Search results for: wlan security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2851

Search results for: wlan security

841 Substation Automation, Digitization, Cyber Risk and Chain Risk Management Reliability

Authors: Serzhan Ashirov, Dana Nour, Rafat Rob, Khaled Alotaibi

Abstract:

There has been a fast growth in the introduction and use of communications, information, monitoring, and sensing technologies. The new technologies are making their way to the Industrial Control Systems as embedded in products, software applications, IT services, or commissioned to enable integration and automation of increasingly global supply chains. As a result, the lines that separated the physical, digital, and cyber world have diminished due to the vast implementation of the new, disruptive digital technologies. The variety and increased use of these technologies introduce many cybersecurity risks affecting cyber-resilience of the supply chain, both in terms of the product or service delivered to a customer and members of the supply chain operation. US department of energy considers supply chain in the IR4 space to be the weakest link in cybersecurity. The IR4 identified the digitization of the field devices, followed by digitalization that eventually moved through the digital transformation space with little care for the new introduced cybersecurity risks. This paper will examine the best methodologies for securing the electrical substations from cybersecurity attacks due to supply chain risks, and due to digitization effort. SCADA systems are the most vulnerable part of the power system infrastructure due to digitization and due to the weakness and vulnerabilities in the supply chain security. The paper will discuss in details how create a secure supply chain methodology, secure substations, and mitigate the risks due to digitization

Keywords: cybersecurity, supply chain methodology, secure substation, digitization

Procedia PDF Downloads 65
840 The Complementary Explanations of Institutional and Feminist Perspectives for Female Social Enterprise in Pakistan

Authors: Mohammad Sohail Yunis, Hina Hashim, Alistair R. Anderson

Abstract:

Entrepreneurship is gendered with masculine qualities, yet social enterprise epitomizes caring a feminine quality. However enterprising practices may have little to do with gender. Consequently, the purpose of this paper is to examine practices using two very different explanatory theories, feminist and institutional theory, to establish the role played by gender. This study is situated in KP, the poor but traditional north of Pakistan. Utilising on an interpretive qualitative research approach, this research collected data through in-depth interviews with ten women social entrepreneurs of KP, Pakistan and analyzed using thematic analysis. Empirically, this paper identifies and describes on a number of interesting themes that relate to the women entrepreneurship such as 'women empowerment, patriarchal culture, role of culture and societal norms, religious extremism and terrorism, forced entrepreneurs, change creators, institutional corruption, and security issues'. In addition, female social enterprise in KP is set in a patriarchal, masculine culture, but the practices negotiate institutional obstacles to bring benefits to the disenfranchised. Finally, this research claims to present an original insight into female social entrepreneurship in a developing country context and provide fresh theoretical and empirical perspectives to advance knowledge and scholarship.

Keywords: female social entrepreneurship, institutional theory, feminist theory, developing countries

Procedia PDF Downloads 222
839 A Pattern Recognition Neural Network Model for Detection and Classification of SQL Injection Attacks

Authors: Naghmeh Moradpoor Sheykhkanloo

Abstract:

Structured Query Language Injection (SQLI) attack is a code injection technique in which malicious SQL statements are inserted into a given SQL database by simply using a web browser. Losing data, disclosing confidential information or even changing the value of data are the severe damages that SQLI attack can cause on a given database. SQLI attack has also been rated as the number-one attack among top ten web application threats on Open Web Application Security Project (OWASP). OWASP is an open community dedicated to enabling organisations to consider, develop, obtain, function, and preserve applications that can be trusted. In this paper, we propose an effective pattern recognition neural network model for detection and classification of SQLI attacks. The proposed model is built from three main elements of: a Uniform Resource Locator (URL) generator in order to generate thousands of malicious and benign URLs, a URL classifier in order to: 1) classify each generated URL to either a benign URL or a malicious URL and 2) classify the malicious URLs into different SQLI attack categories, and an NN model in order to: 1) detect either a given URL is a malicious URL or a benign URL and 2) identify the type of SQLI attack for each malicious URL. The model is first trained and then evaluated by employing thousands of benign and malicious URLs. The results of the experiments are presented in order to demonstrate the effectiveness of the proposed approach.

Keywords: neural networks, pattern recognition, SQL injection attacks, SQL injection attack classification, SQL injection attack detection

Procedia PDF Downloads 470
838 Attachment Patterns in a Sample of South African Children at Risk in Middle Childhood

Authors: Renate Gericke, Carol Long

Abstract:

Despite the robust empirical support of attachment, advancement in the description and conceptualization of attachment has been slow and has not significantly advanced beyond the identification of attachment security or type (namely, secure, avoidant, ambivalent and disorganized). This has continued despite papers arguing for theoretical refinement in the classification of attachment presentations. For thinking and practice to advance, it is critically important that these categories and their assessment be interrogated in different contexts and across developmental age. To achieve this, a quantitative design was used with descriptive and inferential statistics, and general linear models were employed to analyze the data. The Attachment Story Completion Test (ASCT) was administered to 105 children between the ages of eight and twelve from socio-economically deprived contexts with high exposure to trauma. A staggering 93% of the children had insecure attachments (specifically, avoidant 37%, disorganized 34% and ambivalent 22%) and attachment was more complex than currently conceptualized in the attachment literature. Primary attachment did not only present as one of four discreet categories, but 70% of the sample had a complex attachment with more than one type of maternal attachment style. Attachment intensity also varied along a continuum (between 1 and 5). The findings have implications for a) research that has not considered the potential complexity of attachment or attachment intensity, b) policy to more actively support mother-infant dyads, particularly in high-risk contexts and c) question the applicability of a western conceptualization of a primary maternal attachment figure in non-western collectivist societies.

