Search results for: security safe
2586 Risky Driving Behavior among Bus Driver in Jakarta
Authors: Ratri A. Benedictus, Felicia M. Yolanda
Abstract:
Public transport is a crucial issue for capital city in developing country, such as Jakarta. Inadequate number and low quality of public transport services resulting personal vehicles as the main option. As a result, traffic jams are getting worse in Jakarta. The low quality of public transport, particularly buses, compounded by the risk behavior of the driver. Traffic accidents involving public bus in Jakarta were often the case, even result in fatality. The purpose of this study is to get a description of risk behavior among the public bus drivers in Jakarta. 132 bus drivers become respondent of this study. Risky Driving Behavior scale of Dorn were used. Data were analyzed using descriptive statistics. 51.5% of respondents felt often showing risky behavior while on driving. The highest type of risky driving behavior is still using the unsafe bus (62%). Followed by trespass the bus line (30%), over speed (21%), violate the road signs (15%) and driving with unhealthy physical condition (4%). Results of this study suggested that high understanding of the bus drivers on their risk behaviors have not lead to the emergence of safe driving behavior. Therefore, together with technical engineering and instrumentation work intervention over this issue, psychological aspects also need to be considered, such as: risk perception, safety attitude,safety culture, locus of control and Fatalism.Keywords: bus driver, psychological factors, public transportation, risky driving behavior
Procedia PDF Downloads 3652585 Analysis of Histamine Content in Selected Food Products from the Serbian Market
Authors: Brizita Djordjevic, Bojana Vidovic, Milica Zrnic, Uros Cakar, Ivan Stankovic, Davor Korcok, Sladjana Sobajic
Abstract:
Histamine is a biogenic amine, which is formed by enzymatic decarboxylation from the amino acid histidine. It can be found in foods such as fish and fish products, meat and fermented meat products, cheese, wine and beer. The presence of histamine in these foods can indicate microbiological spoilage or poor manufacturing processes. The consumption of food containing large amounts of histamine can have toxicological consequences. In 62 food products (31 canned fish products, 19 wines and 12 cheeses) from the market of Serbia the content of histamine was determined using enzyme-linked immunosorbent assay (ELISA) test kit according to the manufacturer's instructions (Immunolab GmbH, Kassel, Germany). The detection limits of this assay were 20 µg/kg for fish and cheese and 4 µg/L for wine. The concentration of histamine varied between 0.16-207 mg/kg in canned fish products, 0.03-1.47 mg/kg in cheeses and 0.01- 0.18 mg/L in wines. In all analyzed canned fish products the results obtained for the histamine were below the limits set by European and national legislation, so they can be considered acceptable and safe for the health consumers. The levels of histamine in analyzed cheeses and wines were very low and did not pose safety concerns.Keywords: cheese, enzyme-linked immunosorbent assay, histamine, fish products, wine
Procedia PDF Downloads 4502584 Real-Time Detection of Space Manipulator Self-Collision
Authors: Zhang Xiaodong, Tang Zixin, Liu Xin
Abstract:
In order to avoid self-collision of space manipulators during operation process, a real-time detection method is proposed in this paper. The manipulator is fitted into a cylinder enveloping surface, and then the detection algorithm of collision between cylinders is analyzed. The collision model of space manipulator self-links can be detected by using this algorithm in real-time detection during the operation process. To ensure security of the operation, a safety threshold is designed. The simulation and experiment results verify the effectiveness of the proposed algorithm for a 7-DOF space manipulator.Keywords: space manipulator, collision detection, self-collision, the real-time collision detection
Procedia PDF Downloads 4742583 Penguins Search Optimization Algorithm for Chaotic Synchronization System
Authors: Sofiane Bououden, Ilyes Boulkaibet
Abstract:
In terms of security of the information signal, the meta-heuristic Penguins Search Optimization Algorithm (PeSOA) is applied to synchronize chaotic encryption communications in the case of sensitive dependence on initial conditions in chaotic generator oscillator. The objective of this paper is the use of the PeSOA algorithm to exploring search space with random and iterative processes for synchronization of symmetric keys in both transmission and reception. Simulation results show the effectiveness of the PeSOA algorithm in generating symmetric keys of the encryption process and synchronizing.Keywords: meta-heuristic, PeSOA, chaotic systems, encryption, synchronization optimization
Procedia PDF Downloads 2012582 Covid-19, Diagnosis with Computed Tomography and Artificial Intelligence, in a Few Simple Words
Authors: Angelis P. Barlampas
Abstract:
