Search results for: security critical application
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 15002

Search results for: security critical application

13022 Mobile Application for Construction Sites Management

Authors: A. Khelifi, M. Al Kaabi, B. Al Rawashdeh

Abstract:

The infrastructure is one of the most important pillars of the UAE, where it spends millions of dollars for investments in the construction sectors. The research done by Kuwait Finance House (KFH) Research showed clearly that the UAE investments in the construction sectors have exceeded 30 billion dollars in 2013. There are many construction companies in the UAE and each one of them is taking the responsibilities to build different infrastructures. The large scale construction projects consist of multi human activities which can affect the efficiency and productivity of the running projects. The Construction Administration System is developed to increase the efficiency and productivity at the construction sites. It runs on two platforms: web server and mobile phone and supports two main users: mobile user and institution employee. With Construction Administration Mobile Application the user can manage and control several projects, create several reports and send these reports in Portable Document Format (PDF) formats through emails, view the physical location of each project, capturing and save photos. An institution employee can use the system to view all existing workers and projects, send emails and view the progress of each project.

Keywords: construction sites, management, mobile application, Portable Document Format (PDF)

Procedia PDF Downloads 373
13021 The Role of Synthetic Data in Aerial Object Detection

Authors: Ava Dodd, Jonathan Adams

Abstract:

The purpose of this study is to explore the characteristics of developing a machine learning application using synthetic data. The study is structured to develop the application for the purpose of deploying the computer vision model. The findings discuss the realities of attempting to develop a computer vision model for practical purpose, and detail the processes, tools, and techniques that were used to meet accuracy requirements. The research reveals that synthetic data represents another variable that can be adjusted to improve the performance of a computer vision model. Further, a suite of tools and tuning recommendations are provided.

Keywords: computer vision, machine learning, synthetic data, YOLOv4

Procedia PDF Downloads 218
13020 Emulation Model in Architectural Education

Authors: Ö. Şenyiğit, A. Çolak

Abstract:

It is of great importance for an architectural student to know the parameters through which he/she can conduct his/her design and makes his/her design effective in architectural education. Therefore; an empirical application study was carried out through the designing activity using the emulation model to support the design and design approaches of architectural students. During the investigation period, studies were done on the basic design elements and principles of the fall semester, and the emulation model, one of the designing methods that constitute the subject of the study, was fictionalized as three phased “recognition-interpretation-application”. As a result of the study, it was observed that when students were given a key method during the design process, their awareness increased and their aspects improved as well.

Keywords: basic design, design education, design methods, emulation

Procedia PDF Downloads 230
13019 The Practical Application of Sensory Awareness in Developing Healthy Communication, Emotional Regulation, and Emotional Introspection

Authors: Node Smith

Abstract:

Developmental psychology has long focused on modeling consciousness, often neglecting practical application and clinical utility. This paper aims to bridge this gap by exploring the practical application of physical and sensory tracking and awareness in fostering essential skills for conscious development. Higher conscious development requires practical skills such as self-agency, the ability to hold multiple perspectives, and genuine altruism. These are not personality characteristics but areas of skillfulness that address many cultural deficiencies impacting our world. They are intertwined with individual as well as collective conscious development. Physical, sensory tracking and awareness are crucial for developing these skills and offer the added benefit of cultivating healthy communication, emotional regulation, and introspection. Unlike skills such as throwing a baseball, which can be developed through practice or innate ability, the ability to introspect, track physical sensations, and observe oneself objectively is essential for advancing consciousness. Lacking these skills leads to cultural and individual anxiety, helplessness, and a lack of agency, manifesting as blame-shifting and irresponsibility. The inability to hold multiple perspectives stifles altruism, as genuine consideration for a global community requires accepting other perspectives without conditions. Physical and sensory tracking enhances self-awareness by grounding individuals in their bodily experiences. This grounding is critical for emotional regulation, allowing individuals to identify and process emotions in real-time, preventing overwhelm and fostering balance. Techniques like mindfulness meditation and body scan exercises attune individuals to their physical sensations, providing insights into their emotional states. Sensory awareness also facilitates healthy communication by fostering empathy and active listening. When individuals are in tune with their physical sensations, they become more present in interactions, picking up on subtle cues and responding thoughtfully. This presence reduces misunderstandings and conflicts, promoting more effective communication. The ability to introspect and observe oneself objectively is key to emotional introspection. This skill allows individuals to reflect on their thoughts, feelings, and behaviors, identify patterns, recognize areas for growth, and make conscious choices aligned with their values and goals. In conclusion, physical and sensory tracking and awareness are vital for developing the skills necessary for higher consciousness development. By fostering self-agency, emotional regulation, and the ability to hold multiple perspectives, these practices contribute to healthier communication, deeper emotional introspection, and a more altruistic and connected global community. Integrating these practices into developmental psychology and therapeutic interventions holds significant promise for both individual and societal transformation.

Keywords: conscious development, emotional introspection, emotional regulation, self-agency, stages of development

Procedia PDF Downloads 30
13018 Blockchain-Based Decentralized Architecture for Secure Medical Records Management

Authors: Saeed M. Alshahrani

Abstract:

This research integrated blockchain technology to reform medical records management in healthcare informatics. It was aimed at resolving the limitations of centralized systems by establishing a secure, decentralized, and user-centric platform. The system was architected with a sophisticated three-tiered structure, integrating advanced cryptographic methodologies, consensus algorithms, and the Fast Healthcare Interoperability Resources (HL7 FHIR) standard to ensure data security, transaction validity, and semantic interoperability. The research has profound implications for healthcare delivery, patient care, legal compliance, operational efficiency, and academic advancements in blockchain technology and healthcare IT sectors. The methodology adapted in this research comprises of Preliminary Feasibility Study, Literature Review, Design and Development, Cryptographic Algorithm Integration, Modeling the data and testing the system. The research employed a permissioned blockchain with a Practical Byzantine Fault Tolerance (PBFT) consensus algorithm and Ethereum-based smart contracts. It integrated advanced cryptographic algorithms, role-based access control, multi-factor authentication, and RESTful APIs to ensure security, regulate access, authenticate user identities, and facilitate seamless data exchange between the blockchain and legacy healthcare systems. The research contributed to the development of a secure, interoperable, and decentralized system for managing medical records, addressing the limitations of the centralized systems that were in place. Future work will delve into optimizing the system further, exploring additional blockchain use cases in healthcare, and expanding the adoption of the system globally, contributing to the evolution of global healthcare practices and policies.

