Search results for: ion torrent personal genome machine (PGM)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5333

Search results for: ion torrent personal genome machine (PGM)

3473 Rating Agreement: Machine Learning for Environmental, Social, and Governance Disclosure

Authors: Nico Rosamilia

Abstract:

The study evaluates the importance of non-financial disclosure practices for regulators, investors, businesses, and markets. It aims to create a sector-specific set of indicators for environmental, social, and governance (ESG) performances alternative to the ratings of the agencies. The existing literature extensively studies the implementation of ESG rating systems. Conversely, this study has a twofold outcome. Firstly, it should generalize incentive systems and governance policies for ESG and sustainable principles. Therefore, it should contribute to the EU Sustainable Finance Disclosure Regulation. Secondly, it concerns the market and the investors by highlighting successful sustainable investing. Indeed, the study contemplates the effect of ESG adoption practices on corporate value. The research explores the asset pricing angle in order to shed light on the fragmented argument on the finance of ESG. Investors may be misguided about the positive or negative effects of ESG on performances. The paper proposes a different method to evaluate ESG performances. By comparing the results of a traditional econometric approach (Lasso) with a machine learning algorithm (Random Forest), the study establishes a set of indicators for ESG performance. Therefore, the research also empirically contributes to the theoretical strands of literature regarding model selection and variable importance in a finance framework. The algorithms will spit out sector-specific indicators. This set of indicators defines an alternative to the compounded scores of ESG rating agencies and avoids the possible offsetting effect of scores. With this approach, the paper defines a sector-specific set of indicators to standardize ESG disclosure. Additionally, it tries to shed light on the absence of a clear understanding of the direction of the ESG effect on corporate value (the problem of endogeneity).

Keywords: ESG ratings, non-financial information, value of firms, sustainable finance

Procedia PDF Downloads 77
3472 Influence of Food Microbes on Horizontal Transfer of β-Lactam Resistance Genes between Salmonella Strains in the Mouse Gut

Authors: M. Ottenbrite, G. Yilmaz, J. Devenish, M. Kang, H. Dan, M. Lin, C. Lau, C. Carrillo, K. Bessonov, J. Nash, E. Topp, J. Guan

Abstract:

Consumption of food contaminated by antibiotic-resistant (AR) bacteria may lead to the transmission of AR genes in the gut microbiota and cause AR bacterial infection, a significant public health concern. However, information is limited on if and how background microbes from the food matrix (food microbes) may influence resistance transmission. Thus, we assessed the colonization of a β-lactam resistant Salmonella Heidelberg strain (donor) and a β-lactam susceptible S. Typhimurium strain (recipient) and the transfer of the resistance genes in the mouse gut in the presence or absence of food microbes that were derived from washing freshly-harvested carrots. Mice were pre-treated with streptomycin and then inoculated with both donor and recipient bacteria or recipient only. Fecal shedding of the donor, recipient, and transconjugant bacteria was enumerated using selective culture techniques. Transfer of AR genes was confirmed by whole genome sequencing. Gut microbial composition was determined by 16s rRNA amplicon sequencing. Significantly lower numbers of donors and recipients were shed from mice that were inoculated with food microbes compared to those without food microbe inoculation. S. Typhimurium transconjugants were only recovered from mice without inoculation of food microbes. A significantly higher survival rate was in mice with vs. without inoculation of food microbes. The results suggest that the food microbes may compete with both the donor and recipient Salmonella, limit their growth and reduce transmission of the β-lactam resistance gene in the mouse gut.

Keywords: antibiotic resistance, gene transfer, gut microbiota, Salmonella infection

Procedia PDF Downloads 64
3471 Stochastic Multicast Routing Protocol for Flying Ad-Hoc Networks

Authors: Hyunsun Lee, Yi Zhu

Abstract:

Wireless ad-hoc network is a decentralized type of temporary machine-to-machine connection that is spontaneous or impromptu so that it does not rely on any fixed infrastructure and centralized administration. As unmanned aerial vehicles (UAVs), also called drones, have recently become more accessible and widely utilized in military and civilian domains such as surveillance, search and detection missions, traffic monitoring, remote filming, product delivery, to name a few. The communication between these UAVs become possible and materialized through Flying Ad-hoc Networks (FANETs). However, due to the high mobility of UAVs that may cause different types of transmission interference, it is vital to design robust routing protocols for FANETs. In this talk, the multicast routing method based on a modified stochastic branching process is proposed. The stochastic branching process is often used to describe an early stage of an infectious disease outbreak, and the reproductive number in the process is used to classify the outbreak into a major or minor outbreak. The reproductive number to regulate the local transmission rate is adapted and modified for flying ad-hoc network communication. The performance of the proposed routing method is compared with other well-known methods such as flooding method and gossip method based on three measures; average reachability, average node usage and average branching factor. The proposed routing method achieves average reachability very closer to flooding method, average node usage closer to gossip method, and outstanding average branching factor among methods. It can be concluded that the proposed multicast routing scheme is more efficient than well-known routing schemes such as flooding and gossip while it maintains high performance.

Keywords: Flying Ad-hoc Networks, Multicast Routing, Stochastic Branching Process, Unmanned Aerial Vehicles

Procedia PDF Downloads 117
3470 Development and Characterisation of Nonwoven Fabrics for Apparel Applications

Authors: Muhammad Cheema, Tahir Shah, Subhash Anand

Abstract:

The cost of making apparel fabrics for garment manufacturing is very high because of their conventional manufacturing processes and new methods/processes are being constantly developed for making fabrics by unconventional methods. With the advancements in technology and the availability of the innovative fibres, durable nonwoven fabrics by using the hydroentanglement process that can compete with the woven fabrics in terms of their aesthetic and tensile properties are being developed. In the work reported here, the hydroentangled nonwoven fabrics were developed through a hybrid nonwoven manufacturing processes by using fibrillated Tencel® and bi-component (sheath/core) polyethylene/polyester (PE/PET) fibres, in which the initial nonwoven fabrics were prepared by the needle-punching method followed by hydroentanglement process carried out at optimal pressures of 50 to 250bars. The prepared fabrics were characterized according to the British Standards (BS 3356:1990, BS 9237:1995, BS 13934-1:1999) and the attained results were compared with those for a standard plain-weave cotton, polyester woven fabric and commercially available nonwoven fabric (Evolon®). The developed hydroentangled fabrics showed better drape properties owing to their flexural rigidity of 252 mg.cm in the machine direction, while the corresponding commercial hydroentangled fabric displayed a value of 1340 mg.cm in the machine direction. The tensile strength of the developed hydroentangled fabrics showed an approximately 200% increase than the commercial hydroentangled fabrics. Similarly, the developed hydroentangled fabrics showed higher properties in term of air permeability, such as the developed hydroentangled fabric exhibited 448 mm/sec and Evolon fabric exhibited 69 mm/sec at 100 Pa pressure. Thus for apparel fabrics, the work combining the existing methods of nonwoven production, provides additional benefits in terms of cost, time and also helps in reducing the carbon footprint for the apparel fabric manufacture.