Target: The (SARS-CoV-2) is still a threat. AI software could be useful, categorizing the disease into different severities and indicate the extent of the lesions. Materials and methods: AI is a new revolutionary technique, which uses powered computerized systems, to do what a human being does more rapidly, more easily, as accurate and diagnostically safe as the original medical report and, in certain circumstances, even better, saving time and helping the health system to overcome problems, such as work overload and human fatigue. Results: It will be given an effort to describe to the inexperienced reader (see figures), as simple as possible, how an artificial intelligence system diagnoses computed tomography pictures. First, the computerized machine learns the physiologic motives of lung parenchyma by being feeded with normal structured images of the lung tissue. Having being used to recognizing normal structures, it can then easily indentify the pathologic ones, as their images do not fit to known normal picture motives. It is the same way as when someone spends his free time in reading magazines with quizzes, such as <Keywords: covid-19, artificial intelligence, automated imaging, CT, chest imaging
Procedia PDF Downloads 562581 Characterization of the Catalytic and Structural Roles of the Human Hexokinase 2 in Cancer Progression
Authors: Mir Hussain Nawaz, Lyudmila Nedyalkova, Haizhong Zhu, Wael M. Rabeh
Abstract:
In this study, we aim to biochemically and structurally characterize the interactions of human HK2 with the mitochondria in addition to the role of its N-terminal domain in catalysis and stability of the full-length enzyme. Here, we solved the crystal structure of human HK2 in complex with glucose and glucose-6-phosphate (PDB code: 2NZT), where it is a homodimer with catalytically active N- and C-terminal domains linked by a seven-turn α-helix. Different from the inactive N-terminal domains of isozymes 1 and 3, the N- domain of HK2 not only capable to catalyze a reaction but it is responsible for the thermodynamic stabilizes of the full-length enzyme. Deletion of first α-helix of the N-domain that binds to the mitochondria altered the stability and catalytic activity of the full-length HK2. In addition, we found the linker helix between the N- and C-terminal domains to play an important role in controlling the catalytic activity of the N-terminal domain. HK2 is a major step in the regulation of glucose metabolism in cancer making it an ideal target for the development of new anticancer therapeutics. Characterizing the structural and molecular mechanisms of human HK2 and its role in cancer metabolism will accelerate the design and development of new cancer therapeutics that are safe and cancer specific.Keywords: cancer metabolism, enzymology, drug discovery, protein stability
Procedia PDF Downloads 2682580 A Method and System for Secure Authentication Using One Time QR Code
Authors: Divyans Mahansaria
Abstract:
User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common.Keywords: authentication, QR code, cipher / decipher text, one time password, secret information
Procedia PDF Downloads 2702579 Experimental Investigation of Hybrid Rocket Motor: Ignition, Throttling and Re-Ignition Phenomena
Authors: A. El-S. Makled, M. K. Al-Tamimi
Abstract:
Ignition phenomena are of great interest area over the past many years, and it has a direct impact on many propulsion and combustion applications. The direct goal of the paper is to realize and evaluate a functioning ignition method, shut-off, throttling and re-start operations for the hybrid rocket motor. A small-scale hybrid rocket motor (SSHRM) is designed, manufactured, demonstrated at various operating conditions and finally equipped for laboratory firing tests with high level of safety. Various solid fuel grains as Polymethyle-methacrylate (PMMA) and Polyethylene (PE) are selected, and it is decided to use the commercial gaseous oxygen (GO2) for its availability and low cost. Examine different types of ignition methods, pyrotechnic charge, fuse wire, heat wire and finally hot oxidizer method by using the heat exchanger, which are proposed as very safe ignition methods. Finally; recognize phenomena of throttling and re-start operations. Ignition by hot GO2 impingement is proved to be a very attractive ignition method for laboratory SSHRM, for its high safety, reliability and acceptable delay time. Finally; the throttling and re-start operations are demonstrated several times and can be carried out more easily with hot air ignition method.Keywords: hybrid rocket motor, ignition system, re-start phenomena, throttling
Procedia PDF Downloads 3042578 Seismic Performance of Nuclear Power Plant Structures Subjected to Korean Earthquakes
Authors: D. D. Nguyen, H. S. Park, S. W. Yang, B. Thusa, Y. M. Kim, T. H. Lee
Abstract:
Currently, the design response spectrum (i.e., Nuclear Regulatory Commission - NRC 1.60 spectrum) with the peak ground acceleration (PGA) 0.3g (for Safe Shutdown Earthquake level) is specified for designing the new nuclear power plant (NPP) structures in Korea. However, the recent earthquakes in the region such as the 2016 Gyeongju and the 2017 Pohang earthquake showed that the possible PGA of ground motions can be larger than 0.3g. Therefore, there is a need to analyze the seismic performance of the existing NPP structures under these earthquakes. An NPP model, APR-1400, which is designed and built in Korea was selected for a case study. The NPP structure is numerically modeled in terms of lumped-mass stick elements using OpenSees framework. The floor acceleration and displacement of components are measured to quantify the responses of components. The numerical results show that the floor spectral accelerations are significantly amplified in the components subjected to Korean earthquakes. A comparison between floor response spectra of Korean earthquakes and the NRC design motion highlights that the seismic design level of NPP components under an earthquake should be thoroughly reconsidered. Additionally, a seismic safety assessment of the equipment and relays attached to main structures is also required.Keywords: nuclear power plant, floor response spectra, Korean earthquake, NRC spectrum