Keywords: healthcare informatics, blockchain, medical records management, decentralized architecture, data security, cryptographic algorithms

Procedia PDF Downloads 51
13017 The Inhibition of Relapse of Orthodontic Tooth Movement by NaF Administration in Expressions of TGF-β1, Runx2, Alkaline Phosphatase and Microscopic Appearance of Woven Bone

Authors: R. Sutjiati, Rubianto, I. B. Narmada, I. K. Sudiana, R. P. Rahayu

Abstract:

The prevalence of post-treatment relapse in orthodontics in the community is high enough; therefore, relapses in orthodontic treatment must be prevented well. The aim of this study is to experimentally test the inhibition of relapse of orthodontics tooth movement in NaF of expression TGF-β1, Runx2, alkaline phosphatase (ALP) and microscopic of woven bone. The research method used was experimental laboratory research involving 30 rats, which were divided into three groups. Group A: rats were not given orthodontic tooth movement and without NaF. Group B: rats were given orthodontic tooth movement and without 11.5 ppm by topical application. Group C: rats were given orthodontic tooth movement and 11.75 ppm by topical application. Orthodontic tooth movement was conducted by applying ligature wires of 0.02 mm in diameter on the molar-1 (M-1) of left permanent maxilla and left insisivus of maxilla. Immunohistochemical examination was conducted to calculate the number of osteoblast to determine TGF β1, Runx2, ALP and haematoxylin to determine woven bone on day 7 and day 14. Results: It was shown that administrations of Natrium Fluoride topical application proved effective to increase the expression of TGF-β1, Runx2, ALP and to increase woven bone in the tension area greater than administration without natrium fluoride topical application (p < 0.05), except the expression of ALP on day 7 and day 14 which was significant. The results of the study show that NaF significantly increases the expressions of TGF-β1, Runx2, ALP and woven bone. The expression of the variables enhanced on day 7 compared on that on day 14, except ALP. Thus, it can be said that the acceleration of woven bone occurs on day 7.

Keywords: TGF-β1, Runx2, ALP, woven bone, natrium fluoride

Procedia PDF Downloads 227
13016 Carbon Dioxide (CO₂) and Methane (CH₄) Fluxes from Irrigated Wheat in a Subtropical Floodplain Soil Increased by Reduced Tillage, Residue Retention, and Nitrogen Application Rate

Authors: R. Begum, M. M. R. Jahangir, M. Jahiruddin, M. R. Islam, M. M. Rahman, M. B. Hossain, P. Hossain

Abstract:

Quantifying carbon (C) sequestration in soils is necessary to help better understand the effect of agricultural practices on the C cycle. The estimated contribution of agricultural carbon dioxide (CO₂) and methane (CH₄) to global warming potential (GWP) has a wide range. The underlying causes of this huge uncertainty are the difficulties to predict the regional CO₂ and CH₄ loss due to the lack of experimental evidence on CO₂ and CH₄ emissions and associated drivers. The CH₄ and CO₂ emissions were measured in irrigated wheat in subtropical floodplain soils which have been under two soil disturbance levels (strip vs. conventional tillage; ST vs. CT being both with 30% residue retention) and three N fertilizer rates (60, 100, and 140% of the recommended N fertilizer dose, RD) in annual wheat (Triticum aestivum)-mungbean (Vigna radiata)-rice (Oryza sativa L) for seven consecutive years. The highest CH₄ and CO₂ emission peak was observed on day 3 after urea application in both tillages except CO₂ flux in CT. Nitrogen fertilizer application rate significantly influenced mean and cumulative CH₄ and CO₂ fluxes. The CH₄ and CO₂ fluxes decreased in an optimum dose of N fertilizer except for ST for CH₄. The CO₂ emission significantly showed higher emission at minimum (60% of RD) fertilizer application at both tillages. Soil microbial biomass carbon (MBC), organic carbon (SOC), Particulate organic carbon (POC), permanganate oxidisable carbon (POXC), basal respiration (BR) were significantly higher in ST which were negative and significantly correlated with CO₂. However, POC and POXC were positively and significantly correlated with CH₄ emission.

Keywords: carbon dioxide emissions, methane emission, nitrogen rate, tillage

Procedia PDF Downloads 109
13015 Nation Building versus Self Determination: Thai State’s Response to Insurgency in South

Authors: Sunaina Sunaina

Abstract:

The emergence of Thailand as a modern nation was amalgamation of several minority groups. Eventually, the nation tried to mitigate these diversities in the name of nationalism in the backdrop of colonial powers presence in neighboring nations. However, the continued imposition of modern nation building processes (which is a western concept) in the post-colonial era deepen the feelings of alienation among the minority groups and leads to separatist conflicts. It is significant that whatever form these conflicts take, will impact the security of nation as well as the region of Southeast Asia. This paper tries to explore the possible factors behind the state policies adopted by the government of Thailand to manage the insurgency in Southern provinces in the south. The protracted insurgency in the South has historical roots as Pattani kingdom had glorious period whether it was trade or commerce or education and its assimilation was never accepted by the leaders of these areas. But after assimilation of southern provinces in the state, it has been the state policy as an important factor in promoting or mitigating the insurgency. Initial protests from the elite class of southern provinces inflated into a more organized and violent uprising after Second World War. It was only the decade of 1990s that a relative peace could prevail for some time. The violence reemerged in 2004 with more intensity and till today this area is suffering with violence. Period of different Prime Ministers dealt this insurgency in different ways sometimes very hard line approach had been adopted especially under Primeminstership of Thaksin Shinawatra. Recently, the peace talks which were started during the period of Yinglunck Shinawatra and were carried forward by Junta government also halted. And again, the region stays in a very volatile state. Violence in these provinces not only questions the capability of government to provide political solution to the problem, but also emerges as a major threat to the internal security of the state. The current era where global terrorism is spreading fast, such vulnerable areas may work as a new ground for its proliferation in Southeast Asia. The paper attempts to understand how Thailand’s historical experience of security determines a different approach to national unity which limits the prospects for autonomy in the South. In conjunction with this experience it is nature of national politics and leadership that influences the nature of policies on the ground in Southern Thailand. The paper also tries to bring out conflict between state sovereignty and self-determination as demanded by many in the southern provinces.

