Search results for: privacy enhancing technologies
4085 Cybersecurity Protection Structures: The Case of Lesotho
Authors: N. N. Mosola, K. F. Moeketsi, R. Sehobai, N. Pule
Abstract:
The Internet brings increasing use of Information and Communications Technology (ICT) services and facilities. Consequently, new computing paradigms emerge to provide services over the Internet. Although there are several benefits stemming from these services, they pose several risks inherited from the Internet. For example, cybercrime, identity theft, malware etc. To thwart these risks, this paper proposes a holistic approach. This approach involves multidisciplinary interactions. The paper proposes a top-down and bottom-up approach to deal with cyber security concerns in developing countries. These concerns range from regulatory and legislative areas, cyber awareness, research and development, technical dimensions etc. The main focus areas are highlighted and a cybersecurity model solution is proposed. The paper concludes by combining all relevant solutions into a proposed cybersecurity model to assist developing countries in enhancing a cyber-safe environment to instill and promote a culture of cybersecurity.Keywords: cybercrime, cybersecurity, computer emergency response team, computer security incident response team
Procedia PDF Downloads 1564084 Political will in Fighting Corruption in Vietnam
Authors: Anh Dao Vu, Bill Ryan
Abstract:
The Vietnamese government struggles to grapple with the problem of rampant corruption, one of the most challenging difficulties the country faces. According to Transparency International’s Corruption Perceptions Index (CPI) 2014, Vietnam ranks 119 out of 175 countries. The CPI gives Vietnam a score of 31 on a scale from 0 to 100, where 0 indicates ‘highly corrupt’ and 100 represents ‘very clean’. Corruption eats into the national GDP of Vietnam, causing a loss of 3% to 4% of GDP per annum. In general, the Vietnamese people’s trust in their government to wage an effective fight against corruption, especially in the public sector, has been greatly eroded in recent years. Some substantial public demonstrations persuaded the government to implement strong anti-corruption measures. However, so far those measures have not been particularly successful. One of the main reasons for this shortcoming is that neither the Communist Party of Vietnam nor the government has demonstrated sufficiently strong ‘political will’ in fighting corruption. There remains a large gap between rhetoric and reality. This paper will examine the reasons why insufficient ‘political will’ is displayed in the ostensible fight against public sector corruption, and how certain anti-corruption strategies will both strengthen levels of political commitment to the fight against corruption while enhancing the effectiveness of that essential national endeavor.Keywords: corruption, political will, Vietnam, anti-corruption
Procedia PDF Downloads 3274083 Investigation of Delivery of Triple Play Service in GE-PON Fiber to the Home Network
Authors: Anurag Sharma, Dinesh Kumar, Rahul Malhotra, Manoj Kumar
Abstract:
Fiber based access networks can deliver performance that can support the increasing demands for high speed connections. One of the new technologies that have emerged in recent years is Passive Optical Networks. This paper is targeted to show the simultaneous delivery of triple play service (data, voice and video). The comparative investigation and suitability of various data rates is presented. It is demonstrated that as we increase the data rate, number of users to be accommodated decreases due to increase in bit error rate.Keywords: BER, PON, TDMPON, GPON, CWDM, OLT, ONT
Procedia PDF Downloads 7344082 Analysis of Critical Success Factors for Implementing Industry 4.0 and Circular Economy to Enhance Food Traceability
Authors: Mahsa Pishdar
Abstract:
Food traceability through the supply chain is facing increased demand. IoT and blockchain are among the tools under consideration in the Industry 4.0 era that could be integrated to help implementation of the Circular Economy (CE) principles while enhancing food traceability solutions. However, such tools need intellectual system, and infrastructureto be settled as guidance through the way, helping overcoming obstacles. That is why the critical success factors for implementing Industry 4.0 and circular economy principles in food traceability concept are analyzed in this paper by combination of interval type 2 fuzzy Worst Best Method and Measurement Alternatives and Ranking according to Compromise Solution (Interval Type 2 fuzzy WBM-MARCOS). Results indicate that “Knowledge of Industry 4.0 obligations and CE principle” is the most important factor that is the basis of success following by “Management commitment and support”. This will assist decision makers to seize success in gaining a competitive advantage while reducing costs through the supply chain.Keywords: food traceability, industry 4.0, internet of things, block chain, best worst method, marcos
Procedia PDF Downloads 2074081 Punching Shear Strengthening of Reinforced Concrete Flat Slabs Using Internal Square Patches of Carbon Fiber Reinforced Polymer
Authors: Malik Assi
Abstract:
This research presents a strengthening technique for enhancing the punching shear resistance of concrete flat slabs. Internal square patches of CFRP were centrally installed inside 450*450mm concrete panels during casting at a chosen distance from the tension face to produce six simply supported samples. The dimensions of those patches ranged from 50*50mm to 360*360mm. All the examined slabs contained the same amount of tensile reinforcement, had identical dimensions, were designed according to the American Concrete Institute code (ACI) and tested to failure. Compared to the control unstrengthened spacemen, all the strengthened slabs have shown an enhancement in punching capacity and stiffness. This enhancement has been found to be proportional to the area of the installed CFRP patches. In addition to the reasonably enhanced stiffness and punching shear, this strengthening technique can change the slab failure mode from shear to flexural.Keywords: CFRP patches, Flat slabs, Flexural, Stiffness, Punching shear