Keywords: attachment, children at risk, middle childhood, non-western context

Procedia PDF Downloads 194
837 Impact of Climate on Sugarcane Yield Over Belagavi District, Karnataka Using Statistical Mode

Authors: Girish Chavadappanavar

Abstract:

The impact of climate on agriculture could result in problems with food security and may threaten the livelihood activities upon which much of the population depends. In the present study, the development of a statistical yield forecast model has been carried out for sugarcane production over Belagavi district, Karnataka using weather variables of crop growing season and past observed yield data for the period of 1971 to 2010. The study shows that this type of statistical yield forecast model could efficiently forecast yield 5 weeks and even 10 weeks in advance of the harvest for sugarcane within an acceptable limit of error. The performance of the model in predicting yields at the district level for sugarcane crops is found quite satisfactory for both validation (2007 and 2008) as well as forecasting (2009 and 2010).In addition to the above study, the climate variability of the area has also been studied, and hence, the data series was tested for Mann Kendall Rank Statistical Test. The maximum and minimum temperatures were found to be significant with opposite trends (decreasing trend in maximum and increasing in minimum temperature), while the other three are found in significant with different trends (rainfall and evening time relative humidity with increasing trend and morning time relative humidity with decreasing trend).

Keywords: climate impact, regression analysis, yield and forecast model, sugar models

Procedia PDF Downloads 72
836 Comparison between Deterministic and Probabilistic Stability Analysis, Featuring Consequent Risk Assessment

Authors: Isabela Moreira Queiroz

Abstract:

Slope stability analyses are largely carried out by deterministic methods and evaluated through a single security factor. Although it is known that the geotechnical parameters can present great dispersal, such analyses are considered fixed and known. The probabilistic methods, in turn, incorporate the variability of input key parameters (random variables), resulting in a range of values of safety factors, thus enabling the determination of the probability of failure, which is an essential parameter in the calculation of the risk (probability multiplied by the consequence of the event). Among the probabilistic methods, there are three frequently used methods in geotechnical society: FOSM (First-Order, Second-Moment), Rosenblueth (Point Estimates) and Monte Carlo. This paper presents a comparison between the results from deterministic and probabilistic analyses (FOSM method, Monte Carlo and Rosenblueth) applied to a hypothetical slope. The end was held to evaluate the behavior of the slope and consequent risk analysis, which is used to calculate the risk and analyze their mitigation and control solutions. It can be observed that the results obtained by the three probabilistic methods were quite close. It should be noticed that the calculation of the risk makes it possible to list the priority to the implementation of mitigation measures. Therefore, it is recommended to do a good assessment of the geological-geotechnical model incorporating the uncertainty in viability, design, construction, operation and closure by means of risk management. 

Keywords: probabilistic methods, risk assessment, risk management, slope stability

Procedia PDF Downloads 392
835 Indonesia’s Defense Diplomacy Strength Towards China’s Aggressive Maritime Policy

Authors: Pangihutan Panjaitan, Helda Risman, Devindra Oktaviano

Abstract:

This research is departed from the security issues generated from China’s unilateral claims in the South China Sea conflict. The diplomacy challenges come from Indonesia’s relations with China as well as with ASEAN-member countries involved in the conflict. It is estimated that the conflict in the South China Sea region will become an endless conflict. Comprehensively, Indonesia is implementing a gradual shift in diplomatic approach in creating positive and constructive ties among Indonesia, China, and ASEAN. In line with the rapid-changing world order, the conventional military approach becomes less significant in today’s modern inter-state interactions. This research is conducted in a qualitative literature review to explain how Indonesia’s recent soft diplomacy approach applied in the South China Sea conflict. This type of diplomacy theoretically assumed as one of the most preferred ways to establish mutual trust and confidence among conflicting parties. Maritime issues found its significance in contemporary foreign policy since the world’s most dynamic region has moved to the archipelagic Asia-Pacific. As mentioned by rationalists, every country, including Indonesia, has surely formulated its own prominent national interest, such as the defense aspect. Finally, this research will provide a deep analysis on Indonesia’s centrality in ASEAN as an effective way to ensure Indonesia’s strategic policy in the region well accommodated.

Keywords: soft diplomacy, south China sea, national defense, China

Procedia PDF Downloads 161
834 Assessing the Risk of Condensation and Moisture Accumulation in Solid Walls: Comparing Different Internal Wall Insulation Options

Authors: David Glew, Felix Thomas, Matthew Brooke-Peat

Abstract:

Improving the thermal performance of homes is seen as an essential step in achieving climate change, fuel security, fuel poverty targets. One of the most effective thermal retrofits is to insulate solid walls. However, it has been observed that applying insulation to the internal face of solid walls reduces the surface temperature of the inner wall leaf, which may introduce condensation risk and may interrupt seasonal moisture accumulation and dissipation. This research quantifies the extent to which the risk of condensation and moisture accumulation in the wall increases (which can increase the risk of timber rot) following the installation of six different types of internal wall insulation. In so doing, it compares how risk is affected by both the thermal resistance, thickness, and breathability of the insulation. Thermal bridging, surface temperatures, condensation risk, and moisture accumulation are evaluated using hygrothermal simulation software before and after the thermal upgrades. The research finds that installing internal wall insulation will always introduce some risk of condensation and moisture. However, it identifies that risks were present prior to insulation and that breathable materials and insulation with lower resistance have lower risks than alternative insulation options. The implications of this may be that building standards that encourage the enhanced thermal performance of solid walls may be introducing moisture risks into homes.

