Search results for: security safe
2376 Blind Hybrid ARQ Retransmissions with Different Multiplexing between Time and Frequency for Ultra-Reliable Low-Latency Communications in 5G
Authors: Mohammad Tawhid Kawser, Ishrak Kabir, Sadia Sultana, Tanjim Ahmad
Abstract:
A promising service category of 5G, popularly known as Ultra-Reliable Low-Latency Communications (URLLC), is devoted to providing users with the staunchest fail-safe connections in the splits of a second. The reliability of data transfer, as offered by Hybrid ARQ (HARQ), should be employed as URLLC applications are highly error-sensitive. However, the delay added by HARQ ACK/NACK and retransmissions can degrade performance as URLLC applications are highly delay-sensitive too. To improve latency while maintaining reliability, this paper proposes the use of blind transmissions of redundancy versions exploiting the frequency diversity of wide bandwidth of 5G. The blind HARQ retransmissions proposed so far consider narrow bandwidth cases, for example, dedicated short range communication (DSRC), shared channels for device-to-device (D2D) communication, etc., and thus, do not gain much from the frequency diversity. The proposal also combines blind and ACK/NACK based retransmissions for different multiplexing options between time and frequency depending on the current radio channel quality and stringency of latency requirements. The wide bandwidth of 5G justifies that the proposed blind retransmission, without waiting for ACK/NACK, is not palpably extravagant. A simulation is performed to demonstrate the improvement in latency of the proposed scheme.Keywords: 5G, URLLC, HARQ, latency, frequency diversity
Procedia PDF Downloads 452375 Spatial Optimization of Riverfront Street Based on Inclusive Design
Authors: Lianxue Shi
Abstract:
Riverfront street has the dual characteristics of street space and waterfront space, which is not only a vital place for residents to travel and communicate but also a high-frequency space for people's leisure and entertainment. However, under the development of cities and towns pursuing efficiency, riverfront streets appear to have a variety of problems, such as a lack of multifunctionality, insufficient facilities, and loss of characteristics, which fail to meet the needs of various groups of people, and their inclusiveness is facing a great challenge. It is, therefore, evident that the optimization of riverfront street space from an inclusivity perspective is important to the establishment of a human-centered, high-quality urban space. Therefore, this article starts by exploring the interactive relationship between inclusive design and street space. Based on the analysis of the characteristics of the riverfront street space and people's needs, it proposes the four inclusive design orientations of natural inclusion, group inclusion, spatial inclusion, and social inclusion. It then constructs a design framework for the inclusive optimization of riverfront street space, aiming to create streets that are “safe and accessible, diverse and shared, distinctive and friendly, green and sustainable”. Riverfront streets in Wansheng District, Chongqing, are selected as a practice case, and specific strategies are put forward in four aspects: the creation of an accessible slow-traffic system, the provision of diversified functional services, the reshaping of emotional bonds and the integration of ecological spaces.Keywords: inclusiveness design, riverfront street, spatial optimization, street spaces
Procedia PDF Downloads 402374 Oxygenation in Turbulent Flows over Block Ramps
Authors: Thendiyath Roshni, Stefano Pagliara
Abstract:
Block ramps (BR) or rock chutes are eco-friendly natural river restoration structures. BR are made of ramp of rocks and flows over BR develop turbulence and helps in the entrainment of ambient air. These act as natural aerators in river flow and therefore leads to oxygenation of water. As many of the hydraulic structures in rivers, hinders the natural path for aquatic habitat. However, flows over BR ascertains a natural rocky flow and ensures safe and natural movement for aquatic habitat. Hence, BR is considered as a better alternative for drop structures. As water quality is concerned, turbulent and aerated flows over BR or macro-roughness conditions improves aeration and thereby oxygenation. Hence, the objective of this paper is to study the oxygenation in the turbulent flows over BR. Experimental data were taken for a slope (S) of 27.5% for three discharges (Q = 9, 15 and 21 lps) conditions. Air concentration were measured with the help of air concentration probe for three different discharges in the uniform flow region. Oxygen concentration is deduced from the air concentration as ambient air is entrained in the flows over BR. Air concentration profiles and oxygen profiles are plotted in the uniform flow region for three discharges and found that air concentration and oxygen concentration does not show any remarkable variation in properties in the longitudinal profile in uniform flow region. An empirical relation is developed for finding the average oxygen concentration (Oₘ) for S = 27.5% in the uniform flow region for 9 < Q < 21 lps. The results show that as the discharge increases over BR, there is a reduction of oxygen concentration in the uniform flow region.Keywords: aeration, block ramps, oxygenation, turbulent flows
Procedia PDF Downloads 1802373 Facial Partial Unilateral Lentiginosis Treated with Low-Fluence Q-Switched 1,064-Nm Neodymium-Doped Yttrium Aluminum Garnet Laser
Authors: En Hyung Kim
Abstract:
Partial unilateral lentiginosis (PUL) is an unusual pigmentary disorder characterized by numerous lentigines grouped within an area of normal skin. Although treatment is not necessary, many patients with facial PUL seek medical help for cosmetic reasons. There is no established standard treatment for PUL. Conventional lasers may cause postinflammatory hyperpigmentation because keratinocytes are injured during the process. Also scarring, long downtime and pain are important issues. Case: A 19-year-old patient with facial PUL was treated with 1064-nm Q-Switched Neodymium-Doped Yttrium Aluminum Garnet (QS Nd:YAG) laser. The patient was treated at one-week intervals starting with a spot size of 6 mm, a fluence of 2.5 J/cm2 and a pulse rate of 10 Hz with 1-2 passes of slow sliding technique with approximately 5-15 % overlap. The fluence was elevated to 3 J/cm2 after the 4th session according to treatment response and patient tolerance. After 10 treatment sessions the lesions were remarkably improved. Discussion: Although the exact mechanism by which low fluence 1,064-nm QS Nd:YAG laser improves pigmentary lesions is unclear, the term ‘subcellular selective photothermolysis’ and ‘melanocyte apoptosis and replacement’ have been proposed. If appropriate measures are taken to monitor patient response during and after the procedure, low fluence 1064-nm QS Nd:YAG laser may achieve good cosmetic result in the treatment of PUL with a very safe and effective profile.Keywords: laser toning, low fluence, 1064-nm Q-switched neodymium-doped yttrium aluminum garnet laser, partial unilateral lentiginosis
Procedia PDF Downloads 2342372 Central Palmar Necrosis Following Steroid Injections for the Treatment of Carpal Tunnel Syndrome: A Case Report
Authors: M. Ridwanul Hassan, Samuel George
Abstract:
Aims: Steroid injections are commonly used as a diagnostic tool or an alternative to surgical management of carpal tunnel syndrome (CTS) and are generally safe. Ischaemia is a rare complication with very few cases reported in the literature. Methods: We report a case of a 50-year-old female that presented with a necrotic wound to her left palm one month after a steroid injection into the carpal tunnel. She had a 2-year history of CTS in her left hand that was treated with six previous steroid injections in primary care during this period. The wound evolved from a blister to a necrotic ulcer which led to a painful, hollow defect in the centre of her palm. She did not report any history of trauma, nor did she have any co-morbidities. Clinical photographs were taken. Results: On examination, she had a 0.5 cmx1 cm defect in the palm of her left hand down to aponeurosis. There was purulent discharge in the wound with surrounding erythema but no spreading cellulitis. She had full function of her fingers but was very tender on movements and at rest. She was admitted for intravenous antibiotics and underwent a debridement, washout, and carpal tunnel release the next day. The defect was packed to heal by secondary intention and has now fully healed one month following her operation. Conclusions: This is an extremely rare complication of steroid injections to the carpal tunnel and may have been avoided by earlier referral for surgery rather than treatment using multiple steroid injections.Keywords: hand surgery, complication, rare, carpal tunnel syndrome
Procedia PDF Downloads 1152371 Role of Social Workers in Juvenile Justice Board as a Child Protection Mechanism for Children in Conflict with Law
Authors: Ida D. Souza, Lena Ashok
Abstract:
Every child has a fundamental right to be protected and it is only a safe, supported child who can effectively cope with difficult circumstances and lead a happy childhood. The vulnerability of children has increased due to emerging lifestyles, raising cost of living, higher expectations from adults, parental and care-giver stress /burn-out and a general raise in demand for services for children. A major area of concern is the rise of juvenile crimes in the overall crimes committed in the country. The UNCRC 1989 and JJ Act 2000 enables the structures to handle the juvenile children in care and concern in its real terms. One of the mechanisms to protect the children is the JJB a justice system. The aim is to hold a child culpable (guilty) for offence they committed, not through punishment, but counseling the child to understand their actions and persuade them away from such deviated activities in the future. The JJB consists of two social workers and a judicial magistrate and one of whom should be a woman. This study aims at understanding the role of social workers in best practices in deciding the best course of action for the rehabilitation of the child. Two case studies were carried out through in-depth interviews with the social worker member of the JJB of two Udupi and Mangalore districts. The best practices reported in which children are being allowed to express themselves in a child friendly environment and in the best interest of the child. The study highlighted team work to be very effective in understanding the child in their reformation.Keywords: child protection, best practices, juvenile justice, reformation teamwork
Procedia PDF Downloads 3652370 Fire Performance of Fly Ash Concrete with Pre-Fire Load
Authors: Kunjie Fan
Abstract:
Fly ash has been widely used as supplemental cementitious material in concrete for decades, especially in the ready-mixed concrete industry. Addition of fly ash not only brings economic and environmental benefits but also improves the engineering properties of concrete. It is well known that the pre-fire load has significant impacts on mechanical properties of concrete at high temperatures, however, the fire performance of stressed fly ash concrete is still not clear. Therefore, an apparatus was specially designed for testing “hot” mechanical properties of fly ash concrete with different heating-loading regimes. Through the experimental research, the mechanical properties, including compressive strength, peak strain, elastic modulus, complete stress-strain relationship, and transient thermal creep of fly ash concrete under uniaxial compression at elevated temperatures, have been investigated. It was found that the compressive strength and the elastic modulus increase with the load level, while the peak strain decreases with the applied stress level. In addition, 25% replacement of OPC with FA in the concrete mitigated the deterioration of the compressive strength, the development of transient thermal creep, and the nonlinearity of stress-strain response at elevated temperatures but hardly influenced the value of the elastic modulus and the peak strain. The applicability of Eurocode EN1992-1-2 to normal strength concrete with 25% replacement of fly ash has been verified to be safe. Based on the experimental analysis, an advanced constitutive model for stressed fly ash concrete at high temperatures was proposed.Keywords: fire performance, fly ash concrete, pre-fire load, mechanical properties, transient thermal creep
