Search results for: security program
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6512

Search results for: security program

4682 Non-Targeted Adversarial Image Classification Attack-Region Modification Methods

Authors: Bandar Alahmadi, Lethia Jackson

Abstract:

Machine Learning model is used today in many real-life applications. The safety and security of such model is important, so the results of the model are as accurate as possible. One challenge of machine learning model security is the adversarial examples attack. Adversarial examples are designed by the attacker to cause the machine learning model to misclassify the input. We propose a method to generate adversarial examples to attack image classifiers. We are modifying the successfully classified images, so a classifier misclassifies them after the modification. In our method, we do not update the whole image, but instead we detect the important region, modify it, place it back to the original image, and then run it through a classifier. The algorithm modifies the detected region using two methods. First, it will add abstract image matrix on back of the detected image matrix. Then, it will perform a rotation attack to rotate the detected region around its axes, and embed the trace of image in image background. Finally, the attacked region is placed in its original position, from where it was removed, and a smoothing filter is applied to smooth the background with foreground. We test our method in cascade classifier, and the algorithm is efficient, the classifier confident has dropped to almost zero. We also try it in CNN (Convolutional neural network) with higher setting and the algorithm was successfully worked.

Keywords: adversarial examples, attack, computer vision, image processing

Procedia PDF Downloads 342
4681 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou

Abstract:

Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.

Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol

Procedia PDF Downloads 283
4680 Artificial Neural Network Based Model for Detecting Attacks in Smart Grid Cloud

Authors: Sandeep Mehmi, Harsh Verma, A. L. Sangal

Abstract:

Ever since the idea of using computing services as commodity that can be delivered like other utilities e.g. electric and telephone has been floated, the scientific fraternity has diverted their research towards a new area called utility computing. New paradigms like cluster computing and grid computing came into existence while edging closer to utility computing. With the advent of internet the demand of anytime, anywhere access of the resources that could be provisioned dynamically as a service, gave rise to the next generation computing paradigm known as cloud computing. Today, cloud computing has become one of the most aggressively growing computer paradigm, resulting in growing rate of applications in area of IT outsourcing. Besides catering the computational and storage demands, cloud computing has economically benefitted almost all the fields, education, research, entertainment, medical, banking, military operations, weather forecasting, business and finance to name a few. Smart grid is another discipline that direly needs to be benefitted from the cloud computing advantages. Smart grid system is a new technology that has revolutionized the power sector by automating the transmission and distribution system and integration of smart devices. Cloud based smart grid can fulfill the storage requirement of unstructured and uncorrelated data generated by smart sensors as well as computational needs for self-healing, load balancing and demand response features. But, security issues such as confidentiality, integrity, availability, accountability and privacy need to be resolved for the development of smart grid cloud. In recent years, a number of intrusion prevention techniques have been proposed in the cloud, but hackers/intruders still manage to bypass the security of the cloud. Therefore, precise intrusion detection systems need to be developed in order to secure the critical information infrastructure like smart grid cloud. Considering the success of artificial neural networks in building robust intrusion detection, this research proposes an artificial neural network based model for detecting attacks in smart grid cloud.

Keywords: artificial neural networks, cloud computing, intrusion detection systems, security issues, smart grid

Procedia PDF Downloads 322
4679 Exercise Intervention For Women After Treatment For Ovarian Cancer

Authors: Deirdre Mc Grath, Joanne Reid

Abstract:

Background: Ovarian cancer is the leading cause of mortality among gynaecologic cancers in developed countries and the seventh most common cancer worldwide with nearly 240,000 women diagnosed each year. Although it is recognized engaging in exercise results in positive health care outcomes, women with ovarian cancer are reluctant to participate. No evidence currently exists focusing on how to successfully implement an exercise intervention program for patients with ovarian cancer, using a realist approach. There is a requirement for the implementation of exercise programmes within the oncology health care setting as engagement in such interventions has positive health care outcomes for women with ovarian cancer both during and following treatment. Aim: To co-design the implementation of an exercise intervention for women following treatment for ovarian cancer. Methods: This study is a realist evaluation using quantitative and qualitative methods of data collection and analysis. Realist evaluation is well-established within the health and social care setting and has in relation to this study enabled a flexible approach to investigate how to optimise implementation of an exercise intervention for this patient population. This single centre study incorporates three stages in order to identify the underlying contexts and mechanisms which lead to the successful implementation of an exercise intervention for women who have had treatment for ovarian cancer. Stage 1 - A realist literature review. Stage 2 -Co-design of the implementation of an exercise intervention with women following treatment for ovarian cancer, their carer’s, and health care professionals. Stage 3 –Implementation of an exercise intervention with women following treatment for ovarian cancer. Evaluation of the implementation of the intervention from the perspectives of the women who participated in the intervention, their informal carers, and health care professionals. The underlying program theory initially conceptualised before and during the realist review was developed further during the co-design stage. The evolving program theory in relation to how to successfully implement an exercise for these women is currently been refined and tested during the final stage of this realist evaluation which is the implementation and evaluation stage. Results: This realist evaluation highlights key issues in relation to the implementation of an exercise intervention within this patient population. The underlying contexts and mechanisms which influence recruitment, adherence, and retention rates of participants are identified. Conclusions: This study will inform future research on the implementation of exercise interventions for this patient population. It is anticipated that this intervention will be implemented into practice as part of standard care for this group of patients.

