Search results for: data integrity and privacy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 25810

Search results for: data integrity and privacy

25630 AI-Enabled Smart Contracts for Reliable Traceability in the Industry 4.0

Authors: Harris Niavis, Dimitra Politaki

Abstract:

The manufacturing industry was collecting vast amounts of data for monitoring product quality thanks to the advances in the ICT sector and dedicated IoT infrastructure is deployed to track and trace the production line. However, industries have not yet managed to unleash the full potential of these data due to defective data collection methods and untrusted data storage and sharing. Blockchain is gaining increasing ground as a key technology enabler for Industry 4.0 and the smart manufacturing domain, as it enables the secure storage and exchange of data between stakeholders. On the other hand, AI techniques are more and more used to detect anomalies in batch and time-series data that enable the identification of unusual behaviors. The proposed scheme is based on smart contracts to enable automation and transparency in the data exchange, coupled with anomaly detection algorithms to enable reliable data ingestion in the system. Before sensor measurements are fed to the blockchain component and the smart contracts, the anomaly detection mechanism uniquely combines artificial intelligence models to effectively detect unusual values such as outliers and extreme deviations in data coming from them. Specifically, Autoregressive integrated moving average, Long short-term memory (LSTM) and Dense-based autoencoders, as well as Generative adversarial networks (GAN) models, are used to detect both point and collective anomalies. Towards the goal of preserving the privacy of industries' information, the smart contracts employ techniques to ensure that only anonymized pointers to the actual data are stored on the ledger while sensitive information remains off-chain. In the same spirit, blockchain technology guarantees the security of the data storage through strong cryptography as well as the integrity of the data through the decentralization of the network and the execution of the smart contracts by the majority of the blockchain network actors. The blockchain component of the Data Traceability Software is based on the Hyperledger Fabric framework, which lays the ground for the deployment of smart contracts and APIs to expose the functionality to the end-users. The results of this work demonstrate that such a system can increase the quality of the end-products and the trustworthiness of the monitoring process in the smart manufacturing domain. The proposed AI-enabled data traceability software can be employed by industries to accurately trace and verify records about quality through the entire production chain and take advantage of the multitude of monitoring records in their databases.

Keywords: blockchain, data quality, industry4.0, product quality

Procedia PDF Downloads 189
25629 Enhancing Halal Food Integrity Through Whistleblowing Practices: Implementing Halal And Toyyib Principles

Authors: Norazilawati Binti Md Dahlal, Nabiila Binti Mat Yusoff, Anis Najiha Binti Ahmad

Abstract:

With the increasing demand for halal products, there is a growing emphasis on ensuring their quality and adherence to halal standards. However, the vulnerability of halal goods to fraud and adulteration poses a significant challenge to the integrity of the halal industry. Whistleblowers play a pivotal role in safeguarding the safety and integrity of halal food by exposing wrongdoings, misconduct, and fraudulent practices. This study explores the implementation of whistleblowing practices aligned with halal and toyyib principles to effectively address halal food fraud issues. Whistleblowing is defined as the act of disclosing information about misconduct, immorality, or unlawful activities to relevant authorities or the public. Although whistleblowing is universally recognized as beneficial, it exposes whistleblowers to substantial risks, including career setbacks, reputation damage, and personal safety threats. Despite legal protections, whistleblowers often face retaliation and hesitancy to come forward. By integrating the principles of halal and toyyib, which encompass the physical and spiritual as well as material and supernatural elements, effective whistleblowing practices can be developed. These principles include the physical characteristic of the product in accordance with Shari’ah law (P1); products that are sourced ethically and responsibly (P2); Products that meet high standard of quality and safety (P3); functioning as servant and caliph of Allah in managing according to Allah's commands and prohibitions (P4); not excessively wasteful or extravagant (P5); positive moral and spiritual implications associated with the product (P6); and aimed at achieving prosperity in both this life and the Hereafter (P7). Employing a quantitative research approach, this study examines Islamic primary data sources and secondary data sources to investigate the prevalence and impact of whistleblowing in the halal industry. By analyzing the principles of halal and toyyib and exploring the importance of whistleblowing effective whistleblowing practices, this research aims to enhance our understanding of promoting accountability and justice within the halal industry from an Islamic perspective.

Keywords: whistleblowing, halal and toyyib, food fraud, halal integrity, Islamic practices

Procedia PDF Downloads 133
25628 Examining Statistical Monitoring Approach against Traditional Monitoring Techniques in Detecting Data Anomalies during Conduct of Clinical Trials

Authors: Sheikh Omar Sillah

Abstract:

Introduction: Monitoring is an important means of ensuring the smooth implementation and quality of clinical trials. For many years, traditional site monitoring approaches have been critical in detecting data errors but not optimal in identifying fabricated and implanted data as well as non-random data distributions that may significantly invalidate study results. The objective of this paper was to provide recommendations based on best statistical monitoring practices for detecting data-integrity issues suggestive of fabrication and implantation early in the study conduct to allow implementation of meaningful corrective and preventive actions. Methodology: Electronic bibliographic databases (Medline, Embase, PubMed, Scopus, and Web of Science) were used for the literature search, and both qualitative and quantitative studies were sought. Search results were uploaded into Eppi-Reviewer Software, and only publications written in the English language from 2012 were included in the review. Gray literature not considered to present reproducible methods was excluded. Results: A total of 18 peer-reviewed publications were included in the review. The publications demonstrated that traditional site monitoring techniques are not efficient in detecting data anomalies. By specifying project-specific parameters such as laboratory reference range values, visit schedules, etc., with appropriate interactive data monitoring, statistical monitoring can offer early signals of data anomalies to study teams. The review further revealed that statistical monitoring is useful to identify unusual data patterns that might be revealing issues that could impact data integrity or may potentially impact study participants' safety. However, subjective measures may not be good candidates for statistical monitoring. Conclusion: The statistical monitoring approach requires a combination of education, training, and experience sufficient to implement its principles in detecting data anomalies for the statistical aspects of a clinical trial.