Procedia PDF Downloads 902369 Effects of Reversible Watermarking on Iris Recognition Performance
Authors: Andrew Lock, Alastair Allen
Abstract:
Fragile watermarking has been proposed as a means of adding additional security or functionality to biometric systems, particularly for authentication and tamper detection. In this paper we describe an experimental study on the effect of watermarking iris images with a particular class of fragile algorithm, reversible algorithms, and the ability to correctly perform iris recognition. We investigate two scenarios, matching watermarked images to unmodified images, and matching watermarked images to watermarked images. We show that different watermarking schemes give very different results for a given capacity, highlighting the importance of investigation. At high embedding rates most algorithms cause significant reduction in recognition performance. However, in many cases, for low embedding rates, recognition accuracy is improved by the watermarking process.Keywords: biometrics, iris recognition, reversible watermarking, vision engineering
Procedia PDF Downloads 4632368 The Importance of Downstream Supply Chain in Supply Chain Risk Management: Multi-Objective Optimization
Authors: Zohreh Khojasteh-Ghamari, Takashi Irohara
Abstract:
One of the efficient ways in supply chain risk management is avoiding the interruption in Supply Chain (SC) before it occurs. Although the majority of the organizations focus on their first-tier suppliers to avoid risk in the SC, studies show that in only 60 percent of the disruption cases the reason is first tier suppliers. In the 40 percent of the SC disruptions, the reason is downstream SC, which is the second tier and lower. Due to the increasing complexity and interrelation of modern supply chains, the SC elements have become difficult to trace. Moreover, studies show that there is a vital need to better understand the integration of risk and visibility, especially in the context of multiple objectives. In this study, we propose a multi-objective programming model to avoid disruption in SC. The objective of this study is evaluating the effect of downstream SCV on managing supply chain risk. We propose a multi-objective mathematical programming model with the objective functions of minimizing the total cost and maximizing the downstream supply chain visibility (SCV). The decision variable is supplier selection. We assume there are several manufacturers and several candidate suppliers. For each manufacturer, our model proposes the best suppliers with the lowest cost and maximum visibility in downstream supply chain. We examine the applicability of the model by numerical examples. We also define several scenarios for datasets and observe the tendency. The results show that minimum visibility in downstream SC is needed to have a safe SC network.Keywords: downstream supply chain, optimization, supply chain risk, supply chain visibility
Procedia PDF Downloads 2482367 Convention Refugees in New Zealand: Being Trapped in Immigration Limbo without the Right to Obtain a Visa
Authors: Saska Alexandria Hayes
Abstract:
Multiple Convention Refugees in New Zealand are stuck in a state of immigration limbo due to a lack of defined immigration policies. The Refugee Convention of 1951 does not give the right to be issued a permanent right to live and work in the country of asylum. A gap in New Zealand's immigration law and policy has left Convention Refugees without the right to obtain a resident or temporary entry visa. The significant lack of literature on this topic suggests that the lack of visa options for Convention Refugees in New Zealand is a widely unknown or unacknowledged issue. Refugees in New Zealand enjoy the right of non-refoulement contained in Article 33 of the Refugee Convention 1951, whether lawful or unlawful. However, a number of rights contained in the Refugee Convention 1951, such as the right to gainful employment and social security, are limited to refugees who maintain lawful immigration status. If a Convention Refugee is denied a resident visa, the only temporary entry visa a Convention Refugee can apply for in New Zealand is discretionary. The appeal cases heard at the Immigration Protection Tribunal establish that Immigration New Zealand has declined resident and discretionary temporary entry visa applications by Convention Refugees for failing to meet the health or character immigration instructions. The inability of a Convention Refugee to gain residency in New Zealand creates a dependence on the issue of discretionary temporary entry visas to maintain lawful status. The appeal cases record that this reliance has led to Convention Refugees' lawful immigration status being in question, temporarily depriving them of the rights contained in the Refugee Convention 1951 of lawful refugees. In one case, the process of applying for a discretionary temporary entry visa led to a lawful Convention Refugee being temporarily deprived of the right to social security, breaching Article 24 of the Refugee Convention 1951. The judiciary has stated a constant reliance on the issue of discretionary temporary entry visas for Convention Refugees can lead to a breach of New Zealand's international obligations under Article 7 of the International Covenant on Civil and Political Rights. The appeal cases suggest that, despite successful judicial proceedings, at least three persons have been made to rely on the issue of discretionary temporary entry visas potentially indefinitely. The appeal cases establish that a Convention Refugee can be denied a discretionary temporary entry visa and become unlawful. Unlawful status could ultimately breach New Zealand's obligations under Article 33 of the Refugee Convention 1951 as it would procedurally deny Convention Refugees asylum. It would force them to choose between the right of non-refoulement or leaving New Zealand to seek the ability to access all the human rights contained in the Universal Declaration of Human Rights elsewhere. This paper discusses how the current system has given rise to these breaches and emphasizes a need to create a designated temporary entry visa category for Convention Refugees.Keywords: domestic policy, immigration, migration, New Zealand