Keywords: hydroentanglement, nonwoven apparel, durable nonwoven, wearable nonwoven

Procedia PDF Downloads 256
3469 Effects of an Inclusive Educational Model for Students with High Intellectual Capacity and Special Educational Needs: A Case Study in Talentos UdeC, Chile

Authors: Gracia V. Navarro, María C. González, María G. González, María V. González

Abstract:

In Chile, since 2002, there are extracurricular enrichment programs complementary to regular education for students with high intellectual capacity. This paper describes a model for the educational inclusion of students, with special educational needs associated with high intellectual capacity, developed at the University of Concepción and its effects on its students, academics and undergraduate students that collaborate with the program. The Talentos UdeC Program was created in 2003 and is intended for 240 children and youth from 11 to 18 years old, from 15 communes of the Biobio region. The case Talentos UdeC is analyzed from a mixed qualitative study in which those participating in the educational model are considered. The sample was composed of 30 students, 30 academics, and 30 undergraduate students. In the case of students, pre and post program measurements were made to analyze their socio-emotional adaptation, academic motivation and socially responsible behavior. The mentioned variables are measured through questionnaires designed and validated by the University of Concepcion that included: The Socially Responsible Behavior Questionnaire (CCSR); the Academic Motivation Questionnaire (CMA) and the Socio-Emotional Adaptation Questionnaire (CASE). The information obtained by these questionnaires was analyzed through a quantitative analysis. Academics and undergraduate students were interviewed to learn their perception of the effects of the program on themselves, on students and on society. The information obtained is analyzed using qualitative analysis based on the identification of common themes and descriptors for the construction of conceptual categories of answers. Quantitative results show differences in the first three variables analyzed in the students, after their participation for two years in Talentos UdeC. Qualitative results demonstrate perception of effects in the vision of world, project of life and in other areas of the students’ development; perception of effects in a personal, professional and organizational plane by academics and a perception of effects in their personal-social development and training in generic competencies by undergraduates students.

Keywords: educational model, high intellectual capacity, inclusion, special educational needs

Procedia PDF Downloads 205
3468 Federated Learning in Healthcare

Authors: Ananya Gangavarapu

Abstract:

Convolutional Neural Networks (CNN) based models are providing diagnostic capabilities on par with the medical specialists in many specialty areas. However, collecting the medical data for training purposes is very challenging because of the increased regulations around data collections and privacy concerns around personal health data. The gathering of the data becomes even more difficult if the capture devices are edge-based mobile devices (like smartphones) with feeble wireless connectivity in rural/remote areas. In this paper, I would like to highlight Federated Learning approach to mitigate data privacy and security issues.

Keywords: deep learning in healthcare, data privacy, federated learning, training in distributed environment

Procedia PDF Downloads 133
3467 Force Measurement for E-Cadherin-Mediated Intercellular Adhesion Probed by Protein Micropattern and Traction Force Microscopy

Authors: Chieh-Chung Tsou, Chun-Min Lo, Yeh-Shiu Chu

Abstract:

Cell’s mechanical forces provide important physical cues in regulation of proper cellular functions, such as cell differentiation, proliferation and migration. It is believed that adhesive forces generated by cell-cell interaction are able to transmit to the interior of cell through filamentous cortical cytoskeleton. Prominent among other membrane receptors, Cadherins are prototypical adhesive molecules able to generate remarkable forces to regulate intercellular adhesion. However, the mechanistic steps of mechano-transduction in Cadherin-mediated adhesion remain very controversial. We are interested in understanding how Cadherin protein complexes enable force generation and transmission at cell-cell contact in the initial stage of intercellular adhesion. For providing a better control of time, space, and substrate stiffness, in this study, a combination of protein micropattern, micropipette manipulation, and traction force microscopy is used. Pair micropattern with different forms confines cell spreading area and the gaps in pairs varied from 2 to 8 microns are applied for monitoring the forces that cell pairs generated, measured by traction force microscopy. Moreover, cell clones obtained from epithelial cells undergone genome editing are used to score the importance for known components of Cadherin complexes in force generation. We believe that our results from this combinatory mechanobiological method will provide deep insights on understanding the biophysical principle governing mechano- transduction of Cadherin-mediated intercellular adhesion.

Keywords: cadherin, intercellular adhesion, protein micropattern, traction force microscopy

Procedia PDF Downloads 248
3466 The Relationship between the Content of Inner Human Experience and Well-Being: An Experience Sampling Study

Authors: Xinqi Guo, Karen R. Dobkins

Abstract:

Background and Objectives: Humans are probably the only animals whose minds are constantly filled with thoughts, feelings and emotions. Previous studies have investigated human minds from different dimensions, including its proportion of time for not being present, its representative format, its personal relevance, its temporal locus, and affect valence. The current study aims at characterizing human mind by employing Experience Sampling Methods (ESM), a self-report research procedure for studying daily experience. This study emphasis on answering the following questions: 1) How does the contents of the inner experience vary across demographics, 2) Are certain types of inner experiences correlated with level of mindfulness and mental well-being (e.g., are people who spend more time being present happier, and are more mindful people more at-present?), 3) Will being prompted to report one’s inner experience increase mindfulness and mental well-being? Methods: Participants were recruited from the subject pool of UC San Diego or from the social media. They began by filling out two questionnaires: 1) Five Facet Mindfulness Questionnaire-Short Form, and 2) Warwick-Edinburgh Mental Well-being Scale, and demographic information. Then they participated in the ESM part by responding to the prompts which contained questions about their real-time inner experience: if they were 'at-present', 'mind-wandering', or 'zoned-out'. The temporal locus, the clarity, and the affect valence, and the personal importance of the thought they had the moment before the prompt were also assessed. A mobile app 'RealLife Exp' randomly delivered these prompts 3 times/day for 6 days during wake-time. After the 6 days, participants completed questionnaire (1) and (2) again. Their changes of score were compared to a control group who did not participate in the ESM procedure (yet completed (1) and (2) one week apart). Results: Results are currently preliminary as we continue to collect data. So far, there is a trend that participants are present, mind-wandering and zoned-out, about 53%, 23% and 24% during wake-time, respectively. The thoughts of participants are ranked to be clearer and more neutral if they are present vs. mind-wandering. Mind-wandering thoughts are 66% about the past, consisting 80% of inner speech. Discussion and Conclusion: This study investigated the subjective account of human mind by a tool with high ecological validity. And it broadens the understanding of the relationship between contents of mind and well-being.