Procedia PDF Downloads 2674080 The Potential of M-Government towards Successful Implementation of E-Government in Saudi Arabia
Authors: Majed Ahmed Alfayad
Abstract:
Technology is now present in almost all areas and practices globally, and this has led governments around the world to adopt technology in the public sector. Therefore, electronic government has been introduced as a means of the automation of government services. New technologies and trends appear every single day, and governments need to meet the citizen’s requirements and expectations in order to succeed in the E-Government program. This research investigates the potential of mobile government as an enhancement force for the E-Government project in the Kingdom of Saudi Arabia, where the usage of mobile technology is coming to be favoured by citizens. Qualitative methodology has been adopted in this study for the data collection and analysis, and in particular the grounded theory approach.Keywords: e-government, e-participation, m-government, mobile technology
Procedia PDF Downloads 3334079 Experimental Study of CO₂ Hydrate Formation in Presence of Different Promotors
Authors: Samaneh Soroush, Tommy Golczynski, Tony Spratt
Abstract:
One of the new technologies for CO₂ capture, storage, and utilization (CCSU) is forming clathrate hydrate. This technology has some unknowns and challenges that make it difficult to apply in the real world. The low formation rate is one of the main difficulties of CO₂ hydrate. In this work, the effect of different promotors on the hydrate formation rate has been studied. Two surfactants, sodium dodecyl sulfate (SDS), tetra-n-butylammonium bromide (TBAB), and cyclopentane (CP) as a thermodynamic promotor and their combination have been used for the experiments. The results showed that the SDS is a powerful kinetic promotor and its combination with CP helps to convert more CO₂ to hydrate in a short time.Keywords: carbon capture, carbon dioxide, hydrate, promotor
Procedia PDF Downloads 2554078 The Impact of Passive Design Factors on House Energy Efficiency for New Cities in Egypt
Authors: Mahmoud Mourad, Ahmad Hamza H. Ali, S.Ookawara, Ali Kamel Abdel-Rahman, Nady M. Abdelkariem
Abstract:
The energy consumption of a house can be affected simultaneously by many building design factors related to its main architectural features, building elements and materials. This study focuses on the impact of passive design factors on the annual energy consumption of a suggested prototype house for single-family detached houses of 240 m2 in two floors, each floor of 120 m2 in new Egyptian cities located in (Alexandria - Cairo - Siwa - Assuit – Aswan) which resemble five different climatic zones (Northern coast – Northern upper Egypt - dessert region- Southern upper Egypt – South Egypt) respectively. This study present the effect of the passive design factors affecting the building energy consumption as building orientation, building material (walls, roof and slabs), building type (residential, educational, commercial), building occupancy (type of occupant, no. of occupant, age), building landscape and site selection, building envelope and fenestration (glazing material, shading), and building plan form. This information can be used to estimate the approximate saving in energy consumption, which would result on a change in the design datum for the future houses development, and to identify the major design problems for energy efficiency. To achieve the above objective, this paper presents a study for the factors affecting on the building energy consumption in the hot arid area in new Egyptian cities in five different climatic zones , followed by defining the energy needs for different utilization in this suggested prototype house. Consequently, a detailed analysis of the available Renewable Energy utilizations technologies used in the suggested home, and a calculation of the energy as a function of yearly distribution that required for this home will presented. The results obtained from building annual energy analyses show that architecture passive design factors saves about 35% of the annual energy consumption. It shows also passive cooling techniques saves about 45%, and renewable energy systems saves about 40% of the annual energy needs for this proposed home depending on the cities location on the climatic zones.Keywords: architecture passive design factors, energy efficient homes, Egypt new cites, renewable energy technologies
Procedia PDF Downloads 4014077 Augmented Reality and Its Impact on Education
Authors: Aliakbar Alijarahi, Ali Khaleghi, Azadehe Afrasiyabi
Abstract:
One of the emerging technologies in the field of education that can be effectively profitable, called augmented reality, where the combination of real world and virtual images in real time produces new concepts that can facilitate learning. The paper, providing an introduction to the general concept of augmented reality, aims at surveying its capabitities in different areas, with an emphasis on Education, It seems quite necessary to have comparative study on virtual/e-learning and augmented reality and conclude their differences in education methods. As an review article, the paper is composed, instead of producing new concepts, to sum-up and analayze accomplished works related to the subject.Keywords: augmented reality, education, virtual learning, e-learning
Procedia PDF Downloads 3414076 The Development of Wind Energy and Its Social Acceptance: The Role of Income Received by Wind Farm Owners, the Case of Galicia, Northwest Spain
Authors: X. Simon, D. Copena, M. Montero
Abstract:
The last decades have witnessed a significant increase in renewable energy, especially wind energy, to achieve sustainable development. Specialized literature in this field has carried out interesting case studies to extensively analyze both the environmental benefits of this energy and its social acceptance. However, to the best of our knowledge, work to date makes no analysis of the role of private owners of lands with wind potential within a broader territory of strong wind implantation, nor does it estimate their economic incomes relating them to social acceptance. This work fills this gap by focusing on Galicia, territory housing over 4,000 wind turbines and almost 3,400 MW of power. The main difficulty in getting this financial information is that it is classified, not public. We develop methodological techniques (semi- structured interviews and work groups), inserted within the Participatory Research, to overcome this important obstacle. In this manner, the work directly compiles qualitative and quantitative information on the processes as well as the economic results derived from implementing wind energy in Galicia. During the field work, we held 106 semi-structured interviews and 32 workshops with owners of lands occupied by wind farms. The compiled information made it possible to create the socioeconomic database on wind energy in Galicia (SDWEG). This database collects a diversity of quantitative and qualitative information and contains economic information on the income received by the owners of lands occupied by wind farms. In the Galician case, regulatory framework prevented local participation under the community wind farm formula. The possibility of local participation in the new energy model narrowed down to companies wanting to install a wind farm and demanding land occupation. The economic mechanism of local participation begins here, thus explaining the level of acceptance of wind farms. Land owners can receive significant income given that these payments constitute an important source of economic resources, favor local economic activity, allow rural areas to develop productive dynamism projects and improve the standard of living of rural inhabitants. This work estimates that land owners in Galicia perceive about 10 million euros per year in total wind revenues. This represents between 1% and 2% of total wind farm invoicing. On the other hand, relative revenues (Euros per MW), far from the amounts reached in other spaces, show enormous payment variability. This signals the absence of a regulated market, the predominance of partial agreements, and the existence of asymmetric positions between owners and developers. Sustainable development requires the replacement of conventional technologies by low environmental impact technologies, especially those that emit less CO₂. However, this new paradigm also requires rural owners to participate in the income derived from the structural transformation processes linked to sustainable development. This paper demonstrates that regulatory framework may contribute to increasing sustainable technologies with high social acceptance without relevant local economic participation.Keywords: regulatory framework, social acceptance, sustainable development, wind energy, wind income for landowners
Procedia PDF Downloads 1424075 Sustainable Crop Production: Greenhouse Gas Management in Farm Value Chain
Authors: Aswathaman Vijayan, Manish Jha, Ullas Theertha
Abstract:
Climate change and Global warming have become an issue for both developed and developing countries and perhaps the biggest threat to the environment. We at ITC Limited believe that a company’s performance must be measured by its Triple Bottom Line contribution to building economic, social and environmental capital. This Triple Bottom Line strategy focuses on - Embedding sustainability in business practices, Investing in social development and Adopting a low carbon growth path with a cleaner environment approach. The Agri Business Division - ILTD operates in the tobacco crop growing regions of Andhra Pradesh and Karnataka province of India. The Agri value chain of the company comprises of two distinct phases: First phase is Agricultural operations undertaken by ITC trained farmers and the second phase is Industrial operations which include marketing and processing of the agricultural produce. This research work covers the Greenhouse Gas (GHG) management strategy of ITC in the Agricultural operations undertaken by the farmers. The agriculture sector adds considerably to global GHG emissions through the use of carbon-based energies, use of fertilizers and other farming operations such as ploughing. In order to minimize the impact of farming operations on the environment, ITC has a taken a big leap in implementing system and process in reducing the GHG impact in farm value chain by partnering with the farming community. The company has undertaken a unique three-pronged approach for GHG management at the farm value chain: 1) GHG inventory at farm value chain: Different sources of GHG emission in the farm value chain were identified and quantified for the baseline year, as per the IPCC guidelines for greenhouse gas inventories. The major sources of emission identified are - emission due to nitrogenous fertilizer application during seedling production and main-field; emission due to diesel usage for farm machinery; emission due to fuel consumption and due to burning of crop residues. 2) Identification and implementation of technologies to reduce GHG emission: Various methodologies and technologies were identified for each GHG emission source and implemented at farm level. The identified methodologies are – reducing the consumption of chemical fertilizer usage at the farm through site-specific nutrient recommendation; Usage of sharp shovel for land preparation to reduce diesel consumption; implementation of energy conservation technologies to reduce fuel requirement and avoiding burning of crop residue by incorporation in the main field. These identified methodologies were implemented at farm level, and the GHG emission was quantified to understand the reduction in GHG emission. 3) Social and farm forestry for CO2 sequestration: In addition, the company encouraged social and farm forestry in the waste lands to convert it into green cover. The plantations are carried out with fast growing trees viz., Eucalyptus, Casuarina, and Subabul at the rate of 10,000 Ha of land per year. The above approach minimized considerable amount of GHG emission at the farm value chain benefiting farmers, community, and environment at a whole. In addition, the CO₂ stock created by social and farm forestry program has made the farm value chain to become environment-friendly.Keywords: CO₂ sequestration, farm value chain, greenhouse gas, ITC limited