Keywords: insurgency, southern Thailand, security, nation building

Procedia PDF Downloads 123
13014 Opportunities for Lesbian/Gay/Bisexual/Transgender/Queer/Questioning Tourism in Vietnam

Authors: Eric D. Olson

Abstract:

The lesbian/gay/bisexual/transgender/queer/questioning tourist (LGBTQ+) travels more frequently, spends more money on travel, and is more likely to travel internationally compared to their straight/heterosexual counterparts. For Vietnam, this represents a huge opportunity to increase international tourism, considering social advancements and recognition of the LGBTQ+ have greatly increased in the past few years in Vietnam. For example, Vietnam’s Health Ministry confirmed in 2022 that same-sex attraction and being transgender is not a mental health condition. A robust hospitality ecosystem of LGBTQ+ tourism suppliers already exists in Vietnam catering to LGBTQ+ tourists (e.g., Gay Hanoi Tours, VietPride). Vietnam is a safe and welcoming destination with incredible nature, cosmopolitan cities, and friendly people; however, there is a dearth of academic and industry research that has examined how LGBTQ+ international tourists perceive Vietnam as an LGBTQ+ friendly destination. To rectify this gap, this research examines Vietnam as an LGBTQ+ destination in order to provide government officials, destination marketers, and industry practitioners with insight into this increasingly visible tourist market segment. A self-administered survey instrument was administered to n=375 international LGBTQ+ tourists to examine their perceptions of Vietnam. A factor analysis found three categories of LGBTQ+ factors of visitation to Vietnam: safety and security (Eigenvalue = 4.12, variance = 32.45, α = .82); LGBTQ+ attractions (Eigenvalue = 3.65 variance = 24.23, α = .75); and friendly interactions (Eigenvalue = 3.71, variance = 10.45, α = .96). Multiple regression was used to examine LGBTQ+ visitation factors and intention to visit Vietnam, F=12.20 (2, 127), p < .001, R2 = .56. Safety and security (β = 0.42, p < .001), LGBTQ+ attractions (β = 0.61, p < .001) and friendly interactions (β = 0.42, p < .001) are predictors to visit Vietnam. Results are consistent with previous research that highlight safety/security is of utmost importance to the community when traveling. Attractions, such as LGBTQ+ tours, suppliers, and festivals can also be used as a pull factor in encouraging tourism. Implications/limitations will be discussed.

Keywords: tourism, LGBTQ, vietnam, regression

Procedia PDF Downloads 65
13013 Evolution of Propiconazole and Tebuconazole Residues through the Post-Harvest Application in 'Angeleno' Plum

Authors: M. J. Rodríguez, F. M. Sánchez, B. Velardo, P. Calvo, M. J. Serradilla, J. Delgado, J. M. López

Abstract:

The main problems in storage and later transport of fruits, are the decays developed that reduce the quality on destination’s markets. Nowadays, there is an increasing interest in the use of compounds to avoid decays in post-harvest. Triazole fungicides are agrochemicals widely used in the agricultural industry due to their wide spectrum of actions, and in some case, they are used in citrus fruit post-harvest. Moreover, its use is not authorized in plum post-harvest, but in order to a future possible authorization, the evolutions of propiconazole and tebuconazole residues are studied after its post-harvest application in ‘Angeleno’ plum.

Keywords: maximum residue limit (MRL), triazole fungicides, decay, Prunus salicina

Procedia PDF Downloads 309
13012 India’s Deterrence Program: Defense or Development

Authors: Aneri Mehta, Krunal Mehta

Abstract:

A doctrine, any doctrine, incorporates a set of beliefs or principles held by a body of persons. A national nuclear doctrine represents, therefore, the collective set of beliefs or principles held by the nation in regard to the utility of its nuclear weapons. India’s foreign policy has been profoundly affected by the nuclear explosions conducted in May 1998. The departure from the professed peaceful nuclear policies has had several implications for India’s defense and foreign policies. The explosions in Pokhran have aggravated tensions in south Asia by disrupting diplomatic initiatives with Pak and China. Diplomacy has been reduced to damage control. The object of India’s nuclear deterrence is to persuade an adversary that the costs to him of seeking a military solution to his political problems with India will far outweigh the benefits. The paper focuses on India’s guidelines governing nuclear policy, development of nuclear materials for effective deterrence as well as civil development purpose. The paper finds that security concerns and technological capabilities are important determinants of whether India develops a nuclear weapons programs, while security concerns, economic capabilities, and domestic politics help to explain the possession of nuclear weapons.

Keywords: foreign policy, nuclear deterrence, nuclear policy, development

Procedia PDF Downloads 517
13011 Optimization of Oxygen Plant Parameters Simulating with MATLAB

Authors: B. J. Sonani, J. K. Ratnadhariya, Srinivas Palanki

Abstract:

Cryogenic engineering is the fast growing branch of the modern technology. There are various applications of the cryogenic engineering such as liquefaction in gas industries, metal industries, medical science, space technology, and transportation. The low-temperature technology developed superconducting materials which lead to reduce the friction and wear in various components of the systems. The liquid oxygen, hydrogen and helium play vital role in space application. The liquefaction process is produced very low temperature liquid for various application in research and modern application. The air liquefaction system for oxygen plants in gas industries is based on the Claude cycle. The effect of process parameters on the overall system is difficult to be analysed by manual calculations, and this provides the motivation to use process simulators for understanding the steady state and dynamic behaviour of such systems. The parametric study of this system via MATLAB simulations provide useful guidelines for preliminary design of air liquefaction system based on the Claude cycle. Every organization is always trying for reduce the cost and using the optimum performance of the plant for the staying in the competitive market.

