Search results for: DB security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2812

Search results for: DB security

712 Revisiting Pedestrians’ Appraisals of Urban Streets

Authors: Norhaslina Hassan, Sherina Rezvanipour, Amirhosein Ghaffarian Hoseini, Ng Siew Cheok

Abstract:

The walkability features of urban streets are prominent factors that are often focused on achieving a pedestrian-friendly environment. The limited attention that walkability enhancements devote to pedestrians' experiences or perceptions, on the other hand, raises the question of whether walkability enhancement is sufficient for pedestrians to enjoy using the streets. Thus, this paper evaluates the relationship between the socio-physical components of urban streets and pedestrians’ perceptions. A total of 1152 pedestrians from five urban streets in two major Malaysian cities, Kuala Lumpur, and George Town, Penang, participated in this study. In particular, this study used pedestrian preference scores towards socio-physical attributes that exist in urban streets to assess their impact on pedestrians’ appraisals of street likeability, comfort, and safety. Through analysis, the principal component analysis extracted eight socio-physical components, which were then tested via an ordinal regression model to identify their impact on pedestrian street likeability, comfort (visual, auditory, haptic and olfactory), and safety (physical safety, environmental safety, and security). Furthermore, a non-parametric Kruskal Wallis test was used to identify whether the results were subjected to any socio-demographic differences. The results found that all eight components had some degree of effect on the appraisals. It was also revealed that pedestrians’ preferences towards the attributes as well as their appraisals significantly varied based on their age, gender, ethnicity and education. These results and their implications for urban planning are further discussed in this paper.

Keywords: pedestrian appraisal, pedestrian perception, street sociophysical attributes, walking experience

Procedia PDF Downloads 124
711 The Advancement of Environmental Impact Assessment for 5th Transmission Natural Gas Pipeline Project in Thailand

Authors: Penrug Pengsombut, Worawut Hamarn, Teerawuth Suwannasri, Kittiphong Songrukkiat, Kanatip Ratanachoo

Abstract:

PTT Public Company Limited or simply PTT has played an important role in strengthening national energy security of the Kingdom of Thailand by transporting natural gas to customers in power, industrial and commercial sectors since 1981. PTT has been constructing and operating natural gas pipeline system of over 4,500-km network length both onshore and offshore laid through different area classifications i.e., marine, forest, agriculture, rural, urban, and city areas. During project development phase, an Environmental Impact Assessment (EIA) is conducted and submitted to the Office of Natural Resources and Environmental Policy and Planning (ONEP) for approval before project construction commencement. Knowledge and experiences gained and revealed from EIA in the past projects definitely are developed to further advance EIA study process for newly 5th Transmission Natural Gas Pipeline Project (5TP) with approximately 415 kilometers length. The preferred pipeline route is selected and justified by SMARTi map, an advance digital one-map platform with consists of multiple layers geographic and environmental information. Sensitive area impact focus (SAIF) is a practicable impact assessment methodology which appropriate for a particular long distance infrastructure project such as 5TP. An environmental modeling simulation is adopted into SAIF methodology for impact quantified in all sensitive areas whereas other area along pipeline right-of-ways is typically assessed as an impact representative. Resulting time and cost deduction is beneficial to project for early start.

Keywords: environmental impact assessment, EIA, natural gas pipeline, sensitive area impact focus, SAIF

Procedia PDF Downloads 409
710 Efficient Fuzzy Classified Cryptographic Model for Intelligent Encryption Technique towards E-Banking XML Transactions

Authors: Maher Aburrous, Adel Khelifi, Manar Abu Talib

Abstract:

Transactions performed by financial institutions on daily basis require XML encryption on large scale. Encrypting large volume of message fully will result both performance and resource issues. In this paper a novel approach is presented for securing financial XML transactions using classification data mining (DM) algorithms. Our strategy defines the complete process of classifying XML transactions by using set of classification algorithms, classified XML documents processed at later stage using element-wise encryption. Classification algorithms were used to identify the XML transaction rules and factors in order to classify the message content fetching important elements within. We have implemented four classification algorithms to fetch the importance level value within each XML document. Classified content is processed using element-wise encryption for selected parts with "High", "Medium" or “Low” importance level values. Element-wise encryption is performed using AES symmetric encryption algorithm and proposed modified algorithm for AES to overcome the problem of computational overhead, in which substitute byte, shift row will remain as in the original AES while mix column operation is replaced by 128 permutation operation followed by add round key operation. An implementation has been conducted using data set fetched from e-banking service to present system functionality and efficiency. Results from our implementation showed a clear improvement in processing time encrypting XML documents.