Keywords: statistical monitoring, data anomalies, clinical trials, traditional monitoring

Procedia PDF Downloads 75
25627 Effect of Integrity of the Earthing System on the Rise of Earth Potential

Authors: N. Ullah, A. Haddad, F. Van Der Linde

Abstract:

This paper investigates the effects of breaks in bonds, breaks in the earthing system and breaks in earth wire on the rise of the earth potential (EPR) in a substation and at the transmission tower bases using various models of an L6 tower. Different approaches were adopted to examine the integrity of the earthing system and the terminal towers. These effects were investigated to see the associated difference in the EPR magnitudes with respect to a healthy system at various locations. Comparisons of the computed EPR magnitudes were then made between the healthy and unhealthy system to detect any difference. The studies were conducted at power frequency for a uniform soil with different soil resistivities. It was found that full breaks in the double bond of the terminal towers increase the EPR significantly at the fault location, while they reduce EPR at the terminal tower bases. A fault on the isolated section of the grid can result in EPR values up to 8 times of those on a healthy system at higher soil resistivities, provided that the extended earthing system stays connected to the grid.

Keywords: bonding, earthing, EPR, integrity, system

Procedia PDF Downloads 328
25626 Blockchain Technology for Secure and Transparent Oil and Gas Supply Chain Management

Authors: Gaurav Kumar Sinha

Abstract:

The oil and gas industry, characterized by its complex and global supply chains, faces significant challenges in ensuring security, transparency, and efficiency. Blockchain technology, with its decentralized and immutable ledger, offers a transformative solution to these issues. This paper explores the application of blockchain technology in the oil and gas supply chain, highlighting its potential to enhance data security, improve transparency, and streamline operations. By leveraging smart contracts, blockchain can automate and secure transactions, reducing the risk of fraud and errors. Additionally, the integration of blockchain with IoT devices enables real-time tracking and monitoring of assets, ensuring data accuracy and integrity throughout the supply chain. Case studies and pilot projects within the industry demonstrate the practical benefits and challenges of implementing blockchain solutions. The findings suggest that blockchain technology can significantly improve trust and collaboration among supply chain participants, ultimately leading to more efficient and resilient operations. This study provides valuable insights for industry stakeholders considering the adoption of blockchain technology to address their supply chain management challenges.

Keywords: blockchain technology, oil and gas supply chain, data security, transparency, smart contracts, IoT integration, real-time tracking, asset monitoring, fraud reduction, supply chain efficiency, data integrity, case studies, industry implementation, trust, collaboration.

Procedia PDF Downloads 36
25625 Bridge Health Monitoring: A Review

Authors: Mohammad Bakhshandeh

Abstract:

Structural Health Monitoring (SHM) is a crucial and necessary practice that plays a vital role in ensuring the safety and integrity of critical structures, and in particular, bridges. The continuous monitoring of bridges for signs of damage or degradation through Bridge Health Monitoring (BHM) enables early detection of potential problems, allowing for prompt corrective action to be taken before significant damage occurs. Although all monitoring techniques aim to provide accurate and decisive information regarding the remaining useful life, safety, integrity, and serviceability of bridges, understanding the development and propagation of damage is vital for maintaining uninterrupted bridge operation. Over the years, extensive research has been conducted on BHM methods, and experts in the field have increasingly adopted new methodologies. In this article, we provide a comprehensive exploration of the various BHM approaches, including sensor-based, non-destructive testing (NDT), model-based, and artificial intelligence (AI)-based methods. We also discuss the challenges associated with BHM, including sensor placement and data acquisition, data analysis and interpretation, cost and complexity, and environmental effects, through an extensive review of relevant literature and research studies. Additionally, we examine potential solutions to these challenges and propose future research ideas to address critical gaps in BHM.

Keywords: structural health monitoring (SHM), bridge health monitoring (BHM), sensor-based methods, machine-learning algorithms, and model-based techniques, sensor placement, data acquisition, data analysis

Procedia PDF Downloads 90
25624 The Challenges of Well Integrity on Plug and Abandoned Wells for Offshore Co₂ Storage Site Containment

Authors: Siti Noor Syahirah Mohd Sabri

Abstract:

The oil and gas industry is committed to net zero carbon emissions because the consequences of climate change could be catastrophic unless responded to very soon. One way of reducing CO₂ emissions is to inject it into a depleted reservoir buried underground. This greenhouse gas reduction technique significantly reduces CO₂ released into the atmosphere. In general, depleted oil and gas reservoirs provide readily available sites for the storage of CO₂ in offshore areas. This is mainly due to the hydrocarbons have been optimally produced and the existence of voids for effective CO₂ storage. Hence, make it a good candidate for a CO₂ well injector location. Geological storage sites are often evaluated in terms of capacity, injectivity and containment. Leakage through the cap rock or existing well is the main concern in the depleted fields. In order to develop these fields as CO₂ storage sites, the long-term integrity of wells drilled in these oil & gas fields must be ascertained to ensure good CO₂ containment. Well, integrity is often defined as the ability to contain fluids without significant leakage through the project lifecycle. Most plugged and abandoned (P & A) wells in Peninsular Malaysia have drilled 20 – 30 years ago and were not designed to withstand downhole conditions having >50%vol CO₂ and CO₂/H₂O mixture. In addition, Corrosive-Resistant Alloy (CRA) tubular and CO₂-resistant cement was not used during good construction. The reservoir pressure and temperature conditions may have further degraded the material strength and elevated the corrosion rate. Understanding all the uncertainties that may have affected cement-casing bonds, such as the quality of cement behind the casing, subsidence effect, corrosion rate, etc., is the first step toward well integrity evaluation. Secondly, proper quantification of all the uncertainties involved needs to be done to ensure long-term underground storage objectives of CO₂ are achieved. This paper will discuss challenges associated with estimating the performance of well barrier elements in existing P&A wells. Risk ranking of the existing P&A wells is to be carried out in order to ensure the integrity of the storage site is maintained for long-term CO₂ storage. High-risk existing P&A wells are to be re-entered to restore good integrity and to reduce future leakage that may happen. In addition, the requirement to design a fit-for-purpose monitoring and mitigation technology package for potential CO₂ leakage/seepage in the marine environment will be discussed accordingly. The holistic approach will ensure that the integrity is maintained, and CO₂ is contained underground for years to come.