Keywords: ovarian cancer, exercise intervention, implementation, Co-design

Procedia PDF Downloads 188
4678 Physical Activity Levels in Qatar: A Pedometer-Based Assessment

Authors: Suzan Sayegh, Izzeldin Ibrahim, Mercia Van Der Walt, Mohamed Al-Kuwari

Abstract:

Background: Walking is the most common form of physical activity which can promote a healthy well-being among people of different age groups. In this regard, pedometers are becoming more popular within research and are considered useful tools in monitoring physical activity levels based on individuals’ daily steps. A value of ˂5,000 steps/day is identified as a sedentary lifestyle index where individuals are physically inactive. Those achieving 5,000-7,499 steps/day have a low active lifestyle as they do not meet the moderate-to-vigorous physical activity (MVPA) recommendations. Moreover, individuals achieving ≥7,500 steps/day are classified as physically active. The objective of this study is to assess the physical activity levels of adult population in Qatar through a pedometer-based program over a one-year period. Methods: A cross-sectional analysis, as part of a longitudinal study, was carried out over one year to assess the daily step count. “Step into Health” is a community-based program launched by Aspire as an approach for the purpose of improving physical activity across the population of Qatar. The program involves distribution of pedometers to registered members which is supported by a self-monitoring online account and linked to a web database. Daily habitual physical activity (daily total step count) was assessed through Omron HJ-324U pedometer. Analyses were done on data extracted from the web database. Results: A total of 1,988 members were included in this study (males: n=1,143, 57%; females: n=845, 43%). Average age was 37.8±10.9 years distributed as 60% of age between age 25-54 (n=1,186), 27% of age 45-64 (n=546), and 13% of age 18-24 years (n=256). Majority were non-Qataris, 81% (n=1,609) compared with 19% of the Qatari nationality (n=379). Average body mass index (BMI) was 27.8±6.1 (kg/m2) where most of them (41%, n=809) were found to be overweight, between 25-30 kg/m2. Total average step count was 5,469±3,884. Majority were found to be sedentary (n=1110, 55.8%). Middle aged individuals were more active than the other two age groups. Males were seen as more active than females. Those who were less active had a higher BMI. Older individuals were more active. There was a variation in the physical activity level throughout the year period. Conclusion: It is essential to further develop the available intervention programs and increase their physical activity behavior. Planning such physical activity interventions for female population should involve aspects such as time, environmental variables and aerobic steps.

Keywords: adults, pedometer, physical activity, step-count

Procedia PDF Downloads 363
4677 Africa as Endemically a War Continent: Explaining the Changing Pattern of Armed Conflicts in Africa

Authors: Kenneth Azaigba

Abstract:

The history of post-colonial African States has been dubbed a history of endemic warfare in existing literature. Indeed, Africa political environment is characterized by a multiplicity of threats to peace and security. Africa's leading drivers of conflict include abundant (especially mineral) resources, personal rule and attendant political authoritarianism, manipulation of identity politics across ethnicity, marginalization of communities, as well as electoral mal-practices resulting in contested legitimacy and resultant violence. However, the character of armed conflicts in Africa is changing. This paper attempts to reconstruct the trajectory of armed conflicts in Africa and explain the changing pattern of armed conflict. The paper contends that large scale political violence in Africa is on the decline rendering the endemic thesis an inappropriate paradigm in explaining political conflicts in Africa. The paper also posits that though small scale conflicts are springing up and exhibiting trans-border dimensions, these patterns of armed conflicts are not peculiar to Africa but emerging waves of global conflicts. The paper explains that the shift in the scale of warfare in Africa is a function of a multiplicity of post-cold war global contradictions. Inclusive governance, social justice and economic security are articulated as workable panaceas for mitigating warfare in Africa.

Keywords: Africa, conflicts, pattern, war

Procedia PDF Downloads 394
4676 Buffer Zone a Means of Reduction of Deforestation on Protected Area: A Case Study of Gunung Palung National Park in West Kalimantan, Indonesia

Authors: Dhruba Khatri, Uttam Ghimire, Nabin Kumar Thapalia

Abstract:

Protected area management in Indonesia is based on MAB program and ICDPs have become Indonesia’s main approach to biodiversity conservation since the early 1990s. However, very few ICDPs have realized the importance of biodiversity conservation in Indonesia and significantly enhanced as a result of currently planned project activities. Gunung Palung National Park in West Kalimantan was damaged illegal logging after decentralization. It made clear through the field survey: (1) Agroforestry did not make reduce to deforestation on regional level and (2) local people who engaging illegal logging activities have two characteristics that for their life and for vent of surplus labor in village. From these results, it became clear that a local resident had a bilateral character as an actor of conservation and the deforestation and also it confirmed that a market also was working on both of the conservation and deforestation. Therefore, surplus labor can be the key actors for future program design and at the same time it is necessary corroborative system which central government, local government, and local people are concerned with the process of policy making under the situation that management body of national park and buffer zone was separated.

Keywords: buffer zone, decentralization, Gunung Palung National Park, illegal logging, Indonesia

Procedia PDF Downloads 419
4675 Result of Fatty Acid Content in Meat of Selenge Breed Younger Cattle

Authors: Myagmarsuren Soronzonjav, N. Togtokhbayar, L. Davaahuu, B. Minjigdorj, Seong Gu Hwang

Abstract:

The number of natural or organic product consumers is increased in recent years and this healthy demand pushes to increase usage of healthy meat. At the same time, consumers pay more attention on the healthy fat, especially on unsaturated fatty acids. These long chain carbohydrates reduce heart diseases, improve memory and eye sight and activate the immune system. One of the important issues to be solved for our Mongolia’s food security is to provide healthy, fresh, widely available and cheap meat for the population. Thus, an importance of the Selenge breed meat production is increasing in order to supply the quality meat food security since the Selenge breed cattle are rapidly multiplied, beneficial in term of income, the same quality as Mongolian breed, and well digested for human body. We researched the lipid, unsaturated and saturated fatty acid contents of meat of Selenge breed younger cattle by their muscle types. Result of our research reveals that 11 saturated fatty acids are detected. For the content of palmitic acid among saturated fatty acids, 23.61% was in the sirloin meat, 24.01% was in the round and chuck meat, and 24.83% was in the short loin meat.