Keywords: condensation risk, hygrothermal simulation, internal wall insulation, thermal bridging

Procedia PDF Downloads 162
833 Climate Change Vulnerability and Agrarian Communities: Insights from the Composite Vulnerability Index of Indian States of Andhra Pradesh and Karnataka

Authors: G. Sridevi, Amalendu Jyotishi, Sushanta Mahapatra, G. Jagadeesh, Satyasiba Bedamatta

Abstract:

Climate change is a main challenge for agriculture, food security and rural livelihoods for millions of people in India. Agriculture is the sector most vulnerable to climate change due to its high dependence on climate and weather conditions. Among India’s population of more than one billion people, about 68% are directly or indirectly involved in the agricultural sector. This sector is particularly vulnerable to present-day climate variability. In this contest this paper examines the Socio-economic and climate analytical study of the vulnerability index in Indian states of Andhra Pradesh and Karnataka. Using secondary data; it examines the vulnerability through five different sub-indicator of socio-demographic, agriculture, occupational, common property resource (CPR), and climate in respective states among different districts. Data used in this paper has taken from different sources, like census in India 2011, Directorate of Economics and Statistics of respective states governments. Rainfall data was collected from the India Meteorological Department (IMD). In order to capture the vulnerability from two different states the composite vulnerability index (CVI) was developed and used. This indicates the vulnerability situation of different districts under two states. The study finds that Adilabad district in Andhra Pradesh and Chamarajanagar in Karnataka had highest level of vulnerability while Hyderabad and Bangalore in respective states have least level of vulnerability.

Keywords: vulnerability, agriculture, climate change, global warming

Procedia PDF Downloads 459
832 Barriers to Job Localization Policy in Private Sector: Case Study from Oman

Authors: Yahya Al Nahdi

Abstract:

Even though efforts to increase the participation of nationals in the workforce have been in place for more than a decade in the Sultanate of Oman, the results are not impressive. Citizens’ workforce participation – it is argued in the literature – is hindered by institutional, as well as attitudinal concerns. The purpose of this study was to determine barriers to Omanization (employment of Omani nationals) in the private sector as perceived by the senior managers in government and private sector. Data were collected predominantly through in-depth, semi-structured interviews with managers who directly deal with Omanization policies from both the public and private sector. Results from the data analysis have shown that the majority of participants acknowledged a work preference in the movement (public sector). The private sector employees' compensation and benefits package was perceived to be less attractive than that offered in the government (public sector). The negative perceptions (stereotypes) shared by expatriates regarding work attitudes and competencies of citizens in the local labour market was also overwhelmingly perceived as a major hindrance. Furthermore, institutional issues such as, ineffectiveness of rules and regulation regarding Omanization, inappropriate quota system and lack of public awareness towards private sector’s jobs, are also perceived problematic to successful Omanization. Finally, results from the data analysis were used in recommending strategies for potential consideration in the pursuit of a successful Omanization programme.

Keywords: localization, job security, labour force structure, Omanization, private sector, public sector

Procedia PDF Downloads 399
831 Cash Management and the Impact of Cashless Policy in a Developing Nation: Nigeria as a Case Study

Authors: Ossai Paulinus Edwin

Abstract:

Cash Management is a broad area having to do with the collection, concentration, and disbursement of cash including measuring the level of liquidity and managing the cash balance and short-Term Investments. Cash Management involves the efficient collection and disbursement of cash and cash equivalents. It also includes management of marketable securities because, in modern Terminology, money comprises marketable securities and actual cash in hand or in a bank. This cash management is concerned with management of cash inflow and cash outflow of a business especially as it concerns a developing nation like Nigeria. The paper throws light on the impact of cashless policy in Nigeria as it was introduced by the Central Bank of Nigeria (CBN) in December 2011 and was kick-started in Lagos in January 2012. Survey research was adopted with the questionnaires as data collection instrument. Responses show that cashless policy if adopted generally shall increase employment opportunities, reduce cash related robbery thereby reducing risk of carrying cash; it shall also reduce cash related corruption and attract more foreign investors to the country. It is expected that the introduction of cashless policy in Nigeria is a step in the right direction as it shall bring about modernization of Nigeria payment system, reduction in the cost of banking services, reduction in high security and safety risk and also curb banking related corruptions.

Keywords: cashless economy, cash management, cashless policy, e-banking, Nigeria

Procedia PDF Downloads 540
830 Resilience in Refuge Context: The Validity Assessment Using Child and Youth Resilience Measure-28 among Afghan Young Immigrants in Iran

Authors: Baqir Rezai, Leila Heydarinasab, Rasol Roshan, Mohammad Ghulami

Abstract:

Introduction: The resilience process is one of the controversial and important subjects for child and youth immigrants throughout the world. Positive adaptation to the environment is a consequence of resilience which can affect the quality of life and physical and mental health among immigrants. Objective: A total of 714 Afghan young immigrants (14 to 18-years-old) who live in Iran for more than three years were entered into the study. A random sampling method was applied to obtain data. The study samples were divided into two groups (N1 =360 and N2=354) for exploratory and confirmation analysis. Exploratory factorial analysis was applied to confirm the construct validity of CYRM-28. Results: The results showed that this scale has useful validity content, and the study samples include three factors of individuals, context, and relational in child and youth resilience measure-28. However, from a total of 28 main items, only 15 items could identify these factors. Discussion: The resilience process among young immigrants is mainly explained by individuals, social and cultural conditions. For instance, young immigrants search the resilience process in conditions that caused their immigration. In this context, some questions about the content of security and personal promotion in society could identify three main factors.