Keywords: CCUS, well integrity, co₂ storage, offshore

Procedia PDF Downloads 90
25623 Decentralized Data Marketplace Framework Using Blockchain-Based Smart Contract

Authors: Meshari Aljohani, Stephan Olariu, Ravi Mukkamala

Abstract:

Data is essential for enhancing the quality of life. Its value creates chances for users to profit from data sales and purchases. Users in data marketplaces, however, must share and trade data in a secure and trusted environment while maintaining their privacy. The first main contribution of this paper is to identify enabling technologies and challenges facing the development of decentralized data marketplaces. The second main contribution is to propose a decentralized data marketplace framework based on blockchain technology. The proposed framework enables sellers and buyers to transact with more confidence. Using a security deposit, the system implements a unique approach for enforcing honesty in data exchange among anonymous individuals. Before the transaction is considered complete, the system has a time frame. As a result, users can submit disputes to the arbitrators which will review them and respond with their decision. Use cases are presented to demonstrate how these technologies help data marketplaces handle issues and challenges.

Keywords: blockchain, data, data marketplace, smart contract, reputation system

Procedia PDF Downloads 158
25622 Seismic Integrity Determination of Dams in Urban Areas

Authors: J. M. Mayoral, M. Anaya

Abstract:

The urban and economic development of cities demands the construction of water use and flood control infrastructure. Likewise, it is necessary to determine the safety level of the structures built with the current standards and if it is necessary to define the reinforcement actions. The foregoing is even more important in structures of great importance, such as dams, since they imply a greater risk for the population in case of failure or undesirable operating conditions (e.g., seepage, cracks, subsidence). This article presents a methodology for determining the seismic integrity of dams in urban areas. From direct measurements of the dynamic properties using geophysical exploration and ambient seismic noise measurements, the seismic integrity of the concrete-faced rockfill dam selected as a case of study is evaluated. To validate the results, two accelerometer stations were installed (e.g., free field and crest of the dam). Once the dynamic properties were determined, three-dimensional finite difference models were developed to evaluate the dam seismic performance for different intensities of movement, considering the site response and soil-structure interaction effects. The seismic environment was determined from the uniform hazard spectra for several return periods. Based on the results obtained, the safety level of the dam against different seismic actions was determined, and the effectiveness of ambient seismic noise measurements in dynamic characterization and subsequent evaluation of the seismic integrity of urban dams was evaluated.

Keywords: risk, seismic, soil-structure interaction, urban dams

Procedia PDF Downloads 118
25621 The Role of Online Social Networks in Social Movements: Social Polarization and Violations against Social Unity and Privacy of Individuals in Turkey

Authors: Tolga Yazıcı

Abstract:

As a matter of the fact that online social networks like Twitter, Facebook and MySpace have experienced an extensive growth in recent years. Social media offers individuals with a tool for communicating and interacting with one another. These social networks enable people to stay in touch with other people and express themselves. This process makes the users of online social networks active creators of content rather than being only consumers of traditional media. That’s why millions of people show strong desire to learn the methods and tools of digital content production and necessary communication skills. However, the booming interest in communication and interaction through online social networks and high level of eagerness to invent and implement the ways to participate in content production raise some privacy and security concerns. This presentation aims to open the assumed revolutionary, democratic and liberating nature of the online social media up for discussion by reviewing some recent political developments in Turkey. Firstly, the role of Internet and online social networks in mobilizing collective movements through social interactions and communications will be questioned. Secondly, some cases from Gezi and Okmeydanı Protests and also December 17-25 period will be presented in order to illustrate misinformation and manipulation in social media and violation of individual privacy through online social networks in order to damage social unity and stability contradictory to democratic nature of online social networking.

Keywords: online social media networks, democratic participation, social movements, social polarization, privacy of individuals, Turkey

Procedia PDF Downloads 341
25620 Perceived Risks in Business-to-Consumer Online Contracts: An Empirical Study in Saudi Arabia

Authors: Shaya Alshahrani

Abstract:

Perceived risks play a major role in consumer intentions, behaviors, attitudes, and decisions about online shopping in the KSA. This paper investigates the influence of six perceived risk dimensions on Saudi consumers: product risk, information risk, financial risk, privacy and security risk, delivery risk, and terms and conditions risk empirically. To ensure the success of this study, a random survey was distributed to reflect the consumers’ perceived risk and to enable the generalization of the results. Data were collected from 323 respondents in the Kingdom of Saudi Arabia (KSA): 50 who had never shopped online and 273 who had done so. The results indicated that all six risks influenced the respondents’ perceptions of online shopping. The non-online shoppers perceived financial and delivery risks as the most significant barriers to online shopping. This was followed closely by performance, information, and privacy and security risks. Terms and conditions were perceived as less significant. The online consumers considered delivery and performance risks to be the most significant influences on internet shopping. This was followed closely by information and terms and conditions. Financial and privacy and security risks were perceived as less significant. This paper argues that introducing adequate legal solutions to addressing related problems arising from this study is an urgent need. This may enhance consumer trust in the KSA online market, increase consumers’ intentions regarding online shopping, and improve consumer protection.