Keywords: XML transaction, encryption, Advanced Encryption Standard (AES), XML classification, e-banking security, fuzzy classification, cryptography, intelligent encryption

Procedia PDF Downloads 411
709 Treated Wastewater Reuse in Algeria: Overview, Mobilization Potential and Challenges

Authors: Dairi Sabri, Mrad Dounia, Djebbar Yassine, Abida Habib

Abstract:

Food security, which may be ensured by important agricultural production, needs huge amounts of water for irrigation. Recognizing this, the Algerian government made enormous efforts to mobilize water resources. Every drop of water collected, regardless of its origin, is needed to strengthen agricultural production. The present irrigated area in Algeria is about 1 million hectares while the potential agricultural area all over the country exceeds 9 million ha. This clearly shows the need for non-conventional water resources in Algeria, especially treated wastewater reuse. The use of treated wastewater in agricultural irrigation is still at the experimental stage in Algeria. While 20 million hectares worldwide are irrigated with treated wastewater, only 2300 hectares in Algeria are irrigated on an experimental basis in the regions of Setif, Constantine, Mila Telemcen, Tougourt and Boumerdès. The volume of wastewater discharged nationwide is estimated to be around 750 million cubic meters and is expected to exceed 1.5 billion m3 in 2020. An ambitious program of providing treatment facilities has been initiated in this direction to increase the treatment capacity to 2.5 million m3 per day in 2030. In order to optimize the use of this resource, specific research actions interested in defining treated wastewater reuse opportunities and standards are undertaken. The objective of this study is basically to examine the different components of treated wastewater reuse, including standards, treatment processes, agricultural opportunities and potentials as well as technical and economic aspects governing the feasibility of this technology in Algeria based on Geographic Information System (GIS).

Keywords: wastewater reuse, integrated management, irrigation, GIS

Procedia PDF Downloads 301
708 Towards Carbon-Free Communities: A Compilation of Urban Design Criteria for Sustainable Neighborhoods

Authors: Atefeh Kalantari

Abstract:

The increase in population and energy consumption has caused environmental crises such as the energy crisis, increased pollution, and climate change, all of which have resulted in a decline in the quality of life, especially in urban environments. Iran is one of the developing countries which faces several challenges concerning energy use and environmental sustainability such as air pollution, climate change, and energy security. On the other hand, due to its favorable geographic characteristics, Iran has diverse and accessible renewable sources, which provide appropriate substitutes to reduce dependence on fossil fuels. Sustainable development programs and post-carbon cities rely on implementing energy policies in different sectors of society, particularly, the built environment sector is one of the main ones responsible for energy consumption and carbon emissions for cities. Because of this, several advancements and programs are being implemented to promote energy efficiency for urban planning, and city experts, like others, are looking for solutions to deal with these problems. Among the solutions provided for this purpose, low-carbon design can be mentioned. Among the different scales, the neighborhood can be mentioned as a suitable scale for applying the principles and solutions of low-carbon urban design; Because the neighborhood as a "building unit of the city" includes elements and flows that all affect the number of CO2 emissions. The article aims to provide criteria for designing a low-carbon and carbon-free neighborhood through descriptive methods and secondary data analysis. The ultimate goal is to promote energy efficiency and create a more resilient and livable environment for local residents.