Procedia PDF Downloads 1082366 Interoperable Platform for Internet of Things at Home Applications
Authors: Fabiano Amorim Vaz, Camila Gonzaga de Araujo
Abstract:
With the growing number of personal devices such as smartphones, tablets, smart watches, among others, in addition to recent devices designed for IoT, it is observed that residential environment has potential to generate important information about our daily lives. Therefore, this work is focused on showing and evaluating a system that integrates all these technologies considering the context of a smart house. To achieve this, we define an architecture capable of supporting the amount of data generated and consumed at a residence and, mainly, the variety of this data presents. We organize it in a particular cloud containing information about robots, recreational vehicles, weather, in addition to data from the house, such as lighting, energy, security, among others. The proposed architecture can be extrapolated to various scenarios and applications. Through the core of this work, we can define new functionality for residences integrating them with more resources.Keywords: cloud computing, IoT, robotics, smart house
Procedia PDF Downloads 3842365 Real-Time Water Quality Monitoring and Control System for Fish Farms Based on IoT
Authors: Nadia Yaghoobi, Seyed Majid Esmaeilzadeh
Abstract:
Due to advancements in wireless communication, new sensor capabilities have been created. In addition to the automation industry, the Internet of Things (IoT) has been used in environmental issues and has provided the possibility of communication between different devices for data collection and exchange. Water quality depends on many factors which are essential for maintaining the minimum sustainability of water. Regarding the great dependence of fishes on the quality of the aquatic environment, water quality can directly affect their activity. Therefore, monitoring water quality is an important issue to consider, especially in the fish farming industry. The conventional method of water quality testing is to collect water samples manually and send them to a laboratory for testing and analysis. This time-consuming method is a waste of manpower and is not cost-effective. The water quality measurement system implemented in this project monitors water quality in real-time through various sensors (parameters: water temperature, water level, dissolved oxygen, humidity and ambient temperature, water turbidity, PH). The Wi-Fi module, ESP8266, transmits data collected by sensors wirelessly to ThingSpeak and the smartphone app. Also, with the help of these instantaneous data, water temperature and water level can be controlled by using a heater and a water pump, respectively. This system can have a detailed study of the pollution and condition of water resources and can provide an environment for safe fish farming.Keywords: dissolved oxygen, IoT, monitoring, ThingSpeak, water level, water quality, WiFi module
Procedia PDF Downloads 1992364 Traumatic Brachiocephalic Artery Pseudoaneurysm
Authors: Sally Shepherd, Jessica Wong, David Read
Abstract:
Traumatic brachiocephalic artery aneurysm is a rare injury that typically occurs as a result of a blunt chest injury. A 19-year-old female sustained a head-on, high speed motor vehicle crash into a tree. Upon release after 45 minutes of entrapment, she was tachycardic but normotensive, with a significant seatbelt sign across her chest and open deformed right thigh with weak pulses in bilateral lower limbs. A chest XR showed mild upper mediastinal widening. A CT trauma series plus gated CT chest revealed a grade 3a aortic arch transection with brachiocephalic pseudoaneurysm. Endovascular repair of the brachiocephalic artery was attempted post-presentation but was unsuccessful as the first stent migrated to the infrarenal abdominal aorta and the second stent across the brachiocephalic artery origin had a persistent leak at the base. She was transferred to Intensive Care for strict blood pressure control. She returned to theatre 5 hours later for a median sternotomy, aortic arch repair with an 8mm graft extraction, and excision of the innominate artery pseudoaneurysm. She had an uncomplicated post-operative recovery. This case highlights that brachiocephalic artery injury is a rare but potentially lethal injury as a result of blunt chest trauma. Safe management requires a combined Vascular and Cardiothoracic team approach, as stenting alone may be insufficient.Keywords: blunt chest injury, Brachiocephalic aneurysm, innominate artery, trauma
Procedia PDF Downloads 2322363 ISIS Women Recruitment in Spain and De-Radicalization Programs in Prisons
Authors: Inmaculada Yuste Martinez
Abstract:
Since July 5, 2014, Abubaker al Bagdadi, leader of the Islamic State since 2010 climbed the pulpit of the Great Mosque of Al Nuri of Mosul and proclaimed the Caliphate, the number of fighters who have travelled to Syria to join the Caliphate has increased as never before. Although it is true that the phenomenon of foreign fighters is not a new phenomenon, as it occurred after the Spanish Civil War, Republicans from Ireland and the conflict of the Balkans among others, it is highly relevant the fact that in this case, it has reached figures unknown in Europe until now. The approval of the resolution 2178 (2014) of the Security Council, foreign terrorist fighters placed the subject a priority position on the International agenda. The available data allow us to affirm that women have increasingly assumed operative functions in jihadist terrorism and in the activities linked to it in the development of attacks in the European Union, including minors and young adults. In the case of Spain, one in four of the detainees in 2016 were women, a significant increase compared to 2015. This contrasts with the fact that until 2014 no woman had been prosecuted in Spain for terrorist activities of a jihadist nature. It is fundamental when we talk about the prevention of radicalization and counterterrorism that we do not underestimate the potential threat to the