Keywords: cryogenic, liquefaction, low -temperature, oxygen, claude cycle, optimization, MATLAB

Procedia PDF Downloads 318
13010 Problems and Prospects of Agricultural Biotechnology in Nigeria’s Developing Economy

Authors: Samson Abayomi Olasoju, Olufemi Adekunle, Titilope Edun, Johnson Owoseni

Abstract:

Science offers opportunities for revolutionizing human activities, enriched by input from scientific research and technology. Biotechnology is a major force for development in developing countries such as Nigeria. It is found to contribute to solving human problems like water and food insecurity that impede national development and threaten peace wherever it is applied. This review identified the problems of agricultural biotechnology in Nigeria. On the part of rural farmers, there is a lack of adequate knowledge or awareness of biotechnology despite the fact that they constitute the bulk of Nigerian farmers. On part of the government, the problems include: lack of adequate implementation of government policy on bio-safety and genetically modified products, inadequate funding of education as well as research and development of products related to biotechnology. Other problems include: inadequate infrastructures (including laboratory), poor funding and lack of national strategies needed for development and running of agricultural biotechnology. In spite of all the challenges associated with agricultural biotechnology, its prospects still remain great if Nigeria is to meet with the food needs of the country’s ever increasing population. The introduction of genetically engineered products will lead to the high productivity needed for commercialization and food security. Insect, virus and other related diseases resistant crops and livestock are another viable area of contribution of biotechnology to agricultural production. In conclusion, agricultural biotechnology will not only ensure food security, but, in addition, will ensure that the local farmers utilize appropriate technology needed for large production, leading to the prosperity of the farmers and national economic growth, provided government plays its role of adequate funding and good policy implementation.

Keywords: biosafety, biotechnology, food security, genetic engineering, genetic modification

Procedia PDF Downloads 165
13009 Dietary Diversification and Nutritional Education: A Strategy to Improve Child Food Security Status in the Rural Mozambique

Authors: Rodriguez Diego, Del Valle Martin, Hargreaves Matias, Riveros Jose Luis

Abstract:

Nutrient deficiencies due to a diet low in quantitative and qualitative terms, are prevalent throughout the developing world, especially in sub-Saharan Africa. Children and women of childbearing age are especially vulnerable. Limited availability, access and intake of animal foods at home and lack of knowledge about their value in the diet and the role they play in health, contribute to poor diet quality. Poor bioavailability of micronutrients in diets based on foods high in fiber and phytates, the low content of some micronutrients in these foods are further factors to consider. Goats are deeply embedded in almost every Sub-Saharan African rural culture, generally kept for their milk, meat, hair or leather. Goats have played an important role in African social life, especially in food security. Goat meat has good properties for human wellbeing, with a special role in lower income households. It has a high-quality protein (20 protein g/100 meat g) including all essential amino acids, good unsaturated/satured fatty acids relationship, and it is an important B-vitamin source with high micronutrients bioavailability. Mozambique has major food security problems, with poor food access and utilization, undiversified diets, chronic poverty and child malnutrition. Our objective was to design a nutritional intervention based on a dietary diversification, nutritional education, cultural beliefs and local resources, aimed to strengthen food security of children at Barrio Broma village (15°43'58.78"S; 32°46'7.27"E) in Chitima, Mozambique. Two surveys were conducted first of socio-productive local databases and then to 100 rural households about livelihoods, food diversity and anthropometric measurements in children under 5 years. Our results indicate that the main economic activity is goat production, based on a native breed with two deliveries per year in the absence of any management. Adult goats weighted 27.2±10.5 kg and raised a height of 63.5±3.8 cm. Data showed high levels of poverty, with a food diversity score of 2.3 (0-12 points), where only 30% of households consume protein and 13% iron, zinc, and B12 vitamin. The main constraints to food security were poor access to water and low income to buy food. Our dietary intervention was based on improving diet quality by increasing the access to dried goat meat, fresh vegetables, and legumes, and its utilization by a nutritional education program. This proposal was based on local culture and living conditions characterized by the absence of electricity power and drinkable water. The drying process proposed would secure the food maintenance under local conditions guaranteeing food safety for a longer period. Additionally, an ancient local drying technique was rescued and used. Moreover, this kind of dietary intervention would be the most efficient way to improve the infant nutrition by delivering macro and micronutrients on time to these vulnerable populations.

Keywords: child malnutrition, dietary diversification, food security, goat meat

Procedia PDF Downloads 296
13008 Extent of I.C.T Application in Record Management and Factors Hindering the Utilization of E-Learning in the Government Owned Universities in Enugu State, Nigeria

Authors: Roseline Unoma Chidobi

Abstract:

The purpose of this study is to identify the extent of Information Communication Technology (ICT) application in record management and some factors militating against the utilization of e-learning in the universities in Enugu state. The study was a survey research the quantitative data were collected through a 30 – item questionnaire title extent of ICT Application in Record management and militating Factors in the utilization of e-learning (EIARMMFUE). This was administered on a population of 603 respondents made up of university academic staff and senior administrative staff. The data were analyzed using mean, standard deviation and t-test statistics on a modified 4 point rating scale. Findings of the study revealed among others that ICT are not adequately applied in the management of records in the Universities in Nigeria. Factors like wrong notion or superstitious believe hinder the effective utilization of e – learning approach. The study recommended that the use of ICT in record management should be enhanced in order to achieve effective school management. All the factors militating against the effective utilization of e-learning approach should be addressed for the maximum realization of teaching and learning.