Keywords: climate change, low-carbon urban design, carbon-free neighborhood, resilience

Procedia PDF Downloads 81
707 Cybersecurity Challenges and Solutions in ICT Management at the Federal Polytechnic, Ado-Ekiti: A Quantitative Study

Authors: Innocent Uzougbo Onwuegbuzie, Siene Elizabeth Eke

Abstract:

This study investigates cybersecurity challenges and solutions in managing Information and Communication Technology (ICT) at the Federal Polytechnic, Ado-Ekiti, South-West Nigeria. The rapid evolution of ICT has revolutionized organizational operations and impacted various sectors, including education, healthcare, and finance. While ICT advancements facilitate seamless communication, complex data analytics, and strategic decision-making, they also introduce significant cybersecurity risks such as data breaches, ransomware, and other malicious attacks. These threats jeopardize the confidentiality, integrity, and availability of information systems, necessitating robust cybersecurity measures. The primary aim of this research is to identify prevalent cybersecurity challenges in ICT management, evaluate their impact on the institution's operations, and assess the effectiveness of current cybersecurity solutions. Adopting a quantitative research approach, data was collected through surveys and structured questionnaires from students, staff, and IT professionals at the Federal Polytechnic, Ado-Ekiti. The findings underscore the critical need for continuous investment in cybersecurity technologies, employee and student training, and regulatory compliance to mitigate evolving cyber threats. This research contributes to bridging the knowledge gap in cybersecurity management and provides valuable insights into effective strategies and technologies for safeguarding ICT systems in educational institutions. The study's objectives are to enhance the security posture of the Federal Polytechnic, Ado-Ekiti, in an increasingly digital world by identifying and addressing the cybersecurity challenges faced by its ICT management.

Keywords: cybersecurity challenges, cyber threat mitigation, federal polytechnic Ado-Ekiti, ICT management

Procedia PDF Downloads 42
706 Social Crises and Its Impact on the Environment: Case Study of Jos, Plateau State

Authors: A. B. Benshak, M. G. Yilkangnha, V. Y. Nanle

Abstract:

Social crises and violent conflict can inflict direct (short-term) impact on the environment like poisoning water bodies, climate change, deforestation, destroying the chemical component of the soil due to the chemical and biological weapons used. It can also impact the environment indirectly (long-term), e.g., the destruction of political and economic infrastructure to manage the environmental resources and breaking down traditional conservation practices, population displacement and refugee flows which puts pressure on the already inadequate resources, infrastructure, facilities, amenities, services etc. This study therefore examines the impact of social crises on the environment in Jos Plateau State with emphasis on the long-term impact, analyze the relationship between crises and the environment and assess the perception of people on social crises because much work have concentrated on other repercussions such as the economy, health etc that are more politically expedient. The data for this research were collected mostly through interviews, questionnaire, dailies and reports on the subject matter. The data and findings were presented in tables and results showed that the environment is directly and indirectly impacted by crises and that these impacts can in turn result to a continuous cycle of violent activities if not addressed because of the inadequacies in the supply of infrastructural facilities, resources and so on caused by the inflow of displaced population. Recommendations were made on providing security to minimize conflict occurrences in Jos and its environs, minimizing the impact of social crises on the environment, provision of adequate infrastructural facilities to carter for population rise, renewal and regeneration schemes, etc. which will go a long way in mitigating the impact of crises on the environment.

Keywords: environment, impact, long-term, social crises

Procedia PDF Downloads 344
705 Understanding the Endogenous Impact of Tropical Cyclones Floods and Sustainable Landscape Management Innovations on Farm Productivity in Malawi

Authors: Innocent Pangapanga, Eric Mungatana

Abstract:

Tropical cyclones–related floods (TCRFs) in Malawi have devastating effects on smallholder agriculture, thereby threatening the food security agenda, which is already constrained by poor agricultural innovations, low use of improved varieties, and unaffordable inorganic fertilizers, and fragmenting landholding sizes. Accordingly, households have engineered and indigenously implemented sustainable landscape management (SLM) innovations to contain the adverse effects of TCRFs on farm productivity. This study, therefore, interrogated the efficacy of SLM adoption on farm productivity under varying TCRFs, while controlling for the potential selection bias and unobservable heterogeneity through the application of the Endogenous Switching Regression Model. In this study, we further investigated factors driving SLM adoption. Substantively, we found TCRFs reducing farm productivity by 31 percent, on the one hand, and influencing the adoption of SLM innovations by 27 percent, on the other hand. The study also observed that households that interacted SLM with TCRFs were more likely to enhance farm productivity by 24 percent than their counterparts. Interestingly, the study results further demonstrated that multiple adoptions of SLM-related innovations, including intercropping, agroforestry, and organic manure, enhanced farm productivity by 126 percent, suggesting promoting SLM adoption as a package to appropriately inform existing sustainable development goals’ agricultural productivity initiatives under intensifying TCRFs in the country.