Procedia PDF Downloads 1582577 FPGA Implementation of RSA Encryption Algorithm for E-Passport Application
Authors: Khaled Shehata, Hanady Hussien, Sara Yehia
Abstract:
Securing the data stored on E-passport is a very important issue. RSA encryption algorithm is suitable for such application with low data size. In this paper the design and implementation of 1024 bit-key RSA encryption and decryption module on an FPGA is presented. The module is verified through comparing the result with that obtained from MATLAB tools. The design runs at a frequency of 36.3 MHz on Virtex-5 Xilinx FPGA. The key size is designed to be 1024-bit to achieve high security for the passport information. The whole design is achieved through VHDL design entry which makes it a portable design and can be directed to any hardware platform.Keywords: RSA, VHDL, FPGA, modular multiplication, modular exponential
Procedia PDF Downloads 3962576 The Enhancement of Training of Military Pilots Using Psychophysiological Methods
Authors: G. Kloudova, M. Stehlik
Abstract:
Optimal human performance is a key goal in the professional setting of military pilots, which is a highly challenging atmosphere. The aviation environment requires substantial cognitive effort and is rich in potential stressors. Therefore, it is important to analyze variables such as mental workload to ensure safe conditions. Pilot mental workload could be measured using several tools, but most of them are very subjective. This paper details research conducted with military pilots using psychophysiological methods such as electroencephalography (EEG) and heart rate (HR) monitoring. The data were measured in a simulator as well as under real flight conditions. All of the pilots were exposed to highly demanding flight tasks and showed big individual response differences. On that basis, the individual pattern for each pilot was created counting different EEG features and heart rate variations. Later on, it was possible to distinguish the most difficult flight tasks for each pilot that should be more extensively trained. For training purposes, an application was developed for the instructors to decide which of the specific tasks to focus on during follow-up training. This complex system can help instructors detect the mentally demanding parts of the flight and enhance the training of military pilots to achieve optimal performance.Keywords: cognitive effort, human performance, military pilots, psychophysiological methods
Procedia PDF Downloads 2362575 Contribution to the Study of the Microbiological Quality of Chawarma Sold in Biskra
Authors: Sara Boulmai̇z
Abstract:
In order to study the microbiological quality of chawarma sold in Biskra, a sampling through some fastfoods of the city was done, the parameters studied are highlighted according to the criteria required by the country's trade management. Microbiological analyzes revealed different levels of contamination by microorganisms. The 10 samples were of an overall view of unsatisfactory quality, and according to the standards, no sample was satisfactory. The range of total aerobic mesophilic flora found is between 105 and 1.2 × 10 7 CFU / g, that of fecal coliforms is 104 to 2.4 × 10 5 CFU / g. The suspected pathogenic staphylococci were between 3.103 and 2.7.106 CFU / g. Salmonellae were absent in all samples, whereas sulphite-reducing anaerobes were present in a single sample. The rate of E. cloacae was between 103 and 6.104 CFU / g. As for fungi and safe mice, their rate was 103 to 107 CFU / g. The study of the sensitivity of antibiotics showed multi-resistance to all the antibiotics tested, although there is a sensitivity towards others. All strains of Staphylococcus aureus tested demonstrated resistance against erythromycin, 30% against streptomycin, and 10% against tetracycline. While the strains of E. cloacae were resistant in all strains to amoxicillin, ceftazidime, cefotaxime, and erythromycin, while they were sensitive to fosfomycin, sulfamethoxazole trimethoperine, ciprofloxacin, and tetracycline. While against chlorophenicol and ofloxacin, the sensitivity was dominant, although there was intermediate resistance. In this study demonstrates that foodborne illnesses remain a problem that arises in addition to the increasingly observed bacterial resistance and that, after all, healthy eating is a right.Keywords: chawarma, microbiological quality, pathogens., street food
Procedia PDF Downloads 1182574 Kluyveromyces marxianus ABB S8 as Yeast-Based Technology to Manufacture Low FODMAP Baking Good
Authors: Jordi Cuñé, Carlos de Lecea, Laia Marti
Abstract:
Small molecules known as fermentable oligo-, di-, and monosaccharides and polyols (FODMAPs) are quickly fermented in the large intestine after being poorly absorbed in the small intestine. There is proof that individuals suffering from functional gastrointestinal disorders, like irritable bowel syndrome (IBS), observe an improvement while following a diet low in FODMAPs. Because wheat has a relatively high fructan content, it is a key source of FODMAPs in our diet. A yeast-based method was created in this study to lower the amounts of FODMAP in (whole wheat) bread. In contrast to fermentation by regular baker yeast, the combination of Kluyveromyces marxianus ABB S7 with Saccharomyces cerevisiae allowed a reduction of fructan content by 60% without implying the appearance of other substrates categorized as FODMAP (excess fructose or polyols). The final FODMAP content in the developed whole wheat bread would allow its classification as a safe product for sensitive people, according to international consensus. Cocultures of S. cerevisiae and K. marxianus were established in order to ensure sufficient CO₂ generation; larger quantities of gas were produced due to the strains' synergistic relationship. Thus, this method works well for lowering the levels of FODMAPs in bread.Keywords: Kluyveromyces marxianus, bakery, bread, FODMAP, IBS, functional gastro intestinal disorders