Procedia PDF Downloads 2954074 The Effect of Artificial Intelligence on Autism Attitudes and Laws
Authors: Nermin Noshi Esraeil Abdalla
Abstract:
Inclusive schooling offerings for college kids with Autism stays in its early developmental levels in Thailand. despite many greater youngsters with autism are attending schools since the Thai authorities brought the training Provision for human beings with Disabilities Act in 2008, the services students with autism and their families obtain are typically missing. This quantitative examine used attitude and Preparedness to educate college students with Autism Scale (APTSAS) to investigate 110 number one faculty teachers’ attitude and preparedness to educate college students with autism inside the widespread training school room. Descriptive statistical evaluation of the records discovered that scholar behavior changed into the most good sized factor in constructing teachers’ terrible attitudes students with autism. the majority of teachers additionally indicated that their pre-service schooling did not put together them to fulfill the mastering needs of children with autism especially, folks who are non-verbal. The take a look at is substantial and offers path for enhancing trainer education for inclusivity in Thailand.Keywords: attitude, autism, teachers, sports activities, movement skills, motor skills
Procedia PDF Downloads 224073 The Use of Crisis Workplace Technology to Protect Communication Processes of Critical Infrastructure
Authors: Jiri Barta, Jiří F. Urbanek
Abstract:
This paper deals with a protection of the national and European infrastructure. It is issue nowadays. The paper deals with the perspectives and possibilities of "smart solutions" to critical infrastructure protection. The research project deals with computers aided technologies are used from the perspective of new, better protection of selected infrastructure objects. Protection is focused on communication and information channels. These communication and information channels are very important for the functioning of the system of protection of critical infrastructure elements.Keywords: interoperability, communication systems, controlling proces, critical infrastructure, crisis workplaces, continuity
Procedia PDF Downloads 2994072 Role of Emotional Support and Work Motivation for Quality of Work Life on Balinese Working Women
Authors: Komang Rahayu Indrawati, Ni Wayan Sinthia Widiastuti, Ratna Dewi Santosa
Abstract:
Today the career of Balinese working women has been highly developed where able to work with loyalty and high professionalism. Career for a woman is one conscious choice and a call of conscience, which provides financial support for her family. Career for women can develop their own potencies, intellectually, and socially, so women feel that their role is meaningful and beneficial for herself and others. Emotional support becomes important to understand certainly for women who have multirole like Balinese working women to meet the demands of their role and also enhancing their work motivation and the quality of work life. This research used quantitative research method with questionnaires dissemination to 120 respondents and analyzed using Multiple Regression Analysis. The purpose of this study was to see the role of emotional support for work motivation and quality of work life in working Balinese women. The results of this study showed that emotional support and work motivation give a significant role in the quality of work life on Balinese working women.Keywords: Balinese working women, emotional support, quality of work life, work motivation
Procedia PDF Downloads 1974071 Understanding the Basics of Information Security: An Act of Defense
Authors: Sharon Q. Yang, Robert J. Congleton
Abstract:
Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.Keywords: cybercrimes, hacking technologies, higher education, information security, libraries
Procedia PDF Downloads 1344070 Students’ Perception of Their M-Learning Readiness
Authors: Sulaiman Almutairy, Trevor Davies, Yota Dimitriadi
Abstract:
This paper presents study investigating how to understand better the psychological readiness for mobile learning (m-learning) among Saudi students, while also evaluating m-learning in Saudi Arabia-a topic that has not yet received adequate attention from researchers. Data was acquired through a questionnaire administered to 131 Saudi students at UK universities, in July 2013. The study confirmed that students are confident using mobile devices in their daily lives and that they would welcome more opportunities for mobile learning. The findings indicated that Saudi higher education students are highly familiar with, and are psychologically ready for, m-learning.Keywords: m-learning, mobile technologies, psychological readiness, higher education
Procedia PDF Downloads 5204069 Controlled Digital Lending, Equitable Access to Knowledge and Future Library Services
Authors: Xuan Pang, Alvin L. Lee, Peggy Glatthaar
Abstract:
Libraries across the world have been an innovation engine of creativity and opportunityin many decades. The on-going global epidemiology outbreak and health crisis experience illuminates potential reforms, rethinking beyond traditional library operations and services. Controlled Digital Lending (CDL) is one of the emerging technologies libraries used to deliver information digitally in support of online learning and teachingand make educational materials more affordable and more accessible. CDL became a popular term in the United States of America (USA) as a result of a white paper authored by Kyle K. Courtney (Harvard University) and David Hansen (Duke University). The paper gave the legal groundwork to explore CDL: Fair Use, First Sale Doctrine, and Supreme Court rulings. Library professionals implemented this new technology to fulfill their users’ needs. Three libraries in the state of Florida (University of Florida, Florida Gulf Coast University, and Florida A&M University) started a conversation about how to develop strategies to make CDL work possible at each institution. This paper shares the stories of piloting and initiating a CDL program to ensure students have reliable, affordable access to course materials they need to be successful. Additionally, this paper offers an overview of the emerging trends of Controlled Digital Lending in the USA and demonstrates the development of the CDL platforms, policies, and implementation plans. The paper further discusses challenges and lessons learned and how each institution plans to sustain the program into future library services. The fundamental mission of the library is providing users unrestricted access to library resources regardless of their physical location, disability, health status, or other circumstances. The professional due diligence of librarians, as information professionals, is to makeeducational resources more affordable and accessible.CDL opens a new frontier of library services as a mechanism for library practice to enhance user’s experience of using libraries’ services. Libraries should consider exploring this tool to distribute library resources in an effective and equitable way. This new methodology has potential benefits to libraries and end users.Keywords: controlled digital lending, emerging technologies, equitable access, collaborations
Procedia PDF Downloads 1354068 Reliable Multicast Communication in Next Generation Networks
Authors: Muazzam Ali Khan Khattak
Abstract:
Next Generation Network is combination of different networks having different technologies. Due to mobile nature of nodes the movement of nodes occurs from one network to another network. Multicasting in such networks is still a hot issue of research because the user in today's world wants reliable communication wherever it lies. Due to heterogeneity of NGN it is very difficult to handle reliable multicast communication. In this paper we proposed an improved scheme for reliable multicast communication in next generation networks. Because multicast communication is very important to deliver same data packets to multiple receivers and minimize the network traffic. This new scheme will make the multicast communication in NGN more reliable and efficient.Keywords: next generation networks, route request, IPT, NACK, ARQ, DTN
Procedia PDF Downloads 5034067 A PHREEQC Reactive Transport Simulation for Simply Determining Scaling during Desalination
Authors: Andrew Freiburger, Sergi Molins
Abstract:
Freshwater is a vital resource; yet, the supply of clean freshwater is diminishing as the consequence of melting snow and ice from global warming, pollution from industry, and an increasing demand from human population growth. The unsustainable trajectory of diminishing water resources is projected to jeopardize water security for billions of people in the 21st century. Membrane desalination technologies may resolve the growing discrepancy between supply and demand by filtering arbitrary feed water into a fraction of renewable, clean water and a fraction of highly concentrated brine. The leading hindrance of membrane desalination is fouling, whereby the highly concentrated brine solution encourages micro-organismal colonization and/or the precipitation of occlusive minerals (i.e. scale) upon the membrane surface. Thus, an understanding of brine formation is necessary to mitigate membrane fouling and to develop efficacious desalination technologies that can bolster the supply of available freshwater. This study presents a reactive transport simulation of brine formation and scale deposition during reverse osmosis (RO) desalination. The simulation conceptually represents the RO module as a one-dimensional domain, where feed water directionally enters the domain with a prescribed fluid velocity and is iteratively concentrated in the immobile layer of a dual porosity model. Geochemical PHREEQC code numerically evaluated the conceptual model with parameters for the BW30-400 RO module and for real water feed sources – e.g. the Red and Mediterranean seas, and produced waters from American oil-wells, based upon peer-review data. The presented simulation is computationally simpler, and hence less resource intensive, than the existent and more rigorous simulations of desalination phenomena, like TOUGHREACT. The end-user may readily prepare input files and execute simulations on a personal computer with open source software. The graphical results of fouling-potential and brine characteristics may therefore be particularly useful as the initial tool for screening candidate feed water sources and/or informing the selection of an RO module.Keywords: desalination, PHREEQC, reactive transport, scaling
Procedia PDF Downloads 1364066 Comparison of Blockchain Ecosystem for Identity Management
Authors: K. S. Suganya, R. Nedunchezhian
Abstract:
In recent years, blockchain technology has been found to be the most significant discovery in this digital era, after the discovery of the Internet and Cloud Computing. Blockchain is a simple, distributed public ledger that contains all the user’s transaction details in a block. The global copy of the block is then shared among all its peer-peer network users after validation by the Blockchain miners. Once a block is validated and accepted, it cannot be altered by any users making it a trust-free transaction. It also resolves the problem of double-spending by using traditional cryptographic methods. Since the advent of bitcoin, blockchain has been the backbone for all its transactions. But in recent years, it has found its roots and uses in many fields like Smart Contracts, Smart City management, healthcare, etc. Identity management against digital identity theft has become a major concern among financial and other organizations. To solve this digital identity theft, blockchain technology can be employed with existing identity management systems, which maintain a distributed public ledger containing details of an individual’s identity containing information such as Digital birth certificates, Citizenship number, Bank details, voter details, driving license in the form of blocks verified on the blockchain becomes time-stamped, unforgeable and publicly visible for any legitimate users. The main challenge in using blockchain technology to prevent digital identity theft is ensuring the pseudo-anonymity and privacy of the users. This survey paper will exert to study the blockchain concepts, consensus protocols, and various blockchain-based Digital Identity Management systems with their research scope. This paper also discusses the role of Blockchain in COVID-19 pandemic management by self-sovereign identity and supply chain management.Keywords: blockchain, consensus protocols, bitcoin, identity theft, digital identity management, pandemic, COVID-19, self-sovereign identity
Procedia PDF Downloads 1304065 An Experimental Study on Some Conventional and Hybrid Models of Fuzzy Clustering
Authors: Jeugert Kujtila, Kristi Hoxhalli, Ramazan Dalipi, Erjon Cota, Ardit Murati, Erind Bedalli
Abstract:
Clustering is a versatile instrument in the analysis of collections of data providing insights of the underlying structures of the dataset and enhancing the modeling capabilities. The fuzzy approach to the clustering problem increases the flexibility involving the concept of partial memberships (some value in the continuous interval [0, 1]) of the instances in the clusters. Several fuzzy clustering algorithms have been devised like FCM, Gustafson-Kessel, Gath-Geva, kernel-based FCM, PCM etc. Each of these algorithms has its own advantages and drawbacks, so none of these algorithms would be able to perform superiorly in all datasets. In this paper we will experimentally compare FCM, GK, GG algorithm and a hybrid two-stage fuzzy clustering model combining the FCM and Gath-Geva algorithms. Firstly we will theoretically dis-cuss the advantages and drawbacks for each of these algorithms and we will describe the hybrid clustering model exploiting the advantages and diminishing the drawbacks of each algorithm. Secondly we will experimentally compare the accuracy of the hybrid model by applying it on several benchmark and synthetic datasets.Keywords: fuzzy clustering, fuzzy c-means algorithm (FCM), Gustafson-Kessel algorithm, hybrid clustering model
Procedia PDF Downloads 5144064 Kuwait Environmental Remediation Program: Waste Management Data Analytics for Planning and Optimization of Waste Collection
Authors: Aisha Al-Baroud
Abstract:
The United Nations Compensation Commission (UNCC), Kuwait National Focal Point (KNFP) and Kuwait Oil Company (KOC) cooperated in a joint project to undertake comprehensive and collaborative efforts to remediate 26 million m3 of crude oil contaminated soil that had resulted from the Gulf War in 1990/1991. These efforts are referred to as the Kuwait Environmental Remediation Program (KERP). KOC has developed a Total Remediation Solution (TRS) for KERP, which will guide the Remediation projects, comprises of alternative remedial solutions with treatment techniques inclusive of limited landfills for non-treatable soil materials disposal, and relies on treating certain ranges of Total Petroleum Hydrocarbon (TPH) contamination with the most appropriate remediation techniques. The KERP Remediation projects will be implemented within the KOC’s oilfields in North and South East Kuwait. The objectives of this remediation project is to clear land for field development and treat all the oil contaminated features (dry oil lakes, wet oil lakes, and oil contaminated piles) through TRS plan to optimize the treatment processes and minimize the volume of contaminated materials to be placed into landfills. The treatment strategy will comprise of Excavation and Transportation (E&T) of oil contaminated soils from contaminated land to remote treatment areas and to use appropriate remediation technologies or a combination of treatment technologies to achieve remediation target criteria (RTC). KOC has awarded five mega projects to achieve the same and is currently in the execution phase. As a part of the company’s commitment to environment and for the fulfillment of the mandatory HSSEMS procedures, all the Remediation contractors needs to report waste generation data from the various project activities on a monthly basis. Data on waste generation is collected in order to implement cost-efficient and sustainable waste management operations. Data analytics approaches can be built on the top of the data to produce more detailed, and in-time waste generation information for the basis of waste management and collection. The results obtained highlight the potential of advanced data analytic approaches in producing more detailed waste generation information for planning and optimization of waste collection and recycling.Keywords: waste, tencnolgies, KERP, data, soil
Procedia PDF Downloads 1134063 Enhancing Rural Agricultural Value Chains through Electric Mobility Services in Ethiopia