Keywords: experience sampling method, meta-memory, mindfulness, mind-wandering

Procedia PDF Downloads 127
3465 The Regulation of Reputational Information in the Sharing Economy

Authors: Emre Bayamlıoğlu

Abstract:

This paper aims to provide an account of the legal and the regulative aspects of the algorithmic reputation systems with a special emphasis on the sharing economy (i.e., Uber, Airbnb, Lyft) business model. The first section starts with an analysis of the legal and commercial nature of the tripartite relationship among the parties, namely, the host platform, individual sharers/service providers and the consumers/users. The section further examines to what extent an algorithmic system of reputational information could serve as an alternative to legal regulation. Shortcomings are explained and analyzed with specific examples from Airbnb Platform which is a pioneering success in the sharing economy. The following section focuses on the issue of governance and control of the reputational information. The section first analyzes the legal consequences of algorithmic filtering systems to detect undesired comments and how a delicate balance could be struck between the competing interests such as freedom of speech, privacy and the integrity of the commercial reputation. The third section deals with the problem of manipulation by users. Indeed many sharing economy businesses employ certain techniques of data mining and natural language processing to verify consistency of the feedback. Software agents referred as "bots" are employed by the users to "produce" fake reputation values. Such automated techniques are deceptive with significant negative effects for undermining the trust upon which the reputational system is built. The third section is devoted to explore the concerns with regard to data mobility, data ownership, and the privacy. Reputational information provided by the consumers in the form of textual comment may be regarded as a writing which is eligible to copyright protection. Algorithmic reputational systems also contain personal data pertaining both the individual entrepreneurs and the consumers. The final section starts with an overview of the notion of reputation as a communitarian and collective form of referential trust and further provides an evaluation of the above legal arguments from the perspective of public interest in the integrity of reputational information. The paper concludes with certain guidelines and design principles for algorithmic reputation systems, to address the above raised legal implications.

Keywords: sharing economy, design principles of algorithmic regulation, reputational systems, personal data protection, privacy

Procedia PDF Downloads 462
3464 Day Ahead and Intraday Electricity Demand Forecasting in Himachal Region using Machine Learning

Authors: Milan Joshi, Harsh Agrawal, Pallaw Mishra, Sanand Sule

Abstract:

Predicting electricity usage is a crucial aspect of organizing and controlling sustainable energy systems. The task of forecasting electricity load is intricate and requires a lot of effort due to the combined impact of social, economic, technical, environmental, and cultural factors on power consumption in communities. As a result, it is important to create strong models that can handle the significant non-linear and complex nature of the task. The objective of this study is to create and compare three machine learning techniques for predicting electricity load for both the day ahead and intraday, taking into account various factors such as meteorological data and social events including holidays and festivals. The proposed methods include a LightGBM, FBProphet, combination of FBProphet and LightGBM for day ahead and Motifs( Stumpy) based on Mueens algorithm for similarity search for intraday. We utilize these techniques to predict electricity usage during normal days and social events in the Himachal Region. We then assess their performance by measuring the MSE, RMSE, and MAPE values. The outcomes demonstrate that the combination of FBProphet and LightGBM method is the most accurate for day ahead and Motifs for intraday forecasting of electricity usage, surpassing other models in terms of MAPE, RMSE, and MSE. Moreover, the FBProphet - LightGBM approach proves to be highly effective in forecasting electricity load during social events, exhibiting precise day ahead predictions. In summary, our proposed electricity forecasting techniques display excellent performance in predicting electricity usage during normal days and special events in the Himachal Region.

Keywords: feature engineering, FBProphet, LightGBM, MASS, Motifs, MAPE

Procedia PDF Downloads 65
3463 A Comparative Study of the Tribological Behavior of Bilayer Coatings for Machine Protection

Authors: Cristina Diaz, Lucia Perez-Gandarillas, Gonzalo Garcia-Fuentes, Simone Visigalli, Roberto Canziani, Giuseppe Di Florio, Paolo Gronchi

Abstract:

During their lifetime, industrial machines are often subjected to chemical, mechanical and thermal extreme conditions. In some cases, the loss of efficiency comes from the degradation of the surface as a result of its exposition to abrasive environments that can cause wear. This is a common problem to be solved in industries of diverse nature such as food, paper or concrete industries, among others. For this reason, a good selection of the material is of high importance. In the machine design context, stainless steels such as AISI 304 and 316 are widely used. However, the severity of the external conditions can require additional protection for the steel and sometimes coating solutions are demanded in order to extend the lifespan of these materials. Therefore, the development of effective coatings with high wear resistance is of utmost technological relevance. In this research, bilayer coatings made of Titanium-Tantalum, Titanium-Niobium, Titanium-Hafnium, and Titanium-Zirconium have been developed using magnetron sputtering configuration by PVD (Physical Vapor Deposition) technology. Their tribological behavior has been measured and evaluated under different environmental conditions. Two kinds of steels were used as substrates: AISI 304, AISI 316. For the comparison with these materials, titanium alloy substrate was also employed. Regarding the characterization, wear rate and friction coefficient were evaluated by a tribo-tester, using a pin-on-ball configuration with different lubricants such as tomato sauce, wine, olive oil, wet compost, a mix of sand and concrete with water and NaCl to approximate the results to real extreme conditions. In addition, topographical images of the wear tracks were obtained in order to get more insight of the wear behavior and scanning electron microscope (SEM) images were taken to evaluate the adhesion and quality of the coating. The characterization was completed with the measurement of nanoindentation hardness and elastic modulus. Concerning the results, thicknesses of the samples varied from 100 nm (Ti-Zr layer) to 1.4 µm (Ti-Hf layer) and SEM images confirmed that the addition of the Ti layer improved the adhesion of the coatings. Moreover, results have pointed out that these coatings have increased the wear resistance in comparison with the original substrates under environments of different severity. Furthermore, nanoindentation hardness results showed an improvement of the elastic strain to failure and a high modulus of elasticity (approximately 200 GPa). As a conclusion, Ti-Ta, Ti-Zr, Ti-Nb, and Ti-Hf are very promising and effective coatings in terms of tribological behavior, improving considerably the wear resistance and friction coefficient of typically used machine materials.