Procedia PDF Downloads 512573 Ultrasonographic Evaluation of Tars and Metatars Region of Dromedary Camel
Authors: Aboozar Dehghan, S. Sharifi, A. Ardeshiri, F. Jafari, F. Samani
Abstract:
Ultrasonography is a safe, particular, available and easy to use method to evaluate soft tissues. Tendons play the main role to body locomotors system. Ultrasonography performed in tarsus and metatarsus region of rare limb of eight adult, Dromedary camels (camelus dromedaries) in both sex. Clinical examination and gate analysis was performed before slaughtering. From the tarsus to the 1st phalanx was divided to 4 equal region include 1a, 2a, 1b and 2b. Flexor surface was clipped and covered by enough ultrasonography gel. Ultrasonography was performed by linear phased array 8-12 Mhz transducer in transverse and longitudinal section and Superficial digital flexor tendon (SDFT), deep digital flexor tendon (DDFT) and suspensory ligament (SL) were imaged. Echogenicity and diameter of these structures were recorded. Size of tendons and SL measured after necropsy too. statistical analysis obtained that SDFT diameter larger than others in all described regions and mean of DDFT diameter larger than suspensory ligament. Echogenicity of SL more than SDFT and DDFT. No Significant relationship was seen between left and right rare limb structures size. Between sex and tendons and SL diameter, significant relationship not seen.Keywords: dromedary camel, tars and metatars, ultrasonography
Procedia PDF Downloads 5632572 Liability of AI in Workplace: A Comparative Approach Between Shari’ah and Common Law
Authors: Barakat Adebisi Raji
Abstract:
In the workplace, Artificial Intelligence has, in recent years, emerged as a transformative technology that revolutionizes how organizations operate and perform tasks. It is a technology that has a significant impact on transportation, manufacturing, education, cyber security, robotics, agriculture, healthcare, and so many other organizations. By harnessing AI technology, workplaces can enhance productivity, streamline processes, and make more informed decisions. Given the potential of AI to change the way we work and its impact on the labor market in years to come, employers understand that it entails legal challenges and risks despite the advantages inherent in it. Therefore, as AI continues to integrate into various aspects of the workplace, understanding the legal and ethical implications becomes paramount. Also central to this study is the question of who is held liable where AI makes any defaults; the person (company) who created the AI, the person who programmed the AI algorithm or the person who uses the AI? Thus, the aim of this paper is to provide a detailed overview of how AI-related liabilities are addressed under each legal tradition and shed light on potential areas of accord and divergence between the two legal cultures. The objectives of this paper are to (i) examine the ability of Common law and Islamic law to accommodate the issues and damage caused by AI in the workplace and the legality of compensation for such injury sustained; (ii) to discuss the extent to which AI can be described as a legal personality to bear responsibility: (iii) examine the similarities and disparities between Common Law and Islamic Jurisprudence on the liability of AI in the workplace. The methodology adopted in this work was qualitative, and the method was purely a doctrinal research method where information is gathered from the primary and secondary sources of law, such as comprehensive materials found in journal articles, expert-authored books and online news sources. Comparative legal method was also used to juxtapose the approach of Islam and Common Law. The paper concludes that since AI, in its current legal state, is not recognized as a legal entity, operators or manufacturers of AI should be held liable for any damage that arises, and the determination of who bears the responsibility should be dependent on the circumstances surrounding each scenario. The study recommends the granting of legal personality to AI systems, the establishment of legal rights and liabilities for AI, the establishment of a holistic Islamic virtue-based AI ethics framework, and the consideration of Islamic ethics.Keywords: AI, health- care, agriculture, cyber security, common law, Shari'ah
Procedia PDF Downloads 452571 Building Safety Through Real-time Design Fire Protection Systems
Authors: Mohsin Ali Shaikh, Song Weiguo, Muhammad Kashan Surahio, Usman Shahid, Rehmat Karim
Abstract:
When the area of a structure that is threatened by a disaster affects personal safety, the effectiveness of disaster prevention, evacuation, and rescue operations can be summarized by three assessment indicators: personal safety, property preservation, and attribution of responsibility. These indicators are applicable regardless of the disaster that affects the building. People need to get out of the hazardous area and to a safe place as soon as possible because there's no other way to respond. The results of the tragedy are thus closely related to how quickly people are advised to evacuate and how quickly they are rescued. This study considers present fire prevention systems to address catastrophes and improve building safety. It proposes the methods of Prevention Level for Deployment in Advance and Spatial Transformation by Human-Machine Collaboration. We present and prototype a real-time fire protection system architecture for building disaster prevention, evacuation, and rescue operations. The design encourages the use of simulations to check the efficacy of evacuation, rescue, and disaster prevention procedures throughout the planning and design phase of the structure.Keywords: prevention level, building information modeling, quality management system, simulated reality