Keywords: perceived risk, online contracts, Saudi Arabia, consumer protection

Procedia PDF Downloads 148
25619 The Recording of Personal Data in the Spanish Criminal Justice System and Its Impact on the Right to Privacy

Authors: Deborah García-Magna

Abstract:

When a person goes through the criminal justice system, either as a suspect, arrested, prosecuted or convicted, certain personal data are recorded, and a wide range of persons and organizations may have access to it. The recording of data can have a great impact on the daily life of the person concerned during the period of time determined by the legislation. In addition, this registered information can refer to various aspects not strictly related directly to the alleged or actually committed infraction. In some areas, the Spanish legislation does not clearly determine the cancellation period of the registers nor what happens when they are cancelled since some of the files are not really erased and remain recorded, even if their consultation is no more allowed or it is stated that they should not be taken into account. Thus, access to the recorded data of arrested or convicted persons may reduce their possibilities of reintegration into society. In this research, some of the areas in which data recording has a special impact on the lives of affected persons are analyzed in a critical manner, taking into account Spanish legislation and jurisprudence, and the influence of the European Court of Human Rights, the Council of Europe and other supranational instruments. In particular, the analysis cover the scope of video-surveillance in public spaces, the police record, the recording of personal data for the purposes of police investigation (especially DNA and psychological profiles), the registry of administrative and minor offenses (especially as they are taken into account to impose aggravating circumstaces), criminal records (of adults, minors and legal entities), and the registration of special circumstances occurred during the execution of the sentence (files of inmates under special surveillance –FIES–, disciplinary sanctions, special therapies in prison, etc.).

Keywords: ECHR jurisprudence, formal and informal criminal control, privacy, disciplinary sanctions, social reintegration

Procedia PDF Downloads 144
25618 Survey on Data Security Issues Through Cloud Computing Amongst Sme’s in Nairobi County, Kenya

Authors: Masese Chuma Benard, Martin Onsiro Ronald

Abstract:

Businesses have been using cloud computing more frequently recently because they wish to take advantage of its advantages. However, employing cloud computing also introduces new security concerns, particularly with regard to data security, potential risks and weaknesses that could be exploited by attackers, and various tactics and strategies that could be used to lessen these risks. This study examines data security issues on cloud computing amongst sme’s in Nairobi county, Kenya. The study used the sample size of 48, the research approach was mixed methods, The findings show that data owner has no control over the cloud merchant's data management procedures, there is no way to ensure that data is handled legally. This implies that you will lose control over the data stored in the cloud. Data and information stored in the cloud may face a range of availability issues due to internet outages; this can represent a significant risk to data kept in shared clouds. Integrity, availability, and secrecy are all mentioned.

Keywords: data security, cloud computing, information, information security, small and medium-sized firms (SMEs)

Procedia PDF Downloads 84
25617 Big Data and Health: An Australian Perspective Which Highlights the Importance of Data Linkage to Support Health Research at a National Level

Authors: James Semmens, James Boyd, Anna Ferrante, Katrina Spilsbury, Sean Randall, Adrian Brown

Abstract:

‘Big data’ is a relatively new concept that describes data so large and complex that it exceeds the storage or computing capacity of most systems to perform timely and accurate analyses. Health services generate large amounts of data from a wide variety of sources such as administrative records, electronic health records, health insurance claims, and even smart phone health applications. Health data is viewed in Australia and internationally as highly sensitive. Strict ethical requirements must be met for the use of health data to support health research. These requirements differ markedly from those imposed on data use from industry or other government sectors and may have the impact of reducing the capacity of health data to be incorporated into the real time demands of the Big Data environment. This ‘big data revolution’ is increasingly supported by national governments, who have invested significant funds into initiatives designed to develop and capitalize on big data and methods for data integration using record linkage. The benefits to health following research using linked administrative data are recognised internationally and by the Australian Government through the National Collaborative Research Infrastructure Strategy Roadmap, which outlined a multi-million dollar investment strategy to develop national record linkage capabilities. This led to the establishment of the Population Health Research Network (PHRN) to coordinate and champion this initiative. The purpose of the PHRN was to establish record linkage units in all Australian states, to support the implementation of secure data delivery and remote access laboratories for researchers, and to develop the Centre for Data Linkage for the linkage of national and cross-jurisdictional data. The Centre for Data Linkage has been established within Curtin University in Western Australia; it provides essential record linkage infrastructure necessary for large-scale, cross-jurisdictional linkage of health related data in Australia and uses a best practice ‘separation principle’ to support data privacy and security. Privacy preserving record linkage technology is also being developed to link records without the use of names to overcome important legal and privacy constraint. This paper will present the findings of the first ‘Proof of Concept’ project selected to demonstrate the effectiveness of increased record linkage capacity in supporting nationally significant health research. This project explored how cross-jurisdictional linkage can inform the nature and extent of cross-border hospital use and hospital-related deaths. The technical challenges associated with national record linkage, and the extent of cross-border population movements, were explored as part of this pioneering research project. Access to person-level data linked across jurisdictions identified geographical hot spots of cross border hospital use and hospital-related deaths in Australia. This has implications for planning of health service delivery and for longitudinal follow-up studies, particularly those involving mobile populations.