Keywords: e-learning, information communication, teaching, technology, tertiary institution

Procedia PDF Downloads 518
13007 Risks beyond Cyber in IoT Infrastructure and Services

Authors: Mattias Bergstrom

Abstract:

Significance of the Study: This research will provide new insights into the risks with digital embedded infrastructure. Through this research, we will analyze each risk and its potential negation strategies, especially for AI and autonomous automation. Moreover, the analysis that is presented in this paper will convey valuable information for future research that can create more stable, secure, and efficient autonomous systems. To learn and understand the risks, a large IoT system was envisioned, and risks with hardware, tampering, and cyberattacks were collected, researched, and evaluated to create a comprehensive understanding of the potential risks. Potential solutions have then been evaluated on an open source IoT hardware setup. This list shows the identified passive and active risks evaluated in the research. Passive Risks: (1) Hardware failures- Critical Systems relying on high rate data and data quality are growing; SCADA systems for infrastructure are good examples of such systems. (2) Hardware delivers erroneous data- Sensors break, and when they do so, they don’t always go silent; they can keep going, just that the data they deliver is garbage, and if that data is not filtered out, it becomes disruptive noise in the system. (3) Bad Hardware injection- Erroneous generated sensor data can be pumped into a system by malicious actors with the intent to create disruptive noise in critical systems. (4) Data gravity- The weight of the data collected will affect Data-Mobility. (5) Cost inhibitors- Running services that need huge centralized computing is cost inhibiting. Large complex AI can be extremely expensive to run. Active Risks: Denial of Service- It is one of the most simple attacks, where an attacker just overloads the system with bogus requests so that valid requests disappear in the noise. Malware- Malware can be anything from simple viruses to complex botnets created with specific goals, where the creator is stealing computer power and bandwidth from you to attack someone else. Ransomware- It is a kind of malware, but it is so different in its implementation that it is worth its own mention. The goal with these pieces of software is to encrypt your system so that it can only be unlocked with a key that is held for ransom. DNS spoofing- By spoofing DNS calls, valid requests and data dumps can be sent to bad destinations, where the data can be extracted for extortion or to corrupt and re-inject into a running system creating a data echo noise loop. After testing multiple potential solutions. We found that the most prominent solution to these risks was to use a Peer 2 Peer consensus algorithm over a blockchain to validate the data and behavior of the devices (sensors, storage, and computing) in the system. By the devices autonomously policing themselves for deviant behavior, all risks listed above can be negated. In conclusion, an Internet middleware that provides these features would be an easy and secure solution to any future autonomous IoT deployments. As it provides separation from the open Internet, at the same time, it is accessible over the blockchain keys.

Keywords: IoT, security, infrastructure, SCADA, blockchain, AI

Procedia PDF Downloads 101
13006 Factors of Influence in Software Process Improvement: An ISO/IEC 29110 for Very-Small Entities

Authors: N. Wongsai, R. Wetprasit, V. Siddoo

Abstract:

The recently introduced ISO/IEC 29110 standard Lifecycle profile for Very Small Entities (VSE) has been adopted and practiced in many small and medium software companies, including in Thailand’s software industry. Many Thai companies complete their software process improvement (SPI) initiative program and have been certified. There are, however, a number of participants fail to success. This study was concerned with the factors that influence the accomplishment of the standard implementation in various VSE characteristics. In order to achieve this goal, exploring and extracting critical factors from prior studies were carried out and then the obtained factors were validated by the standard experts. Data analysis of comments and recommendations was performed using a qualitative content analysis method. This paper presents the initial set of influence factors in both positive and negative impact the ISO/IEC 29110 implementation with an aim at helping such SPI practitioners with some considerations to manage appropriate adoption approach in order to achieve its implementation.

Keywords: barriers, critical success factors, ISO/IEC 29110, Software Process Improvement, SPI, Very-Small Entity, VSE

Procedia PDF Downloads 311
13005 Application of the Bionic Wavelet Transform and Psycho-Acoustic Model for Speech Compression

Authors: Chafik Barnoussi, Mourad Talbi, Adnane Cherif

Abstract:

In this paper we propose a new speech compression system based on the application of the Bionic Wavelet Transform (BWT) combined with the psychoacoustic model. This compression system is a modified version of the compression system using a MDCT (Modified Discrete Cosine Transform) filter banks of 32 filters each and the psychoacoustic model. This modification consists in replacing the banks of the MDCT filter banks by the bionic wavelet coefficients which are obtained from the application of the BWT to the speech signal to be compressed. These two methods are evaluated and compared with each other by computing bits before and bits after compression. They are tested on different speech signals and the obtained simulation results show that the proposed technique outperforms the second technique and this in term of compressed file size. In term of SNR, PSNR and NRMSE, the outputs speech signals of the proposed compression system are with acceptable quality. In term of PESQ and speech signal intelligibility, the proposed speech compression technique permits to obtain reconstructed speech signals with good quality.

Keywords: speech compression, bionic wavelet transform, filterbanks, psychoacoustic model

Procedia PDF Downloads 374
13004 Mother-Child Attachment and Anxiety Symptoms in Middle Childhood: Differences in Levels of Attachment Security

Authors: Simran Sharda

Abstract:

There is increasing evidence that leads psychologists today to believe that the attachment formed between a mother and child plays a much more profound role in later-life outcomes than previously expected. Particularly, the fact that a link may exist between maternal attachment and the development in addition to the severity of social anxiety in middle childhood seems to be gaining ground. This research will examine and address a myriad of major issues related to the impact of mother-child attachment: behaviors of children with different levels of secure attachment, various aspects of anxiety in relation to attachment security as well as other styles of mother-child attachments, especially avoidant attachment and over-attachment. This analysis serves to compile previous literature on the subject and touch light upon a logical extension of the research. Moreover, researchers have identified links between attachment and the externalization of problem behaviors: these behaviors may later manifest as social anxiety as well as increased severity and likelihood of PTSD diagnosis (an anxiety disorder). Furthermore, secure attachment has been linked to increased health benefits, cognitive skills, emotive socialization, and developmental psychopathology.

Keywords: child development, anxiety, cognition, developmental psychopathology, mother-child relationships, maternal, cognitive development

Procedia PDF Downloads 152
13003 Irradiated-Chitosan and Methyl Jasmonate Modulate the Growth, Physiology and Alkaloids Production in Catharanthus roseus (l.) G. Don.