Procedia PDF Downloads 732570 The Impact of Artificial Intelligence on Human Rights Development
Authors: Kerols Seif Said Botros
Abstract:
The relationship between development and human rights has been debated for a long time. Various principles, from the right to development to development-based human rights, are applied to understand the dynamics between these two concepts. Despite the measures calculated, the connection between enhancement and human rights remains vague. Despite, the connection between these two opinions and the need to strengthen human rights have increased in recent years. It will then be examined whether the right to sustainable development is acceptable or not. In various human rights instruments and this is a good vibe to the request cited above. The book then cites domestic and international human rights treaties, as well as jurisprudence and regulations defining human rights institutions, to support this view.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.
Procedia PDF Downloads 602569 Prioritization in Modern Portfolio Management - An Action Design Research Approach to Method Development for Scaled Agility
Authors: Jan-Philipp Schiele, Karsten Schlinkmeier
Abstract:
Allocation of scarce resources is a core process of traditional project portfolio management. However, with the popularity of agile methodology, established concepts and methods of portfolio management are reaching their limits and need to be adapted. Consequently, the question arises of how the process of resource allocation can be managed appropriately in scaled agile environments. The prevailing framework SAFe offers Weightest Shortest Job First (WSJF) as a prioritization technique, butestablished companies are still looking for methodical adaptions to apply WSJF for prioritization in portfolios in a more goal-oriented way and aligned for their needs in practice. In this paper, the relevant problem of prioritization in portfolios is conceptualized from the perspective of coordination and related mechanisms to support resource allocation. Further, an Action Design Research (ADR) project with case studies in a finance company is outlined to develop a practically applicable yet scientifically sound prioritization method based on coordination theory. The ADR project will be flanked by consortium research with various practitioners from the financial and insurance industry. Preliminary design requirements indicate that the use of a feedback loop leads to better team and executive level coordination in the prioritization process.Keywords: scaled agility, portfolio management, prioritization, business-IT alignment
Procedia PDF Downloads 2022568 Failure Analysis of Laminated Veneer Bamboo Dowel Connections
Authors: Niloufar Khoshbakht, Peggi L. Clouston, Sanjay R. Arwade, Alexander C. Schreyer
Abstract:
Laminated veneer bamboo (LVB) is a structural engineered composite made from glued layers of bamboo. A relatively new building product, LVB is currently employed in similar sizes and applications as dimensional lumber. This study describes the results of a 3D elastic Finite Element model for halfhole specimens when loaded in compression parallel-to-grain per ASTM 5764. The model simulates LVB fracture initiation due to shear stresses in the dowel joint and predicts displacement at failure validated through comparison with experimental results. The material fails at 1mm displacement due to in-plane shear stresses. The paper clarifies the complex interactive state of in-plane shear, tension perpendicular-to-grain, and compression parallel-to-grain stresses that form different distributions in the critical zone beneath the bolt hole for half-hole specimens. These findings are instrumental in understanding key factors and fundamental failure mechanisms that occur in LVB dowel connections to help devise safe standards and further LVB product adoption and design.Keywords: composite, dowel connection, embedment strength, failure behavior, finite element analysis, Moso bamboo
Procedia PDF Downloads 2692567 Assessment of Records Management in Registry Department of Kebbi State University of Science and Technology, Aliero Nigeria
Authors: Murtala Aminu, Salisu Adamu Aliero, Adamu Muhammed
Abstract:
Records are a vital asset in ensuring that the institution is governed effectively and efficiently, and is accountable to its staff, students and the community that it serves. The major purpose of this study was to assess record management of the registry department of Kebbi state University of science and technology Aliero. To be able to achieve this objective, research questions were formulated and answers obtained, which centered on records creation, record management policy, challenges facing records management. The review of related literature revealed that there is need for records to be properly managed and in doing so there is need for good records management policy that clearly spells out the various programs required for effective records management. Survey research method was used involving questionnaire, and observation. The findings revealed that the registry department of the University still has a long way to go with respect to day-today records management. The study recommended provision for adequate, modern, safe and functional storage facilities, sufficient and regular funding, recruitment of trained personnel, on the job training for existing staff, computerization of all units records, and uninterrupted power supply to all parts of the unit as a means of ensuring proper records management.Keywords: records, management, records management policy, registry