Keywords: coating, stainless steel, tribology, wear

Procedia PDF Downloads 145
3462 Forensic Detection of Errors Permitted by the Witnesses in Their Testimony

Authors: Lev Bertovsky

Abstract:

The purpose of this study was to determine the reasons for the formation of false testimony from witnesses and make recommendations on the recognition of such cases. During the studies, which were based on the achievements of professionals in the field of psychology, as well as personal investigative practice, the stages of perception of the information were studied, as well as the process of its reclaim from the memory and transmission to the communicator upon request. Based on the principles of the human brain, kinds of conscientious witness mistakes were systematized. Proposals were formulated for the optimization of investigative actions in cases where the witnesses make an honest mistake with respect to the effects previously observed by them.

Keywords: criminology, eyewitness testimony, honest mistake, information, investigator, investigation, questioning

Procedia PDF Downloads 181
3461 Modelling Insider Attacks in Public Cloud

Authors: Roman Kulikov, Svetlana Kolesnikova

Abstract:

Last decade Cloud Computing technologies have been rapidly becoming ubiquitous. Each year more and more organizations, corporations, internet services and social networks trust their business sensitive information to Public Cloud. The data storage in Public Cloud is protected by security mechanisms such as firewalls, cryptography algorithms, backups, etc.. In this way, however, only outsider attacks can be prevented, whereas virtualization tools can be easily compromised by insider. The protection of Public Cloud’s critical elements from internal intruder remains extremely challenging. A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems (OS) to share a single hardware processor in Cloud Computing. One of the hypervisor's functions is to enforce access control policies. Furthermore, it prevents guest OS from disrupting each other and from accessing each other's memory or disk space. Hypervisor is the one of the most critical and vulnerable elements in Cloud Computing infrastructure. Nevertheless, it has been poorly protected from being compromised by insider. By exploiting certain vulnerabilities, privilege escalation can be easily achieved in insider attacks on hypervisor. In this way, an internal intruder, who has compromised one process, is able to gain control of the entire virtual machine. Thereafter, the consequences of insider attacks in Public Cloud might be more catastrophic and significant to virtual tools and sensitive data than of outsider attacks. So far, almost no preventive security countermeasures have been developed. There has been little attention paid for developing models to assist risks mitigation strategies. In this paper formal model of insider attacks on hypervisor is designed. Our analysis identifies critical hypervisor`s vulnerabilities that can be easily compromised by internal intruder. Consequently, possible conditions for successful attacks implementation are uncovered. Hence, development of preventive security countermeasures can be improved on the basis of the proposed model.

Keywords: insider attack, public cloud, cloud computing, hypervisor

Procedia PDF Downloads 356
3460 Expectations of Unvaccinated Health Workers in Greece and the Question of Trust: A Qualitative Study of Vaccine Hesitancy

Authors: Sideri Katerina, Chanania Eleni

Abstract:

The reasons why people remain unvaccinated, especially health workers, are complex. In Greece, 2 percent of health workers (around 7,000) remain unvaccinated, despite the fact that for this group of people vaccination against COVID-19 is mandatory. In April 2022, the Greek health minister repeated that unvaccinated health care workers will remain suspended from their jobs ‘for as long as the pandemic lasts,’ explaining that the suspension of the workers in question was ‘entirely their choice’ and that health professionals who do not believe in vaccines ‘do not believe in their own science.’ Although policy circles around the world often link vaccine hesitancy to ignorance of science or misinformation, various recently published qualitative studies show that vaccine hesitancy is the result of a combination of factors, which include distrust towards elites and the system of innovation and distrust towards government. In a similar spirit, some commentators warn that labeling hesitancy as “anti-science” is bad politics. In this paper, we worked within the tradition of STS taking the view that people draw upon personal associations to enact and express civic concern with an issue, the enactment of public concern involves the articulation of threats to actors’ way of life, personal values, relationships, lived experiences, broader societal values and institutional structures. To this effect, we have conducted 27 in depth interviews with unvaccinated Greek health workers and we are in the process of conducting 20 more interviews. We have so far found that rather than a question of believing in ‘facts’ vaccine hesitancy reflects deep distrust towards those charged with the making of decisions and pharmaceutical companies and that emotions (rather than rational thinking) play a crucial role in the formation of attitudes and the making of decisions. We need to dig deeper so as to understand the causes of distrust towards technical government and the ways in which public(s) conceive of and want to be part in the politics of innovation. We particularly address the question of the effectiveness of mandatory vaccination of health workers and whether such top-down regulatory measures further polarize society, to finally discuss alternative regulatory approaches and governance structures.

Keywords: vaccine hesitancy, innovation, trust in vaccines, sociology of vaccines, attitude drivers towards scientific information, governance

Procedia PDF Downloads 67
3459 Environmental Sanitation Parameters Recording in Refugee-Migrants Camps in Greece, 2017

Authors: Crysovaladou Kefaloudi, Kassiani Mellou, Eirini Saranti-Papasaranti, Athanasios Koustenis, Chrysoula Botsi, Agapios Terzidis

Abstract:

Recent migration crisis led to a vast migrant – refugees movement to Greece which created an urgent need for hosting settlements. Taken into account the protection of public health from possible pathogens related to water and food supply as well as waste and sewage accumulation, a 'Living Conditions Recording Form' was created in the context of 'PHILOS' European Program funded by the Asylum Migration and Integration Fund (AMIF) of EU’s DG Migration and Home Affairs, in order to assess a number of environmental sanitation parameters, in refugees – migrants camps in mainland. The assessment will be completed until the end of July. From March to June 2017, mobile unit teams comprised of health inspectors of sub-action 2 of “PHILOS” proceeded with the assessment of living conditions in twenty-two out of thirty-one camps and 'Stata' was used for the statistical analysis of obtained information. Variables were grouped into the following categories: 1) Camp administration, 2) hosted population number, 3) accommodation, 4) heating installations, 5) personal hygiene, 6) sewage collection and disposal, 7) water supply, 8) waste collection and management, 9) pest control, 10) fire safety, 11) food handling and safety. Preliminary analysis of the results showed that camp administration was performed in 90% of the camps by a public authority with the coordination of various NGOs. The median number of hosted population was 222 ranging from 62 to 3200, and the median value of hosted population per accommodation type was 4 in 19 camps. Heating facilities were provided in 86.1% of camps. In 18.2 % of the camps, one personal hygiene facility was available per 6 people ranging in the rest of the camps from 1 per 3 to 1 per 20 hosted refugees-migrants. Waste and sewage collection was performed depending on populations demand in an adequate way in all recorded camps. In 90% of camps, water was supplied through the central water supply system. In 85% of camps quantity and quality of water supply inside camps was regularly monitored for microbial and chemical indices. Pest control was implemented in 86.4% of the camps as well as fire safety measures. Food was supplied by catering companies in 50% of the camps, and the quality and quantity food was monitored at a regular basis. In 77% of camps, food was prepared by the hosted population with the availability of proper storage conditions. Furthermore, in all camps, hosted population was provided with personal hygiene items and health sanitary educational programs were implemented in 77.3% of camps. In conclusion, in the majority of the camps, environmental sanitation parameters were satisfactory. However, waste and sewage accumulation, as well as inadequate pest control measures were recorded in some camps. The obtained data have led to a number of recommendations for the improvement of sanitary conditions, disseminated to all relevant stakeholders. Special emphasis was given to hygiene measures implementation during food handling by migrants – refugees, as well as to waste and sewage accumulation taking in to account the population’s cultural background.

Keywords: environmental sanitation parameters, food borne diseases risk assessment, refugee – migrants camps, water borne diseases risk assessment

Procedia PDF Downloads 218
3458 Treatment of Interferograms Image of Perturbation Processes in Metallic Samples by Optical Method

Authors: Daira Radouane, Naim Boudmagh, Hamada Adel

Abstract:

The but of this handling is to use the technique of the shearing with a mechanism lapping machine of image: a prism of Wollaston. We want to characterize this prism in order to be able to employ it later on in an analysis by shearing. A prism of Wollaston is a prism produced in a birefringent material i.e. having two indexes of refraction. This prism is cleaved so as to present the directions associated with these indices in its face with entry. It should be noted that these directions are perpendicular between them.

Keywords: non destructive control, aluminium, interferometry, treatment of image

Procedia PDF Downloads 321
3457 Human-Machine Cooperation in Facial Comparison Based on Likelihood Scores

Authors: Lanchi Xie, Zhihui Li, Zhigang Li, Guiqiang Wang, Lei Xu, Yuwen Yan

Abstract:

Image-based facial features can be classified into category recognition features and individual recognition features. Current automated face recognition systems extract a specific feature vector of different dimensions from a facial image according to their pre-trained neural network. However, to improve the efficiency of parameter calculation, an algorithm generally reduces the image details by pooling. The operation will overlook the details concerned much by forensic experts. In our experiment, we adopted a variety of face recognition algorithms based on deep learning, compared a large number of naturally collected face images with the known data of the same person's frontal ID photos. Downscaling and manual handling were performed on the testing images. The results supported that the facial recognition algorithms based on deep learning detected structural and morphological information and rarely focused on specific markers such as stains and moles. Overall performance, distribution of genuine scores and impostor scores, and likelihood ratios were tested to evaluate the accuracy of biometric systems and forensic experts. Experiments showed that the biometric systems were skilled in distinguishing category features, and forensic experts were better at discovering the individual features of human faces. In the proposed approach, a fusion was performed at the score level. At the specified false accept rate, the framework achieved a lower false reject rate. This paper contributes to improving the interpretability of the objective method of facial comparison and provides a novel method for human-machine collaboration in this field.

Keywords: likelihood ratio, automated facial recognition, facial comparison, biometrics

Procedia PDF Downloads 122
3456 Ensemble Machine Learning Approach for Estimating Missing Data from CO₂ Time Series

Authors: Atbin Mahabbati, Jason Beringer, Matthias Leopold

Abstract:

To address the global challenges of climate and environmental changes, there is a need for quantifying and reducing uncertainties in environmental data, including observations of carbon, water, and energy. Global eddy covariance flux tower networks (FLUXNET), and their regional counterparts (i.e., OzFlux, AmeriFlux, China Flux, etc.) were established in the late 1990s and early 2000s to address the demand. Despite the capability of eddy covariance in validating process modelling analyses, field surveys and remote sensing assessments, there are some serious concerns regarding the challenges associated with the technique, e.g. data gaps and uncertainties. To address these concerns, this research has developed an ensemble model to fill the data gaps of CO₂ flux to avoid the limitations of using a single algorithm, and therefore, provide less error and decline the uncertainties associated with the gap-filling process. In this study, the data of five towers in the OzFlux Network (Alice Springs Mulga, Calperum, Gingin, Howard Springs and Tumbarumba) during 2013 were used to develop an ensemble machine learning model, using five feedforward neural networks (FFNN) with different structures combined with an eXtreme Gradient Boosting (XGB) algorithm. The former methods, FFNN, provided the primary estimations in the first layer, while the later, XGB, used the outputs of the first layer as its input to provide the final estimations of CO₂ flux. The introduced model showed slight superiority over each single FFNN and the XGB, while each of these two methods was used individually, overall RMSE: 2.64, 2.91, and 3.54 g C m⁻² yr⁻¹ respectively (3.54 provided by the best FFNN). The most significant improvement happened to the estimation of the extreme diurnal values (during midday and sunrise), as well as nocturnal estimations, which is generally considered as one of the most challenging parts of CO₂ flux gap-filling. The towers, as well as seasonality, showed different levels of sensitivity to improvements provided by the ensemble model. For instance, Tumbarumba showed more sensitivity compared to Calperum, where the differences between the Ensemble model on the one hand and the FFNNs and XGB, on the other hand, were the least of all 5 sites. Besides, the performance difference between the ensemble model and its components individually were more significant during the warm season (Jan, Feb, Mar, Oct, Nov, and Dec) compared to the cold season (Apr, May, Jun, Jul, Aug, and Sep) due to the higher amount of photosynthesis of plants, which led to a larger range of CO₂ exchange. In conclusion, the introduced ensemble model slightly improved the accuracy of CO₂ flux gap-filling and robustness of the model. Therefore, using ensemble machine learning models is potentially capable of improving data estimation and regression outcome when it seems to be no more room for improvement while using a single algorithm.