Keywords: chromatogram, gas chromatography, organic resolving, saturated and unsaturated fatty acids

Procedia PDF Downloads 274
4674 Detection of Defects in CFRP by Ultrasonic IR Thermographic Method

Authors: W. Swiderski

Abstract:

In the paper introduced the diagnostic technique making possible the research of internal structures in composite materials reinforced fibres using in different applications. The main reason of damages in structures of these materials is the changing distribution of load in constructions in the lifetime. Appearing defect is largely complicated because of the appearance of disturbing of continuity of reinforced fibres, binder cracks and loss of fibres adhesiveness from binders. Defect in composite materials is usually more complicated than in metals. At present, infrared thermography is the most effective method in non-destructive testing composite. One of IR thermography methods used in non-destructive evaluation is vibrothermography. The vibrothermography is not a new non-destructive method, but the new solution in this test is use ultrasonic waves to thermal stimulation of materials. In this paper, both modelling and experimental results which illustrate the advantages and limitations of ultrasonic IR thermography in inspecting composite materials will be presented. The ThermoSon computer program for computing 3D dynamic temperature distribuions in anisotropic layered solids with subsurface defects subject to ulrasonic stimulation was used to optimise heating parameters in the detection of subsurface defects in composite materials. The program allows for the analysis of transient heat conduction and ultrasonic wave propagation phenomena in solids. The experiments at MIAT were fulfilled by means of FLIR SC 7600 IR camera. Ultrasonic stimulation was performed with the frequency from 15 kHz to 30 kHz with maximum power up to 2 kW.

Keywords: composite material, ultrasonic, infrared thermography, non-destructive testing

Procedia PDF Downloads 299
4673 ScRNA-Seq RNA Sequencing-Based Program-Polygenic Risk Scores Associated with Pancreatic Cancer Risks in the UK Biobank Cohort

Authors: Yelin Zhao, Xinxiu Li, Martin Smelik, Oleg Sysoev, Firoj Mahmud, Dina Mansour Aly, Mikael Benson

Abstract:

Background: Early diagnosis of pancreatic cancer is clinically challenging due to vague, or no symptoms, and lack of biomarkers. Polygenic risk score (PRS) scores may provide a valuable tool to assess increased or decreased risk of PC. This study aimed to develop such PRS by filtering genetic variants identified by GWAS using transcriptional programs identified by single-cell RNA sequencing (scRNA-seq). Methods: ScRNA-seq data from 24 pancreatic ductal adenocarcinoma (PDAC) tumor samples and 11 normal pancreases were analyzed to identify differentially expressed genes (DEGs) in in tumor and microenvironment cell types compared to healthy tissues. Pathway analysis showed that the DEGs were enriched for hundreds of significant pathways. These were clustered into 40 “programs” based on gene similarity, using the Jaccard index. Published genetic variants associated with PDAC were mapped to each program to generate program PRSs (pPRSs). These pPRSs, along with five previously published PRSs (PGS000083, PGS000725, PGS000663, PGS000159, and PGS002264), were evaluated in a European-origin population from the UK Biobank, consisting of 1,310 PDAC participants and 407,473 non-pancreatic cancer participants. Stepwise Cox regression analysis was performed to determine associations between pPRSs with the development of PC, with adjustments of sex and principal components of genetic ancestry. Results: The PDAC genetic variants were mapped to 23 programs and were used to generate pPRSs for these programs. Four distinct pPRSs (P1, P6, P11, and P16) and two published PRSs (PGS000663 and PGS002264) were significantly associated with an increased risk of developing PC. Among these, P6 exhibited the greatest hazard ratio (adjusted HR[95% CI] = 1.67[1.14-2.45], p = 0.008). In contrast, P10 and P4 were associated with lower risk of developing PC (adjusted HR[95% CI] = 0.58[0.42-0.81], p = 0.001, and adjusted HR[95% CI] = 0.75[0.59-0.96], p = 0.019). By comparison, two of the five published PRS exhibited an association with PDAC onset with HR (PGS000663: adjusted HR[95% CI] = 1.24[1.14-1.35], p < 0.001 and PGS002264: adjusted HR[95% CI] = 1.14[1.07-1.22], p < 0.001). Conclusion: Compared to published PRSs, scRNA-seq-based pPRSs may be used not only to assess increased but also decreased risk of PDAC.

Keywords: cox regression, pancreatic cancer, polygenic risk score, scRNA-seq, UK biobank

Procedia PDF Downloads 107
4672 The Shadow of Terrorism in the World Tourism Industry: Impacts, Prevention and Recovery Strategies

Authors: Maria Brás

Abstract:

The main purpose of the presentation is to identify the impacts and appropriate measures to prevent potential attacks, or minimize the risk of an attack in tourist destination. Terrorism has been growing in the shadow of unpredictability, however, is possible to minimize the danger of a terrorist attack by doing the: (1) recognition; (2); evaluation; (3) avoidance; (4) threat reduction. The vulnerability of tourism industry to terrorism is an undeniable fact, and terrorists know it. They use this advantage attacking tourists for very specific reasons, such as the: (1) international coverage by the media, “if it bleeds it leads” ; (2) chances of getting different nationalities at the same place and time; (3) possibility of destroyed the economy of a destination, or destinations (“terrorism contamination effect”), through the reduction of tourist demand; (4) psychological, and social disruption based on fear of negative consequences. Security incidents, such as terrorism, include different preventive measures that can be conducted in partnership with: tourism industry (hotels, airports, tourist attractions, among others); central government; public and/or private sector; local community; and media. The recovery strategies must be based on the dissemination of positive information to the media; in creating new marketing strategies that emphasize the social and cultural values of the destination; encourage domestic tourism; get government, or state, financial support.

Keywords: terrorism, tourism, safety, security, impacts, prevention, recovery

Procedia PDF Downloads 347
4671 Context Aware Anomaly Behavior Analysis for Smart Home Systems

Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu

Abstract:

The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.

