is conceptualized from the perspective of coordination and related mechanisms to support resource allocation. Further, an Action Design Research (ADR) project with case studies in a finance company is outlined to develop a practically applicable yet scientifically sound prioritization method based on coordination theory. The ADR project will be flanked by consortium research with various practitioners from the financial and insurance industry. Preliminary design requirements indicate that the use of a feedback loop leads to better team and executive level coordination in the prioritization process.

Keywords: scaled agility, portfolio management, prioritization, business-IT alignment

Procedia PDF Downloads 180
2480 Failure Analysis of Laminated Veneer Bamboo Dowel Connections

Authors: Niloufar Khoshbakht, Peggi L. Clouston, Sanjay R. Arwade, Alexander C. Schreyer

Abstract:

Laminated veneer bamboo (LVB) is a structural engineered composite made from glued layers of bamboo. A relatively new building product, LVB is currently employed in similar sizes and applications as dimensional lumber. This study describes the results of a 3D elastic Finite Element model for halfhole specimens when loaded in compression parallel-to-grain per ASTM 5764. The model simulates LVB fracture initiation due to shear stresses in the dowel joint and predicts displacement at failure validated through comparison with experimental results. The material fails at 1mm displacement due to in-plane shear stresses. The paper clarifies the complex interactive state of in-plane shear, tension perpendicular-to-grain, and compression parallel-to-grain stresses that form different distributions in the critical zone beneath the bolt hole for half-hole specimens. These findings are instrumental in understanding key factors and fundamental failure mechanisms that occur in LVB dowel connections to help devise safe standards and further LVB product adoption and design.

Keywords: composite, dowel connection, embedment strength, failure behavior, finite element analysis, Moso bamboo

Procedia PDF Downloads 256
2479 Assessment of Records Management in Registry Department of Kebbi State University of Science and Technology, Aliero Nigeria

Authors: Murtala Aminu, Salisu Adamu Aliero, Adamu Muhammed

Abstract:

Records are a vital asset in ensuring that the institution is governed effectively and efficiently, and is accountable to its staff, students and the community that it serves. The major purpose of this study was to assess record management of the registry department of Kebbi state University of science and technology Aliero. To be able to achieve this objective, research questions were formulated and answers obtained, which centered on records creation, record management policy, challenges facing records management. The review of related literature revealed that there is need for records to be properly managed and in doing so there is need for good records management policy that clearly spells out the various programs required for effective records management. Survey research method was used involving questionnaire, and observation. The findings revealed that the registry department of the University still has a long way to go with respect to day-today records management. The study recommended provision for adequate, modern, safe and functional storage facilities, sufficient and regular funding, recruitment of trained personnel, on the job training for existing staff, computerization of all units records, and uninterrupted power supply to all parts of the unit as a means of ensuring proper records management.

Keywords: records, management, records management policy, registry

Procedia PDF Downloads 304
2478 Analyzing Restrictive Refugee Policies in Japan and the United Kingdom: An Examination of Fundamental Causes and Implications

Authors: Shalini Shawari Matharage

Abstract:

The worldwide refugee challenge has arisen as a critical concern, with millions of individuals fleeing their home countries owing to conflict, persecution, and human rights violations. Since the establishment of an international framework in 1951 for tackling the humanitarian needs of refugees and asylum seekers, many developed and developing countries have adopted a refugee admittance framework into their national immigration policy and steadily changed their domestic legislation to assist the resettlement of refugees. However, many developed nations have put forth strict limitations on refugee admission in the midst of the continuing refugee crisis, claiming factors including national sovereignty, security of their borders, and national economy. Two such developed nations that have been restrictive on refugees is Japan and the United Kingdom. Despite their contrasting histories, migration methods, and viewpoints on diversity in modern society, the two notably developed nations have taken similar restrictive approaches in refugee policy in the recent years. This study attempts to investigate the underlying causes that led these countries to adopt strict refugee policies and how those policies have affected their compliance with international human rights responsibilities. The study employs a head-to-head methodology to examine the structural inequities in Japan and the United Kingdom's refugee policies. Using data from the UNHCR Refugee Data Finder, official government policy proposals, statements, and academic works, the study evaluates the contemporary refugee legislations, fundamental causes, and subsequent implications. The study illustrates a combination of economic, security, and demographic issues, as well as political rigidity and negative public perceptions, as major determinants of the two countries' restrictive refugee policies. The findings shed light on the restrictive actions taken by Japan and the UK, raising concerns about potential breaches in obligations to their commitments to international law and human rights obligations. Understanding the underlying issues influencing these policies allows lawmakers and activists to establish more compassionate refugee policies that adhere to international human rights and protect vulnerable individuals fleeing persecution. Ultimately, this study aims to contribute to the development of sensible refugee policies that uphold human rights and humanitarian values.