Keywords: carbon flux, Eddy covariance, extreme gradient boosting, gap-filling comparison, hybrid model, OzFlux network

Procedia PDF Downloads 127
3455 Financial Inclusion in Indonesia and Its Challenges

Authors: Yen Sun, Pariang Siagian

Abstract:

The aim of this paper is to examine the progress of financial inclusion in Indonesia. The object of this paper is Micro Enterprises (MEs) and methodology used will be qualitative method by using surveys and questionnaires. The results show that there are still 20% MEs have no banking facilities at all and about 78% MEs still use their own capital to run their business. Furthermore, personal characteristics such as gender and education are factors that can explain financial inclusion. It is also said that in general MEs need banking product and services. However, there are still barriers that hinder them to be financially included. The most barriers they have to face are marketing exclusion. It shows that they have lack information about banking product and services since marketing strategy from bank is not disseminated clearly through various media.

Keywords: financial inclusion, financial exclusion, micro enterprises, Indonesia

Procedia PDF Downloads 391
3454 Sensorless Machine Parameter-Free Control of Doubly Fed Reluctance Wind Turbine Generator

Authors: Mohammad R. Aghakashkooli, Milutin G. Jovanovic

Abstract:

The brushless doubly-fed reluctance generator (BDFRG) is an emerging, medium-speed alternative to a conventional wound rotor slip-ring doubly-fed induction generator (DFIG) in wind energy conversion systems (WECS). It can provide competitive overall performance and similar low failure rates of a typically 30% rated back-to-back power electronics converter in 2:1 speed ranges but with the following important reliability and cost advantages over DFIG: the maintenance-free operation afforded by its brushless structure, 50% synchronous speed with the same number of rotor poles (allowing the use of a more compact, and more efficient two-stage gearbox instead of a vulnerable three-stage one), and superior grid integration properties including simpler protection for the low voltage ride through compliance of the fractional converter due to the comparatively higher leakage inductances and lower fault currents. Vector controlled pulse-width-modulated converters generally feature a much lower total harmonic distortion relative to hysteresis counterparts with variable switching rates and as such have been a predominant choice for BDFRG (and DFIG) wind turbines. Eliminating a shaft position sensor, which is often required for control implementation in this case, would be desirable to address the associated reliability issues. This fact has largely motivated the recent growing research of sensorless methods and developments of various rotor position and/or speed estimation techniques for this purpose. The main limitation of all the observer-based control approaches for grid-connected wind power applications of the BDFRG reported in the open literature is the requirement for pre-commissioning procedures and prior knowledge of the machine inductances, which are usually difficult to accurately identify by off-line testing. A model reference adaptive system (MRAS) based sensor-less vector control scheme to be presented will overcome this shortcoming. The true machine parameter independence of the proposed field-oriented algorithm, offering robust, inherently decoupled real and reactive power control of the grid-connected winding, is achieved by on-line estimation of the inductance ratio, the underlying rotor angular velocity and position MRAS observer being reliant upon. Such an observer configuration will be more practical to implement and clearly preferable to the existing machine parameter dependent solutions, and especially bearing in mind that with very little modifications it can be adapted for commercial DFIGs with immediately obvious further industrial benefits and prospects of this work. The excellent encoder-less controller performance with maximum power point tracking in the base speed region will be demonstrated by realistic simulation studies using large-scale BDFRG design data and verified by experimental results on a small laboratory prototype of the WECS emulation facility.

Keywords: brushless doubly fed reluctance generator, model reference adaptive system, sensorless vector control, wind energy conversion

Procedia PDF Downloads 58
3453 Gender Equity in Everyday Lives: A Case Study from New Delhi, India

Authors: Shrutika Lakshmi

Abstract:

Gender inequality has been quite evident particularly in the third world economies in different domains like health, education, marriages and personal freedom. Women’s exercise to personal freedom is driven by their financial standing in third world social milieu. However, even after decades of attempt to achieve a socio-economic standing equal to men, their attempts have failed in registering success.This research has been conducted in the national capital of India New Delhi aiming to reflect upon the gendered relations in society on the category of employed women. This particular category of women have been chosen for the study in order to study the gender relations, subordination of such women in household despite having an economic standing of their own, etc. The methodology used for this study is semi-structured interview along with qualitative analysis. Moreover, with the help of direct interaction with these women, we get insight into the kind of gendered relations prevailing inside the household structure which have their roots in age old customs and stereotype of the social milieu. Most importantly, the highlight of the study remains on the point where the hierarchy remains in the subconscious of these women and they never forget their social standing. It has been interesting to note that how even after contributing to the family income successively, their position remains subjugated in front of their male counterparts and thus, they are not ‘free’ in the real sense of the term. Even after attaining an economically stable position, these women did not enjoy the same comfort and freedom of choice as their male counterparts do, this could be gauged from the fact that when asked about ‘time for one’s own self’ they had no sense of it. This is astonishing in today’s world where every individual works and strives for a better livelihood and quality existence. Such findings reflect upon the reality of our society where women are still subjugated and duty bound towards the household even after having the same economic stand as their male counterparts. The burden of household chores and responsibilities fall solely on the shoulders of a women despite being an employed women even in the present times. Cooperation comes primarily from female members of the household and not from males. And thus, we as a society are far away from gender equity. We still suffer from prejudices and stereotypes which prevent us from giving same respect to women which we keep reserved for the man. Given this scenario, it seems, gender equity is a distant goal which we will have to keep striving for even harder even after decades of feminist struggles all over the world.

Keywords: employed women, subjugation in household, gender hierarchy, financial independence,

Procedia PDF Downloads 144
3452 Fragile States as the Fertile Ground for Non-State Actors: Colombia and Somalia

Authors: Giorgi Goguadze, Jakub Zajączkowski

Abstract:

This paper is written due to overview the connection between fragile states and non-state actors, we should take into account that fragile states may vary from weak, failing and failed. In this paper we will discuss about two countries, one of them is weak (Colombia/ second one is already failed- Somalia. We will try to understand what feeds ill non-state actors such as: terrorist organizations, criminal entities and other cells in these countries, what threats are they representing and how to eliminate these dangers in both national and international scope. This paper is mainly based on literature overview and personal attitude and doesn’t claim to be in scientific chain.