Keywords: data integration, data linkage, health planning, health services research

Procedia PDF Downloads 216
25616 Modeling and Analysis of Drilling Operation in Shale Reservoirs with Introduction of an Optimization Approach

Authors: Sina Kazemi, Farshid Torabi, Todd Peterson

Abstract:

Drilling in shale formations is frequently time-consuming, challenging, and fraught with mechanical failures such as stuck pipes or hole packing off when the cutting removal rate is not sufficient to clean the bottom hole. Crossing the heavy oil shale and sand reservoirs with active shale and microfractures is generally associated with severe fluid losses causing a reduction in the rate of the cuttings removal. These circumstances compromise a well’s integrity and result in a lower rate of penetration (ROP). This study presents collective results of field studies and theoretical analysis conducted on data from South Pars and North Dome in an Iran-Qatar offshore field. Solutions to complications related to drilling in shale formations are proposed through systemically analyzing and applying modeling techniques to select field mud logging data. Field data measurements during actual drilling operations indicate that in a shale formation where the return flow of polymer mud was almost lost in the upper dolomite layer, the performance of hole cleaning and ROP progressively change when higher string rotations are initiated. Likewise, it was observed that this effect minimized the force of rotational torque and improved well integrity in the subsequent casing running. Given similar geologic conditions and drilling operations in reservoirs targeting shale as the producing zone like the Bakken formation within the Williston Basin and Lloydminster, Saskatchewan, a drill bench dynamic modeling simulation was used to simulate borehole cleaning efficiency and mud optimization. The results obtained by altering RPM (string revolution per minute) at the same pump rate and optimized mud properties exhibit a positive correlation with field measurements. The field investigation and developed model in this report show that increasing the speed of string revolution as far as geomechanics and drilling bit conditions permit can minimize the risk of mechanically stuck pipes while reaching a higher than expected ROP in shale formations. Data obtained from modeling and field data analysis, optimized drilling parameters, and hole cleaning procedures are suggested for minimizing the risk of a hole packing off and enhancing well integrity in shale reservoirs. Whereas optimization of ROP at a lower pump rate maintains the wellbore stability, it saves time for the operator while reducing carbon emissions and fatigue of mud motors and power supply engines.

Keywords: ROP, circulating density, drilling parameters, return flow, shale reservoir, well integrity

Procedia PDF Downloads 86
25615 The Impact of Cryptocurrency Classification on Money Laundering: Analyzing the Preferences of Criminals for Stable Coins, Utility Coins, and Privacy Tokens

Authors: Mohamed Saad, Huda Ismail

Abstract:

The purpose of this research is to examine the impact of cryptocurrency classification on money laundering crimes and to analyze how the preferences of criminals differ according to the type of digital currency used. Specifically, we aim to explore the roles of stablecoins, utility coins, and privacy tokens in facilitating or hindering money laundering activities and to identify the key factors that influence the choices of criminals in using these cryptocurrencies. To achieve our research objectives, we used a dataset for the most highly traded cryptocurrencies (32 currencies) that were published on the coin market cap for 2022. In addition to conducting a comprehensive review of the existing literature on cryptocurrency and money laundering, with a focus on stablecoins, utility coins, and privacy tokens, Furthermore, we conducted several Multivariate analyses. Our study reveals that the classification of cryptocurrency plays a significant role in money laundering activities, as criminals tend to prefer certain types of digital currencies over others, depending on their specific needs and goals. Specifically, we found that stablecoins are more commonly used in money laundering due to their relatively stable value and low volatility, which makes them less risky to hold and transfer. Utility coins, on the other hand, are less frequently used in money laundering due to their lack of anonymity and limited liquidity. Finally, privacy tokens, such as Monero and Zcash, are increasingly becoming a preferred choice among criminals due to their high degree of privacy and untraceability. In summary, our study highlights the importance of understanding the nuances of cryptocurrency classification in the context of money laundering and provides insights into the preferences of criminals in using digital currencies for illegal activities. Based on our findings, our recommendation to the policymakers is to address the potential misuse of cryptocurrencies for money laundering. By implementing measures to regulate stable coins, strengthening cross-border cooperation, fostering public-private partnerships, and increasing cooperation, policymakers can help prevent and detect money laundering activities involving digital currencies.

Keywords: crime, cryptocurrency, money laundering, tokens.

Procedia PDF Downloads 87
25614 Evolving Jurisprudence of Rape Laws in India: A Study of Last One Decade

Authors: Drutika Upadhyay

Abstract:

Rape is one of the most heinous crimes committed against the body of a woman violating her privacy and dignity. The Right to Privacy and the Right to Live with Dignity constitute the very essence of the Right to Life and Personal Liberty, a Fundamental Right guaranteed under Article 21 of the Indian Constitution. The study is conducted with the primary objective of analyzing the efficacy of rape laws in India. The study begins by explaining the origin, meaning, and kinds of rape recognised under Indian jurisprudence. Further, it explains various statutory and penal provisions relating to rape and the loopholes in such provisions. It focuses on the procedure followed during investigation and trial and also aims at developing an understanding of the rights of the victim and the sentence in cases of rape. The study also throws some light upon the amendments made to the criminal law and the recommendations of the Law Commission of India to meet the demands of the changing criminal justice delivery system. The outcome of the study suggests that the laws relating to rape have proved to be a major failure owing to the lack of proper implementation. Also, the lack of education among the masses leads to gender biasness, which is the ultimate cause for the commission of such crime. At last, the author concludes that the present criminal law system of the country contains various lacunae that need to be filled in so as to make the criminal justice system more stringent. Further, the scope of the definition of ‘rape’ needs to be widened in order to include such other acts of non-consensual and sexual nature that are currently not included in the definition. The author has adopted a non-doctrinal and analytical approach and relied upon the secondary sources of data for the purpose of the study. The scope of the study is limited to the crime committed against women.