security of countries like Spain that women from the West can assume to the global jihadist movement. This work aims to deepen the radicalization processes of these women and their profiles influencing the female inmate population. It also wants to focus on the importance of creating de-radicalization programs for these inmates since women are a crucial element in radicalization processes. A special focus it is made on young radicalized female inmate population as this target group is the most recoverable and on which it would result more fruitful to intervene. De-radicalization programs must also be designed to fit their profiles and circumstances; a sensitive environment will be prisons and juvenile centers, areas that until now had been unrelated to this problem and which are already hosting the first convicted in judicial offices in Spanish territory. A qualitative research and an empirical and analytical method has been implemented in this work, focused on the cases that took place in Spain of young women and the imaginary that the Islamic State uses for the processes of radicalization for this target group and how it does not fit with their real role in the Jihad, as opposed to other movements in which women do have a real and active role in the armed conflict as YPJ do it as a part of the armed wing of the Democratic Union Party of Syria.Keywords: caliphate, de-radicalization, foreign fighter, gender perspective, ISIS, jihadism, recruitment
Procedia PDF Downloads 1732362 Unsafe Abortions in India: Questioning the Propitiousness of MTP Act
Authors: Suresh Sharma, Neeti Goutam
Abstract:
In India abortions are legal and with the exceedingly liberal and broadened law that was passed in 1971, “Medical Termination of Pregnancy Act” had opened a new window to Women’s’ freedom and choice over their fertility. This paper would like to focus on the factors responsible for or leading to unsafe abortion as well as such high incidence of abortion in India which can help in understanding the ways in which we can prevent this apathy. To study the intricacies involved in delivering safety to womanhood in terms of safe abortion practice which includes more trained personnel, detailed explanation and consequences of conducting an abortion, fine reporting, awareness regarding family planning measures and not only pressurizing them to sterilize immediately after an abortion but also prior to that informing them and lastly easy accessibility of Contraceptives with a educated and brief information on that. Data has been drawn from various sources such as National Family Household Survey (1, 2, 3), Health Management Information System and Annual Health Survey. To safeguard the interest of women when it comes to complications resulting from unsafe abortions, Reproductive Health laid its strict adherence to it in its guidelines. The Government could induce more measures in terms of family planning measures and increase in the number of skilled medical health force, chiefly in rural areas to prevent the illegality of abortions. But before that fine reporting on the number of abortions performed will give an insight to this very issue only then policies and programs will work much better in favor of women.Keywords: abortion, MTP act, India, women
Procedia PDF Downloads 3642361 Optimized Approach for Secure Data Sharing in Distributed Database
Authors: Ahmed Mateen, Zhu Qingsheng, Ahmad Bilal
Abstract:
In the current age of technology, information is the most precious asset of a company. Today, companies have a large amount of data. As the data become larger, access to data for some particular information is becoming slower day by day. Faster data processing to shape it in the form of information is the biggest issue. The major problems in distributed databases are the efficiency of data distribution and response time of data distribution. The security of data distribution is also a big issue. For these problems, we proposed a strategy that can maximize the efficiency of data distribution and also increase its response time. This technique gives better results for secure data distribution from multiple heterogeneous sources. The newly proposed technique facilitates the companies for secure data sharing efficiently and quickly.Keywords: ER-schema, electronic record, P2P framework, API, query formulation
Procedia PDF Downloads 3342360 Mixotrophic Cultivation of Microalgae as a Feasible Strategy for Carotenoid Production
Authors: Jian Li
Abstract:
Carotenoids area group of metabolites in mostly photosynthetic organisms such as plants and microalgae and have wide applications in cosmetics, food, feed, and health industries. Although phototrophic cultivation of microalgae has been developed to produce some carotenoids for decades, most carotenoids are currently synthesized chemically at industrial scales because of affordable production costs. Chemical carotenoids are regarded not as safe for human beings as natural carotenoids and are restricted only for animal feed markets, and the industries call for inexpensive sources of natural products. Microalgae grow much quicker in mixotrophy than in phototrophy, and thus mixotrophic cultivation processes have great potential to reduce the production cost of carotenoids from microalgae. However, much more expensive photobioreactor systems and more strictly controlled sterile processes are needed to avoid contamination by heterotrophic organisms during mixotrophic cultivation processes, which makes mixotrophy, in fact, much more expensive than phototrophic cultivation. Recently technical breakthroughs have been reported to overcome contamination problems in photobioreactor systems traditionally used for phototrophic cultivation, and a much lower process cost of mixotrophic cultivation than that of phototrophic cultivation might be achieved for carotenoid production. These reviews intend to summarize recent technical advancements in mixotrophic cultivation of microalgae, to evaluate the economic viability of carotenoid production from mixotrophically cultivated microalgae, and to prospect mixotrophy as a strategy to produce a variety of carotenoids for industrial applications.Keywords: microalgae, carotenoid, mixotrophy, biotechnology
