Search results for: secure land rights
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4217

Search results for: secure land rights

2387 Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme

Authors: Nidal F. Shilbayeh, Reem A. Al-Saidi, Ahmed H. Alsswey

Abstract:

In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.

Keywords: e-voting preparation stage, blind signature protocol, Nonce based authentication scheme, Kerberos Authentication Protocol, pseudo voter identity scheme PVID

Procedia PDF Downloads 288
2386 Copyright Clearance for Artificial Intelligence Training Data: Challenges and Solutions

Authors: Erva Akin

Abstract:

– The use of copyrighted material for machine learning purposes is a challenging issue in the field of artificial intelligence (AI). While machine learning algorithms require large amounts of data to train and improve their accuracy and creativity, the use of copyrighted material without permission from the authors may infringe on their intellectual property rights. In order to overcome copyright legal hurdle against the data sharing, access and re-use of data, the use of copyrighted material for machine learning purposes may be considered permissible under certain circumstances. For example, if the copyright holder has given permission to use the data through a licensing agreement, then the use for machine learning purposes may be lawful. It is also argued that copying for non-expressive purposes that do not involve conveying expressive elements to the public, such as automated data extraction, should not be seen as infringing. The focus of such ‘copy-reliant technologies’ is on understanding language rules, styles, and syntax and no creative ideas are being used. However, the non-expressive use defense is within the framework of the fair use doctrine, which allows the use of copyrighted material for research or educational purposes. The questions arise because the fair use doctrine is not available in EU law, instead, the InfoSoc Directive provides for a rigid system of exclusive rights with a list of exceptions and limitations. One could only argue that non-expressive uses of copyrighted material for machine learning purposes do not constitute a ‘reproduction’ in the first place. Nevertheless, the use of machine learning with copyrighted material is difficult because EU copyright law applies to the mere use of the works. Two solutions can be proposed to address the problem of copyright clearance for AI training data. The first is to introduce a broad exception for text and data mining, either mandatorily or for commercial and scientific purposes, or to permit the reproduction of works for non-expressive purposes. The second is that copyright laws should permit the reproduction of works for non-expressive purposes, which opens the door to discussions regarding the transposition of the fair use principle from the US into EU law. Both solutions aim to provide more space for AI developers to operate and encourage greater freedom, which could lead to more rapid innovation in the field. The Data Governance Act presents a significant opportunity to advance these debates. Finally, issues concerning the balance of general public interests and legitimate private interests in machine learning training data must be addressed. In my opinion, it is crucial that robot-creation output should fall into the public domain. Machines depend on human creativity, innovation, and expression. To encourage technological advancement and innovation, freedom of expression and business operation must be prioritised.

Keywords: artificial intelligence, copyright, data governance, machine learning

Procedia PDF Downloads 79
2385 Environmental Pollution and Health Risks of Residents Living near Ewekoro Cement Factory, Ewekoro, Nigeria

Authors: Michael Ajide Oyinloye

Abstract:

The natural environment is made up of air, water and soil. The release of emission of industrial waste into anyone of the components of the environment causes pollution. Industrial pollution significantly threatens the inherent right of people, to the enjoyment of a safe and secure environment. The aim of this paper is to assess the effect of environmental pollution and health risks of residents living near Ewekoro Cement factory. The research made use of IKONOS imagery for Geographical Information System (GIS) to buffer and extract buildings that are less than 1 km to the plant, within 1 km to 5 km and above 5 km to the factory. Also, a questionnaire was used to elicit information on the socio-economic factors, the effect of environmental pollution on residents and measures adopted to control industrial pollution on the residents. Findings show that most buildings that between less than 1 km and 1 km to 5 km to the factory have high health risk in the study area. The study recommended total relocation for the residents of the study area to reduce risk health problems.

Keywords: environmental pollution, health risk, GIS, satellite imagery, ewekoro

Procedia PDF Downloads 533
2384 Screening of Indigenous Rhizobacteria for Growth Promoting and Antagonistic Activity against Fusarium Oxysporoum in Tomato

Authors: Mohammed H. Abu-Dieyeh, Mohammad M. Zalloum

Abstract:

Plant growth-promoting rhizobacteria (PGPR) are known to enhance plant growth and/or reduce plant damage due to soil-borne pathogens. Tomato is the highest consumable vegetable world-wide including Jordan. Fusarium oxysporum is a pathogen that causes well-known damages and losses to many vegetable crops including tomato. In this study, purification of 112 isolates of PGPR strains from rhizosphere environment of different regions in Jordan was accomplished. All bacterial isolates were In-vitro screened for antagonistic effects against F. oxysporum. The eleven most effective isolates that caused 30%-50% in-vitro growth reduction of F. oxysporum were selected. 8 out of 11 of these isolates were collected from Al-Halabat (arid-land). 7 isolates of Al-Halabat exerted 40-54% In-vitro growth reduction of F. oxysporum. Four-week-old seedlings of tomato cultivar (Anjara, the most susceptible indigenous cultivar to F. oxysporum) treated with PGPR5 (Bacillus amyloliquefaciens), and exposed to F. oxysporum, showed no disease symptoms and no significant changes in biomasses or chlorophyll contents indicating a non-direct mechanism of action of PGPR on tomato plants. However PGPR3 (Bacillus sp.), PGPR4 (Bacillus cereus), and PGPR38 (Paenibacillus sp.) treated plants or PGPR treated and exposed to F. oxysporum showed a significant increasing growth of shoot and root biomasses as well as chlorophyll contents of leaves compared to control untreated plants or plants exposed to the fungus without PGPR treatment. A significant increase in number of flowers per plant was also recorded in all PGPR treated plants. The characterization of rhizobacterial strains were accomplished using 16S rRNA gene sequence analysis in addition to microscopic characterization. Further research is necessary to explore the potentiality of other collected PGPR isolates on tomato plants in addition to investigate the efficacy of the identified isolates on other plant pathogens and then finding a proper and effective methods of formulation and application of the successful isolates on selected crops.