Keywords: CYRM-28, factorial analysis, resilience, Afghan young immigrants

Procedia PDF Downloads 140
829 Effect of Pretreatment on Quality Parameters of Natural Convection Mixed-Mode Solar Dried Potato

Authors: Kshanaprava Dhalsamant, Punyadarshini P. Tripathy, Shanker L. Shrivastava

Abstract:

With present high global population, the need for rising food usage by minimizing food wastage and investment is highly necessary to achieve food security. The purpose of this study is to enlighten the effect of pre-drying treatment on rehydration, color, texture, nanohardness, microstructure and surface morphology of solar dried potato samples dried in the mixed-mode solar dryer. Locally bought potatoes were cleaned and cut into cylindrical pieces and pretreated with sodium metabisulfite (0.5%) for 10 min before placing them in natural convection solar dryer designed and developed in Indian Institute of Technology Kharagpur, India. Advanced quality characteristics were studied using Atomic Force Microscope (AFM), Scanning Electron Microscopy (SEM) and nanoindentation method, along with color, texture and water activity. The rehydration indices of solar dried potatoes were significantly biased by pretreatment followed by rehydration temperature. A lower redness index (a*) with a higher value of yellowness index (b*), chroma (C*) and hue angle (h*) were obtained for pretreated samples. Also, the average nanohardness (H) of untreated samples exhibited substantial lower value (18.46%) compared to pretreated samples. Additionally, a creep displacement of 43.27 nm during 20 s dwell time under constant load of 200

Keywords: pretreatment, nanohardness, microstructure, surface morphology

Procedia PDF Downloads 170
828 Gender-Based Violence among Women and Girls with Disability in Nepal

Authors: Manita Pyakurel, Ram Chandra Silwal, Padam Simkhada, Edwin van Teijlingen, Bikesh Bajracharya, Sushila Sapkota, Tina Gorkhali, Salita Gurung

Abstract:

Introduction: Gender-based violence (GBV) has been identified as a social and personal security concern for women with disabilities who are at increased risk for various types of abuse. This study aims to determine the prevalence rates of physical, psychological, and sexual violence among women and girls with disability in Nepal. Methods: This cross-sectional study was conducted in 28 municipalities, 14 districts, and 7 provinces representing all three ecological regions of Nepal from January to March 2021. Study respondents were girls and women with disabilities, aged between 15 and 59 years, at the study sites. Face-to-face semi-structured interviews were conducted among 1294 respondents using the KoBo toolbox application on a smartphone or tablet. Results: Among the total study population, 35.3% shared lifetime violence experience. Only 4.8% formally reported violence experienced. Among the violence experienced participants maximum (92.6%) of women and girls identified no change in violence before and after the COVID-19 pandemic. Women who were married had protective odds of 0.71 for violence experienced in their lifetime [aOR-0.71, CI (0.56-0.90)]. Conclusion: More than one-third experienced violence in their lifetime. Intimate partner violence was the most common violence experienced by women and girls with disability in Nepal. Sexual violence was the least type of violence experienced. The most common perpetrator of violence includes the mother or father-in-law. Most of the women and girls never reported violence.

Keywords: gender-based violence, prevalence, girls, women

Procedia PDF Downloads 140
827 Metabolic and Adaptive Laboratory Evolutionary Engineering (ALE) of Saccharomyces cerevisiae for Second Generation Biofuel Production

Authors: Farnaz Yusuf, Naseem A. Gaur

Abstract:

The increase in environmental concerns, rapid depletion of fossil fuel reserves and intense interest in achieving energy security has led to a global research effort towards developing renewable sources of fuels. Second generation biofuels have attracted more attention recently as the use of lignocellulosic biomass can reduce fossil fuel dependence and is environment-friendly. Xylose is the main pentose and second most abundant sugar after glucose in lignocelluloses. Saccharomyces cerevisiae does not readily uptake and use pentose sugars. For an economically feasible biofuel production, both hexose and pentose sugars must be fermented to ethanol. Therefore, it is important to develop S. cerevisiae host platforms with more efficient xylose utilization. This work aims to construct a xylose fermenting yeast strains with engineered oxido-reductative pathway for xylose metabolism. Engineered strain was further improved by adaptive evolutionary engineering approach. The engineered strain is able to grow on xylose as sole carbon source with the maximum ethanol yield of 0.39g/g xylose and productivity of 0.139g/l/h at 96 hours. The further improvement in strain development involves over expression of pentose phosphate pathway and protein engineering of xylose reductase/xylitol dehydrogenase to change their cofactor specificity in order to reduce xylitol accumulation.