Authors: Clemens Pizzinini, Philipp Rosner, David Ziegler, Markus Lienkamp
Abstract:
Transportation is a constitutional part of most supply and value chains in modern economies. Smallholder farmers in rural Ethiopia face severe challenges along their supply and value chains. In particular, suitable, affordable, and available transport services are in high demand. To develop a context-specific technical solutions, a problem-to-solution methodology based on the interaction with technology is developed. With this approach, we fill the gap between proven transportation assessment frameworks and general user-centered techniques. Central to our approach is an electric test vehicle that is implemented in rural supply and value chains for research, development, and testing. Based on our objective and the derived methodological requirements, a set of existing methods is selected. Local partners are integrated into an organizational framework that executes major parts of this research endeavour in the Arsi Zone, Oromia Region, Ethiopia.Keywords: agricultural value chain, participatory methods, agile methods, sub-Saharan Africa, Ethiopia, electric vehicle, transport service
Procedia PDF Downloads 744062 Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya
Authors: Samuel Mwangi, Josephine K. Mule
Abstract:
Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities.Keywords: facial recognition, access control, technology, learning
Procedia PDF Downloads 1254061 Research on the Evaluation of Enterprise-University-Research Cooperation Ability in Hubei Province
Authors: Dongfang Qiu, Yilin Lu
Abstract:
The measurement of enterprise-university-research cooperative efficiency has important meanings in improving the cooperative efficiency, strengthening the effective integration of regional resource, enhancing the ability of regional innovation and promoting the development of regional economy. The paper constructs the DEA method and DEA-Malmquist productivity index method to research the cooperation efficiency of Hubei by making comparisons with other provinces in China. The study found out the index of technology efficiency is 0.52 and the enterprise-university- research cooperative efficiency is Non-DEA efficient. To realize the DEA efficiency of Hubei province, the amount of 1652.596 R&D employees and 638.368 R&D employees’ full time equivalence should be reduced or 137.89 billion yuan of new products’ sales income be increased. Finally, it puts forward policy recommendations on existing problems to strengthen the standings of the cooperation, realize the effective application of the research results, and improve the level of management of enterprise-university-research cooperation efficiency.Keywords: cooperation ability, DEA method, enterprise-university-research cooperation, Malmquist efficiency index
Procedia PDF Downloads 3974060 Hydration Behavior of Belitic Cement in the Presence of Na₂CO₃, NaOH, KOH, and Water Glass
Authors: F. Amor, A. Bouregba, N. El Fami, A. Diouri
Abstract:
This study provides insights into the role of alkalis in modifying the hydration kinetics and microstructural development of β-dicalcium silicate, highlighting potential pathways for enhancing the performance of belite-based cements in various construction applications. It investigates the behavior of β-dicalcium silicates (β-Ca₂SiO₄) when hydrated in various alkaline environments, including deionized water and solutions containing 2M concentrations of Na₂CO₃, NaOH, KOH, and water glass. The dicalcium silicate was synthesized with laboratory reagents, calcium carbonate, and gel silica. The hydration process was carried out over different periods, ranging from 7 to 90 days. The hydrated samples were characterized using X-ray diffraction, infrared spectroscopy, and scanning electron microscopy, while the mechanical strength tests were performed at 28 and 90 days. The results indicate that the presence of alkalis significantly influences the hydration of belite cement. Early hydration is accelerated, which is evident from the faster dissolution of C₂S, a decrease in C₂S peaks, and the formation of C-S-H products, including sodium-containing C-(N)-S-H and potassium-containing C-(K)-S-H.Keywords: dicalcium silicate, alkali activator, hydration, water glass, Na₂CO₃, NaOH, KOH
Procedia PDF Downloads 134059 Assessment of Factors Influencing Adoption of Agroforestry Technologies in Halaba Special Woreda, Southern Ethiopia
Authors: Mihretu Erjabo
Abstract:
Halaba special district is characterized by drought, soil erosion, high population pressure, poor livestock production, lack of feed for livestock, very deep water table, very low productivity of crops and food insufficiency. In order to address these problems, the woreda agricultural development office along with other management practices such as soil physical conservation measures agroforestry was introduced decades ago as a means to alleviate the problem. However, the level of agroforestry adoption remains low. Objective of this study was to identify the factors that influence adoption of agroforestry technologies by farmers in the district. Random sampling was employed to select two kebele administrations and respondents. Data collection was conducted by rural household questionnaire survey, participatory rural appraisal, questionnaires for local and woreda extension staff, secondary data resources and field observation. A sample of 12 key informants, 6 extension staffs, and 182 households, were used in the data collection. Chi square test used to determine significant relationships between adoption of agroforestry and 15 selected variables. Out of which eleven were found to be significant to affect farmers’ adoptiveness. These were frequency of visits of farmers (13.39%), participation in training (11.49%), farmers’ attitude towards agroforestry practices (10.61%), frequency of visits of extensionists (10.38%), participation in extension meeting (10.34%), participation in field day (10.28%), land holding size (9.29%), level of literacy (8.78%), awareness about the importance of agroforestry technology packages (7.06%), time taken from their residence to nearest extension (5.04%) and gender of respondents (3.34%). This study also identified various factors that result in low adoption rates of agroforestry including fear of competition, seedling, rainfall and labour shortage, free grazing, financial problem, expecting trees as soil degrader and long span of trees and lack of need ranking. To improve farmers’ adoption, the factors identified should be well addressed by launching a series and recurrent outreach extension program appropriate and suitable to farmers need.Keywords: farmers attitude, farmers participation, soil degradation, technology packages