Keywords: antagonism, arid land, growth promoting, rhizobacteria, tomato

Procedia PDF Downloads 368
2383 Assessing the Channel Design of the Eco-Friendly ‘Falaj’ Water System in Meeting the Optimal Water Demand: A Case Study of Falaj Al-Khatmain, Sultanate of Oman

Authors: Omer Al-Kaabi, Ahmed Nasr, Abdullah Al-Ghafri, Mohammed Abdelfattah

Abstract:

The Falaj system, derived from natural water sources, is a man-made canal system designed to supply communities of farmers with water for domestic and agricultural purposes. For thousands of years, Falaj has served communities by harnessing the force of gravity; it persists as a vital water management system in numerous regions across the Sultanate of Oman. Remarkably, predates the establishment of many fundamental hydraulic principles used today. Al-Khatmain Falaj, with its accessibility and historical significance spanning over 2000 years, was chosen as the focal point of this study. The research aimed to investigate the efficiency of Al-Khatmain Falaj in meeting specific water demands. The HEC-RAS model was utilized to visualize water flow dynamics within the Falaj channels, accompanied by graphical representations of pertinent variables. The application of HEC-RAS helped to measure different water flow scenarios within the channel, enabling a clear comparison with the demand area catchment. The cultivated land of Al-Khatmain is 723,124 m² and consists of 16,873 palm trees representing 91% of the total area and the remaining 9% is mixed types of trees counted 3,920 trees. The study revealed a total demand of 8,244 m³ is required to irrigate the cultivated land. Through rigorous analysis, the study has proven that the Falaj system in Al-Khatmain operates with high efficiency, as the average annual water supply is 9676.8 m3/day. Additionally, the channel designed at 0.6m width x 0.3m height efficiently holds the optimal water supply, with an average flow depth of 0.21m. Also, the system includes an overflow drainage channel to mitigate floods and prevent crop damage based on seasonal requirements. This research holds promise for examining diverse hydrological conditions and devising effective strategies to manage scenarios of both high and low flow rates.

Keywords: Al-Khatmain, sustainability, Falaj, HEC-RAS, water management system

Procedia PDF Downloads 38
2382 Financial Problems Met in the Tourism Sector in Turkey: A Survey on the Tourism Businesses

Authors: Raif Parlakkaya, Huseyin Cetin, Halil Akmese, Mesut Murat Adabali

Abstract:

As the economies of other countries in the Mediterranean Basin, the tourism sector in our country has a high denominator in economics. Tourism businesses, which are building blocks of tourism, sector faces with a variety of problems during their activities. These problems faced make business efficiency and competition conditions of the businesses difficult. Most of the problems faced by the tourism businesses and the information of consumers about consumers’ rights were used in this study, which is conducted to determine the problems of tourism businesses in the Central Anatolia Region. It is aimed to contribute the awareness of staff and executives working at tourism sector and to attract attention of businesses active concurrently with tourism sector and legislators.

Keywords: financial problems, the problems of tourism businesses, tourism businesses, tourism sector in Turkey

Procedia PDF Downloads 481
2381 Email Phishing Detection Using Natural Language Processing and Convolutional Neural Network

Authors: M. Hilani, B. Nassih

Abstract:

Phishing is one of the oldest and best known scams on the Internet. It can be defined as any type of telecommunications fraud that uses social engineering tricks to obtain confidential data from its victims. It’s a cybercrime aimed at stealing your sensitive information. Phishing is generally done via private email, so scammers impersonate large companies or other trusted entities to encourage victims to voluntarily provide information such as login credentials or, worse yet, credit card numbers. The COVID-19 theme is used by cybercriminals in multiple malicious campaigns like phishing. In this environment, messaging filtering solutions have become essential to protect devices that will now be used outside of the secure perimeter. Despite constantly updating methods to avoid these cyberattacks, the end result is currently insufficient. Many researchers are looking for optimal solutions to filter phishing emails, but we still need good results. In this work, we concentrated on solving the problem of detecting phishing emails using the different steps of NLP preprocessing, and we proposed and trained a model using one-dimensional CNN. Our study results show that our model obtained an accuracy of 99.99%, which demonstrates how well our model is working.

Keywords: phishing, e-mail, NLP preprocessing, CNN, e-mail filtering

Procedia PDF Downloads 114
2380 An Analysis of How Students Perceive Their Self-Efficacy in Online Speaking Classes

Authors: Heny Hartono, Cecilia Titiek Murniati

Abstract:

The pandemic has given teachers and students no other choice but having full online learning. In such an emergency situation as the time of the covid-19 pandemic, the application of LMS (Learner Management System) in higher education is the most reasonable solution for students and teachers. In fact, the online learning requires all elements of a higher education systems, including the human resources, infrastructure, and supporting systems such as the application, server, and stable internet connection. The readiness of the higher education institution in preparing the online system may secure those who are involved in the online learning process. It may also result in students’ self-efficacy in online learning. This research aimed to investigate how students perceive their self-efficacy in online English learning, especially in speaking classes which is considered as a productive language skill. This research collects qualitative data with narrative inquiry involving 25 students of speaking classes as the respondents. The results of this study show that students perceive their self-efficacy in speaking online classes as not very high.