Keywords: amendment, criminal law, fundamental right, personal liberty, privacy, rape

Procedia PDF Downloads 130
25613 Challenges in Multi-Cloud Storage Systems for Mobile Devices

Authors: Rajeev Kumar Bedi, Jaswinder Singh, Sunil Kumar Gupta

Abstract:

The demand for cloud storage is increasing because users want continuous access their data. Cloud Storage revolutionized the way how users access their data. A lot of cloud storage service providers are available as DropBox, G Drive, and providing limited free storage and for extra storage; users have to pay money, which will act as a burden on users. To avoid the issue of limited free storage, the concept of Multi Cloud Storage introduced. In this paper, we will discuss the limitations of existing Multi Cloud Storage systems for mobile devices.

Keywords: cloud storage, data privacy, data security, multi cloud storage, mobile devices

Procedia PDF Downloads 699
25612 Ethically Integrating Robots to Assist Elders and Patients with Dementia

Authors: Suresh Lokiah

Abstract:

The emerging trend of integrating robots into elderly care, particularly for assisting patients with dementia, holds the potential to greatly transform the sector. Assisted living facilities, which house a significant number of elderly individuals and dementia patients, constantly strive to engage their residents in stimulating activities. However, due to staffing shortages, they often rely on volunteers to introduce new activities. Despite the availability of social interaction, these residents, frequently overlooked in society, are in desperate need of additional support. Robots designed for elder care are categorized based on their design and functionality. These categories include companion robots, telepresence robots, health monitoring robots, and rehab robots. However, the integration of such robots raises significant ethical concerns, notably regarding privacy, autonomy, and the risk of dehumanization. Privacy issues arise as these robots may need to continually monitor patient activities. There is also a risk of patients becoming overly dependent on these robots, potentially undermining their autonomy. Furthermore, the replacement of human touch with robotic interaction may lead to the dehumanization of care. This paper delves into the ethical considerations of incorporating robotic assistance in eldercare. It proposes a series of guidelines and strategies to ensure the ethical deployment of these robots. These guidelines suggest involving patients in the design and development process of the robots and emphasize the critical need for human oversight to respect the dignity and rights of the elderly and dementia patients. The paper also recommends implementing robust privacy measures, including secure data transmission and data anonymization. In conclusion, this paper offers a thorough examination of the ethical implications of using robotic assistance in elder care. It provides a strategic roadmap to ensure this technology is utilized ethically, thereby maximizing its potential benefits and minimizing any potential harm.

Keywords: human-robot interaction, robots for eldercare, ethics, health, dementia

Procedia PDF Downloads 99
25611 Analyses for Primary Coolant Pump Coastdown Phenomena for Jordan Research and Training Reactor

Authors: Yazan M. Alatrash, Han-ok Kang, Hyun-gi Yoon, Shen Zhang, Juhyeon Yoon

Abstract:

Flow coastdown phenomena are very important to secure nuclear fuel integrity during loss of off-site power accidents. In this study, primary coolant flow coastdown phenomena are investigated for the Jordan Research and Training Reactor (JRTR) using a simulation software package, Modular Modelling System (MMS). Two MMS models are built. The first one is a simple model to investigate the characteristics of the primary coolant pump only. The second one is a model for a simulation of the Primary Coolant System (PCS) loop, in which all the detailed design data of the JRTR PCS system are modelled, including the geometrical arrangement data. The same design data for a PCS pump are used for both models. Coastdown curves obtained from the two models are compared to study the PCS loop coolant inertia effect on a flow coastdown. Results showed that the loop coolant inertia effect is found to be small in the JRTR PCS loop, i.e., about one second increases in a coastdown half time required to halve the coolant flow rate. The effects of different flywheel inertia on the flow coastdown are also investigated. It is demonstrated that the coastdown half time increases with the flywheel inertia linearly. The designed coastdown half time is proved to be well above the design requirement for the fuel integrity.

Keywords: flow coastdown, loop inertia, modelling, research reactor

Procedia PDF Downloads 502
25610 Mobile Agent Security Using Reference Monitor Based Security Framework

Authors: Sandhya Armoogum

Abstract:

In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially hostile hosts. Mobile code such as a mobile agent is vulnerable when executing on remote hosts. The mobile agent may be subjected to various attacks such as tampering, inspection, and replay attack by a malicious host. Much research has been done to provide solutions for various security problems, such as authentication of mobile agent and hosts, integrity and confidentiality of the data carried by the mobile agent. Many of such proposed solutions in literature are not suitable for open systems whereby the mobile code arrives and executes on a host which is not known and trusted by the mobile agent owner. In this paper, we propose the adoption of the reference monitor by hosts in an open system for providing trust and security for mobile code execution. A secure protocol for the distribution of the reference monitor entity is described. This reference monitor entity on the remote host may also provide several security services such as authentication and integrity to the mobile code.

Keywords: security, mobile agents, reference monitor, trust

Procedia PDF Downloads 440
25609 Increasing Number of NGOs and Their Conduct: A Case Study of Far Western Region of Nepal

Authors: Raju Thapa

Abstract:

Non-Governmental Organizations (NGOs) are conducting activities in Nepal with the overall objective to strengthen peace, progress and prosperity in the society. Based on the research objectives, this study has tried to trace out the reasons behind massive growth of NGOs and the trends that have shaped the handling and functioning of NGOs in the Kailali district. The outcomes of this research are quite embarrassing for NGOs officials. Based on the findings of this research, NGOs are expected to review their guiding principal, integrity and conduct for the betterment of the society.