Procedia PDF Downloads 3182566 Enhancing Scalability in Ethereum Network Analysis: Methods and Techniques
Authors: Stefan K. Behfar
Abstract:
The rapid growth of the Ethereum network has brought forth the urgent need for scalable analysis methods to handle the increasing volume of blockchain data. In this research, we propose efficient methodologies for making Ethereum network analysis scalable. Our approach leverages a combination of graph-based data representation, probabilistic sampling, and parallel processing techniques to achieve unprecedented scalability while preserving critical network insights. Data Representation: We develop a graph-based data representation that captures the underlying structure of the Ethereum network. Each block transaction is represented as a node in the graph, while the edges signify temporal relationships. This representation ensures efficient querying and traversal of the blockchain data. Probabilistic Sampling: To cope with the vastness of the Ethereum blockchain, we introduce a probabilistic sampling technique. This method strategically selects a representative subset of transactions and blocks, allowing for concise yet statistically significant analysis. The sampling approach maintains the integrity of the network properties while significantly reducing the computational burden. Graph Convolutional Networks (GCNs): We incorporate GCNs to process the graph-based data representation efficiently. The GCN architecture enables the extraction of complex spatial and temporal patterns from the sampled data. This combination of graph representation and GCNs facilitates parallel processing and scalable analysis. Distributed Computing: To further enhance scalability, we adopt distributed computing frameworks such as Apache Hadoop and Apache Spark. By distributing computation across multiple nodes, we achieve a significant reduction in processing time and enhanced memory utilization. Our methodology harnesses the power of parallelism, making it well-suited for large-scale Ethereum network analysis. Evaluation and Results: We extensively evaluate our methodology on real-world Ethereum datasets covering diverse time periods and transaction volumes. The results demonstrate its superior scalability, outperforming traditional analysis methods. Our approach successfully handles the ever-growing Ethereum data, empowering researchers and developers with actionable insights from the blockchain. Case Studies: We apply our methodology to real-world Ethereum use cases, including detecting transaction patterns, analyzing smart contract interactions, and predicting network congestion. The results showcase the accuracy and efficiency of our approach, emphasizing its practical applicability in real-world scenarios. Security and Robustness: To ensure the reliability of our methodology, we conduct thorough security and robustness evaluations. Our approach demonstrates high resilience against adversarial attacks and perturbations, reaffirming its suitability for security-critical blockchain applications. Conclusion: By integrating graph-based data representation, GCNs, probabilistic sampling, and distributed computing, we achieve network scalability without compromising analytical precision. This approach addresses the pressing challenges posed by the expanding Ethereum network, opening new avenues for research and enabling real-time insights into decentralized ecosystems. Our work contributes to the development of scalable blockchain analytics, laying the foundation for sustainable growth and advancement in the domain of blockchain research and application.Keywords: Ethereum, scalable network, GCN, probabilistic sampling, distributed computing
Procedia PDF Downloads 812565 The Correlation of Total Phenol Content with Free Radicals Scavenging Activity and Effect of Ethanol Concentration in Extraction Process of Mangosteen Rind (Garcinia mangostana)
Authors: Ririn Lestari Sri Rahayu, Mustofa Ahda
Abstract:
The use of synthetic antioxidants often causes a negative effect on health and increases the incidence of carcinogenesis. Development of the natural antioxidants should be investigated. However, natural antioxidants have a low toxicity and are safe for human consumption. Ethanol extract of mangosteen rind (Garcinia mangostana) contains natural antioxidant compounds that have various pharmacological activities. Antioxidants from the ethanol extract of mangosteen rind have free radicals scavenging activities. The scavenging activity of ethanol extract of mangosteen rind was determined by DPPH method. The phenolic compound from the ethanol extract of mangosteen rind is determined with Folin-Ciocalteu method. The results showed that the absolute ethanol extract of mangosteen rind has IC50 of 40.072 ug/mL. The correlation of total phenols content with free radical scavenging activity has an equation y: 5.207x + 205.51 and determination value (R2) of 0.9329. Total phenols content from the ethanol extract of mangosteen rind has a good correlation with free radicals scavenging activity of DPPH.Keywords: Antioxidant, Garcinia mangostana, Inhibition concentration 50%, Phenolic.