Keywords: biofuel, lignocellulosic biomass, saccharomyces cerevisiae, xylose

Procedia PDF Downloads 217
826 Strategies and Difficulties to Integrate Renewable Energy into Recreational Open Spaces

Authors: A. Tereci, M. Atmaca

Abstract:

Recreational spaces designed or build for refreshment of the users through natural riches and/or activities. Those places contribute to the quality of city life by providing relaxation point for citizens and maintaining the environmental equilibrium. The elements which constitute the recreational areas also promote long-term environmental and social sustainability of cities. Preservation and creation of the recreation open spaces are important for water and air quality, natural habitat and also social communication. On this point, it is also a good area for promoting the renewable energy sources through comprehension of the sustainable development which is possible only with using nature and technic together. Energy production is mainly technical issue, and architectural design of these elements to the site always ignores or avoid. The main problems for integration of renewable energy sources are the system suitability, security, durability, and resiliency. In this paper, one of the city recreational open spaces in Konya, Turkey was evaluated for integration of possible renewable energy sources. It shows that the solar energy potential is high and PV integration is the best option. On the other hand wind, energy power and area is not suitable for wind turbine, so wind belts were decided to integrate on the design. According to recreational activities, the chosen elements was designed for site application, and their performance was calculated. According to possible installation on the furniture, there is 50 MWh/a electricity production capacity.

Keywords: energy, integrated design, recreational space, renewables

Procedia PDF Downloads 158
825 Climate Change and Global Warming: Effect on Indian Agriculture and Legal Control

Authors: Aman Guru, Chiron Singhi

Abstract:

The Earth’s climate is being changed at an unrivalled rate since beginning of the evolution of the Earth, 4–5 billion years back, but presently it gained pace due to unintentional anthropogenic disturbances and also increased global warming since the mid-20th century, and these incessant changes in the climatic pattern may bring unpropitious effect on global health and security. Today, however, it is not only the air, or water that are polluted, but the whole atmosphere is prone to pollution and this resulted in other cascading ramification in the form of change in the pattern of rainfall, melting of ice, the rise in the sea level etc. Human activities like production, transport, burning of fuels are adding umpteen dangerous pollutants to the atmosphere which in turn gives rise to global warming. Agriculture plays an imperative part in India's economy. Agriculture, along with fisheries and forestry, is one of the largest contributors to the Gross Domestic Product in India. Research on the effect of climate change and vulnerability of agriculture is a high need in India. A steady increase of CO2 is a primary cause of climate change and global warming and which in turn have a great impact on Indian agriculture. The research focuses on the effect of climate change on Indian agriculture and the proceedings and legal control of legislative measures on such issues and the ways to implement such laws which can help to provide a solution to these problems which can prove beneficial to Indian farmers and their agricultural produce.

Keywords: agriculture, climate change, global warming, India laws, legislative measures

Procedia PDF Downloads 314
824 Context-Aware Alert Method in Hajj Pilgrim Location-Based Tracking System

Authors: Syarif Hidayat

Abstract:

As millions of people with different backgrounds perform hajj every year in Saudi Arabia, it brings out several problems. Missing people is among many crucial problems need to be encountered. Some people might have had insufficient knowledge of using tracking system equipment. Other might become a victim of an accident, lose consciousness, or even died, prohibiting them to perform certain activity. For those reasons, people could not send proper SOS message. The major contribution of this paper is the application of the diverse alert method in pilgrims tracking system. It offers a simple yet robust solution to send SOS message by pilgrims during Hajj. Knowledge of context aware computing is assumed herein. This study presents four methods that could be utilized by pilgrims to send SOS. The first method is simple mobile application contains only a button. The second method is based on behavior analysis based off GPS location movement anomaly. The third method is by introducing pressing pattern to smartwatch physical button as a panic button. The fourth method is by identifying certain accelerometer pattern recognition as a sign of emergency situations. Presented method in this paper would be an important part of pilgrims tracking system. The discussion provided here includes easy to use design whilst maintaining tracking accuracy, privacy, and security of its users.

Keywords: context aware computing, emergency alert system, GPS, hajj pilgrim tracking, location-based services

Procedia PDF Downloads 217
823 Encoded Fiber Optic Sensors for Simultaneous Multipoint Sensing

Authors: C. Babu Rao, Pandian Chelliah

Abstract:

Owing to their reliability, a number of fluorescent spectra based fiber optic sensors have been developed for detection and identification of hazardous chemicals such as explosives, narcotics etc. In High security regions, such as airports, it is important to monitor simultaneously multiple locations. This calls for deployment of a portable sensor at each location. However, the selectivity and sensitivity of these techniques depends on the spectral resolution of the spectral analyzer. The better the resolution the larger the repertoire of chemicals that can be detected. A portable unit will have limitations in meeting these requirements. Optical fibers can be employed for collecting and transmitting spectral signal from the portable sensor head to a sensitive central spectral analyzer (CSA). For multipoint sensing, optical multiplexing of multiple sensor heads with CSA has to be adopted. However with multiplexing, when one sensor head is connected to CSA, the rest may remain unconnected for the turn-around period. The larger the number of sensor heads the larger this turn-around time will be. To circumvent this imitation, we propose in this paper, an optical encoding methodology to use multiple portable sensor heads connected to a single CSA. Each portable sensor head is assigned an unique address. Spectra of every chemical detected through this sensor head, are encoded by its unique address and can be identified at the CSA end. The methodology proposed is demonstrated through a simulation using Matlab SIMULINK.