Authors: Moin Uddin, M. Masroor A. Khan, Faisal Rasheed, Tariq Ahmad Dar, Akbar Ali, Lalit Varshney

Abstract:

Oligomers, obtained by exposing the natural polysaccharides (alginate, carrageenan, chitosan, etc.) to cobalt-60 generated gamma radiation may prove as potent plant growth promoters when applied as foliar sprays to the plants. They function as endogenous growth elicitors, triggering the synthesis of different enzymes and modulating various plant responses by exploiting the gene expression. Exogenous application of Jasmonic acid or of its methyl ester, methyl jasmonate (MeJ) has been reported to increase the secondary metabolites production in medicinal and aromatic plants. Keeping this in mind, three pot experiments were conducted to test whether the foliar application of irradiated-chitosan (IC) and MeJ, applied alone or in combination, could augment the active constituents as well as growth, physiological and yield attributes of Catharanthus roseus, which carries anticancer alkaloids, viz. vincristine and vinblastine, in its leaves in addition to various other useful alkaloids. Totally, 5 spray treatments, comprising various aqueous solutions of IC [20, 40, 80 and 160 mg L-1 (Experiment 1)], MeJ (10, 20, 30 and 40 mg L-1 (Experiment 2)] and those of IC+MeJ [40+20, 40+30, 80+20, 80+30, 160+20 and 160+30 mg L-1 (Experiment 3)], were applied at seven days interval. Total leaf-alkaloids content as well as growth, physiological and yield parameters, evaluated at 120 days after sowing, were significantly enhanced by IC application. IC application could not increase the leaf-content of vincristine and vinblastine; nonetheless, it significantly augmented the yield of these alkaloids owing to enhancing the dry mass of leaves per plant. MeJ application, particularly at 30 mg L-1, increased both content (17%) and yield (48%) of total leaf-alkaloids as well as the content and yield of vincristine ( 29 and 63%, respectively) and vinblastine (14 and 44%, respectively) alkaloids, though it significantly decreased most other parameters studied, particularly at higher concentrations (30 and 40 mg L-1 of MeJ). As compared to the control (water-spray treatment), collective application of IC (80 mg L-1) and MeJ (20 mg L-1) resulted in the highest values of most of the parameters studied. However, 80 mg L-1 of IC applied with 30 mg L-1 of MeJ gave the best results for the content and yield of total as well as anticancer leaf-alkaloids (vincristine and vinblastine). Comparing the control, it increased the content and yield of total leaf-alkaloids (37 and 118%, respectively) and those of vincristine (65 and 163%, respectively) and vinblastine (31 and 107%, respectively). Conclusively, the applied technique significantly enhanced the production of total as well as anticancer alkaloids of Catharanthus roseus.

Keywords: anticancer alkaloids (vincristine and vinblastine), catharanthus roseus, irradiated chitosan, methyl jasmonate

Procedia PDF Downloads 386
13002 Presenting Internals of Networks Using Bare Machine Technology

Authors: Joel Weymouth, Ramesh K. Karne, Alexander L. Wijesinha

Abstract:

Bare Machine Internet is part of the Bare Machine Computing (BMC) paradigm. It is used in programming application ns to run directly on a device. It is software that runs directly against the hardware using CPU, Memory, and I/O. The software application runs without an Operating System and resident mass storage. An important part of the BMC paradigm is the Bare Machine Internet. It utilizes an Application Development model software that interfaces directly with the hardware on a network server and file server. Because it is “bare,” it is a powerful teaching and research tool that can readily display the internals of the network protocols, software, and hardware of the applications running on the Bare Server. It was also demonstrated that the bare server was accessible by laptop and by smartphone/android. The purpose was to show the further practicality of Bare Internet in Computer Engineering and Computer Science Education and Research. It was also to show that an undergraduate student could take advantage of a bare server with any device and any browser at any release version connected to the internet. This paper presents the Bare Web Server as an educational tool. We will discuss possible applications of this paradigm.

Keywords: bare machine computing, online research, network technology, visualizing network internals

Procedia PDF Downloads 166
13001 Efficient Elimination of Common Allergens through the Application of Dry Microfine Steam on Innate Surfaces

Authors: O. Rachinel, C. Recchia, M. Bourel, B. Recchia

Abstract:

Dry microfine steam (DMS) technology, developed by Laurastar, was shown to effectively eliminate a range of pathogens such as Sars-CoV-2, E. coli, S. aureus and C. Albicans. The aim of this study was to investigate the effect of DMS technology on allergens. Therefore, the application of the DMS technology was tested on two common allergens (Dermatophagoides pteronyssinus and cat allergen Fel d 1), on different inert surfaces (e.g., cotton), during 2 to 3 seconds. Quantification of the remaining allergens was performed and the reduction rates reached 100% in 3 seconds for D. pteronyssinus and 97,74% in 2 seconds for cat allergens. In conclusion, DMS showed high efficacy in the elimination of common allergens and could be seen as a natural solution to improve domestic hygiene and reduce allergies.

Keywords: steam, allergens, dust mites, pollens

Procedia PDF Downloads 133
13000 Public Wi-Fi Security Threat Evil Twin Attack Detection Based on Signal Variant and Hop Count

Authors: Said Abdul Ahad Ahadi, Elyas Baray, Nitin Rakesh, Sudeep Varshney

Abstract:

Wi-Fi is a widely used internet source that is used to provide internet access in many areas such as Stores, Cafes, University campuses, Restaurants and so on. This technology brought more facilities in communication and networking. On the other hand, due to the transmission of data over the air, which makes the network vulnerable, so it becomes prone to various threats such as Evil Twin and etc. The Evil Twin is a kind of adversary which impersonates a legitimate access point (LAP) as it can happen by spoofing the name (SSID) and MAC address (BSSID) of a legitimate access point (LAP). And this attack can cause many threats such as MITM, Service Interruption, Access point service blocking. Various Evil Twin Attack Detection Techniques are proposed, but they require additional hardware, or they require protocol modification. In this paper, we proposed a new technique based on Access Point’s two fingerprints, Received Signal Strength Indicator (RSSI) and Hop Count, that is hard to copy by an adversary. And we implemented the technique in a system called “ETDetector,” which can detect and prevent the attack.