Keywords: tropical cyclones–related floods, sustainable landscape management innovations, farm productivity, endogeneity, endogenous switching regression model, panel data, smallholder agriculture

Procedia PDF Downloads 116
704 Error Detection and Correction for Onboard Satellite Computers Using Hamming Code

Authors: Rafsan Al Mamun, Md. Motaharul Islam, Rabana Tajrin, Nabiha Noor, Shafinaz Qader

Abstract:

In an attempt to enrich the lives of billions of people by providing proper information, security and a way of communicating with others, the need for efficient and improved satellites is constantly growing. Thus, there is an increasing demand for better error detection and correction (EDAC) schemes, which are capable of protecting the data onboard the satellites. The paper is aimed towards detecting and correcting such errors using a special algorithm called the Hamming Code, which uses the concept of parity and parity bits to prevent single-bit errors onboard a satellite in Low Earth Orbit. This paper focuses on the study of Low Earth Orbit satellites and the process of generating the Hamming Code matrix to be used for EDAC using computer programs. The most effective version of Hamming Code generated was the Hamming (16, 11, 4) version using MATLAB, and the paper compares this particular scheme with other EDAC mechanisms, including other versions of Hamming Codes and Cyclic Redundancy Check (CRC), and the limitations of this scheme. This particular version of the Hamming Code guarantees single-bit error corrections as well as double-bit error detections. Furthermore, this version of Hamming Code has proved to be fast with a checking time of 5.669 nanoseconds, that has a relatively higher code rate and lower bit overhead compared to the other versions and can detect a greater percentage of errors per length of code than other EDAC schemes with similar capabilities. In conclusion, with the proper implementation of the system, it is quite possible to ensure a relatively uncorrupted satellite storage system.

Keywords: bit-flips, Hamming code, low earth orbit, parity bits, satellite, single error upset

Procedia PDF Downloads 130
703 Legal Contestation of Non-Legal Norms: The Case of Humanitarian Intervention Norm between 1999 and 2018

Authors: Nazli Ustunes Demirhan

Abstract:

Norms of any nature are subject to pressures of change throughout their lifespans, as they are interpreted and re-interpreted every time they are used rhetorically or practically by international actors. The inevitable contestation of different interpretations may lead to an erosion of the norm, as well as to its strengthening. This paper aims to question the role of formal legality on the change of norm strength, using a norm contestation framework and a multidimensional norm strength conceptualization. It argues that the role of legality is not necessarily linked to the formal legal characteristics of a norm, but is about the legality of the contestation processes. In order to demonstrate this argument, the paper examines the evolutionary path of the humanitarian intervention norm as a case study. Humanitarian intervention, as a norm of very low formal legal characteristics, has been subject to numerous cycles of contestation, demonstrating a fluctuating pattern of norm strength. With the purpose of examining the existence and role of legality in the selected contestation periods from 1999 to 2017, this paper uses process tracing method with a detailed document analysis on the Security Council documents; including decisions, resolutions, meeting minutes, press releases as well as individual country statements. Through the empirical analysis, it is demonstrated that the legality of the contestation processes has a positive effect at least on the authoritativeness dimension of norm strength. This study tries to contribute to the developing dialogue between international relations (IR) and internal law (IL) disciplines with its better-tuned understanding of legality. It connects to further questions in IR/IL nexus, relating to the value added of norm legality, and politics of legalization as well as better international policies for norm reinforcement.