Keywords: immigration, Japan, refugee policy, united kingdom

Procedia PDF Downloads 60
2477 The Correlation of Total Phenol Content with Free Radicals Scavenging Activity and Effect of Ethanol Concentration in Extraction Process of Mangosteen Rind (Garcinia mangostana)

Authors: Ririn Lestari Sri Rahayu, Mustofa Ahda

Abstract:

The use of synthetic antioxidants often causes a negative effect on health and increases the incidence of carcinogenesis. Development of the natural antioxidants should be investigated. However, natural antioxidants have a low toxicity and are safe for human consumption. Ethanol extract of mangosteen rind (Garcinia mangostana) contains natural antioxidant compounds that have various pharmacological activities. Antioxidants from the ethanol extract of mangosteen rind have free radicals scavenging activities. The scavenging activity of ethanol extract of mangosteen rind was determined by DPPH method. The phenolic compound from the ethanol extract of mangosteen rind is determined with Folin-Ciocalteu method. The results showed that the absolute ethanol extract of mangosteen rind has IC50 of 40.072 ug/mL. The correlation of total phenols content with free radical scavenging activity has an equation y: 5.207x + 205.51 and determination value (R2) of 0.9329. Total phenols content from the ethanol extract of mangosteen rind has a good correlation with free radicals scavenging activity of DPPH.

Keywords: Antioxidant, Garcinia mangostana, Inhibition concentration 50%, Phenolic.

Procedia PDF Downloads 347
2476 Application of Box-Behnken Response Surface Design for Optimization of Essential Oil Based Disinfectant on Mixed Species Biofilm

Authors: Anita Vidacs, Robert Rajko, Csaba Vagvolgyi, Judit Krisch

Abstract:

With the optimization of a new disinfectant the number of tests could be decreased and the cost of processing too. Good sanitizers are eco-friendly and allow no resistance evolvement of bacteria. The essential oils (EOs) are natural antimicrobials, and most of them have the Generally Recognized As Safe (GRAS) status. In our study, the effect of the EOs cinnamon, marjoram, and thyme was investigated against mixed species bacterial biofilms of Escherichia coli, Listeria monocytogenes, Pseudomonas putida, and Staphylococcus aureus. The optimal concentration of EOs, disinfection time and level of pH were evaluated with the aid of Response Surface Box-Behnken Design (RSD) on 1 day and 7 days old biofilms on metal, plastic, and wood surfaces. The variable factors were in the range of 1-3 times of minimum bactericide concentration (MBC); 10-110 minutes acting time and 4.5- 7.5 pH. The optimized EO disinfectant was compared to industrial used chemicals (HC-DPE, Hypo). The natural based disinfectants were applicable; the acting time was below 30 minutes. EOs were able to eliminate the biofilm from the used surfaces except from wood. The disinfection effect of the EO based natural solutions was in most cases equivalent or better compared to chemical sanitizers used in food industry.

Keywords: biofilm, Box-Behnken design, disinfectant, essential oil

Procedia PDF Downloads 207
2475 Israeli Households Caring for Children and Adults with Intellectual and Developmental Disabilities: An Explorative Study

Authors: Ayelet Gur

Abstract:

Background: In recent years we are witnessing a welcome trend in which more children/persons with disabilities are living at home with their families and within their communities. This trend is related to various policy innovations as the UN Convention on the Rights of People with Disabilities that reflect a shift from the medical-institutional model to a human rights approach. We also witness the emergence of family centered approaches that perceive the family and not just the individual with the disability as a worthy target of policy planning, implementation and evaluation efforts. The current investigation aims to explore economic, psychological and social factors among households of families of children or adults with intellectual disabilities in Israel and to present policy recommendation. Methods: A national sample of 301 households was recruited through the education and employment settings of persons with intellectual disability. The main caregiver of the person with the disability (a parent) was interviewed. Measurements included the income and expense surveys; assets and debts questionnaire; the questionnaire on resources and stress; the social involvement questionnaire and Personal Wellbeing Index. Results: Findings indicate significant gaps in financial circumstances between households of families of children with intellectual disabilities and households of the general Israeli society. Households of families of children with intellectual disabilities report lower income and higher expenditures and loans than the general society. They experience difficulties in saving and coping with unexpected expenses. Caregivers (the parents) experience high stress, low social participation, low financial support from family, friend and non-governmental organizations and decreased well-being. They are highly dependent on social security allowances which constituted 40% of the household's income. Conclusions: Households' dependency on social security allowances may seem contradictory to the encouragement of persons with intellectual disabilities to favor independent living in light of the human rights approach to disability. New policy should aim at reducing caregivers' stress and enhance their social participation and support, with special emphasis on families of lower socio-economic status. Finally, there is a need to continue monitoring the economic and psycho-social needs of households of families of children with intellectual disabilities and other developmental disabilities.

Keywords: disability policy, family policy, intellectual and developmental disabilities, Israel, households study, parents of children with disabilities

Procedia PDF Downloads 143
2474 Wheat Production and Market in Afghanistan

Authors: Fayiz Saifurahman, Noori Fida Mohammad

Abstract:

Afghanistan produces the highest rate of wheat, it is the first source of food, and food security in Afghanistan is dependent on the availability of wheat. Although Afghanistan is the main producer of wheat, on the other hand, Afghanistan is the largest importers of flour. The objective of this study is to assess the structure and dynamics of the wheat market in Afghanistan, can compute with foreign markets, and increase the level of production. To complete this, a broad series of secondary data was complied with, group discussions and interviews with farmers, agricultural and market experts. The research findings propose that; the government should adopt different policies to support the local market. The government should distribute the seed, support financially and technically to increase wheat production.

Keywords: Afghanistan, wheat, production , import

Procedia PDF Downloads 148
2473 Real-Time Detection of Space Manipulator Self-Collision

Authors: Zhang Xiaodong, Tang Zixin, Liu Xin

Abstract:

In order to avoid self-collision of space manipulators during operation process, a real-time detection method is proposed in this paper. The manipulator is fitted into a cylinder enveloping surface, and then the detection algorithm of collision between cylinders is analyzed. The collision model of space manipulator self-links can be detected by using this algorithm in real-time detection during the operation process. To ensure security of the operation, a safety threshold is designed. The simulation and experiment results verify the effectiveness of the proposed algorithm for a 7-DOF space manipulator.

Keywords: space manipulator, collision detection, self-collision, the real-time collision detection

Procedia PDF Downloads 451
2472 Penguins Search Optimization Algorithm for Chaotic Synchronization System

Authors: Sofiane Bououden, Ilyes Boulkaibet

Abstract:

In terms of security of the information signal, the meta-heuristic Penguins Search Optimization Algorithm (PeSOA) is applied to synchronize chaotic encryption communications in the case of sensitive dependence on initial conditions in chaotic generator oscillator. The objective of this paper is the use of the PeSOA algorithm to exploring search space with random and iterative processes for synchronization of symmetric keys in both transmission and reception. Simulation results show the effectiveness of the PeSOA algorithm in generating symmetric keys of the encryption process and synchronizing.

Keywords: meta-heuristic, PeSOA, chaotic systems, encryption, synchronization optimization

Procedia PDF Downloads 181
2471 A Method and System for Secure Authentication Using One Time QR Code

Authors: Divyans Mahansaria

Abstract:

User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common.

Keywords: authentication, QR code, cipher / decipher text, one time password, secret information

Procedia PDF Downloads 258
2470 FPGA Implementation of RSA Encryption Algorithm for E-Passport Application

Authors: Khaled Shehata, Hanady Hussien, Sara Yehia

Abstract:

Securing the data stored on E-passport is a very important issue. RSA encryption algorithm is suitable for such application with low data size. In this paper the design and implementation of 1024 bit-key RSA encryption and decryption module on an FPGA is presented. The module is verified through comparing the result with that obtained from MATLAB tools. The design runs at a frequency of 36.3 MHz on Virtex-5 Xilinx FPGA. The key size is designed to be 1024-bit to achieve high security for the passport information. The whole design is achieved through VHDL design entry which makes it a portable design and can be directed to any hardware platform.