Procedia PDF Downloads 1584058 The Development of Educational Video Games Aimed at Enhancing Academic Motivation and Learning Among African American Males
Authors: Kenneth Philip Jones
Abstract:
This dissertation investigates the potential of developing educational-based video games to motivate and engage African American males. The study employed a qualitative methodological approach by investigating African American males who are avid video game players and are currently enrolled at a college or university. The participants were individually and collectively video and audio recorded during the interviews and observations. Situated Learning theory analyzed how motivation and engagement can transfer from a video game to an educational context. The research aims to address the disparities in our educational systems when it comes to providing a culture, climate, and atmosphere that will enable the academic development of African American males. The primary objective of the findings is based on the participants’ responses and the data collected to provide recommendations to educators and scholars on how to address the issues that have demoralized African American males in education and provide a platform that will allow for equality in educational development and advancement.Keywords: video games, motivation, behavioral, learning transfer
Procedia PDF Downloads 1214057 Differentials in Reproductive and Child Health Care in India
Authors: Dewaram Abhiman Nagdeve
Abstract:
The present paper examined the urban-rural differentials and the factors influencing net change in reproductive and child health input, its utilization, and its output during the National Family Health Survey conducted during 1992-93 and 2019-21 in India. The analysis of NFHS data has been done and variables have been grouped into health input regarding antenatal care, postnatal care, and child care, utilization regarding reproductive and child health care, and reproductive and child health outcomes. An analysis was done using bivariate analysis and the chi-square test. The study reveals that there was an increase in health input, utilization, and output during the intra-survey period. Urban-rural disparities in Reproductive and Child Health (RCH) indicators persist, highlighting the need for focused intervention by the Indian government. Key steps should include enhancing RCH programs through robust information and education campaigns and deploying dedicated health personnel to remote and inaccessible rural areas. These initiatives are crucial to reducing both maternal and child mortality rates and ensuring equitable healthcare access nationwide.Keywords: urban, rural, differentials, reproductive and child health, India
Procedia PDF Downloads 34056 Internet-Of-Things and Ergonomics, Increasing Productivity and Reducing Waste: A Case Study
Authors: V. Jaime Contreras, S. Iliana Nunez, S. Mario Sanchez
Abstract:
Inside a manufacturing facility, we can find innumerable automatic and manual operations, all of which are relevant to the production process. Some of these processes add more value to the products more than others. Manual operations tend to add value to the product since they can be found in the final assembly area o final operations of the process. In this areas, where a mistake or accident can increase the cost of waste exponentially. To reduce or mitigate these costly mistakes, one approach is to rely on automation to eliminate the operator from the production line - requires a hefty investment and development of specialized machinery. In our approach, the center of the solution is the operator through sufficient and adequate instrumentation, real-time reporting and ergonomics. Efficiency and reduced cycle time can be achieved thorough the integration of Internet-of-Things (IoT) ready technologies into assembly operations to enhance the ergonomics of the workstations. Augmented reality visual aids, RFID triggered personalized workstation dimensions and real-time data transfer and reporting can help achieve these goals. In this case study, a standard work cell will be used for real-life data acquisition and a simulation software to extend the data points beyond the test cycle. Three comparison scenarios will run in the work cell. Each scenario will introduce a dimension of the ergonomics to measure its impact independently. Furthermore, the separate test will determine the limitations of the technology and provide a reference for operating costs and investment required. With the ability, to monitor costs, productivity, cycle time and scrap/waste in real-time the ROI (return on investment) can be determined at the different levels to integration. This case study will help to show that ergonomics in the assembly lines can make significant impact when IoT technologies are introduced. Ergonomics can effectively reduce waste and increase productivity with minimal investment if compared with setting up to custom machine.Keywords: augmented reality visual aids, ergonomics, real-time data acquisition and reporting, RFID triggered workstation dimensions
Procedia PDF Downloads 214