Keywords: self-efficacy, online learning, speaking class, college students, e-learning

Procedia PDF Downloads 93
2379 Effect of Forests and Forest Cover Change on Rainfall in the Central Rift Valley of Ethiopia

Authors: Alemayehu Muluneh, Saskia Keesstra, Leo Stroosnijder, Woldeamlak Bewket, Ashenafi Burka

Abstract:

There are some scientific evidences and a belief by many that forests attract rain and deforestation contributes to a decline of rainfall. However, there is still a lack of concrete scientific evidence on the role of forests in rainfall amount. In this paper, we investigate the forest-rainfall relationships in the environmentally hot spot area of the Central Rift Valley (CRV) of Ethiopia. Specifically, we evaluate long term (1970-2009) rainfall variability and its relationship with historical forest cover and the relationship between existing forest cover and topographical variables and rainfall distribution. The study used 16 long term and 15 short term rainfall stations. The Mann-Kendall test, bi variate and multiple regression models were used. The results show forest and wood land cover continuously declined over the 40 years period (1970-2009), but annual rainfall in the rift valley floor increased by 6.42 mm/year. But, on the escarpment and highlands, annual rainfall decreased by 2.48 mm/year. The increase in annual rainfall in the rift valley floor is partly attributable to the increase in evaporation as a result of increasing temperatures from the 4 existing lakes in the rift valley floor. Though, annual rainfall is decreasing on the escarpment and highlands, there was no significant correlation between this rainfall decrease and forest and wood land decline and also rainfall variability in the region was not explained by forest cover. Hence, the decrease in annual rainfall on the escarpment and highlands is likely related to the global warming of the atmosphere and the surface waters of the Indian Ocean. Spatial variability of number of rainy days from systematically observed two-year’s rainfall data (2012-2013) was significantly (R2=-0.63) explained by forest cover (distance from forest). But, forest cover was not a significant variable (R2=-0.40) in explaining annual rainfall amount. Generally, past deforestation and existing forest cover showed very little effect on long term and short term rainfall distribution, but a significant effect on number of rainy days in the CRV of Ethiopia.

Keywords: elevation, forest cover, rainfall, slope

Procedia PDF Downloads 539
2378 Assessment and Adaptation Strategy of Climate Change to Water Quality in the Erren River and Its Impact to Health

Authors: Pei-Chih Wu, Hsin-Chih Lai, Yung-Lung Lee, Yun-Yao Chi, Ching-Yi Horng, Hsien-Chang Wang

Abstract:

The impact of climate change to health has always been well documented. Amongst them, water-borne infectious diseases, chronic adverse effects or cancer risks due to chemical contamination in flooding or drought events are especially important in river basin. This study therefore utilizes GIS and different models to integrate demographic, land use, disaster prevention, social-economic factors, and human health assessment in the Erren River basin. Therefore, through the collecting of climatic, demographic, health surveillance, water quality and other water monitoring data, potential risks associated with the Erren River Basin are established and to understand human exposure and vulnerability in response to climate extremes. This study assesses the temporal and spatial patterns of melioidosis (2000-2015) and various cancer incidents in Tainan and Kaohsiung cities. The next step is to analyze the spatial association between diseases incidences, climatic factors, land uses, and other demographic factors by using ArcMap and GeoDa. The study results show that amongst all melioidosis cases in Taiwan, 24% cases (115) residence occurred in the Erren River basin. The relationship between the cases and in Tainan and Kaohsiung cities are associated with population density, aging indicator, and residence in Erren River basin. Risks from flooding due to heavy rainfall and fish farms in spatial lag regression are also related. Through liver cancer, the preliminary analysis in temporal and spatial pattern shows an increases pattern in annual incidence without clusters in Erren River basin. Further analysis of potential cancers connected to heavy metal contamination from water pollution in Erren River is established. The final step is to develop an assessment tool for human exposure from water contamination and vulnerability in response to climate extremes for the second year.

Keywords: climate change, health impact, health adaptation, Erren River Basin

Procedia PDF Downloads 299
2377 Modelling Forest Fire Risk in the Goaso Forest Area of Ghana: Remote Sensing and Geographic Information Systems Approach

Authors: Bernard Kumi-Boateng, Issaka Yakubu

Abstract:

Forest fire, which is, an uncontrolled fire occurring in nature has become a major concern for the Forestry Commission of Ghana (FCG). The forest fires in Ghana usually result in massive destruction and take a long time for the firefighting crews to gain control over the situation. In order to assess the effect of forest fire at local scale, it is important to consider the role fire plays in vegetation composition, biodiversity, soil erosion, and the hydrological cycle. The occurrence, frequency and behaviour of forest fires vary over time and space, primarily as a result of the complicated influences of changes in land use, vegetation composition, fire suppression efforts, and other indigenous factors. One of the forest zones in Ghana with a high level of vegetation stress is the Goaso forest area. The area has experienced changes in its traditional land use such as hunting, charcoal production, inefficient logging practices and rural abandonment patterns. These factors which were identified as major causes of forest fire, have recently modified the incidence of fire in the Goaso area. In spite of the incidence of forest fires in the Goaso forest area, most of the forest services do not provide a cartographic representation of the burned areas. This has resulted in significant amount of information being required by the firefighting unit of the FCG to understand fire risk factors and its spatial effects. This study uses Remote Sensing and Geographic Information System techniques to develop a fire risk hazard model using the Goaso Forest Area (GFA) as a case study. From the results of the study, natural forest, agricultural lands and plantation cover types were identified as the major fuel contributing loads. However, water bodies, roads and settlements were identified as minor fuel contributing loads. Based on the major and minor fuel contributing loads, a forest fire risk hazard model with a reasonable accuracy has been developed for the GFA to assist decision making.