Keywords: optical encoding, fluorescence, multipoint sensing

Procedia PDF Downloads 711
822 Application to Monitor the Citizens for Corona and Get Medical Aids or Assistance from Hospitals

Authors: Vathsala Kaluarachchi, Oshani Wimalarathna, Charith Vandebona, Gayani Chandrarathna, Lakmal Rupasinghe, Windhya Rankothge

Abstract:

It is the fundamental function of a monitoring system to allow users to collect and process data. A worldwide threat, the corona outbreak has wreaked havoc in Sri Lanka, and the situation has gotten out of hand. Since the epidemic, the Sri Lankan government has been unable to establish a systematic system for monitoring corona patients and providing emergency care in the event of an outbreak. Most patients have been held at home because of the high number of patients reported in the nation, but they do not yet have access to a functioning medical system. It has resulted in an increase in the number of patients who have been left untreated because of a lack of medical care. The absence of competent medical monitoring is the biggest cause of mortality for many people nowadays, according to our survey. As a result, a smartphone app for analyzing the patient's state and determining whether they should be hospitalized will be developed. Using the data supplied, we are aiming to send an alarm letter or SMS to the hospital once the system recognizes them. Since we know what those patients need and when they need it, we will put up a desktop program at the hospital to monitor their progress. Deep learning, image processing and application development, natural language processing, and blockchain management are some of the components of the research solution. The purpose of this research paper is to introduce a mechanism to connect hospitals and patients even when they are physically apart. Further data security and user-friendliness are enhanced through blockchain and NLP.

Keywords: blockchain, deep learning, NLP, monitoring system

Procedia PDF Downloads 133
821 Mechanisms to Combat Maritime Terrorism in the Law of the Kingdom of Saudi Arabia and International Law

Authors: Khaleed Alsufyyan

Abstract:

This doctoral research has been successfully approved by a specialist upgrade panel, and it presents the proposition that the KSA policy for combating maritime terrorism is inadequate and current governance frameworks, including laws, are insufficiently developed to respond effectively and fairly to maritime terrorism. It will examine the legal system in the KSA in terms of effectiveness fairness, as well as investigate this proposition to determine what factors have contributed to such a deficiency. The main focus of this research will draw upon the policies, laws, and practices of the KSA, as well as UK and international laws and policies, to assess whether it is feasible to apply them in the context of the KSA. This thesis will recommend strategies regarding maritime terrorism to enrich the legal and policy frameworks and address the current and future dynamics of maritime terrorism adequately. To derive suitable improvements, UK policies, laws, and practices will be considered for policy transfer purposes. As for studies focused on the KSA, since the KSA is a Muslim state, it will be important to assess the impact of Islamic Law or Sharia Law subject to the doctrines of fairness and effectiveness to comprehend how the KSA’s legal system operates and determine the boundaries it sets for the response to maritime terrorism. This thesis will propose that more reforms are needed to effectively and fairly deal with maritime terrorism based on the prevailing understanding of Sharia law. The research will address the international perspectives on the problem of maritime terrorism and international cooperation of the KSA regarding maritime terrorism and consider the need for further developments.

Keywords: maritime terrorism, maritime security, combat maritime terrorism in the KSA, protecting maritime transport against terrorism

Procedia PDF Downloads 88
820 Pilot Program for the Promotion of Normal Childbirth in the North, Northeast and Midwest of Brazil

Authors: Natália Bruno Chaves, Richardes Caúla, Roosevelt do Vale, Daniela Toneti, Rafaela Carvalho, Renata Silva Lopes, Antônio Carlos Júnior, Adner Nobre, Viviane Santiago, Yara Alana Caldato, Estefania Rodriguez Urrego, André Buarque Lemos, Catarina Nucci Stetner, Marcos Mauro Barreto, Stefany Moreira Lima, Mara Cavalcante, Ticiane Ribeiro

Abstract:

The Well Born (Nascer Bem – in Portuguese) Program was created in the Hapvida health network with the aim of improving access to safe and quality prenatal care for users. In addition to offering a line of prenatal care, the inclusion of obstetric nursing and the decentralization of childbirth, bring security that professionals did not indicate the route of delivery for professional convenience. The introduction of the nursing consultation came to reinforce the care to our users, strengthening their bond and reception. In 2021, the program maintained an average of 40% of normal births in the north, northeast and central-west regions of Brazil, an average above that observed in the rest of the country's private health systems, around 20%. In addition, the neonatal hospitalization rate of this population remained around 5.1%, a figure below the national average. With these data, the “Nascer Bem” program is affirmed as a safe and effective strategy for the promotion of safe normal birth.

Keywords: quality, safe, prenatal, obstetric nursing

Procedia PDF Downloads 119
819 Artificial Intelligence in Vietnamese Higher Education: Benefits, Challenges and Ethics

Authors: Duong Van Thanh

Abstract:

Artificial Intelligence (AI) has been recently a new trend in Higher Education systems globally as well as in the Vietnamese Higher Education. This study explores the benefits and challenges in applications of AI in 02 selected universities, ie. Vietnam National Universities in Hanoi Capital and the University of Economics in Ho Chi Minh City. Particularly, this paper focuses on how the ethics of Artificial Intelligence have been addressed among faculty members at these two universities. The AI ethical issues include the access and inclusion, privacy and security, transparency and accountability. AI-powered educational technology has the potential to improve access and inclusion for students with disabilities or other learning needs. However, there is a risk that AI-based systems may not be accessible to all students and may even exacerbate existing inequalities. AI applications can be opaque and difficult to understand, making it challenging to hold them accountable for their decisions and actions. It is important to consider the benefits that adopting AI-systems bring to the institutions, teaching, and learning. And it is equally important to recognize the drawbacks of using AI in education and to take the necessary steps to mitigate any negative impact. The results of this study present a critical concern in higher education in Vietnam, where AI systems may be used to make important decisions about students’ learning and academic progress. The authors of this study attempt to make some recommendation that the AI-system in higher education system is frequently checked by a human in charge to verify that everything is working as it should or if the system needs some retraining or adjustments.