Keywords: RSA, VHDL, FPGA, modular multiplication, modular exponential

Procedia PDF Downloads 376
2469 Removal of Heavy Metals from Aqueous Solutions by Low-Cost Materials: A Review

Authors: I. Nazari, B. Shaabani, P. Abaasifar

Abstract:

In small quantities certain heavy metals are nutritionally essential for a healthy life. The heavy metals linked most often to human poisoning are lead, mercury, arsenic, and cadmium. Other heavy metals including copper, zinc and chromium are actually required by the body in small quantity but can also be toxic in large doses. Nowadays, we have contamination to this heavy metals in some untreated industrial waste waters and even in several populated cities drinking waters around the world. The contamination of ground and underground water sources to heavy metals can be concentrated and travel up to food chain by drinking water and agricultural products. In recent years, the need for safe and economical methods for removal of heavy metals from contaminated water has necessitated research interest towards the finding low-cost alternatives. Bio-adsorbents have emerged as low-cost and efficient materials for the removal of heavy metals from waste and ground waters. The bio-adsorbents have an affinity for heavy metals ions to form metal complexes or chelates due to having functional groups including carboxyl, hydroxyl, imidazole, and etc. The objective of this study is to review researches in less expensive adsorbents and their utilization possibilities for various low-cost bio-adsorbents such as coffee beans, rice husk, and saw dust for the removal of heavy metals from contaminated waters.

Keywords: heavy metals, water pollution, bio-adsorbents, low cost adsorbents

Procedia PDF Downloads 341
2468 A Simple Design Procedure for Calculating the Column Ultimate Load of Steel Frame Structures

Authors: Abdul Hakim Chikho

Abstract:

Calculating the ultimate load of a column in a sway framed structure involves, in the currently used design method, the calculation of the column effective length and utilizing the interaction formulas or tables. Therefore, no allowance is usually made for the effects of the presence of semi rigid connections or the presence of infill panels. In this paper, a new and simple design procedure is recommend to calculate the ultimate load of a framed Column allowing for the presence of rotational end restraints, semi rigid connections, the column end moments resulted from the applied vertical and horizontal loading and infill panels in real steel structure. In order to verify the accuracy of the recommended method to predict good and safe estimations of framed column ultimate loads, several examples have been solved utilizing the recommended procedure, and the results were compared to those obtained using a second order computer program, and good correlation had been obtained. Therefore, the accuracy of the proposed method to predict the Behaviour of practical steel columns in framed structures has been verified.

Keywords: column ultimate load, semi rigid connections, steel column, infill panel, steel structure

Procedia PDF Downloads 165
2467 A Portable Miniature Syringe Needle Remover And Receptacle For Drug Injection Users

Authors: Fanjun Zhou

Abstract:

In today's drug-ridden society, drug injection is gradually becoming more popular and has hidden danger to IDUs (injection drug users) such as infectious diseases. According to reports, 67% of IDUs reported improper disposal at some point over the prior 30 days, leading to a proliferation of injection needles on the streets. In recent years, the number of cases of children or ordinary people unintentionally picking up needles have increased. Various needle remover inventions have begun to surface, but the existing ones are either expensive, unportable, or risky for IDUs. In order to effectively alleviate the proliferation of drug injection needles and improve the invention of needle removers, a miniature portable needle remover and receptacle is invented. The device for capturing and storing syringe needles contains an upper lid portion mounted tightly onto the lower box portion through an interlock system on the opposing sides of the device with a breaking-twisting mechanism to remove the needle. The invention is intended to be affordable to the general public, safe enough for IDUs to use, reliable enough not to harm others, and effective in breaking needles from the syringe. This report is conducted in the hope of spreading awareness of the dangers of drug injection and to provide a way to mitigate this drug rampant situation.