Keywords: forest, GIS, remote sensing, Goaso

Procedia PDF Downloads 450
2376 Multifunctionality of Cover Crops in South Texas: Looking at Multiple Benefits of Cover Cropping on Small Farms in a Subtropical Climate

Authors: Savannah Rugg, Carlo Moreno, Pushpa Soti, Alexis Racelis

Abstract:

Situated in deep South Texas, the Lower Rio Grande Valley (LRGV) is considered one the most productive agricultural regions in the southern US. With the highest concentration of organic farms in the state (Hidalgo county), the LRGV has a strong potential to be leaders in sustainable agriculture. Finding management practices that comply with organic certification and increase the health of the agroecosytem and the farmers working the land is increasingly pertinent. Cover cropping, or the intentional planting of non-cash crop vegetation, can serve multiple functions in an agroecosystem by decreasing environmental pollutants that originate from the agroecosystem, reducing inputs needed for crop production, and potentially decreasing on-farm costs for farmers—overall increasing the sustainability of the farm. Use of cover crops on otherwise fallow lands have shown to enhance ecosystem services such as: attracting native beneficial insects (pollinators), increase nutrient availability in topsoil, prevent nutrient leaching, increase soil organic matter, and reduces soil erosion. In this study, four cover crops (Lablab, Sudan Grass, Sunn Hemp, and Pearl Millet) were analyzed in the subtropical region of south Texas to see how their multiple functions enhance ecosystem services. The four cover crops were assessed to see their potential to harbor native insects, their potential to increase soil nitrogen, to increase soil organic matter, and to suppress weeds. The preliminary results suggest that these subtropical varieties of cover crops have potential to enhance ecosystem services on agricultural land in the RGV by increasing soil organic matter (in all varieties), increasing nitrogen in topsoil (Lablab, Sunn Hemp), and reducing weeds (Sudan Grass).

Keywords: cover crops, ecosystem services, subtropical agriculture, sustainable agriculture

Procedia PDF Downloads 294
2375 Secure E-Voting Using Blockchain Technology

Authors: Barkha Ramteke, Sonali Ridhorkar

Abstract:

An election is an important event in all countries. Traditional voting has several drawbacks, including the expense of time and effort required for tallying and counting results, the cost of papers, arrangements, and everything else required to complete a voting process. Many countries are now considering online e-voting systems, but the traditional e-voting systems suffer a lack of trust. It is not known if a vote is counted correctly, tampered or not. A lack of transparency means that the voter has no assurance that his or her vote will be counted as they voted in elections. Electronic voting systems are increasingly using blockchain technology as an underlying storage mechanism to make the voting process more transparent and assure data immutability as blockchain technology grows in popularity. The transparent feature, on the other hand, may reveal critical information about applicants because all system users have the same entitlement to their data. Furthermore, because of blockchain's pseudo-anonymity, voters' privacy will be revealed, and third parties involved in the voting process, such as registration institutions, will be able to tamper with data. To overcome these difficulties, we apply Ethereum smart contracts into blockchain-based voting systems.

Keywords: blockchain, AMV chain, electronic voting, decentralized

Procedia PDF Downloads 128
2374 System Security Impact on the Dynamic Characteristics of Measurement Sensors in Smart Grids

Authors: Yiyang Su, Jörg Neumann, Jan Wetzlich, Florian Thiel

Abstract:

Smart grid is a term used to describe the next generation power grid. New challenges such as integration of renewable and decentralized energy sources, the requirement for continuous grid estimation and optimization, as well as the use of two-way flows of energy have been brought to the power gird. In order to achieve efficient, reliable, sustainable, as well as secure delivery of electric power more and more information and communication technologies are used for the monitoring and the control of power grids. Consequently, the need for cybersecurity is dramatically increased and has converged into several standards which will be presented here. These standards for the smart grid must be designed to satisfy both performance and reliability requirements. An in depth investigation of the effect of retrospectively embedded security in existing grids on it’s dynamic behavior is required. Therefore, a retrofitting plan for existing meters is offered, and it’s performance in a test low voltage microgrid is investigated. As a result of this, integration of security measures into measurement architectures of smart grids at the design phase is strongly recommended.

Keywords: cyber security, performance, protocols, security standards, smart grid

Procedia PDF Downloads 313
2373 The Balancing of the Parental Responsibilities and Right and the Best Interest of the Child within the Parent-Child Relationship

Authors: R. Prinsloo

Abstract:

Amniotic fluid stem cells (AFSC) have been shown to contribute towards the amelioration of Acute Renal Failure (ARF), but the mechanisms underlying the renoprotective effect are largely unknown. Therefore, the main goal of the current study was to evaluate the therapeutic efficacy of AFSC in a cisplatin-induced rat model of ARF and to investigate the underlying mechanisms responsible for its renoprotective effect. To study the therapeutic efficacy of AFSC, ARF was induced in Wistar rats by an intra-peritoneal injection of cisplatin, and five days after administration, the rats were randomized into two groups and injected with either AFSC or normal saline intravenously. On day 8 and 12 after cisplatin injection, i.e., day 3 and day7 post-therapy respectively, the blood biochemical parameters, histopathological changes, apoptosis, and expression of pro-apoptotic, anti-apoptotic and autophagy-related proteins in renal tissues were studied in both groups of rats. Administration of AFSC in ARF rats resulted in improvement of renal function and attenuation of renal damage as reflected by significant decrease in blood urea nitrogen, serum creatinine levels, tubular cell apoptosis as assessed by Bax/Bcl2 ratio, and expression of the pro-apoptotic proteins viz. PUMA, Bax, cleaved caspase-3 and cleaved caspase-9 as compared to saline-treated group. Furthermore, in the AFSC-treated group as compared to saline-treated group, there was a significant increase in the activation of autophagy as evident by increased expression of LC3-II, ATG5, ATG7, Beclin1 and phospho-AMPK levels with a concomitant decrease in phospho-p70S6K and p62 expression levels. To further confirm whether the protective effects of AFSC on cisplatin-induced apoptosis were dependent on autophagy, chloroquine, an autophagy inhibitor was administered by the intra-peritoneal route. Chloroquine administration led to significant reduction in the anti-apoptotic effects of the AFSC therapy and further deterioration in the renal structure and function caused by cisplatin. Collectively, our results put forth that AFSC ameliorates cisplatin-induced ARF through induction of autophagy and inhibition of apoptosis. Furthermore, the protective effects of AFSC were blunted by chloroquine, highlighting that activation of autophagy is an important mechanism of action for the protective role of AFSC in cisplatin-induced renal injury.

Keywords: best interest of the child, children's rights, parent and child relationship, parental responsibilities and rights

Procedia PDF Downloads 101
2372 Design and Implementation of Automated Car Anti-Collision System Device Using Distance Sensor

Authors: Mehrab Masayeed Habib, Tasneem Sanjana, Ahmed Amin Rumel

Abstract:

Automated car anti-collision system is a trending technology of science. A car anti-collision system is an automobile safety system. The aim of this paper was to describe designing a car anti-collision system device to reduce the severity of an accident. The purpose of this device is to prevent collision among cars and objects to reduce the accidental death of human. This project gives an overview of secure & smooth journey of car as well as the certainty of human life. This system is controlled by microcontroller PIC. Sharp distance sensor is used to detect any object within the danger range. A crystal oscillator is used to produce the oscillation and generates the clock pulse of the microcontroller. An LCD is used to give information about the safe distance and a buzzer is used as alarm. An actuator is used as automatic break and inside the actuator; there is a motor driver that runs the actuator. For coding ‘microC PRO for PIC’ was used and ’Proteus Design Suite version 8 Software’ was used for simulation.

Keywords: sharp distance sensor, microcontroller, MicroC PRO for PIC, proteus, actuator, automobile anti-collision system

Procedia PDF Downloads 467
2371 Beneficial Effect of Micropropagation Coupled with Mycorrhization on Enhancement of Growth Performance of Medicinal Plants

Authors: D. H. Tejavathi

Abstract:

Medicinal plants are globally valuable sources of herbal products. Wild populations of many medicinal plants are facing threat of extinction because of their narrow distribution, endemicity, and degradation of specific habitats. Micropropagation is an established in vitro technique by which large number of clones can be obtained from a small bit of explants in a short span of time within a limited space. Mycorrhization can minimize the transient transplantation shock, experienced by the micropropagated plants when they are transferred from lab to land. AM fungal association improves the physiological status of the host plants through better uptake of water and nutrients, particularly phosphorus. Consequently, the growth performance and biosynthesis of active principles are significantly enhanced in AM fungal treated plants. Bacopa monnieri, Andrographis paniculata, Agave vera-curz, Drymaria cordata and Majorana hortensis, important medicinal plants used in various indigenous systems of medicines, are selected for the present study. They form the main constituents of many herbal formulations. Standard in vitro techniques were followed to obtain the micropropagated plants. Shoot tips and nodal segments were used as explants. Explants were cultured on Murashige and Skoog, and Phillips and Collins media supplemented with various combinations of growth regulators. Multiple shoots were obtained on a media containing both auxins and cytokinins at various concentrations and combinations. Multiple shoots were then transferred to rooting media containing auxins for root induction. Thus, obtained in vitro regenerated plants were subjected to brief acclimatization before transferring them to land. One-month-old in vitro plants were treated with AM fungi, and the symbiotic effect on the overall growth parameters was analyzed. It was found that micropropagation coupled with mycorrhization has significant effect on the enhancement of biomass and biosynthesis of active principles in these selected medicinal plants. In vitro techniques coupled with mycorrhization have opened a possibility of obtaining better clones in respect of enhancement of biomass and biosynthesis of active principles. Beneficial effects of AM fungal association with medicinal plants are discussed.

Keywords: cultivation, medicinal plants, micropropagation, mycorrhization

Procedia PDF Downloads 166
2370 Electrical Geophysical and Physiochemical Assessment of the Impact of Environmental Pollution on the Groundwater Potential of a Waste Land fill at Tudun Murtala in Nassarawa Local Government Area, Kano State, Nigeria

Authors: Abubakar Maitama Yusuf Hotoro, Olokpo Israel Olofu, Yusuf U. Tarauni, Mudassir A. Umar, Aliyu A, Dahiru Garba Diso, Usman H. Jamoh, M. Sale

Abstract:

The study assessed the impact of environmental pollution on groundwater potential at Tudun Murtala waste land fill using electrical resistivity, induced polarization and Physiochemical methods. The study area is located between latitude 12.023678N and longitude 8.573676 E. Geophysical data were collected at maximum length of 140m along twelve profiles using ABEM Terrameter SAS 1000. Results from the Geophysical analysis showed that the profiles were underlain by three lithological layers; the top layer consisting of Loamy and Sand soils, alluvium, granite, shale and sandstone. The second and third layers were predominantly made of weathered and fractured basements respectively. The potential groundwater water bearing zones of the study area occurred at VES2, VES4, VES5, VES6 and VES7. The thicknesses of the sounding points were found to be 20.8m at VES2; 25.2m at VES4; 13.2m at VES5; 50.8m at VES6 and 13.3m at VES7. The corresponding depths for the sounding points were 20.8m at VES2; 27.9m at VES4; 26.7m at VES5; 51.6m at VES6 and 24.9m at VES7 respectively. The Physiochemical study of selected groundwater samples assessed parameters such as the Electrical Conductivity, EC (288dS/m to 1365dS/m), TDS (170.8mg/L to 820mg/L) Pb (0.546mg/l to 0.629mg/l), Cu (-0.001mg/l to 0.004mg/l), and Cd (0.031mg/l to 0.092mg/l). The physiochemical results showed that the groundwater around the dumpsite may have been contaminated, especially in Dumpsite Hole 1 and Hole 2 at VES4 and VES6 respectively. There are indications for suspected leachate mitigation around the two VES points. Even though, the pH values of 6.4 and 6.2 at the two sounding points were considered to be within the permissible pH range (6.5 to 6.8). The values of other elements present in the groundwater for the samples at other VES points were found to be above permissible WHO and Nigerian Standards for Drinking Water.

Keywords: resistivity induced polarization, chargeability, landfill, leachate, contamination

Procedia PDF Downloads 52
2369 Characterization of Surface Suction Grippers for Continuous-Discontinuous Fiber Reinforced Semi-Finished Parts of an Automated Handling and Preforming Operation

Authors: Jürgen Fleischer, Woramon Pangboonyanon, Dominic Lesage

Abstract:

Non-metallic lightweight materials such as fiber reinforced plastics (FRP) become very significant at present. Prepregs e.g. SMC and unidirectional tape (UD-tape) are one of raw materials used to produce FRP. This study concerns with the manufacturing steps of handling and preforming of this UD-SMC and focuses on the investigation of gripper characteristics regarding gripping forces in normal and lateral direction, in order to identify suitable operating pressures for a secure gripping operation. A reliable handling and preforming operation results in a higher adding value of the overall process chain. As a result, the suitable operating pressures depending on travelling direction for each material type could be shown. Moreover, system boundary conditions regarding allowable pulling force in normal and lateral directions during preforming could be measured.

Keywords: continuous-discontinuous fiber reinforced plastics, UD-SMC-prepreg, handling, preforming, prepregs, sheet moulding compounds, surface suction gripper

Procedia PDF Downloads 219
2368 Appearance-Based Discrimination in a Workplace: An Emerging Problem for Labor Law Relationships

Authors: Irmina Miernicka

Abstract:

Nowadays, dress codes and widely understood appearance are becoming more important in the workplace. They are often used in the workplace to standardize image of an employer, to communicate a corporate image and ensure that customers can easily identify it. It is also a way to build professionalism of employer. Additionally, in many cases, an employer will introduce a dress code for health and safety reasons. Employers more often oblige employees to follow certain rules concerning their clothing, grooming, make-up, body art or even weight. An important research problem is to find the limits of the employer's interference with the external appearance of employees. They are primarily determined by the two main obligations of the employer, i. e. the obligation to respect the employee's personal rights and the principle of equal treatment and non-discrimination in employment. It should also be remembered that the limits of the employer's interference will be different when certain rules concerning the employee's appearance result directly from the provisions of laws and other acts of universally binding law (workwear, official clothing, and uniform). The analysis of this issue was based on literature and jurisprudence, both domestic and foreign, including the U.S. and European case law, and led the author to put forward a thesis that there are four main principles, which will protect the employer from the allegation of discrimination. First, it is the principle of adequacy - the means requirements regarding dress code must be appropriate to the position and type of work performed by the employee. Secondly, in accordance with the purpose limitation principle, an employer may introduce certain requirements regarding the appearance of employees if there is a legitimate, objective justification for this (such as work safety or type of work performed), not dictated by the employer's subjective feelings and preferences. Thirdly, these requirements must not place an excessive burden on workers and be disproportionate in relation to the employer's objective (principle of proportionality). Fourthly, the employer should also ensure that the requirements imposed in the workplace are equally burdensome and enforceable from all groups of employees. Otherwise, it may expose itself to grounds of discrimination based on sex or age. At the same time, it is also possible to differentiate the situation of some employees if these differences are small and reflect established habits and traditions and if employees are obliged to maintain the same level of professionalism in their positions. Although this subject may seem to be insignificant, frequent application of dress codes and increasing awareness of both employees and employers indicate that its legal aspects need to be thoroughly analyzed. Many legal cases brought before U.S. and European courts show that employees look for legal protection when they consider that their rights are violated by dress code introduced in a workplace.

Keywords: labor law, the appearance of an employee, discrimination in the workplace, dress code in a workplace

Procedia PDF Downloads 120
2367 Self-Organizing Map Network for Wheeled Robot Movement Optimization

Authors: Boguslaw Schreyer

Abstract:

The paper investigates the application of the Kohonen’s Self-Organizing Map (SOM) to the wheeled robot starting and braking dynamic states. In securing wheeled robot stability as well as minimum starting and braking time, it is important to ensure correct torque distribution as well as proper slope of braking and driving moments. In this paper, a correct movement distribution has been formulated, securing optimum adhesion coefficient and good transversal stability of a wheeled robot. A neural tuner has been proposed to secure the above properties, although most of the attention is attached to the SOM network application. If the delay of the torque application or torque release is not negligible, it is important to change the rising and falling slopes of the torque. The road/surface condition is also paramount in robot dynamic states control. As the road conditions may randomly change in time, application of the SOM network has been suggested in order to classify the actual road conditions.