Keywords: NGO, trends, increasing, conduct, integrity, guiding principle, legal, governance, human resources, public trust, financial, collaboration, networking

Procedia PDF Downloads 412
25608 The Main Steamline Break Transient Analysis for Advanced Boiling Water Reactor Using TRACE, PARCS, and SNAP Codes

Authors: H. C. Chang, J. R. Wang, A. L. Ho, S. W. Chen, J. H. Yang, C. Shih, L. C. Wang

Abstract:

To confirm the reactor and containment integrity of the Advanced Boiling Water Reactor (ABWR), we perform the analysis of main steamline break (MSLB) transient by using the TRACE, PARCS, and SNAP codes. The process of the research has four steps. First, the ABWR nuclear power plant (NPP) model is developed by using the above codes. Second, the steady state analysis is performed by using this model. Third, the ABWR model is used to run the analysis of MSLB transient. Fourth, the predictions of TRACE and PARCS are compared with the data of FSAR. The results of TRACE/PARCS and FSAR are similar. According to the TRACE/PARCS results, the reactor and containment integrity of ABWR can be maintained in a safe condition for MSLB.

Keywords: advanced boiling water reactor, TRACE, PARCS, SNAP

Procedia PDF Downloads 207
25607 Nordic Study on Public Acceptance of Drones

Authors: Virpi Oksman

Abstract:

Drones are new phenomenon in public spaces. Adoption of this kind of new technologies requires public acceptance. Drones and other unmanned aerial systems may have various impacts on people’s living environments, and the public is exposed to possible disadvantages of drones. Public acceptance may be expressed as positive or negative attitude by majority of the citizens towards the new technology or service or as rapid adoption of it in everyday life. In various parts of the globe, in cities and in rural areas, drones as emerging technologies are perceived quite differently. Public acceptance studies of drones have been conducted mostly in highly urbanized environments like in Singapore and in European cities. This paper presents results of a Nordic survey study (N=1000) conducted in Sweden and in Finland. The survey aims at understanding the level of acceptance of different uses of drones in public spaces and the main concerns and benefits related to emerging UAM technologies. The study shows that even though the general attitude towards drones is quite positive, privacy and safety, and noise levels are the main concerns by Nordic citizens. Also, for what purpose and by whom the drones are operated affects the acceptability significantly. The study concludes, that there is need for regulations that safeguard public interests. In addition, considering privacy in design, and quiet environmentally friendly drones support public acceptance of drones.

Keywords: public acceptance, privacy, safety, survey

Procedia PDF Downloads 166
25606 A Study of New Window Typology for Palestinian Residential Building for More Sustainable Building

Authors: Nisreen Ardda

Abstract:

Fenestrations are one of the main building envelope elements that play an important role in home social-ecological l factors. They play a vital role in providing natural lighting and ventilation, visual, thermal, and acoustical comfort, and also provide weather-tightness, privacy, a feeling of openness. In most home buildings, fenestrations are controlled manually by the occupants, which significantly impacts occupants' comfort and energy use. Culture plays a central role in the Palestinians window operation behavior. Improved windows design that provides the desired privacy while maintaining the appropriate function of fenestration (natural lighting, thermal comfort, and visual openness) is becoming a necessity. Therefore, this paper proposes a window typology to achieve the social and environmental factors in residential buildings in the West Bank. The window typology and reference building were designed in Rivet 2021, and natural ventilation was carried out in Design Builder 4.3.0.039. The results showed that the proposed typology provides the desired privacy and the feeling of openness without compromising natural ventilation as the existing window did.

Keywords: window design, passive design, sustainable built environment, building material

Procedia PDF Downloads 186
25605 Enhancing National Integrity through Teaching Secular Perspectives in Medieval Indian History Curricula: A Secular Paradigms

Authors: Deepak Deshpande, Vikas Minchekar

Abstract:

Day by day in modern India communal forces became stronger and stronger. Each and every caste group trying to show their strength through massive marches. Such kind of marches or ralliesruinous national integrity in India. To test this assumption present investigation has been carried out. This research was undertaken by using survey techniques. The study has been carried out in two phases. In the first stage, the students’ attitudes were collected while in the second phase the views of the members of the historical association were collected. The social dominance orientation scale and sources of social dominance inventory have been administered on 200 college students belonging to Maratha caste. Analyzed data revealed ahigh level of social dominance in Maratha caste students. Approximately, 80 percent students have reported that they have learned such dominance from the medieval history. The other sources disappear very less prominent. These results and present Indian social situation have been communicated with the members of the historical association of India. The majority members of this association agreed with this reality. The consensus also received on that Maratha caste person experiencing dominance due to the misinterpretation of the King Shivaji Empire; synchronize by politicians. The survey monkey app was used through electronic mail to collect the views on ‘The attitude towards the modification of curricula questionnaire’. The maximum number of members of the historical association agreed to employ to teach the medieval Indian history accordingly the secular perspectives.

Keywords: social dominance orientation, secular perceptive, national integrity, Maratha caste and medieval Indian history

Procedia PDF Downloads 259
25604 Gonadotoxic and Cytotoxic Effect of Induced Obesity via Monosodium Glutamate on Mus musculus Testis Cytoarchitecture and Sperm Parameter

Authors: I. Nur Hilwani, R. Nasibah, S. Nurdiana, M. J. Norashirene

Abstract:

Impaired fertility may be the result of indirect consumption of anti-fertility agents through food. Monosodium glutamate (MSG) has been widely used as food additive, flavour enhancer and included in vaccines. This study focuses in determining the gonadotoxic and cytotoxic effect of MSG on selected sperm parameters such as sperm viability, sperm membrane integrity and testes cytoarchitecture of male mice via histological examination to determine its effect on spermatogenesis. Twenty-four Mus musculus were randomly divided into 4 groups and given intraperitoneal injections (IP) daily for 14 days of different MSG concentrations at 250, 500 and 1000mg/kg MSG to body weight to induce obesity. Saline was given to control group. Mice were sacrificed and analysis revealed abnormalities in values for sperm parameters and damages to testes cytoarchitecture of male mice. The results recorded decreased viability (p<0.05) and integrity of sperm membrane (p>0.05) with degenerative structures in seminiferous tubule of testes. The results indicated various implications of MSG on male mice reproductive system which has consequences in fertility potential.