Keywords: needle remover, drug injection, injection drug users, portable, receptacle

Procedia PDF Downloads 74
2466 Design of Single Point Mooring Buoy System by Parametric Analysis

Authors: Chul-Hee Jo, Do-Youb Kim, Seok-Jin Cho, Yu-Ho Rho

Abstract:

The Catenary Anchor Leg Mooring (CALM) Single Point Mooring (SPM) buoy system is the most popular and widely used type of offshore loading terminals. SPM buoy mooring systems have been deployed worldwide for a variety of applications, water depths and vessel sizes ranging from small production carriers to Very Large Crude Carriers (VLCCs). Because of safe and easy berthing and un-berthing operations, the SPM buoy mooring system is also preferred for offshore terminals. The SPM buoy consists of a buoy that is permanently moored to the seabed by means of multiple mooring lines. The buoy contains a bearing system that allows a part of it to rotate around the moored geostatic part. When moored to the rotating part of the buoy, a vessel is able to freely weathervane around the buoy. This study was verified the effects of design variables in order to design an SPM buoy mooring system through parametric analysis. The design variables have independent and nonlinear characteristics. Using parametric analysis, this research was found that the fairlead departure angle, wave height and period, chain diameter and line length effect to the mooring top tension, buoy excursion and line layback.

Keywords: Single Point Mooring (SPM), Catenary Anchor Leg Mooring(CALM), design variables, parametric analysis, mooring system optimization

Procedia PDF Downloads 372
2465 Application of Medium High Hydrostatic Pressure in Preserving Textural Quality and Safety of Pineapple Compote

Authors: Nazim Uddin, Yohiko Nakaura, Kazutaka Yamamoto

Abstract:

Compote (fruit in syrup) of pineapple (Ananas comosus L. Merrill) is expected to have a high market potential as one of convenient ready-to-eat (RTE) foods worldwide. High hydrostatic pressure (HHP) in combination with low temperature (LT) was applied to the processing of pineapple compote as well as medium HHP (MHHP) in combination with medium-high temperature (MHT) since both processes can enhance liquid impregnation and inactivate microbes. MHHP+MHT (55 or 65 °C) process, as well as the HHP+LT process, has successfully inactivated the microbes in the compote to a non-detectable level. Although the compotes processed by MHHP+MHT or HHP+LT have lost the fresh texture as in a similar manner as those processed solely by heat, it was indicated that the texture degradations by heat were suppressed under MHHP. Degassing process reduced the hardness, while calcium (Ca) contributed to be retained hardness in MHT and MHHP+MHT processes. Electrical impedance measurement supported the damage due to degassing and heat. The color, Brix, and appearance were not affected by the processing methods significantly. MHHP+MHT and HHP+LT processes may be applicable to produce high-quality, safe RTE pineapple compotes. Further studies on the optimization of packaging and storage condition will be indispensable for commercialization.

Keywords: compote of pineapple, RTE, medium high hydrostatic pressure, postharvest loss, texture

Procedia PDF Downloads 124
2464 In vitro Investigation of Genotoxic and Antigenotoxic Properties of Gunnera perpensa Roots Extracts

Authors: P. H. Mfengwana, S. S. Mashele, L. Verschaeve, R. Anthonissen, I. T. Manduna

Abstract:

Gunnera perpensa is traditionally used mostly by women for the treatment of different gynaecological related conditions due to its proven uterine contractility effects. The uses of this plant include menstrual pain relief, treatment of infertility and promotion of easy labour. However, even though this plant species has been reported to possess numerous medicinal properties, to author’s best knowledge, its safety has not been investigated. Thus, this study was aimed at investigating the genotoxicity and antigenotoxicity of Gunnera perpensa aqueous, methanol and dichloromethane extracts. The in vitro toxicity of the plant extracts was assessed with the neutral red uptake (NRU) test. Genotoxic and antigenotoxic properties of Gunnera perpensa were investigated using high-throughput assays: bacterial Vitotox test and the alkaline comet assay with and without S9 activation on human C3A cells. Ethyl Methanesulfonate (EMS) and 4-nitroquinoline-oxide (4-NQO) were used as positive controls, respectively. All extracts showed toxicity in a dose-dependent manner; however, that does not mean they were all genotoxic. Methanol extract did show genotoxicity with S9 (metabolism) only at the highest concentration of 500 µg/ml due to increased DNA damage observed, however, no genotoxicity was observed from other concentrations. Therefore, the results show that Gunnera perpensa extracts are genotoxic and not safe for human use.