Procedia PDF Downloads 1622359 Secure Image Retrieval Based on Orthogonal Decomposition under Cloud Environment
Authors: Y. Xu, L. Xiong, Z. Xu
Abstract:
In order to protect data privacy, image with sensitive or private information needs to be encrypted before being outsourced to the cloud. However, this causes difficulties in image retrieval and data management. A secure image retrieval method based on orthogonal decomposition is proposed in the paper. The image is divided into two different components, for which encryption and feature extraction are executed separately. As a result, cloud server can extract features from an encrypted image directly and compare them with the features of the queried images, so that the user can thus obtain the image. Different from other methods, the proposed method has no special requirements to encryption algorithms. Experimental results prove that the proposed method can achieve better security and better retrieval precision.Keywords: secure image retrieval, secure search, orthogonal decomposition, secure cloud computing
Procedia PDF Downloads 4882358 Exploitation of Endophytes for the Management of Plant Pathogens
Authors: N. P. Eswara Reddy, S. Thahir Basha
Abstract:
Here, we report the success stories of potential leaf, seed and root endophytes against soil borne as well as foliar plant pathogens which are nutritionally adequate and safe for consumption. Endophytes are the microorganisms that reside asymptomatically in the tissues of higher plants are a robust source of potential biocontrol agents and it is presumed that the survival ability of endophytes may be better when compared to phylloplane microflora. Of all the 68 putative leaf endophytes, the endophytes viz., EB9 (100%), and EB35 (100%) which were superior in controlling Colletotrichum gloeosporioides causing mango anthracnose were identified as Brevundimonas bullata (EB09) and Bacillus thuringiensis (EB35) and further delayed in ripening of mango fruits up to 21 days. As a part, the seed endophyte GSE-4 was identified as Archoromobacter spp. against Sclerotium rolfsii causing stem rot of groundnut and the root endophyte REB-8 against Rhizoctonia bataticola causing dry root rot of chickpea was identified as Bacillus subtilis. Both recorded least percent disease incidence (PDI) and increased plant growth promotion, respectively. Further, the novel Bacillus subtilis (SEB-2) against Macrophomina pahseolina causing charcoal rot of sunflower provides an ample scope for exploring the endophytes at large scale. The talc-based formulations of these endophytes developed can be commercialized after toxicological studies. At the bottom line these unexplored endophytes are the need of the hour against aggressive plant pathogens and to maintain the quality and abundance of food and feed and also to fetch marginal economy to the farmers will be discussed.Keywords: endophytes, plant pathogens, commercialization, abundance of food
Procedia PDF Downloads 4212357 An Internet of Things Based Home Automation Based on Raspberry Pi and Node JS Server
Authors: Ahmed Khattab, Bassem Shetta
Abstract:
Today, there are many branches of technology, one of them is the internet of things. In this paper, it's focused specifically on automating all the home appliances through E-mail using Node JS server, the server side stores, and processes this data. The server side contains user interface and notification system functionalities which is operated by Raspberry Pi. It will present the security requirements for the smart home. In this application, the privilege of home control including special persons to use it, using the hardware appliances through mobiles and tablets is achieved. The proposed application delivers high quality of service, long lifetime, low maintenance, fast deployment, and low power requirements with low cost needed for development.Keywords: Raspberry Pi, E-mail, home automation, temperature sensor, PIR sensor, actuators, relay
Procedia PDF Downloads 2692356 The Internet of Things Ecosystem: Survey of the Current Landscape, Identity Relationship Management, Multifactor Authentication Mechanisms, and Underlying Protocols
Authors: Nazli W. Hardy
Abstract:
A critical component in the Internet of Things (IoT) ecosystem is the need for secure and appropriate transmission, processing, and storage of the data. Our current forms of authentication, and identity and access management do not suffice because they are not designed to service cohesive, integrated, interconnected devices, and service applications. The seemingly endless opportunities of IoT are in fact circumscribed on multiple levels by concerns such as trust, privacy, security, loss of control, and related issues. This paper considers multi-factor authentication (MFA) mechanisms and cohesive identity relationship management (IRM) standards. It also surveys messaging protocols that are appropriate for the IoT ecosystem.Keywords: identity relation management, multifactor authentication, protocols, survey of internet of things ecosystem
Procedia PDF Downloads 3622355 Reasons of Change in Security Prices and Price Volatility: An Analysis of the European Carbon Futures Market
Authors: Boulis M. Ibrahim, Iordanis A. Kalaitzoglou
Abstract:
A micro structural pricing model is proposed in which price components account for learning by incorporating changing expectations of the trading intensity and the risk level of incoming trades. An analysis of European carbon futures transactions finds expected trading intensity to increase the information component and decrease the liquidity component of price changes, but at different rates. Among the results, the expected persistence in trading intensity explains the majority of the auto correlations in the level and the conditional volatility of price changes, helps predict hourly patterns in the bid–ask spread and differentiates between the impact of buy versus sell and continuing versus reversing trades.Keywords: CO2 emission allowances, market microstructure, duration, price discovery
Procedia PDF Downloads 4112354 An Overview of the Risk for HIV/AIDS among Young Women in South Africa: Gender Based Violence
Authors: Shaneil Taylor
Abstract:
Gender-based violence is a reflection of the inequalities that are associated within a society between the men and women that affects the health, dignity, security and autonomy of its victims. There are various determinants that contribute to the health risk of young women who have experienced sexual violence, in countries that have a high prevalence rate for HIV. For instance, in South Africa, where the highest prevalence rate for HIV is among young women, their susceptibility to the virus has been increased by sexual violence and cultural inequalities. Therefore, this study is a review of literature that explores how gender-based violence increases the possibility for HIV/AIDS among young women in South Africa.Keywords: gender-based violence, HIV/AIDS transmission, risky sexual behavior, young women
Procedia PDF Downloads 5352353 Maintaining Parenthood: Challenges for Mothers Who Are Victims of Domestic Violence
Authors: Druzhinenko-Silhan Daria, Metz Claire
Abstract:
In this paper, we introduce the findings of the "Conjugal violence: mothers' parenting and court decisions" (VIC-PADEJ) study, focusing on the motherhood experiences of domestic violence victims. Utilizing a longitudinal research protocol that encompassed clinical interviews, projective methods, and various questionnaires, we detail the outcomes derived from seven clinical interviews with mothers alongside a comprehensive analysis. The findings reveal a pronounced decline in security and an imperative need for structuring both social and internal realities. The convergence of these findings indicates that parenting, post-experiencing domestic violence, may become an unattainable task due to the deficiency of internal resources.Keywords: domestic violence, parenthood, mothers victims, projective methods, longitudinal research, alceste analysis
Procedia PDF Downloads 582352 Human Rights Abuse in the Garment Factory in Bekasi Indonesia
Authors: Manotar Tampubolon
Abstract:
Although the Indonesian human rights protection has increased in recent years, but human rights violations still occur in the industrial sector. Crimes against human rights continue to occur and go unnoticed in spite of the government's legislation on human rights, employment law in addition to an international treaty that has been ratified by Indonesia. The increasing number of garment companies in Bekasi, also give rise to increased human rights violations since the government does not have a commitment to protect it. The Indonesian government and industry owners should pay attention to and protect the human rights of workers and treat them accordingly. This paper will review the human rights violations experienced by workers at garment factories in the context of the law, as well as ideas to improve the protection of workers' rights.Keywords: human rights protection, human rights violations, workers’ rights, justice, security
Procedia PDF Downloads 4672351 Facial Recognition of University Entrance Exam Candidates using FaceMatch Software in Iran
Authors: Mahshid Arabi
Abstract:
In recent years, remarkable advancements in the fields of artificial intelligence and machine learning have led to the development of facial recognition technologies. These technologies are now employed in a wide range of applications, including security, surveillance, healthcare, and education. In the field of education, the identification of university entrance exam candidates has been one of the fundamental challenges. Traditional methods such as using ID cards and handwritten signatures are not only inefficient and prone to fraud but also susceptible to errors. In this context, utilizing advanced technologies like facial recognition can be an effective and efficient solution to increase the accuracy and reliability of identity verification in entrance exams. This article examines the use of FaceMatch software for recognizing the faces of university entrance exam candidates in Iran. The main objective of this research is to evaluate the efficiency and accuracy of FaceMatch software in identifying university entrance exam candidates to prevent fraud and ensure the authenticity of individuals' identities. Additionally, this research investigates the advantages and challenges of using this technology in Iran's educational systems. This research was conducted using an experimental method and random sampling. In this study, 1000 university entrance exam candidates in Iran were selected as samples. The facial images of these candidates were processed and analyzed using FaceMatch software. The software's accuracy and efficiency were evaluated using various metrics, including accuracy rate, error rate, and processing time. The research results indicated that FaceMatch software could accurately identify candidates with a precision of 98.5%. The software's error rate was less than 1.5%, demonstrating its high efficiency in facial recognition. Additionally, the average processing time for each candidate's image was less than 2 seconds, indicating the software's high efficiency. Statistical evaluation of the results using precise statistical tests, including analysis of variance (ANOVA) and t-test, showed that the observed differences were significant, and the software's accuracy in identity verification is high. The findings of this research suggest that FaceMatch software can be effectively used as a tool for identifying university entrance exam candidates in Iran. This technology not only enhances security and prevents fraud but also simplifies and streamlines the exam administration process. However, challenges such as preserving candidates' privacy and the costs of implementation must also be considered. The use of facial recognition technology with FaceMatch software in Iran's educational systems can be an effective solution for preventing fraud and ensuring the authenticity of university entrance exam candidates' identities. Given the promising results of this research, it is recommended that this technology be more widely implemented and utilized in the country's educational systems.Keywords: facial recognition, FaceMatch software, Iran, university entrance exam
Procedia PDF Downloads 522350 Absence of Secured Bathing Spaces and Its Effect on Women: An Exploratory Qualitative Study of Rural Odisha, India