Keywords: Internet of Things, network security, context awareness, intrusion detection

Procedia PDF Downloads 200
4670 Developing an Indigenous Mathematics, Science and Technology Education Master’s Program: A Three Universities Collaboration

Authors: Mishack Thiza Gumbo

Abstract:

The participatory action research study reported in this paper aims to explore indigenous mathematics, science, and technology to develop an indigenous Mathematics, Science and Technology Education Master’s Programme ultimately. The study is based on an ongoing collaborative project between the Mathematics, Science and Technology Education Departments of the University of South Africa, University of Botswana and Chinhoyi University of Technology. The study targets the Mathematics, Science and Technology Education Master’s students and indigenous knowledge holders in these three contexts as research participants. They will be interviewed; documents of existing Mathematics, Science and Technology Education Master’s Programmes will be analysed; mathematics, science and technology-related artefacts will also be collected and analysed. Mathematics, Science, and Technology Education are traditionally referred to as gateway subjects because the world economy revolves around them. Scores of scholars call for the indigenisation of research and methodologies so that research can suit and advance indigenous knowledge and sustainable development. There are ethnomathematics, ethnoscience and ethnotechnology which exist in indigenous contexts such as blacksmithing, woodcarving, textile-weaving and dyeing, but the current curricula and research in institutions of learning reflect the Western notions of these subjects. Indigenisation of the academic programmecontributes toward the decolonisation of education. Hence, the development of an indigenous Mathematics, Science and Technology Education Master’s Programme, which will be jointly offered by the three universities mentioned above, will contribute to the transformation of higher education in this sense.

Keywords: indigenous, mathematics, science, technology, master's program, universities, collaboration

Procedia PDF Downloads 165
4669 Smart Growth Through Innovation Programs: Challenges and Opportunities

Authors: Hanadi Mubarak Al-Mubaraki, Michael Busler

Abstract:

Innovation is the powerful tools for economic growth and diversification, which lead to smart growth. The objective of this paper is to identify the opportunities and challenges of innovation programs discuss and analyse the implementation of the innovation program in the United States (US) and United Kingdom (UK). To achieve the objectives, the research used a mixed methods approach, quantitative (survey), and qualitative (multi-case study) to examine innovation best practices in developed countries. In addition, the selection of 4 interview case studies of innovation organisations based on the best practices and successful implementation worldwide. The research findings indicated the two challenges such as 1) innovation required business ecosystem support to deliver innovation outcomes such as new product and new services, and 2) foster the climate of innovation &entrepreneurship for economic growth and diversification. Although the two opportunities such as 1) sustainability of the innovation events which lead smart growth, and 2) establish the for fostering the artificial intelligence hub entrepreneurship networking at multi-levels. The research adds value to academicians and practitioners such as government, funded organizations, institutions, and policymakers. The authors aim to conduct future research a comparative study of innovation case studies between developed and developing countries for policy implications worldwide. The Originality of This study contributes to current literature about the innovation best practice in developed and developing countries.

Keywords: economic development, technology transfer, entrepreneurship, innovation program

Procedia PDF Downloads 150
4668 Proposal of Non-Destructive Inspection Function Based on Internet of Things Technology Using Drone

Authors: Byoungjoon Yu, Jihwan Park, Sujung Sin, Junghyun Im, Minsoo Park, Sehwan Park, Seunghee Park

Abstract:

In this paper, we propose a technology to monitor the soundness of an Internet-based bridge using a non-conductive inspection function. There has been a collapse accident due to the aging of the bridge structure, and it is necessary to prepare for the deterioration of the bridge. The NDT/SHM system for maintenance of existing bridge structures requires a large number of inspection personnel and expensive inspection costs, and access of expensive and large equipment to measurement points is required. Because current drone inspection equipment can only be inspected through camera, it is difficult to inspect inside damage accurately, and the results of an internal damage evaluation are subjective, and it is difficult for non-specialists to recognize the evaluation results. Therefore, it is necessary to develop NDT/SHM techniques for maintenance of new-concept bridge structures that allow for free movement and real-time evaluation of measurement results. This work is financially supported by Korea Ministry of Land, Infrastructure, and Transport (MOLIT) as 'Smart City Master and Doctor Course Grant Program' and a grant (14SCIP-B088624-01) from Construction Technology Research Program funded by Ministry of Land, Infrastructure and Transport of Korean government.

Keywords: Structural Health Monitoring, SHM, non-contact sensing, nondestructive testing, NDT, Internet of Things, autonomous self-driving drone

Procedia PDF Downloads 272
4667 Patient Progression at Discharge: A Communication, Coordination, and Accountability Gap among Hospital Teams

Authors: Nana Benma Osei

Abstract:

Patient discharge can be a hectic process. Patients are sometimes sent to the wrong location or forgotten in lounges in the waiting room. This ends up compromising patient care because the delay in picking the patients can affect how they adhere to medication. Patients may fail to take their medication, and this will lead to negative outcomes. The situation highlights the demands of modern-day healthcare, and the use of technology can help in reducing such challenges and in enhancing the patient’s experience, leading to greater satisfaction with the care provided. The paper contains the proposed changes to a healthcare facility by introducing the clinical decision support system, which will be needed to improve coordination and communication during patient discharge. This will be done under Kurt Lewin’s Change Management Model, which recognizes the different phases in the change process. A pilot program is proposed initially before the program can be implemented in the entire organization. This allows for the identification of challenges and ways of managing them. The paper anticipates some of the possible challenges that may arise during implementation, and a multi-disciplinary approach is considered the most effective. Opposition to the change is likely to arise because staff members may lack information on how the changes will affect them and the skills they will need to learn to use the new system. Training will occur before the technology can be implemented. Every member will go for training, and adequate time is allocated for training purposes. A comparison of data will determine whether the project has succeeded.