Keywords: sperm parameter, testes histology, sperm viability, sperm membrane integrity

Procedia PDF Downloads 347
25603 Exfoliation of Functionalized High Structural Integrity Graphene Nanoplatelets at Extremely Low Temperature

Authors: Mohannad N. H. Al-Malichi

Abstract:

Because of its exceptional properties, graphene has become the most promising nanomaterial for the development of a new generation of advanced materials from battery electrodes to structural composites. However, current methods to meet requirements for the mass production of high-quality graphene are limited by harsh oxidation, high temperatures, and tedious processing steps. To extend the scope of the bulk production of graphene, herein, a facile, reproducible and cost-effective approach has been developed. This involved heating a specific mixture of chemical materials at an extremely low temperature (70 C) for a short period (7 minutes) to exfoliate functionalized graphene platelets with high structural integrity. The obtained graphene platelets have an average thickness of 3.86±0.71 nm and a lateral size less than ~2 µm with a low defect intensity ID/IG ~0.06. The thin film (~2 µm thick) exhibited a low surface resistance of ~0.63 Ω/sq⁻¹, confirming its high electrical conductivity. Additionally, these nanoplatelets were decorated with polar functional groups (epoxy and carboxyl groups), thus have the potential to toughen and provide multifunctional polymer nanocomposites. Moreover, such a simple method can be further exploited for the novel exfoliation of other layered two-dimensional materials such as MXenes.

Keywords: functionalized graphene nanoplatelets, high structural integrity graphene, low temperature exfoliation of graphene, functional graphene platelets

Procedia PDF Downloads 120
25602 Anti-Corruption, an Important Challenge for the Construction Industry!

Authors: Ahmed Stifi, Sascha Gentes, Fritz Gehbauer

Abstract:

The construction industry is perhaps one of the oldest industry of the world. The ancient monuments like the egyptian pyramids, the temples of Greeks and Romans like Parthenon and Pantheon, the robust bridges, old Roman theatres, the citadels and many more are the best testament to that. The industry also has a symbiotic relationship with other . Some of the heavy engineering industry provide construction machineries, chemical industry develop innovative construction materials, finance sector provides fund solutions for complex construction projects and many more. Construction Industry is not only mammoth but also very complex in nature. Because of the complexity, construction industry is prone to various tribulations which may have the propensity to hamper its growth. The comparitive study of this industry with other depicts that it is associated with a state of tardiness and delay especially when we focus on the managerial aspects and the study of triple constraint (time, cost and scope). While some institutes says the complexity associated with it as a major reason, others like lean construction, refers to the wastes produced across the construction process as the prime reason. This paper introduces corruption as one of the prime factors for such delays.To support this many international reports and studies are available depicting that construction industry is one of the most corrupt sectors worldwide, and the corruption can take place throught the project cycle comprising project selection, planning, design, funding, pre-qualification, tendering, execution, operation and maintenance, and even through the reconstrction phase. It also happens in many forms such as bribe, fraud, extortion, collusion, embezzlement and conflict of interest and the self-sufficient. As a solution to cope the corruption in construction industry, the paper introduces the integrity as a key factor and build a new integrity framework to develop and implement an integrity management system for construction companies and construction projects.

Keywords: corruption, construction industry, integrity, lean construction

Procedia PDF Downloads 377
25601 The Admissibility of Evidence Obtained in Contravention of the Right to Privacy in a Criminal Trial: A Comparative Study of Poland and Germany

Authors: Konstancja Syller

Abstract:

International law and European regulations remain hardly silent about the admissibility of evidence obtained illegally in a criminal trial. However, Article 6 of the European Convention on Human Rights guarantees the right to a fair trial, it does not normalise a proceeding status of specified sources or means of proof outright. Therefore, it is the preserve of national legislation and national law enforcement authorities to decide on this matter. In most countries, especially in Germany and Poland, a rather complex normative approach to the issue of proof obtained in violation of the right to privacy is evident, which pursues in practise to many interpretive doubts. In Germany the jurisprudence has a significant impact within the range of the matter mentioned above. The Constitutional Court and the Supreme Court of Germany protect the right to privacy quite firmly - they ruled on inadmissibility of obtaining a proof in the form of a diary or a journal as a protection measure of constitutional guaranteed right. At the same time, however, the Supreme Court is not very convinced with reference to the issue of whether materials collected as a result of an inspection, call recordings or listening to the premises, which were carried out in breach of law, can be used in a criminal trial. Generally speaking, German courts indicate a crucial importance of the principle of Truth and the principle of proportionality, which both enable a judgement to be made as to the possibility of using an evidence obtained unlawfully. Comparing, in Poland there is almost no jurisprudence of the Constitutional Tribunal relating directly to the issue of illegal evidence. It is somehow surprising, considering the doctrinal analysis of the admissibility of using such proof in a criminal trial is performed in relation to standards resulted from the Constitution. Moreover, a crucial de lega lata legal provision, which enables allowing a proof obtained in infringement of the provisions in respect of criminal proceedings or through a forbidden act, is widely criticised within the legal profession ant therefore many courts give it their own interpretation at odds with legislator’s intentions. The comparison of two civil law legal systems’ standards regarding to the admissibility of an evidence obtained in contravention of the right to privacy in a criminal trial, taking also into account EU legislation and judicature, is the conclusive aim of this article.

Keywords: criminal trial, evidence, Germany, right to privacy, Poland

Procedia PDF Downloads 156