Keywords: slip control, SOM network, torque distribution, wheeled Robot

Procedia PDF Downloads 121
2366 Securing Internet of Things Devices in Healthcare industry: An Investigation into Efficient and Effective Authorization Procedures

Authors: Maruf Farhan, Abdul Salih, Sikandar Ali Tahir

Abstract:

Protecting patient information's confidentiality is paramount considering the widespread use of Internet of Things (IoT) gadgets in medical settings. This study's subjects are decentralized identifiers (DIDs) and verifiable credentials (VCs) in conjunction with an OAuth-based authorization framework, as they are the key to protecting IoT healthcare devices. DIDs enable autonomous authentication and trust formation between IoT devices and other entities. To authorize users and enforce access controls based on verified claims, VCs offer a secure and adaptable solution. Through the proposed method, medical facilities can improve the privacy and security of their IoT devices while streamlining access control administration. A Smart pill dispenser in a hospital setting is used to illustrate the advantages of this method. The findings demonstrate the value of DIDs, VCs, and OAuth-based delegation in protecting the IoT devices. Improved processes for authorizing and controlling access to IoT devices are possible thanks to the research findings, which also help ensure patient confidentiality in the healthcare sector.

Keywords: Iot, DID, authorization, verifiable credentials

Procedia PDF Downloads 68
2365 High-Capacity Image Steganography using Wavelet-based Fusion on Deep Convolutional Neural Networks

Authors: Amal Khalifa, Nicolas Vana Santos

Abstract:

Steganography has been known for centuries as an efficient approach for covert communication. Due to its popularity and ease of access, image steganography has attracted researchers to find secure techniques for hiding information within an innocent looking cover image. In this research, we propose a novel deep-learning approach to digital image steganography. The proposed method, DeepWaveletFusion, uses convolutional neural networks (CNN) to hide a secret image into a cover image of the same size. Two CNNs are trained back-to-back to merge the Discrete Wavelet Transform (DWT) of both colored images and eventually be able to blindly extract the hidden image. Based on two different image similarity metrics, a weighted gain function is used to guide the learning process and maximize the quality of the retrieved secret image and yet maintaining acceptable imperceptibility. Experimental results verified the high recoverability of DeepWaveletFusion which outperformed similar deep-learning-based methods.

Keywords: deep learning, steganography, image, discrete wavelet transform, fusion

Procedia PDF Downloads 77
2364 Competitive Intelligence within the Maritime Security Intelligence

Authors: Dicky R. Munaf, Ayu Bulan Tisna

Abstract:

Competitive intelligence (business intelligence) is the process of observing the external environment which often conducted by many organizations to get the relevant information which will be used to create the organization policy, whereas, security intelligence is related to the function of the officers who have the duties to protect the country and its people from every criminal actions that might harm the national and individual security. Therefore, the intelligence dimension of maritime security is associated with all the intelligence activities including the subject and the object that connected to the maritime issues. The concept of intelligence business regarding the maritime security perspective is the efforts to protect the maritime security using the analysis of economic movements as the basic strategic plan. Clearly, a weak maritime security will cause high operational cost to all the economic activities which uses the sea as its media. Thus, it affects the competitiveness of a country compared to the other countries that are able to maintain the maritime law enforcement and secure their marine territory. So, the intelligence business within the security intelligence is important to conduct as the beginning process of the identification against the opponent strategy that might happen in the present or in the future. Thereby, the scenario of the potential impact of all the illegal maritime activities, as well as the strategy in preventing the opponent maneuver can be made.

Keywords: competitive intelligence, maritime security intelligence, intelligent systems, information technology

Procedia PDF Downloads 496
2363 Intrusion Detection Based on Graph Oriented Big Data Analytics

Authors: Ahlem Abid, Farah Jemili

Abstract:

Intrusion detection has been the subject of numerous studies in industry and academia, but cyber security analysts always want greater precision and global threat analysis to secure their systems in cyberspace. To improve intrusion detection system, the visualisation of the security events in form of graphs and diagrams is important to improve the accuracy of alerts. In this paper, we propose an approach of an IDS based on cloud computing, big data technique and using a machine learning graph algorithm which can detect in real time different attacks as early as possible. We use the MAWILab intrusion detection dataset . We choose Microsoft Azure as a unified cloud environment to load our dataset on. We implement the k2 algorithm which is a graphical machine learning algorithm to classify attacks. Our system showed a good performance due to the graphical machine learning algorithm and spark structured streaming engine.

Keywords: Apache Spark Streaming, Graph, Intrusion detection, k2 algorithm, Machine Learning, MAWILab, Microsoft Azure Cloud

Procedia PDF Downloads 140
2362 Design and Implementation of Pseudorandom Number Generator Using Android Sensors

Authors: Mochamad Beta Auditama, Yusuf Kurniawan

Abstract:

A smartphone or tablet require a strong randomness to establish secure encrypted communication, encrypt files, etc. Therefore, random number generation is one of the main keys to provide secrecy. Android devices are equipped with hardware-based sensors, such as accelerometer, gyroscope, etc. Each of these sensors provides a stochastic process which has a potential to be used as an extra randomness source, in addition to /dev/random and /dev/urandom pseudorandom number generators. Android sensors can provide randomness automatically. To obtain randomness from Android sensors, each one of Android sensors shall be used to construct an entropy source. After all entropy sources are constructed, output from these entropy sources are combined to provide more entropy. Then, a deterministic process is used to produces a sequence of random bits from the combined output. All of these processes are done in accordance with NIST SP 800-22 and the series of NIST SP 800-90. The operation conditions are done 1) on Android user-space, and 2) the Android device is placed motionless on a desk.