Procedia PDF Downloads 3622564 Application of Box-Behnken Response Surface Design for Optimization of Essential Oil Based Disinfectant on Mixed Species Biofilm
Authors: Anita Vidacs, Robert Rajko, Csaba Vagvolgyi, Judit Krisch
Abstract:
With the optimization of a new disinfectant the number of tests could be decreased and the cost of processing too. Good sanitizers are eco-friendly and allow no resistance evolvement of bacteria. The essential oils (EOs) are natural antimicrobials, and most of them have the Generally Recognized As Safe (GRAS) status. In our study, the effect of the EOs cinnamon, marjoram, and thyme was investigated against mixed species bacterial biofilms of Escherichia coli, Listeria monocytogenes, Pseudomonas putida, and Staphylococcus aureus. The optimal concentration of EOs, disinfection time and level of pH were evaluated with the aid of Response Surface Box-Behnken Design (RSD) on 1 day and 7 days old biofilms on metal, plastic, and wood surfaces. The variable factors were in the range of 1-3 times of minimum bactericide concentration (MBC); 10-110 minutes acting time and 4.5- 7.5 pH. The optimized EO disinfectant was compared to industrial used chemicals (HC-DPE, Hypo). The natural based disinfectants were applicable; the acting time was below 30 minutes. EOs were able to eliminate the biofilm from the used surfaces except from wood. The disinfection effect of the EO based natural solutions was in most cases equivalent or better compared to chemical sanitizers used in food industry.Keywords: biofilm, Box-Behnken design, disinfectant, essential oil
Procedia PDF Downloads 2232563 Illicit Arms and the Emergence of Armed Groups in Nigeria
Authors: Halilu Babaji, Adamu Buba
Abstract:
Illicit arms and the emergence of armed groups have witnessed unprecedented situations of political uncertainties in Nigeria, and the twenty-first century globalisation has established the process that has benefited a good number of militia groups and thereby boosting both illicit arms movement and the thriving of terrorist groups, which are largely responsible for the longstanding threat to the national security and stability of the country. This has unleashed unforeseen consequences on the entire Sub-region, following an inflow of weapons and armed fighter which are motivated by weak governance, insecurity and poverty. The social, economic and political environments make it a fertile breeding ground for the penetration and development of terrorist groups in Sub-Saharan Africa.Keywords: arms, emergence, insecurity, groups
Procedia PDF Downloads 2672562 Solutions for Comfort and Safety on Vibrations Resulting from the Action of the Wind on the Building in the Form of Portico with Four Floors
Authors: G. B. M. Carvalho, V. A. C. Vale, E. T. L. Cöuras Ford
Abstract:
With the aim of increasing the levels of comfort and security structures, the study of dynamic loads on buildings has been one of the focuses in the area of control engineering, civil engineering and architecture. Thus, this work presents a study based on simulation of the dynamics of buildings in the form of portico subjected to wind action, besides presenting an action of passive control, using for this the dynamics of the structure, consequently representing a system appropriated on environmental issues. These control systems are named the dynamic vibration absorbers.Keywords: dynamic vibration absorber, structure, comfort, safety, wind behavior, structure
Procedia PDF Downloads 4152561 Cloud-Based Mobile-to-Mobile Computation Offloading
Authors: Ebrahim Alrashed, Yousef Rafique
Abstract:
Mobile devices have drastically changed the way we do things on the move. They are being extremely relied on to perform tasks that are analogous to desktop computer capability. There has been a rapid increase of computational power on these devices; however, battery technology is still the bottleneck of evolution. The primary modern approach day approach to tackle this issue is offloading computation to the cloud, proving to be latency expensive and requiring high network bandwidth. In this paper, we explore efforts to perform barter-based mobile-to-mobile offloading. We present define a protocol and present an architecture to facilitate the development of such a system. We further highlight the deployment and security challenges.Keywords: computational offloading, power conservation, cloud, sandboxing
Procedia PDF Downloads 3912560 System Detecting Border Gateway Protocol Anomalies Using Local and Remote Data
Authors: Alicja Starczewska, Aleksander Nawrat, Krzysztof Daniec, Jarosław Homa, Kacper Hołda
Abstract:
Border Gateway Protocol is the main routing protocol that enables routing establishment between all autonomous systems, which are the basic administrative units of the internet. Due to the poor protection of BGP, it is important to use additional BGP security systems. Many solutions to this problem have been proposed over the years, but none of them have been implemented on a global scale. This article describes a system capable of building images of real-time BGP network topology in order to detect BGP anomalies. Our proposal performs a detailed analysis of BGP messages that come into local network cards supplemented by information collected by remote collectors in different localizations.Keywords: BGP, BGP hijacking, cybersecurity, detection
Procedia PDF Downloads 822559 Removal of Heavy Metals from Aqueous Solutions by Low-Cost Materials: A Review
Authors: I. Nazari, B. Shaabani, P. Abaasifar
Abstract:
In small quantities certain heavy metals are nutritionally essential for a healthy life. The heavy metals linked most often to human poisoning are lead, mercury, arsenic, and cadmium. Other heavy metals including copper, zinc and chromium are actually required by the body in small quantity but can also be toxic in large doses. Nowadays, we have contamination to this heavy metals in some untreated industrial waste waters and even in several populated cities drinking waters around the world. The contamination of ground and underground water sources to heavy metals can be concentrated and travel up to food chain by drinking water and agricultural products. In recent years, the need for safe and economical methods for removal of heavy metals from contaminated water has necessitated research interest towards the finding low-cost alternatives. Bio-adsorbents have emerged as low-cost and efficient materials for the removal of heavy metals from waste and ground waters. The bio-adsorbents have an affinity for heavy metals ions to form metal complexes or chelates due to having functional groups including carboxyl, hydroxyl, imidazole, and etc. The objective of this study is to review researches in less expensive adsorbents and their utilization possibilities for various low-cost bio-adsorbents such as coffee beans, rice husk, and saw dust for the removal of heavy metals from contaminated waters.Keywords: heavy metals, water pollution, bio-adsorbents, low cost adsorbents
Procedia PDF Downloads 3652558 A Simple Design Procedure for Calculating the Column Ultimate Load of Steel Frame Structures
Authors: Abdul Hakim Chikho
Abstract:
Calculating the ultimate load of a column in a sway framed structure involves, in the currently used design method, the calculation of the column effective length and utilizing the interaction formulas or tables. Therefore, no allowance is usually made for the effects of the presence of semi rigid connections or the presence of infill panels. In this paper, a new and simple design procedure is recommend to calculate the ultimate load of a framed Column allowing for the presence of rotational end restraints, semi rigid connections, the column end moments resulted from the applied vertical and horizontal loading and infill panels in real steel structure. In order to verify the accuracy of the recommended method to predict good and safe estimations of framed column ultimate loads, several examples have been solved utilizing the recommended procedure, and the results were compared to those obtained using a second order computer program, and good correlation had been obtained. Therefore, the accuracy of the proposed method to predict the Behaviour of practical steel columns in framed structures has been verified.Keywords: column ultimate load, semi rigid connections, steel column, infill panel, steel structure
Procedia PDF Downloads 1862557 A Portable Miniature Syringe Needle Remover And Receptacle For Drug Injection Users
Authors: Fanjun Zhou
Abstract:
In today's drug-ridden society, drug injection is gradually becoming more popular and has hidden danger to IDUs (injection drug users) such as infectious diseases. According to reports, 67% of IDUs reported improper disposal at some point over the prior 30 days, leading to a proliferation of injection needles on the streets. In recent years, the number of cases of children or ordinary people unintentionally picking up needles have increased. Various needle remover inventions have begun to surface, but the existing ones are either expensive, unportable, or risky for IDUs. In order to effectively alleviate the proliferation of drug injection needles and improve the invention of needle removers, a miniature portable needle remover and receptacle is invented. The device for capturing and storing syringe needles contains an upper lid portion mounted tightly onto the lower box portion through an interlock system on the opposing sides of the device with a breaking-twisting mechanism to remove the needle. The invention is intended to be affordable to the general public, safe enough for IDUs to use, reliable enough not to harm others, and effective in breaking needles from the syringe. This report is conducted in the hope of spreading awareness of the dangers of drug injection and to provide a way to mitigate this drug rampant situation.Keywords: needle remover, drug injection, injection drug users, portable, receptacle
Procedia PDF Downloads 99