Keywords: fragile States, terrorism, tribalism, Somalia

Procedia PDF Downloads 362
3451 [Keynote Speech]: Conceptual Design of a Short Take-Off and Landing (STOL) Light Sport Aircraft

Authors: Zamri Omar, Alifi Zainal Abidin

Abstract:

Although flying machines have made their tremendous technological advancement since the first successfully flight of the heavier-than-air aircraft, its benefits to the greater community are still belittled. One of the reasons for this drawback is due to the relatively high cost needed to fly on the typical light aircraft. A smaller and lighter plane, widely known as Light Sport Aircraft (LSA) has the potential to attract more people to actively participate in numerous flying activities, such as for recreational, business trips or other personal purposes. In this paper, we propose a new LSA design with some simple, yet important analysis required in the aircraft conceptual design stage.

Keywords: light sport aircraft, conceptual design, aircraft layout, aircraft

Procedia PDF Downloads 337
3450 The Inception: A University-Wide Research on Alcohol Consumption

Authors: Robi Lou Logarta, Meliz Ann Marilag, Kristyl Lee Nisnisan, Felipe Lula Jr.

Abstract:

Nowadays, alcohol is consumed widely around the globe for plenty of reasons. College years are the time that the students really decide if whether they will or will not engage into alcohol, although alcohol drinking begins before students arrive at college. The reasons on why college students consume alcohol vary in many categories. The norms on alcohol drinking are addiction, emotional pain reliever, popularity purposes, socialization, and a medium of euphoria for most students; college students in particular are most likely to feel this need. After tons of requirements to be complied and courses to be reviewed, they felt a need for celebration and relaxation which ends up in drinking with college mates and a few old friends. A lot of reasons consist the consumption of alcohol and this research determined the reasons behind the students’ onset for alcohol consumption; the main reason for such action and the experiences they encountered after in-take, furthermore, the correlation of alcohol drinking to the average allowance of the involved participants; Mindanao State University-Iligan Institute of Technology Students whether it affects their spending towards alcohol or not. This study assumes that alcohol drinking for MSU-IIT students’ is done to relieve emotional pain caused by flunking in particular subjects as well as dealing with romance, as part of the student body, these acts are noticeable enough which made this hypothesis be formulated. Selected MSU-IIT students were asked about their opinions regarding reasons of alcohol consumption. There were 100 respondents consisting of first year to fifth-year students aging 17-23 years old. Choices were given to the students to mark their most favorable reason for drinking that is adult influence, curiosity, family/personal problems, peer pressure, stress. Using the bar and pie chart illustrations, the collected data was then analyzed and among the given choices, the result has invalidated the hypothesis. The outcome shows that curiosity is the topmost reason why students start to drink and not due to emotional pain. With this, another hypothesis is formulated stating that millennial is a curious generation; this generation has changed the norm of drinking. One of the characteristics of the Y generation is being adventurous which correlates to how they get curious about things and the same goes for alcohol consumption, compared to the latter, this generation can be considered early drinkers in this manner. Therefore, it is concluded that MSU-IIT students which are part of the generation Y are adventurous enough to try unfamiliar beverages to satisfy their curious minds.

Keywords: adult influence, curiosity, family/personal problems, peer pressure, stress

Procedia PDF Downloads 256
3449 Enhancing the Network Security with Gray Code

Authors: Thomas Adi Purnomo Sidhi

Abstract:

Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter.

Keywords: network, network security, grey code, physical layer

Procedia PDF Downloads 496
3448 Is There a Group of "Digital Natives" at Secondary Schools?

Authors: L. Janská, J. Kubrický

Abstract:

The article describes a research focused on the influence of the information and communication technology (ICT) on the pupils' learning. The investigation deals with the influences that distinguish between the group of pupils influenced by ICT and the group of pupils not influenced by ICT. The group influenced by ICT should evince a different approach in number of areas (in managing of two and more activities at once, in a quick orientation and searching for information on the Internet, in an ability to quickly and effectively assess the data sources, in the assessment of attitudes and opinions of the other users of the network, in critical thinking, in the preference to work in teams, in the sharing of information and personal data via the virtual social networking, in insisting on the immediate reaction on their every action etc.).

Keywords: ICT influence, digital natives, pupil´s learning

Procedia PDF Downloads 286
3447 An Evaluation Study of Sleep and Sleep-Related Factors in Clinic Clients with Sleep Difficulties

Authors: Chi-Feng Lai, Wen-Chun Liao Liao

Abstract:

Many people are bothered by sleep difficulties in Taiwan’s society. However, majority of patients get medical treatments without a comprehensive sleep assessment. It is still a big challenge to formulate a comprehensive assessment of sleep difficulties in clinical settings, even though many assessment tools have existed in literature. This study tries to implement reliable and effective ‘comprehensive sleep assessment scales’ in a medical center and to explore differences in sleep-related factors between clinic clients with or without sleep difficulty complaints. The comprehensive sleep assessment (CSA) scales were composed of 5 dimensions: ‘personal factors’, ‘physiological factors’, ‘psychological factors’, ‘social factors’ and ‘environmental factors, and were first evaluated by expert validity and 20 participants with test-retest reliability. The Content Validity Index (CVI) of the CSA was 0.94 and the alpha of the consistency reliability ranged 0.996-1.000. Clients who visited sleep clinic due to sleep difficulties (n=32, 16 males and 16 females, ages 43.66 ±14.214) and gender-and age- matched healthy subjects without sleep difficulties (n=96, 47 males and 49 females, ages 41.99 ±13.69) were randomly recruited at a ratio of 1:3 (with sleep difficulties vs. without sleep difficulties) to compare their sleep and the CSA factors. Results show that all clinic clients with sleep difficulties did have poor sleep quality (PSQI>5) and mild to moderate daytime sleepiness (ESS >11). Personal factors of long working hours (χ2= 10.315, p=0.001), shift workers (χ2= 8.964, p=0.003), night shift (χ2=9.395, p=0.004) and perceived stress (χ2=9.503, p=0.002) were disruptors of sleep difficulties. Physiological factors from physical examination including breathing by mouth, low soft palate, high narrow palate, Edward Angle, tongue hypertrophy, and occlusion of the worn surface were observed in clinic clients. Psychological factors including higher perceived stress (χ2=32.542, p=0.000), anxiety and depression (χ2=32.868, p=0.000); social factors including lack of leisure activities (χ2=39.857, p=0.000), more drinking habits (χ2=1.798, p=0.018), irregular amount and frequency in meals (χ2=5.086, p=0.024), excessive dinner (χ2=21.511, p=0.000), being incapable of getting up on time due to previous poor night sleep (χ2=4.444, p=0.035); and environmental factors including lights (χ2=7.683, p=0.006), noise (χ2=5.086, p=0.024), low or high bedroom temperature (χ2=4.595, p=0.032) were existed in clients. In conclusion, the CSA scales can work as valid and reliable instruments for evaluating sleep-related factors. Findings of this study provide important reference for assessing clinic clients with sleep difficulties.