Keywords: antigenotoxicity, comet test, genotoxicity, Gunnera perpensa, vitotox assay

Procedia PDF Downloads 123
2463 Liability of AI in Workplace: A Comparative Approach Between Shari’ah and Common Law

Authors: Barakat Adebisi Raji

Abstract:

In the workplace, Artificial Intelligence has, in recent years, emerged as a transformative technology that revolutionizes how organizations operate and perform tasks. It is a technology that has a significant impact on transportation, manufacturing, education, cyber security, robotics, agriculture, healthcare, and so many other organizations. By harnessing AI technology, workplaces can enhance productivity, streamline processes, and make more informed decisions. Given the potential of AI to change the way we work and its impact on the labor market in years to come, employers understand that it entails legal challenges and risks despite the advantages inherent in it. Therefore, as AI continues to integrate into various aspects of the workplace, understanding the legal and ethical implications becomes paramount. Also central to this study is the question of who is held liable where AI makes any defaults; the person (company) who created the AI, the person who programmed the AI algorithm or the person who uses the AI? Thus, the aim of this paper is to provide a detailed overview of how AI-related liabilities are addressed under each legal tradition and shed light on potential areas of accord and divergence between the two legal cultures. The objectives of this paper are to (i) examine the ability of Common law and Islamic law to accommodate the issues and damage caused by AI in the workplace and the legality of compensation for such injury sustained; (ii) to discuss the extent to which AI can be described as a legal personality to bear responsibility: (iii) examine the similarities and disparities between Common Law and Islamic Jurisprudence on the liability of AI in the workplace. The methodology adopted in this work was qualitative, and the method was purely a doctrinal research method where information is gathered from the primary and secondary sources of law, such as comprehensive materials found in journal articles, expert-authored books and online news sources. Comparative legal method was also used to juxtapose the approach of Islam and Common Law. The paper concludes that since AI, in its current legal state, is not recognized as a legal entity, operators or manufacturers of AI should be held liable for any damage that arises, and the determination of who bears the responsibility should be dependent on the circumstances surrounding each scenario. The study recommends the granting of legal personality to AI systems, the establishment of legal rights and liabilities for AI, the establishment of a holistic Islamic virtue-based AI ethics framework, and the consideration of Islamic ethics.

Keywords: AI, health- care, agriculture, cyber security, common law, Shari'ah

Procedia PDF Downloads 19
2462 The Procedural Sedation Checklist Manifesto, Emergency Department, Jersey General Hospital

Authors: Jerome Dalphinis, Vishal Patel

Abstract:

The Bailiwick of Jersey is an island British crown dependency situated off the coast of France. Jersey General Hospital’s emergency department sees approximately 40,000 patients a year. It’s outside the NHS, with secondary care being free at the point of care. Sedation is a continuum which extends from a normal conscious level to being fully unresponsive. Procedural sedation produces a minimally depressed level of consciousness in which the patient retains the ability to maintain an airway, and they respond appropriately to physical stimulation. The goals of it are to improve patient comfort and tolerance of the procedure and alleviate associated anxiety. Indications can be stratified by acuity, emergency (cardioversion for life-threatening dysrhythmia), and urgency (joint reduction). In the emergency department, this is most often achieved using a combination of opioids and benzodiazepines. Some departments also use ketamine to produce dissociative sedation, a cataleptic state of profound analgesia and amnesia. The response to pharmacological agents is highly individual, and the drugs used occasionally have unpredictable pharmacokinetics and pharmacodynamics, which can always result in progression between levels of sedation irrespective of the intention. Therefore, practitioners must be able to ‘rescue’ patients from deeper sedation. These practitioners need to be senior clinicians with advanced airway skills (AAS) training. It can lead to adverse effects such as dangerous hypoxia and unintended loss of consciousness if incorrectly undertaken; studies by the National Confidential Enquiry into Patient Outcome and Death (NCEPOD) have reported avoidable deaths. The Royal College of Emergency Medicine, UK (RCEM) released an updated ‘Safe Sedation of Adults in the Emergency Department’ guidance in 2017 detailing a series of standards for staff competencies, and the required environment and equipment, which are required for each target sedation depth. The emergency department in Jersey undertook audit research in 2018 to assess their current practice. It showed gaps in clinical competency, the need for uniform care, and improved documentation. This spurred the development of a checklist incorporating the above RCEM standards, including contraindication for procedural sedation and difficult airway assessment. This was approved following discussion with the relevant heads of departments and the patient safety directorates. Following this, a second audit research was carried out in 2019 with 17 completed checklists (11 relocation of joints, 6 cardioversions). Data was obtained from looking at the controlled resuscitation drugs book containing documented use of ketamine, alfentanil, and fentanyl. TrakCare, which is the patient electronic record system, was then referenced to obtain further information. The results showed dramatic improvement compared to 2018, and they have been subdivided into six categories; pre-procedure assessment recording of significant medical history and ASA grade (2 fold increase), informed consent (100% documentation), pre-oxygenation (88%), staff (90% were AAS practitioners) and monitoring (92% use of non-invasive blood pressure, pulse oximetry, capnography, and cardiac rhythm monitoring) during procedure, and discharge instructions including the documented return of normal vitals and consciousness (82%). This procedural sedation checklist is a safe intervention that identifies pertinent information about the patient and provides a standardised checklist for the delivery of gold standard of care.