Keywords: artificial intelligence, ethics, challenges, vietnam

Procedia PDF Downloads 130
818 A Review on the Challenge and Need of Goat Semen Production and Artificial Insemination in Nepal

Authors: Pankaj K. Jha, Ajeet K. Jha, Pravin Mishra

Abstract:

Goat raising is a popular livestock sub-commodity of mixed farming system in Nepal. Besides food and nutritional security, it has an important role in the economy of many peoples. Goat breeding through AI is commonly practiced worldwide. It is a very basic tool to speed up genetic improvement and increase productivity. For the goat genetic improvement program, the government of Nepal has imported some specialized exotic goat breeds and semen. Some progress has been made in the initiation of selective breeding within the local breeds and practice of AI with imported semen. Importance of AI in goats has drawn more attention among goat farmers. However, importing semen is not a permanent solution at national level; rather, it is more important to develop and establish its own frozen semen production technique. Semen quality and its relationship with fertility are said to be a major concern in animal production, hence accurate measurement of semen fertilizing potential is of great importance. The survivability of sperm cells depends on semen quality. Survivability of sperm cells is assessed through visual and microscopic evaluation of spermatozoal progressive motility and morphology. In Nepal, there is lack of scientific information on seminal attributes of buck semen, its dilution, cooling and freezing technique under management conditions of Nepal. Therefore, the objective of this review was to provide brief information about breeding system, semen production and artificial insemination in Nepalese goat.

Keywords: artificial insemination, goat, Nepal, semen

Procedia PDF Downloads 212
817 Autism Disease Detection Using Transfer Learning Techniques: Performance Comparison between Central Processing Unit vs. Graphics Processing Unit Functions for Neural Networks

Authors: Mst Shapna Akter, Hossain Shahriar

Abstract:

Neural network approaches are machine learning methods used in many domains, such as healthcare and cyber security. Neural networks are mostly known for dealing with image datasets. While training with the images, several fundamental mathematical operations are carried out in the Neural Network. The operation includes a number of algebraic and mathematical functions, including derivative, convolution, and matrix inversion and transposition. Such operations require higher processing power than is typically needed for computer usage. Central Processing Unit (CPU) is not appropriate for a large image size of the dataset as it is built with serial processing. While Graphics Processing Unit (GPU) has parallel processing capabilities and, therefore, has higher speed. This paper uses advanced Neural Network techniques such as VGG16, Resnet50, Densenet, Inceptionv3, Xception, Mobilenet, XGBOOST-VGG16, and our proposed models to compare CPU and GPU resources. A system for classifying autism disease using face images of an autistic and non-autistic child was used to compare performance during testing. We used evaluation matrices such as Accuracy, F1 score, Precision, Recall, and Execution time. It has been observed that GPU runs faster than the CPU in all tests performed. Moreover, the performance of the Neural Network models in terms of accuracy increases on GPU compared to CPU.

Keywords: autism disease, neural network, CPU, GPU, transfer learning

Procedia PDF Downloads 121
816 Simulation Study of Enhanced Terahertz Radiation Generation by Two-Color Laser Plasma Interaction

Authors: Nirmal Kumar Verma, Pallavi Jha

Abstract:

Terahertz (THz) radiation generation by propagation of two-color laser pulses in plasma is an active area of research due to its potential applications in various areas, including security screening, material characterization and spectroscopic techniques. Due to non ionizing nature and the ability to penetrate several millimeters, THz radiation is suitable for diagnosis of cancerous cells. Traditional THz emitters like optically active crystals when irradiated with high power laser radiation, are subject to material breakdown and hence low conversion efficiencies. This problem is not encountered in laser - plasma based THz radiation sources. The present paper is devoted to the simulation study of the enhanced THz radiation generation by propagation of two-color, linearly polarized laser pulses through magnetized plasma. The two laser pulses orthogonally polarized are co-propagating along the same direction. The direction of the external magnetic field is such that one of the two laser pulses propagates in the ordinary mode, while the other pulse propagates in the extraordinary mode through homogeneous plasma. A transverse electromagnetic wave with frequency in the THz range is generated due to the presence of the static magnetic field. It is observed that larger amplitude terahertz can be generated by mixing of ordinary and extraordinary modes of two-color laser pulses as compared with a single laser pulse propagating in the extraordinary mode.