Keywords: comprehensive sleep assessment, sleep-related factors, sleep difficulties

Procedia PDF Downloads 269
3446 Politics in Academia: How the Diffusion of Innovation Relates to Professional Capital

Authors: Autumn Rooms Cypres, Barbara Driver

Abstract:

The purpose of this study is to extend discussions about innovations and career politics. Research questions that grounded this effort were: How does an academic learn the unspoken rules of the academy? What happens politically to an academic’s career when their research speaks against the grain of society? Do professors perceive signals that it is time to move on to another institution or even to another career? Epistemology and Methods: This qualitative investigation was focused on examining perceptions of academics. Therefore an open-ended field study, based on Grounded Theory, was used. This naturalistic paradigm (Lincoln & Guba,1985) was selected because it tends to understand information in terms of whole, of patterns, and in relations to the context of the environment. The technique for gathering data was the process of semi-structured, in-depth interviewing. Twenty five academics across the United States were interviewed relative to their career trajectories and the politics and opportunities they have encountered in relation to their research efforts. Findings: The analysis of interviews revealed four themes: Academics are beholden to 2 specific networks of power that influence their sense of job security; the local network based on their employing university and the national network of scholars who share the same field of research. The fights over what counts as research can and does drift from the intellectual to the political, and personal. Academic were able to identify specific instances of shunning and or punishment from their colleagues related directly to the dissemination of research that spoke against the grain of the local or national networks. Academics identified specific signals from both of these networks indicating that their career was flourishing or withering. Implications: This research examined insights from those who persevered when the fights over what and who counts drifted from the intellectual to the political, and the personal. Considerations of why such drifts happen were offered in the form of a socio-political construct called Fit, which included thoughts on hegemony, discourse, and identity. This effort reveals the importance of understanding what professional capital is relative to job security. It also reveals that fear is an enmeshed and often unspoken part of the culture of Academia. Further research to triangulate these findings would be helpful within international contexts.

Keywords: politics, academia, job security, context

Procedia PDF Downloads 316
3445 Stable Diffusion, Context-to-Motion Model to Augmenting Dexterity of Prosthetic Limbs

Authors: André Augusto Ceballos Melo

Abstract:

Design to facilitate the recognition of congruent prosthetic movements, context-to-motion translations guided by image, verbal prompt, users nonverbal communication such as facial expressions, gestures, paralinguistics, scene context, and object recognition contributes to this process though it can also be applied to other tasks, such as walking, Prosthetic limbs as assistive technology through gestures, sound codes, signs, facial, body expressions, and scene context The context-to-motion model is a machine learning approach that is designed to improve the control and dexterity of prosthetic limbs. It works by using sensory input from the prosthetic limb to learn about the dynamics of the environment and then using this information to generate smooth, stable movements. This can help to improve the performance of the prosthetic limb and make it easier for the user to perform a wide range of tasks. There are several key benefits to using the context-to-motion model for prosthetic limb control. First, it can help to improve the naturalness and smoothness of prosthetic limb movements, which can make them more comfortable and easier to use for the user. Second, it can help to improve the accuracy and precision of prosthetic limb movements, which can be particularly useful for tasks that require fine motor control. Finally, the context-to-motion model can be trained using a variety of different sensory inputs, which makes it adaptable to a wide range of prosthetic limb designs and environments. Stable diffusion is a machine learning method that can be used to improve the control and stability of movements in robotic and prosthetic systems. It works by using sensory feedback to learn about the dynamics of the environment and then using this information to generate smooth, stable movements. One key aspect of stable diffusion is that it is designed to be robust to noise and uncertainty in the sensory feedback. This means that it can continue to produce stable, smooth movements even when the sensory data is noisy or unreliable. To implement stable diffusion in a robotic or prosthetic system, it is typically necessary to first collect a dataset of examples of the desired movements. This dataset can then be used to train a machine learning model to predict the appropriate control inputs for a given set of sensory observations. Once the model has been trained, it can be used to control the robotic or prosthetic system in real-time. The model receives sensory input from the system and uses it to generate control signals that drive the motors or actuators responsible for moving the system. Overall, the use of the context-to-motion model has the potential to significantly improve the dexterity and performance of prosthetic limbs, making them more useful and effective for a wide range of users Hand Gesture Body Language Influence Communication to social interaction, offering a possibility for users to maximize their quality of life, social interaction, and gesture communication.

Keywords: stable diffusion, neural interface, smart prosthetic, augmenting

Procedia PDF Downloads 96
3444 Evaluating Global ‘Thing’ Security of Consumer Products

Authors: Achutha Raman

Abstract:

Today's brave new world features a bonanza of digitally interconnected products, or ‘things,’ that improve convenience, possibilities, and in some cases efficiency for consumers. Nonetheless, even as the market accelerates, this Internet of ‘things’ is subject to substantial leakage of consumer personal data. First defining the fluid concept of ‘things,’ this paper subsequently uses case studies taken from the EU, Asia, and the US, to highlight large gaps and comprehensively evaluate the state of security for consumer ‘things.’ Ultimately, this paper offers several ways of improving the present status quo, and especially focuses on an evaluative approach that augments the standard mechanism of Firmware Over the Air Updates, and ought to be easily implementable.

Keywords: cybersecurity, FOTA, Internet of Things, transnational privacy

Procedia PDF Downloads 209