Keywords: Android hardware-based sensor, deterministic process, entropy source, random number generation/generators

Procedia PDF Downloads 367
2361 Minimization of Denial of Services Attacks in Vehicular Adhoc Networking by Applying Different Constraints

Authors: Amjad Khan

Abstract:

The security of Vehicular ad hoc networking is of great importance as it involves serious life threats. Thus to provide secure communication amongst Vehicles on road, the conventional security system is not enough. It is necessary to prevent the network resources from wastage and give them protection against malicious nodes so that to ensure the data bandwidth availability to the legitimate nodes of the network. This work is related to provide a non conventional security system by introducing some constraints to minimize the DoS (Denial of services) especially data and bandwidth. The data packets received by a node in the network will pass through a number of tests and if any of the test fails, the node will drop those data packets and will not forward it anymore. Also if a node claims to be the nearest node for forwarding emergency messages then the sender can effectively identify the true or false status of the claim by using these constraints. Consequently the DoS(Denial of Services) attack is minimized by the instant availability of data without wasting the network resources.

Keywords: black hole attack, grey hole attack, intransient traffic tempering, networking

Procedia PDF Downloads 277
2360 Comparison of Rainfall Trends in the Western Ghats and Coastal Region of Karnataka, India

Authors: Vinay C. Doranalu, Amba Shetty

Abstract:

In recent days due to climate change, there is a large variation in spatial distribution of daily rainfall within a small region. Rainfall is one of the main end climatic variables which affect spatio-temporal patterns of water availability. The real task postured by the change in climate is identification, estimation and understanding the uncertainty of rainfall. This study intended to analyze the spatial variations and temporal trends of daily precipitation using high resolution (0.25º x 0.25º) gridded data of Indian Meteorological Department (IMD). For the study, 38 grid points were selected in the study area and analyzed for daily precipitation time series (113 years) over the period 1901-2013. Grid points were divided into two zones based on the elevation and situated location of grid points: Low Land (exposed to sea and low elevated area/ coastal region) and High Land (Interior from sea and high elevated area/western Ghats). Time series were applied to examine the spatial analysis and temporal trends in each grid points by non-parametric Mann-Kendall test and Theil-Sen estimator to perceive the nature of trend and magnitude of slope in trend of rainfall. Pettit-Mann-Whitney test is applied to detect the most probable change point in trends of the time period. Results have revealed remarkable monotonic trend in each grid for daily precipitation of the time series. In general, by the regional cluster analysis found that increasing precipitation trend in shoreline region and decreasing trend in Western Ghats from recent years. Spatial distribution of rainfall can be partly explained by heterogeneity in temporal trends of rainfall by change point analysis. The Mann-Kendall test shows significant variation as weaker rainfall towards the rainfall distribution over eastern parts of the Western Ghats region of Karnataka.

Keywords: change point analysis, coastal region India, gridded rainfall data, non-parametric

Procedia PDF Downloads 289
2359 Non-intrusive Hand Control of Drone Using an Inexpensive and Streamlined Convolutional Neural Network Approach

Authors: Evan Lowhorn, Rocio Alba-Flores

Abstract:

The purpose of this work is to develop a method for classifying hand signals and using the output in a drone control algorithm. To achieve this, methods based on Convolutional Neural Networks (CNN) were applied. CNN's are a subset of deep learning, which allows grid-like inputs to be processed and passed through a neural network to be trained for classification. This type of neural network allows for classification via imaging, which is less intrusive than previous methods using biosensors, such as EMG sensors. Classification CNN's operate purely from the pixel values in an image; therefore they can be used without additional exteroceptive sensors. A development bench was constructed using a desktop computer connected to a high-definition webcam mounted on a scissor arm. This allowed the camera to be pointed downwards at the desk to provide a constant solid background for the dataset and a clear detection area for the user. A MATLAB script was created to automate dataset image capture at the development bench and save the images to the desktop. This allowed the user to create their own dataset of 12,000 images within three hours. These images were evenly distributed among seven classes. The defined classes include forward, backward, left, right, idle, and land. The drone has a popular flip function which was also included as an additional class. To simplify control, the corresponding hand signals chosen were the numerical hand signs for one through five for movements, a fist for land, and the universal “ok” sign for the flip command. Transfer learning with PyTorch (Python) was performed using a pre-trained 18-layer residual learning network (ResNet-18) to retrain the network for custom classification. An algorithm was created to interpret the classification and send encoded messages to a Ryze Tello drone over its 2.4 GHz Wi-Fi connection. The drone’s movements were performed in half-meter distance increments at a constant speed. When combined with the drone control algorithm, the classification performed as desired with negligible latency when compared to the delay in the drone’s movement commands.

Keywords: classification, computer vision, convolutional neural networks, drone control

Procedia PDF Downloads 203
2358 A Comprehensive Approach to Create ‘Livable Streets’ in the Mixed Land Use of Urban Neighborhoods Applying Urban Design Principles Which Will Achieve Quality of Life for Pedestrians

Authors: K. C. Tanuja, Mamatha P. Raj

Abstract:

Urbanisation is happening rapidly all over the world. As population increasing in the urban settlements, its required to provide quality of life to all the inhabitants who live in. Urban design is a place making strategic planning. Urban design principles promote visualising any place environmentally, socially and economically viable. Urban design strategies include building mass, transit development, economic viability and sustenance and social aspects.

Keywords: livable streets, social interaction, pedestrian use, urban design

Procedia PDF Downloads 226