Authors: Minaj Ranjita Singh, Meghna Mukherjee, Abhijeet Jadhav
Abstract:
This is an exploratory qualitative study with an objective to understand the bathing practices followed by rural women and its consequences. Access to safe bathing spaces in rural India is a neglected issue due to which women are affected in various ways. Today, government policies are largely focused towards the building of toilets, but no importance has been given to the construction of bathrooms. Both qualitative and quantitative data were collected using in-depth interviews and focused group discussions with rural women in six villages of Odisha, India. The study was approved by an Institutional Research and Ethics Committee, and informed consent was taken from participants. For most of the participants, the access to water, bathing space and toilet was compromised posing various challenges in their daily lives. Women's daily schedule, hygiene practices, dignity, and health are greatly affected due to this lack. Since bathing in the open has been an ancient practice, the community's perception is benign towards the hardship of women. Lack of exposure to concealed bathing, necessary funds, and competing priorities are some of the household level factors which never let them think about having bathrooms and the lack of water supply, proper drainage system, subsidy or financial support are the governance and policy related factors which prevent their access to secured bathing spaces.Keywords: bathrooms, dignity, exploratory, rural, qualitative, women's health, women
Procedia PDF Downloads 1902349 Exploring the Association between Personality Traits and Adolescent Wellbeing in Online Education: A Systematic Review
Authors: Rashmi Motwani, Ritu Raj
Abstract:
The emergence of online educational environments has changed the way adolescents learn, which has benefits and drawbacks for their development. This review has as its goal the examination of how personality traits and adolescents’ well-being are associated in the setting of online education. This review analyses the effects of a variety of personality traits on the mental, emotional, and social health of online school-going adolescents by looking at a wide range of previous research. This research explores the mechanisms that mediate or regulate the connection between one's personality traits and well-being in an online educational environment. The elements can be broken down into two categories: technological, like internet availability and digital literacy, and social, including social support, peer interaction, and teacher-student connections. To improve the well-being of adolescents in online learning environments, it is essential to understand factors that moderate the effects of interventions and support systems. This review concludes by emphasising the complex nature of the association between individual differences in personality and the success of online students aged 13 to 18. This review contributes to the development of evidence-based strategies for promoting positive mental health and overall well-being among adolescents engaged in online educational settings by shedding light on the impact of personality traits on various dimensions of well-being and by identifying the mediating or moderating factors. Educators, governments, and parents can use the findings of this review to create an online learning environment that is safe and well-being for adolescents.Keywords: personality traits, adolescent, wellbeing, online education
Procedia PDF Downloads 542348 Water Crisis Management in a Tourism Dependent Community
Authors: Aishath Shakeela
Abstract:
At a global level, water stewardship, water stress and water security are crucial factors in tourism planning and development considerations. Challenges associated with water is of particular concern to the Maldives as there is limited availability of freshwater, high dependency on desalinated water, and high unit cost associated with desalinating water. While the Maldives is promoted as an example of sustainable tourism, a key sustainability challenge facing tourism dependent communities is the efficient use and management of available water resources. A water crisis event in the capital island of Maldives highlighted how precarious water related issues are in this tourism dependent destination. Applying netnography, the focus of this working paper is to present community perceptions of how government policies addressed Malé Water and Sewerage Company (MWSC) water crisis event.Keywords: crisis management, government policies, Maldives, tourism, water
Procedia PDF Downloads 5332347 Destination Port Detection For Vessels: An Analytic Tool For Optimizing Port Authorities Resources
Authors: Lubna Eljabu, Mohammad Etemad, Stan Matwin
Abstract:
Port authorities have many challenges in congested ports to allocate their resources to provide a safe and secure loading/ unloading procedure for cargo vessels. Selecting a destination port is the decision of a vessel master based on many factors such as weather, wavelength and changes of priorities. Having access to a tool which leverages AIS messages to monitor vessel’s movements and accurately predict their next destination port promotes an effective resource allocation process for port authorities. In this research, we propose a method, namely, Reference Route of Trajectory (RRoT) to assist port authorities in predicting inflow and outflow traffic in their local environment by monitoring Automatic Identification System (AIS) messages. Our RRoT method creates a reference route based on historical AIS messages. It utilizes some of the best trajectory similarity measure to identify the destination of a vessel using their recent movement. We evaluated five different similarity measures such as Discrete Fr´echet Distance (DFD), Dynamic Time Warping (DTW), Partial Curve Mapping (PCM), Area between two curves (Area) and Curve length (CL). Our experiments show that our method identifies the destination port with an accuracy of 98.97% and an fmeasure of 99.08% using Dynamic Time Warping (DTW) similarity measure.Keywords: spatial temporal data mining, trajectory mining, trajectory similarity, resource optimization
Procedia PDF Downloads 125