Keywords: advanced airway skills, checklist, procedural sedation, resuscitation

Procedia PDF Downloads 102
2461 The Impact of Artificial Intelligence on Human Rights Development

Authors: Kerols Seif Said Botros

Abstract:

The relationship between development and human rights has been debated for a long time. Various principles, from the right to development to development-based human rights, are applied to understand the dynamics between these two concepts. Despite the measures calculated, the connection between enhancement and human rights remains vague. Despite, the connection between these two opinions and the need to strengthen human rights have increased in recent years. It will then be examined whether the right to sustainable development is acceptable or not. In various human rights instruments and this is a good vibe to the request cited above. The book then cites domestic and international human rights treaties, as well as jurisprudence and regulations defining human rights institutions, to support this view.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.

Procedia PDF Downloads 34
2460 It Is Time to Perform Total Laparoscopic Hysterectomy (TLH) without the Use of Uterine Manipulator: Kamran's TLH

Authors: Ahmed Gendia, Waseem Kamran

Abstract:

Objective: Total Laparoscopic hysterectomy (TLH) remains a common approach among laparoscopic surgeons. However, this approach depends on the use of uterine manipulator to facilitate the surgery. Although many studies reported the effectiveness of TLH with uterine manipulator, only few reported TLH without the use of any uterine or vaginal manipulation. the aim of this report is to demonstrate our Technique (kamran's TLH) in performing TLH without the use of any uterine or vaginal manipulation in benign conditions and report our intra- and post-operative outcomes. Methodology : surgical technique will be demonstrated through a short video highlighting the easy and safe to learn surgical steps. Additionally, the data of 86 patients who underwent KTLH for benign condition were retrospectively analyzed. the data included intra- and postoperative finding and complications. Results : A total of 86 hysterectomies were performed utilizing the Kamran's TLH ( KTHL). Mean age was 52.2 (±11) years old and BMI was 28.2(±7). Mean operative time was 64.7(±27.9) minutes and estimated bloods loss was 46.2(±54.6) ml. No intraoperative complications were recorded and there was no conversion to open surgery. Only one patient required readmission and surgery for vaginal vault dehiscence. Conclusion & Significance: Uterine manipulator is a key component in performing laparoscopic hysterectomy. However, our approach demonstrated that TLH can be safely performed without the use of any uterine or vaginal manipulation.

Keywords: laparoscopic hystrectomy, TLH, uterine manipulator, surgery

Procedia PDF Downloads 142
2459 Impacts of Environmental Science in Biodiversity Conservation

Authors: S. O. Ekpo

Abstract:

Environmental science deals with everyday challenges such as a cell for call for good and safe quality air, water, food and healthy leaving condition which include destruction of biodiversity and how to conserve these natural resources for sustainable development. Biodiversity or species richness is the sum of all the different species of animals, plants, fungi and microorganisms leaving on earth and variety of habitats in which they leave. Human beings leave on plants and animals on daily basis for food, clothing, medicine, housing, research and trade or commerce; besides this, biodiversity serves to purify the air, water and land of contaminant, and recycle useful materials for continual use of man. However, man continual incessant exploitation and exploration has affected biodiversity negatively in many ways such habitant fragmentation and destruction, introduction of invasive species, pollution, overharvesting, prediction and pest control amongst others. Measures such as recycling material, establishing natural parks, sperm bank, limiting the exploitation of renewable resources to sustainable yield and urban and industrial development as well as prohibiting hunting endangered species and release of non native live forms into an area will go a long way towards conserving biodiversity for continues profitable yield.

Keywords: biodiversity, conservation, exploitation and exploration sustainable yield, recycling of materials

Procedia PDF Downloads 210