Keywords: evil twin, LAP, SSID, Wi-Fi security, signal variation, ETAD, kali linux, scapy, python

Procedia PDF Downloads 138
12999 Impact of Unconditional Cash Transfer Scheme on the Food Security Status of the Elderly in Ekiti State, Nigeria

Authors: R. O. Babatunde, O. M. Igbalajobi, F. Matambalya

Abstract:

Moderate economic growth in developing and emerging countries has led to improvement in the food consumption and nutrition situation in the last two decades. Nevertheless, about 870 million people, with a quarter of them from Sub-Saharan Africa, are still suffering from hunger worldwide. As part of measures to reduce the widespread poverty and hunger, cash transfer programmes are now being implemented in many countries of the world. While nationwide cash transfer schemes are few in Sub-Saharan Africa generally, the available ones are more concentrated in East and Southern Africa. Much of the available literature on social protection had focused on the poverty impact of cash transfer schemes at the household level, with the larger proportion originating from Latin America. On the contrary, much less empirical studies have been conducted on the poverty impact of cash transfer in Sub-Saharan Africa, let alone on the food security and nutrition impact. To fill this gap in knowledge, this paper examines the impact of cash transfer on food security in Nigeria. As a case study, the paper analysed the Ekiti State Cash Transfer Scheme (ECTS). ECTS is an unconditional transfer scheme which was established in 2011 to directly provide cash transfer to elderly persons aged 65 years and above in Ekiti State of Nigeria. Using survey data collected in 2013, we analysed the impact of the scheme on food availability and dietary diversity of the beneficiary households. Descriptive and Propensity Score Matching (PSM) techniques were used to estimate the Average Treatment Effect (ATE) and Average Treatment Effect on the Treated (ATT) among the beneficiary and control groups. Thereafter, a model to test for the impact of participation in the cash transfer scheme on calorie availability and dietary diversity was estimated. The results indicate that while households in the sample are clearly vulnerable, there were statistically significant differences between the beneficiary and control groups. For instance, monthly expenditure, calorie availability and dietary diversity were significantly larger among the beneficiary and consequently, the prevalence and depth of hunger were lower in the group. Econometric results indicate that the cash transfer has a positive and significant effect on food availability and dietary diversity in the households. Expanding the coverage of the present scheme to cover all eligible households in the country and incorporating cash transfer into a comprehensive hunger reduction policy will make it to have a greater impact at improving food security among the most vulnerable households in the country.

Keywords: calorie availability, cash transfers, dietary diversity, propensity score matching

Procedia PDF Downloads 378
12998 Analytic Network Process in Location Selection and Its Application to a Real Life Problem

Authors: Eylem Koç, Hasan Arda Burhan

Abstract:

Location selection presents a crucial decision problem in today’s business world where strategic decision making processes have critical importance. Thus, location selection has strategic importance for companies in boosting their strength regarding competition, increasing corporate performances and efficiency in addition to lowering production and transportation costs. A right choice in location selection has a direct impact on companies’ commercial success. In this study, a store location selection problem of Carglass Turkey which operates in vehicle glass branch is handled. As this problem includes both tangible and intangible criteria, Analytic Network Process (ANP) was accepted as the main methodology. The model consists of control hierarchy and BOCR subnetworks which include clusters of actors, alternatives and criteria. In accordance with the management’s choices, five different locations were selected. In addition to the literature review, a strict cooperation with the actor group was ensured and maintained while determining the criteria and during whole process. Obtained results were presented to the management as a report and its feasibility was confirmed accordingly.

Keywords: analytic network process (ANP), BOCR, multi-actor decision making, multi-criteria decision making, real-life problem, location selection

Procedia PDF Downloads 467
12997 Agent Based Location Management Protocol for Mobile Adhoc Networks

Authors: Mallikarjun B. Channappagoudar, Pallapa Venkataram

Abstract:

The dynamic nature of Mobile adhoc network (MANET) due to mobility and disconnection of mobile nodes, leads to various problems in predicting the movement of nodes and their location information updation, for efficient interaction among the application specific nodes. Location management is one of the main challenges to be considered for an efficient service provision to the applications of a MANET. In this paper, we propose a location management protocol, for locating the nodes of a MANET and to maintain uninterrupted high-quality service for distributed applications by intelligently anticipating the change of location of its nodes. The protocol predicts the node movement and application resource scarcity, does the replacement with the chosen nodes nearby which have less mobility and rich in resources, with the help of both static and mobile agents, and maintains the application continuity by providing required network resources. The protocol has been simulated using Java Agent Development Environment (JADE) Framework for agent generation, migration and communication. It consumes much less time (response time), gives better location accuracy, utilize less network resources, and reduce location management overhead.

Keywords: mobile agent, location management, distributed applications, mobile adhoc network

Procedia PDF Downloads 387
12996 The Future of Food and Agriculture in India: Trends and Challenges

Authors: Vishwambhar Prasad Sati

Abstract:

India’s economy is agriculture dominated. About 70% of the total population depends on practicing agriculture. Out of an estimated 140.3 million ha net cultivated area, 79.44 million ha (57%) is rain-fed, contributing 44% of the total food grain production. Meanwhile, India ranks second and shares 11.3% of the arable land of the world. It means that India has a high potential to harness agricultural resources for present and future food security. However, about 21.9% of people are living below the poverty line, and similarly, a large number of people are deprived or insecure about food. This situation is most critical in rural areas, where about 70% population lives. The study examines the present status, future trends, and challenges of food and agriculture in India. Time series data of the last three decades was gathered from secondary sources on area, production, and yield of crops; irrigated area; production of major crops; area, production, and yield of crops in the major food-producing states of India; food storage and poverty. The data were analyzed using descriptive statistics, correlation methods, and a regression model. State-level data on area, production, and yield of crops and irrigation facilities were indexed into levels, and the potentials of food production in the major food-producing states were observed. It was noted that the progressive growth rate of food production is higher than the population, which means that food is enough to feed the population; however, it is not accessible to all optimally because of wastage, leakage, lack of food storage, and proper distribution of food. If food is stored and distributed properly, there would not be any food shortage in India, the study revealed.