Keywords: two-color laser pulses, terahertz radiation, magnetized plasma, ordinary and extraordinary mode

Procedia PDF Downloads 303
815 Site Suitability Analysis for Multipurpose Dams Using Geospatial Technologies

Authors: Saima Iftikhar Rida Shabbir, Zeeshan Hassan

Abstract:

Water shortage, energy crisis and natural misfortunes are the glitches which reduce the efficacy of agricultural ecosystems especially in Pakistan where these are more frequent besides being intense. Accordingly, the agricultural water resources, food security and country’s economy are at risk. To address this, we have used Geospatial techniques incorporating ASTER Global DEM, Geological map, rainfall data, discharge data, Landsat 5 image of Swat valley in order to assess the viability of selected sites. The sites have been studied via GIS tools, Hydrological investigation and multiparametric analysis for their potentialities of collecting and securing the rain water; regulating floods by storing the surplus water bulks by check dams and developing them for power generation. Our results showed that Siat1-1 was very useful for low-cost dam with main objective of as Debris dam; Site-2 and Site 3 were check dams sites having adequate storing reservoir so as to arrest the inconsistent flow accompanied by catering the sedimentation effects and the debris flows; Site 4 had a huge reservoir capacity but it entails enormous edifice cost over very great flood plain. Thus, there is necessity of active Hydrological developments to estimate the flooded area using advanced and multifarious GIS and remote sensing approaches so that the sites could be developed for harnessing those sites for agricultural and energy drives.

Keywords: site suitability, check dams, SHP, terrain analysis, volume estimation

Procedia PDF Downloads 314
814 Cash Management in a Cashless Economy of a Developing Nation, Problems and Prospects: Nigeria a Case Study

Authors: Ossai Paulinus Edwin

Abstract:

Cash Management is a broad area having to do with the collection, concentration and disbursement of cash including measuring the level of liquidity and managing the cash balance and Short-Term Investments. Cash Management involves the efficient collection and disbursement of cash and cash equivalents. It also includes management of marketable securities because, in modern Terminology, money comprises marketable securities and actual cash in hand or in a bank. This cash management is concerned with management of cash inflow and cash outflow of a business especially as it concerns a developing nation like Nigeria. The paper throws light on the impact of cashless policy in Nigeria as it was introduced by the Central Bank of Nigeria (CBN) in December 2011 and was kick started in Lagos in January 2012. Survey research was adopted with the questionnaires as data collection instrument. Responses show that cashless policy if adopted generally shall increase employment opportunities, reduce cash related robbery thereby reducing risk of carrying cash; it shall also reduce cash related corruption and attract more foreign investors to the country. It is expected that the introduction of cashless policy in Nigeria is a step in the right direction as it shall bring about modernization of Nigeria payment system, reduction in the cost of banking services, reduction in high security and safety risk and also curb banking related corruptions.

Keywords: cashless economy, cash management, cashless policy, e-banking, Nigeria

Procedia PDF Downloads 388
813 Assessment Power and Oscillation Damping Using the POD Controller and Proposed FOD Controller

Authors: Tohid Rahimi, Yahya Naderi, Babak Yousefi, Seyed Hossein Hoseini

Abstract:

Today’s modern interconnected power system is highly complex in nature. In this, one of the most important requirements during the operation of the electric power system is the reliability and security. Power and frequency oscillation damping mechanism improve the reliability. Because of power system stabilizer (PSS) low speed response against of major fault such as three phase short circuit, FACTs devise that can control the network condition in very fast time, are becoming popular. However, FACTs capability can be seen in a major fault present when nonlinear models of FACTs devise and power system equipment are applied. To realize this aim, the model of multi-machine power system with FACTs controller is developed in MATLAB/SIMULINK using Sim Power System (SPS) blockiest. Among the FACTs device, Static synchronous series compensator (SSSC) due to high speed changes its reactance characteristic inductive to capacitive, is effective power flow controller. Tuning process of controller parameter can be performed using different method. However, Genetic Algorithm (GA) ability tends to use it in controller parameter tuning process. In this paper, firstly POD controller is used to power oscillation damping. But in this station, frequency oscillation dos not has proper damping situation. Therefore, FOD controller that is tuned using GA is using that cause to damp out frequency oscillation properly and power oscillation damping has suitable situation.

Keywords: power oscillation damping (POD), frequency oscillation damping (FOD), Static synchronous series compensator (SSSC), Genetic Algorithm (GA)

Procedia PDF Downloads 477
812 Protecting Migrants at Risk as Internally Displaced Persons: State Responses to Foreign Immigrants Displaced by Natural Disasters in Thailand, The United States, and Japan

Authors: Toake Endoh

Abstract:

Cross-border migration of people is a critical driver for sustainable economic development in the Asia-Pacific region. Meanwhile, the region is susceptible to mega-scale natural disasters, such as tsunami, earthquakes, and typhoons. When migrants are stranded in a foreign country by a disaster, who should be responsible for their safety and security? What legal or moral foundation is there to advocate for the protection and assistance of “migrants at risk (M@R)”? How can the states practice “good governance” in their response to displacement of the foreign migrants? This paper inquires how to protect foreign migrants displaced by a natural disaster under international law and proposes protective actions to be taken by of migrant-receiver governments. First, the paper discusses the theoretical foundation for protection of M@R and argues that the nation-states are charged of responsibility to protect at-risk foreigners as “internally displaced persons” in the light of the United Nations’ Guiding Principles of Internal Displacement (1998). Second, through the case study of the Kobe Earthquake in Japan (1995), the Tsunami in Thailand (2004), and the Hurricane Katrina in the U.S. (2005), the paper evaluates how effectively (or poorly) institutions and state actors addressed the specific vulnerability felt by M@R in these crises.

Keywords: internal displaced persons, natural disaster, international migration, responsibility to protect

Procedia PDF Downloads 319