Keywords: patient discharge, clinical decision support system, communication, collaboration

Procedia PDF Downloads 106
4666 Assessment of Physical Activity Levels in Qatar: A Pedometer-Based Study

Authors: Souzan Al Sayegh, Izzeldin Ibrahim, Mercia Van Der Walt, Mohamed Al-Kuwari

Abstract:

Background: Walking is the most common form of physical activity which can promote a healthy well-being among people of different age groups. In this regard, pedometers are becoming more popular within research and are considered useful tools in monitoring physical activity levels based on individuals’ daily steps. A value of ˂5,000 steps/day is identified as a sedentary lifestyle index where individuals are physically inactive. Those achieving 5,000-7,499 steps/day have a low active lifestyle as they do not meet the moderate-to-vigorous physical activity (MVPA) recommendations. Moreover, individuals achieving ≥7,500 steps/day are classified as physically active. The objective of this study is to assess the physical activity levels of adult population in Qatar through a pedometer-based program over a one-year period. Methods: A cross-sectional analysis, as part of a longitudinal study, was carried out over one year to assess the daily step count. 'Step into Health' is a community-based program launched by Aspire as an approach for the purpose of improving physical activity across the population of Qatar. The program involves the distribution of pedometers to registered members which is supported by a self-monitoring online account and linked to a web database. Daily habitual physical activity (daily total step count) was assessed through Omron HJ-324U pedometer. Analyses were done on data extracted from the web database. Results: A total of 1,988 members were included in this study (males: n=1,143, 57%; females: n=845, 43%). Average age was 37.8±10.9 years distributed as 60% of age between age 25-54 (n=1,186), 27% of age 45-64 (n=546), and 13% of age 18-24 years (n=256). Majority were non-Qataris, 81% (n=1,609) compared with 19% of the Qatari nationality (n=379). Average body mass index (BMI) was 27.8±6.1 (kg/m2) where most of them (41%, n=809) were found to be overweight, between 25-30 kg/m2. Total average step count was 5,469±3,884. Majority were found to be sedentary (n=1110, 55.8%). Middle aged individuals were more active than the other two age groups. Males were seen as more active than females. Those who were less active had a higher BMI. Older individuals were more active. There was a variation in the physical activity level throughout the year period. Conclusion: It is essential to further develop the available intervention programs and increase their physical activity behavior. Planning such physical activity interventions for female population should involve aspects such as time, environmental variables and aerobic steps.

Keywords: adults, pedometer, physical activity, step-count

Procedia PDF Downloads 309
4665 Geo Spatial Database for Railway Assets Management

Authors: Muhammad Umar

Abstract:

Safety and Assets management is considering a backbone of every department. GIS in the Railway become very important to Manage Assets and Security through Digital Maps and Web based GIS Maps. It provides a complete frame of work to the organization for the management of assets. Pakistan Railway is the most common and safest mode of traveling in Pakistan. Due to ever-increasing demand of transporting huge amount of information generated from various sources and this information must be accurate. This creates problems for Passengers and Administration that causes finical and time loss. GIS Solve this problem by Digital Maps & Database. It provides you a real time Spatial and Statistical analysis that helps you to communicate and exchange the information in a sophisticated way to the users. GIS Based Web system provides a facility to different end user to make query at a time as per requirements. This GIS System provides an advancement in an organization for a complete Monitoring, Safety and Decision System for tracks, Stations and Junctions that further use for the Analysis of different areas i.e. analysis of tracks, junctions and Stations in case of reconstruction, Rescue for rail accidents and Natural disasters .This Research work helps to reduce the financial loss and reduce human mistakes helps you provide a complete security and Management system of assets.

Keywords: Geographical Information System (GIS) for assets management, geo spatial database, railway assets management, Pakistan

Procedia PDF Downloads 494
4664 Ukrainians Professors in a Luso-Hispanophone Brazilian Border Region: a Case-Study on the Management of Multilingualism in Higher Education

Authors: Isis Ribeiro Berger

Abstract:

In view of recent war conflicts between Russia and Ukraine, the government of Paraná State, in Brazil, started a program to host Ukrainian scientists in state universities in 2022. The initiative aimed at integrating these scientists into the Brazilian academic community, strengthening the role of universities in producing science and innovation even in times of war, as well as fostering Higher Education internationalization. Paraná state was a pioneer in this initiative due to the fact it has been home to the largest contingent of immigrants and descendants of Ukrainians in Brazil because of migratory processes that began at the end of the 19th century. One of the universities receiving Ukrainian scientists is in Foz do Iguaçu, a city that borders Argentina and Paraguay. It is a multilingual environment, whose majority languages are Portuguese (the official language of Brazil), Spanish (the official language of both Argentina and Paraguay), as well as Guarani (the co-official indigenous language of Paraguay). It is in such a sociolinguistic environment that two Ukrainian professors began their activities within the scope of an Interdisciplinary Postgraduate Program (master’s and doctorate degree). This case study, whose theme is the management of multilingualism, was developed within the scope of Language Policy. It aimed at identifying the attitudes of both Ukrainian professors and postgraduate students towards multilingualism in this context, given the plural linguistic repertoire of the academic community, as well as identifying the language management strategies for the construction of knowledge implemented by the program and in the classroom by these participants. Therefore, the study was conducted under a qualitative approach, for which surveys and interviews were adopted as part of its methodological procedures. Data revealed the presence of different languages in the classroom (Portuguese, Spanish, English and Ukrainian), which made pedagogical practices challenging for both professors and students, whose levels of knowledge in the different languages varied significantly. The results indicate that multilingualism was the norm as the means of instruction adopted in this context, in which bilingual Portuguese-English-Ukrainian instruction was used by the professors in their lectures. Although English has been privileged for the internationalization of Higher Education in various contexts, it was not used as an exclusive means of instruction in this case, mostly because it is a predominantly Portuguese-Spanish-speaking environment. In addition, the professors counted on the mediation of an interpreter hired by the program since not every student had sufficient knowledge of English as part of their repertoires. The findings also suggest Portuguese is the language that most of the participants of this study prefer, both because it is the mother tongue of majority, and because it is the official language of the host country to the professors, who have sought to integrate to the local culture and community. This research is inserted in the Axis: Multilingualism and Education, of the UNESCO Chair on Language Policies for Multilingualism to which this study is related.