Keywords: agriculture, food production, population growth, poverty, future trends

Procedia PDF Downloads 93
12995 Environmental Corporate Social Responsibility in Industrial Cities: A Collaborative Governance Approach

Authors: Muhlisin, Moh. Sofyan Budiarto

Abstract:

Corporate social responsibility (CSR) initiatives based on charity and philanthropy have not alleviated many sustainable environmental issues, particularly in industrial towns. The collaborative governance strategy is seen to be an option for resolving difficulties of coordination and communication between businesses, the government, and the community so that the goals of urban environmental management can be met via collaborative efforts. The purpose of this research is to identify the different forms of environmental CSR implementation by corporate entities and to create a CSR collaborative governance model in environmental management. This qualitative investigation was carried out in 2020 in Cilegon City, one of Indonesia’s industrial cities. To investigate their support, a total of 20 informants from three stakeholder groups, namely the government, corporate entities, and the community, were questioned. According to the study’s findings, cleaner production, eco-office, energy and natural resource conservation, waste management, renewable energy, climate change adaptation, and environmental education are all examples of CSR application in the environmental sector. The environmental potential of CSR implementation is to create collaborative governance. The role of business entities in providing the beginning circumstances is critical, while the government offers facilitative leadership and the CSR forum launches institutional design. These three factors are crucial to the efficiency of collaborative governance in industrial cities' environmental management.

Keywords: collaborative governance, CSR forum, environmental CSR, industrial city

Procedia PDF Downloads 79
12994 Internet of Assets: A Blockchain-Inspired Academic Program

Authors: Benjamin Arazi

Abstract:

Blockchain is the technology behind cryptocurrencies like Bitcoin. It revolutionizes the meaning of trust in the sense of offering total reliability without relying on any central entity that controls or supervises the system. The Wall Street Journal states: “Blockchain Marks the Next Step in the Internet’s Evolution”. Blockchain was listed as #1 in Linkedin – The Learning Blog “most in-demand hard skills needed in 2020”. As stated there: “Blockchain’s novel way to store, validate, authorize, and move data across the internet has evolved to securely store and send any digital asset”. GSMA, a leading Telco organization of mobile communications operators, declared that “Blockchain has the potential to be for value what the Internet has been for information”. Motivated by these seminal observations, this paper presents the foundations of a Blockchain-based “Internet of Assets” academic program that joins under one roof leading application areas that are characterized by the transfer of assets over communication lines. Two such areas, which are pillars of our economy, are Fintech – Financial Technology and mobile communications services. The next application in line is Healthcare. These challenges are met based on available extensive professional literature. Blockchain-based assets communication is based on extending the principle of Bitcoin, starting with the basic question: If digital money that travels across the universe can ‘prove its own validity’, can this principle be applied to digital content. A groundbreaking positive answer here led to the concept of “smart contract” and consequently to DLT - Distributed Ledger Technology, where the word ‘distributed’ relates to the non-existence of reliable central entities or trusted third parties. The terms Blockchain and DLT are frequently used interchangeably in various application areas. The World Bank Group compiled comprehensive reports, analyzing the contribution of DLT/Blockchain to Fintech. The European Central Bank and Bank of Japan are engaged in Project Stella, “Balancing confidentiality and auditability in a distributed ledger environment”. 130 DLT/Blockchain focused Fintech startups are now operating in Switzerland. Blockchain impact on mobile communications services is treated in detail by leading organizations. The TM Forum is a global industry association in the telecom industry, with over 850 member companies, mainly mobile operators, that generate US$2 trillion in revenue and serve five billion customers across 180 countries. From their perspective: “Blockchain is considered one of the digital economy’s most disruptive technologies”. Samples of Blockchain contributions to Fintech (taken from a World Bank document): Decentralization and disintermediation; Greater transparency and easier auditability; Automation & programmability; Immutability & verifiability; Gains in speed and efficiency; Cost reductions; Enhanced cyber security resilience. Samples of Blockchain contributions to the Telco industry. Establishing identity verification; Record of transactions for easy cost settlement; Automatic triggering of roaming contract which enables near-instantaneous charging and reduction in roaming fraud; Decentralized roaming agreements; Settling accounts per costs incurred in accordance with agreement tariffs. This clearly demonstrates an academic education structure where fundamental technologies are studied in classes together with these two application areas. Advanced courses, treating specific implementations then follow separately. All are under the roof of “Internet of Assets”.

Keywords: blockchain, education, financial technology, mobile telecommunications services

Procedia PDF Downloads 174
12993 The Current Application of BIM - An Empirical Study Focusing on the BIM-Maturity Level

Authors: Matthias Stange

Abstract:

Building Information Modelling (BIM) is one of the most promising methods in the building design process and plays an important role in the digitalization of the Architectural, Engineering, and Construction (AEC) Industry. The application of BIM is seen as the key enabler for increasing productivity in the construction industry. The model-based collaboration using the BIM method is intended to significantly reduce cost increases, schedule delays, and quality problems in the planning and construction of buildings. Numerous qualitative studies based on expert interviews support this theory and report perceived benefits from the use of BIM in terms of achieving project objectives related to cost, schedule, and quality. However, there is a large research gap in analysing quantitative data collected from real construction projects regarding the actual benefits of applying BIM based on representative sample size and different application regions as well as different project typologies. In particular, the influence of the project-related BIM maturity level is completely unexplored. This research project examines primary data from 105 construction projects worldwide using quantitative research methods. Projects from the areas of residential, commercial, and industrial construction as well as infrastructure and hydraulic engineering were examined in application regions North America, Australia, Europe, Asia, MENA region, and South America. First, a descriptive data analysis of 6 independent project variables (BIM maturity level, application region, project category, project type, project size, and BIM level) were carried out using statistical methods. With the help of statisticaldata analyses, the influence of the project-related BIM maturity level on 6 dependent project variables (deviation in planning time, deviation in construction time, number of planning collisions, frequency of rework, number of RFIand number of changes) was investigated. The study revealed that most of the benefits of using BIM perceived through numerous qualitative studies have not been confirmed. The results of the examined sample show that the application of BIM did not have an improving influence on the dependent project variables, especially regarding the quality of the planning itself and the adherence to the schedule targets. The quantitative research suggests the conclusion that the BIM planning method in its current application has not (yet) become a recognizable increase in productivity within the planning and construction process. The empirical findings indicate that this is due to the overall low level of BIM maturity in the projects of the examined sample. As a quintessence, the author suggests that the further implementation of BIM should primarily focus on an application-oriented and consistent development of the project-related BIM maturity level instead of implementing BIM for its own sake. Apparently, there are still significant difficulties in the interweaving of people, processes, and technology.

Keywords: AEC-process, building information modeling, BIM maturity level, project results, productivity of the construction industry

Procedia PDF Downloads 69