Keywords: attitudes, border region, multilingualism management, Ukrainian professors

Procedia PDF Downloads 73
4663 A Map to Integrating Media into the Spanish Curriculum: The Case of California Lutheran University

Authors: Carrollyne Aasen, Laverne Seales

Abstract:

With increased Latinx communities within the United States, specifically in California, and more universities receiving designations of Hispanic-Serving institutions, Spanish programs have evolved to include more targeted and applicable practical skills. The Spanish program in the Languages and Cultures Department at California Lutheran University incorporated an interdisciplinary project with the Communication Department to create student-generated Spanish-language news inserts, which serve as a sister publication to the English-language student newspaper, The Echo. California Lutheran University is a Hispanic-Serving Institution, meaning it is an accredited undergraduate institution with full-time Hispanic/Latinx students equivalent to at least 25 percent of the total students enrolled. As a Hispanic Serving Institution with growing numbers of bilingual students, faculty, staff, and community members, the need for more information aimed at Hispanic/Latinx communities increased, resulting in the opportunity to reflect topics of interest by community members. This project was developed to fulfill the Spanish program's goals for proficiency by using the American Council on the Teaching of Foreign Languages guidelines and the university's need to support students and the community's voices. This article describes the stages from inception to production and the incorporation of journalism principles into the Spanish curriculum.

Keywords: interdisciplinary, media, foreign languages, HSI

Procedia PDF Downloads 74
4662 Portfolio Management for Construction Company during Covid-19 Using AHP Technique

Authors: Sareh Rajabi, Salwa Bheiry

Abstract:

In general, Covid-19 created many financial and non-financial damages to the economy and community. Level and severity of covid-19 as pandemic case varies over the region and due to different types of the projects. Covid-19 virus emerged as one of the most imperative risk management factors word-wide recently. Therefore, as part of portfolio management assessment, it is essential to evaluate severity of such risk on the project and program in portfolio management level to avoid any risky portfolio. Covid-19 appeared very effectively in South America, part of Europe and Middle East. Such pandemic infection affected the whole universe, due to lock down, interruption in supply chain management, health and safety requirements, transportations and commercial impacts. Therefore, this research proposes Analytical Hierarchy Process (AHP) to analyze and assess such pandemic case like Covid-19 and its impacts on the construction projects. The AHP technique uses four sub-criteria: Health and safety, commercial risk, completion risk and contractual risk to evaluate the project and program. The result will provide the decision makers with information which project has higher or lower risk in case of Covid-19 and pandemic scenario. Therefore, the decision makers can have most feasible solution based on effective weighted criteria for project selection within their portfolio to match with the organization’s strategies.

Keywords: portfolio management, risk management, COVID-19, analytical hierarchy process technique

Procedia PDF Downloads 114
4661 Evaluating Impact of Teacher Professional Development Program on Students’ Learning

Authors: S. C. Lin, W. W. Cheng, M. S. Wu

Abstract:

This study attempted to investigate the connection between teacher professional development program and students’ Learning. This study took Readers’ Theater Teaching Program (RTTP) for professional development as an example to inquiry how participants apply their new knowledge and skills learned from RTTP to their teaching practice and how the impact influence students learning. The goals of the RTTP included: 1) to enhance teachers RT content knowledge; 2) to implement RT instruction in teachers’ classrooms in response to their professional development. 2) to improve students’ ability of reading fluency in professional development teachers’ classrooms. This study was a two-year project. The researchers applied mixed methods to conduct this study including qualitative inquiry and one-group pretest-posttest experimental design. In the first year, this study focused on designing and implementing RTTP and evaluating participants’ satisfaction of RTTP, what they learned and how they applied it to design their English reading curriculum. In the second year, the study adopted quasi-experimental design approach and evaluated how participants RT instruction influenced their students’ learning, including English knowledge, skill, and attitudes. The participants in this study composed two junior high school English teachers and their students. Data were collected from a number of different sources including teaching observation, semi-structured interviews, teaching diary, teachers’ professional development portfolio, Pre/post RT content knowledge tests, teacher survey, and students’ reading fluency tests. To analyze the data, both qualitative and quantitative data analysis were used. Qualitative data analysis included three stages: organizing data, coding data, and analyzing and interpreting data. Quantitative data analysis included descriptive analysis. The results indicated that average percentage of correct on pre-tests in RT content knowledge assessment was 40.75% with two teachers ranging in prior knowledge from 35% to 46% in specific RT content. Post-test RT content scores ranged from 70% to 82% correct with an average score of 76.50%. That gives teachers an average gain of 35.75% in overall content knowledge as measured by these pre/post exams. Teachers’ pre-test scores were lowest in script writing and highest in performing. Script writing was also the content area that showed the highest gains in content knowledge. Moreover, participants hold a positive attitude toward RTTP. They recommended that the approach of professional learning community, which was applied in RTTP was benefit to their professional development. Participants also applied the new skills and knowledge which they learned from RTTP to their practices. The evidences from this study indicated that RT English instruction significantly influenced students’ reading fluency and classroom climate. The result indicated that all of the experimental group students had a big progress in reading fluency after RT instruction. The study also found out several obstacles. Suggestions were also made.

Keywords: teacher’s professional development, program evaluation, readers’ theater, english reading instruction, english reading fluency

Procedia PDF Downloads 401
4660 PLC Based Automatic Railway Crossing System for India

Authors: Tapan Upadhyay, Aqib Siddiqui, Sameer Khan

Abstract:

Railway crossing system in India is a manually operated level crossing system, either manned or unmanned. The main aim is to protect pedestrians and vehicles from colliding with trains, which pass at regular intervals, as India has the largest and busiest railway network. But because of human error and negligence, every year thousands of lives are lost due to accidents at railway crossings. To avoid this, we suggest a solution, by using Programmable Logical Controller (PLC) based automatic system, which will automatically control the barrier as well as roadblocks to stop people from crossing while security warning is given. Often people avoid security warning, and pass two-wheelers from beneath the barrier, while the train is at a distance away. This paper aims at reducing the fatality and accident rate by controlling barrier and roadblocks using sensors which sense the incoming train and vehicles and sends a signal to PLC. The PLC in return sends a signal to barrier and roadblocks. Once the train passes, the barrier and roadblocks retrieve back, and the passage is clear for vehicles and pedestrians to cross. PLC’s are used because they are very flexible, cost effective, space efficient, reduces complexity and minimises errors. Supervisory Control And Data Acquisition (SCADA) is used to monitor the functioning.

Keywords: level crossing, PLC, sensors, SCADA

Procedia PDF Downloads 432
4659 Dynamics of Norms and Identities Facilitate Countries to Resolve Their Conflicts: A Case Study of ASEAN

Authors: Chander Shekhar Kohli

Abstract:

In the field of international relations, countries have been experiencing distinct nature of conflicts. But, in the case of Association of Southeast Asian Nations (ASEAN) for a long time, the members have witnessed conflicts, small and large. These conflicts, as a result, have given catastrophic outcomes, such as killings and destroying properties. For the resolution of such conflicts, nonetheless, efforts likewise have been made, simultaneously, in terms of establishing peace and security. In this background, the ASEAN presents a significant example as before it had faced several wars, like Vietnam War, Cambodia conflicts, and so on. This research paper, therefore, strives to examine the ASEAN as a case with the help of both primary and secondary sources. It likewise will be dealt with how changing norms and identity building facilitate the ASEAN countries to deal with their conflicts both internal and external. This paper also will discuss how internal developments within countries affect conflict resolution process as each member of ASEAN is guided by its national interest. It is then argued that conflict resolution in the ASEAN is moving from its existing power-based solution to norms and identity-based solution as member countries have become more dependent on other countries. The research, therefore, is concluded by saying that the conflicts could only be resolved through building norms and common identities, which of course are recognized crucial mechanisms among the ASEAN countries with some exceptions.

Keywords: ASEAN, conflict resolution, norms and identities, peace and security

Procedia PDF Downloads 212
4658 Numerical Investigation and Optimization of the Effect of Number of Blade and Blade Type on the Suction Pressure and Outlet Mass Flow Rate of a Centrifugal Fan

Authors: Ogan Karabas, Suleyman Yigit

Abstract:

Number of blade and blade type of centrifugal fans are the most decisive factor on the field of application, noise level, suction pressure and outlet mass flow rate. Nowadays, in order to determine these effects on centrifugal fans, numerical studies are carried out in addition to experimental studies. In this study, it is aimed to numerically investigate the changes of suction pressure and outlet mass flow rate values of a centrifugal fan according to the number of blade and blade type. Centrifugal fans of the same size with forward, backward and straight blade type were analyzed by using a simulation program and compared with each other. This analysis was carried out under steady state condition by selecting k-Ɛ turbulence model and air is assumed incompressible. Then, 16, 32 and 48 blade centrifugal fans were again analyzed by using same simulation program, and the optimum number of blades was determined for the suction pressure and the outlet mass flow rate. According to the results of the analysis, it was obtained that the suction pressure in the 32 blade fan was twice the value obtained in the 16 blade fan. In addition, the outlet mass flow rate increased by 45% with the increase in the number of blade from 16 to 32. There is no significant change observed on the suction pressure and outlet mass flow rate when the number of blades increased from 32 to 48. In the light of the analysis results, the optimum blade number was determined as 32.

Keywords: blade type, centrifugal fan, cfd, outlet mass flow rate, suction pressure

Procedia PDF Downloads 408
4657 The ICC, International Criminal Justice and International Politics

Authors: Girma Y. Iyassu Menelik

Abstract:

The international community has gone through indescribable atrocities resulting from acts of war. These atrocities turned Europe and Africa into a wilderness of bloodshed and crime. In the period 1960- 1970s Africa witnessed unprecedented and well-documented assaults on life and property. This necessitated the adoption, signing and ratification of the International Criminal Court, establishment of the International Court of Justice which is a great achievement for the protection and fulfilling of human rights in the context of international political instability. The ICC came as an important opportunity to advance justice for serious crimes committed in violation of international law. Thus the Rome statute has become a formidable contribution to peace and security. There are concerns that the ICC is targeting African states. However, the ICC cannot preside over cases that are not parties to the Rome statute unless the UN Security council refers the situation or the relevant state asks the court to become involved. The instable international political situation thus deals with criminal prosecutions where amnesty is not permissible or is strongly repudiated. The court has become important justice instruments for states that are unable or unwilling to fulfill their obligation to address legacies of massive human rights violations. The ICJ as a court has a twofold role; to settle legal disputes submitted to it by states, and to give advisory opinions on legal questions referred to it by duly authorized United Nations organs and specialized agencies. All members of the UN are ipso facto parties to the statute of the ICJ. The court gives advisory opinion on any legal question. These courts are the most appropriate fora to pronounce on international crimes and are in a better position to know and apply international law. Cases that have been brought to the courts include Rwanda’s genocide, Liberia’s Charles Taylor etc. The receptiveness and cooperation of the local populations are important to the courts and if the ICC and ICJ can provide appropriate protections for the physical and economic safety of victims then peace and human rights observance can be attained. This paper will look into the effectiveness and impediments of these courts in handling criminal and injustices in international politics as while as what needs to be done to strengthen the capacity of these courts.

Keywords: ICC, international politics, justice, UN security council, violence, protection, fulfilling

Procedia PDF Downloads 453
4656 On the Path of Radicalization: Policing of Muslim Americans Post 9/11

Authors: Hagar Elsayed

Abstract:

This case study examines the framing of the diverse populations of Arab, Muslim and South Asian immigrants and their descendants in local communities by both federal and local law enforcement agencies. It explores how urban spaces and policing are constructed as necessary components of national security in the context of the war on terror by focusing on practices employed in local spaces such as Dearborn, Michigan and training methods adopted on a national level. The proliferation of American Arabs as ‘terrorist’ works to legitimize not only increasing state surveillance, but also military strategies which infringe on ‘inside’ spaces. Sustaining these progressively militarized civil policing operations, which demand intense mobilization of state power, requires that whole neighborhoods and districts are reimagined to portray these geographies in a certain light. This case study is central in understanding how Arab, South Asian, and Muslim civilians’ transformation into a “national security” issue have created militarized police enforcement agencies that employ military tactics to map the terrain of Otherness. This study looks at how race factors into key recent incidents, and asks whether this militarization builds from past forms of racist policing, and whether these specific incidents are reflective of larger patterns or whether they are just isolated incidents.

Keywords: American-Muslims, Arabs, militarization, policing

Procedia PDF Downloads 139
4655 An Exploratory Study on the Integration of Neurodiverse University Students into Mainstream Learning and Their Performance: The Case of the Jones Learning Center

Authors: George Kassar, Phillip A. Cartwright

Abstract:

Based on data collected from The Jones Learning Center (JLC), University of the Ozarks, Arkansas, U.S., this study explores the impact of inclusive classroom practices on neuro-diverse college students’ and their consequent academic performance having participated in integrative therapies designed to support students who are intellectually capable of obtaining a college degree, but who require support for learning challenges owing to disabilities, AD/HD, or ASD. The purpose of this study is two-fold. The first objective is to explore the general process, special techniques, and practices of the (JLC) inclusive program. The second objective is to identify and analyze the effectiveness of the processes, techniques, and practices in supporting the academic performance of enrolled college students with learning disabilities following integration into mainstream university learning. Integrity, transparency, and confidentiality are vital in the research. All questions were shared in advance and confirmed by the concerned management at the JLC. While administering the questionnaire as well as conducted the interviews, the purpose of the study, its scope, aims, and objectives were clearly explained to all participants prior starting the questionnaire / interview. Confidentiality of all participants assured and guaranteed by using encrypted identification of individuals, thus limiting access to data to only the researcher, and storing data in a secure location. Respondents were also informed that their participation in this research is voluntary, and they may withdraw from it at any time prior to submission if they wish. Ethical consent was obtained from the participants before proceeding with videorecording of the interviews. This research uses a mixed methods approach. The research design involves collecting, analyzing, and “mixing” quantitative and qualitative methods and data to enable a research inquiry. The research process is organized based on a five-pillar approach. The first three pillars are focused on testing the first hypothesis (H1) directed toward determining the extent to the academic performance of JLC students did improve after involvement with comprehensive JLC special program. The other two pillars relate to the second hypothesis (H2), which is directed toward determining the extent to which collective and applied knowledge at JLC is distinctive from typical practices in the field. The data collected for research were obtained from three sources: 1) a set of secondary data in the form of Grade Point Average (GPA) received from the registrar, 2) a set of primary data collected throughout structured questionnaire administered to students and alumni at JLC, and 3) another set of primary data collected throughout interviews conducted with staff and educators at JLC. The significance of this study is two folds. First, it validates the effectiveness of the special program at JLC for college-level students who learn differently. Second, it identifies the distinctiveness of the mix of techniques, methods, and practices, including the special individualized and personalized one-on-one approach at JLC.

Keywords: education, neuro-diverse students, program effectiveness, Jones learning center

Procedia PDF Downloads 77
4654 Blockchain-Based Approach on Security Enhancement of Distributed System in Healthcare Sector

Authors: Loong Qing Zhe, Foo Jing Heng

Abstract:

A variety of data files are now available on the internet due to the advancement of technology across the globe today. As more and more data are being uploaded on the internet, people are becoming more concerned that their private data, particularly medical health records, are being compromised and sold to others for money. Hence, the accessibility and confidentiality of patients' medical records have to be protected through electronic means. Blockchain technology is introduced to offer patients security against adversaries or unauthorised parties. In the blockchain network, only authorised personnel or organisations that have been validated as nodes may share information and data. For any change within the network, including adding a new block or modifying existing information about the block, a majority of two-thirds of the vote is required to confirm its legitimacy. Additionally, a consortium permission blockchain will connect all the entities within the same community. Consequently, all medical data in the network can be safely shared with all authorised entities. Also, synchronization can be performed within the cloud since the data is real-time. This paper discusses an efficient method for storing and sharing electronic health records (EHRs). It also examines the framework of roles within the blockchain and proposes a new approach to maintain EHRs with keyword indexes to search for patients' medical records while ensuring data privacy.

Keywords: healthcare sectors, distributed system, blockchain, electronic health records (EHR)

Procedia PDF Downloads 196
4653 Finite Element Analysis of Steel-Concrete Composite Structures Considering Bond-Slip Effect

Authors: WonHo Lee, Hyo-Gyoung Kwak

Abstract:

A numerical model considering slip behavior of steel-concrete composite structure is introduced. This model is based on a linear bond stress-slip relation along the interface. Single node was considered at the interface of steel and concrete member in finite element analysis, and it improves analytical problems of model that takes double nodes at the interface by adopting spring elements to simulate the partial interaction. The slip behavior is simulated by modifying material properties of steel element contacting concrete according to the derived formulation. Decreased elastic modulus simulates the slip occurrence at the interface and decreased yield strength simulates drop in load capacity of the structure. The model is verified by comparing numerical analysis applying this model with experimental studies. Acknowledgment—This research was supported by a grant(13SCIPA01) from Smart Civil Infrastructure Research Program funded by Ministry of Land, Infrastructure and Transport(MOLIT) of Korea government and Korea Agency for Infrastructure Technology Advancement(KAIA) and financially supported by Korea Ministry of Land, Infrastructure and Transport(MOLIT) as U-City Master and Doctor Course Grant Program.

Keywords: bond-slip, composite structure, partial interaction, steel-concrete structure

Procedia PDF Downloads 181