Keywords: humanitarian intervention, legality, norm contestation, norm dynamics, responsibility to protect

Procedia PDF Downloads 153
702 Identification Algorithm of Critical Interface, Modelling Perils on Critical Infrastructure Subjects

Authors: Jiří. J. Urbánek, Hana Malachová, Josef Krahulec, Jitka Johanidisová

Abstract:

The paper deals with crisis situations investigation and modelling within the organizations of critical infrastructure. Every crisis situation has an origin in the emergency event occurrence in the organizations of energetic critical infrastructure especially. Here, the emergency events can be both the expected events, then crisis scenarios can be pre-prepared by pertinent organizational crisis management authorities towards their coping or the unexpected event (Black Swan effect) – without pre-prepared scenario, but it needs operational coping of crisis situations as well. The forms, characteristics, behaviour and utilization of crisis scenarios have various qualities, depending on real critical infrastructure organization prevention and training processes. An aim is always better organizational security and continuity obtainment. This paper objective is to find and investigate critical/ crisis zones and functions in critical situations models of critical infrastructure organization. The DYVELOP (Dynamic Vector Logistics of Processes) method is able to identify problematic critical zones and functions, displaying critical interfaces among actors of crisis situations on the DYVELOP maps named Blazons. Firstly, for realization of this ability is necessary to derive and create identification algorithm of critical interfaces. The locations of critical interfaces are the flags of crisis situation in real organization of critical infrastructure. Conclusive, the model of critical interface will be displayed at real organization of Czech energetic crisis infrastructure subject in Black Out peril environment. The Blazons need live power Point presentation for better comprehension of this paper mission.

Keywords: algorithm, crisis, DYVELOP, infrastructure

Procedia PDF Downloads 410
701 Cybersecurity Challenges in Africa

Authors: Chimmoe Fomo Michelle Larissa

Abstract:

The challenges of cybersecurity in Africa are increasingly significant as the continent undergoes rapid digital transformation. With the rise of internet connectivity, mobile phone usage, and digital financial services, Africa faces unique cybersecurity threats. The significance of this study lies in understanding these threats and the multifaceted challenges that hinder effective cybersecurity measures across the continent. The methodologies employed in this study include a comprehensive analysis of existing cybersecurity frameworks in various African countries, surveys of key stakeholders in the digital ecosystem, and case studies of cybersecurity incidents. These methodologies aim to provide a detailed understanding of the current cybersecurity landscape, identify gaps in existing policies, and evaluate the effectiveness of implemented security measures. Major findings of the study indicate that Africa faces numerous cybersecurity challenges, including inadequate regulatory frameworks, insufficient cybersecurity awareness, and a shortage of skilled professionals. Additionally, the prevalence of cybercrime, such as financial fraud, data breaches, and ransomware attacks, exacerbates the situation. The study also highlights the role of international cooperation and regional collaboration in addressing these challenges and improving overall cybersecurity resilience. In conclusion, addressing cybersecurity challenges in Africa requires a multifaceted approach that involves strengthening regulatory frameworks, enhancing public awareness, and investing in cybersecurity education and training. The study underscores the importance of regional and international collaboration in building a robust cybersecurity infrastructure capable of mitigating the risks associated with the continent's digital growth.

Keywords: Africa, cybersecurity, challenges, digital infrastructure, cybercrime

Procedia PDF Downloads 42
700 Quantification of Effect of Linear Anionic Polyacrylamide on Seepage in Irrigation Channels

Authors: Hamil Uribe, Cristian Arancibia

Abstract:

In Chile, the water for irrigation and hydropower generation is delivery essentially through unlined channels on earth, which have high seepage losses. Traditional seepage-abatement technologies are very expensive. The goals of this work were to quantify water loss in unlined channels and select reaches to evaluate the use of linear anionic polyacrylamide (LA-PAM) to reduce seepage losses. The study was carried out in Maule Region, central area of Chile. Water users indicated reaches with potential seepage losses, 45 km of channels in total, whose flow varied between 1.07 and 23.6 m³ s⁻¹. According to seepage measurements, 4 reaches of channels, 4.5 km in total, were selected for LA-PAM application. One to 4 LA-PAM applications were performed at rates of 11 kg ha⁻¹, considering wet perimeter area as basis of calculation. Large channels were used to allow motorboat moving against the current to carry-out LA-PAM application. For applications, a seeder machine was used to evenly distribute granulated polymer on water surface. Water flow was measured (StreamPro ADCP) upstream and downstream in selected reaches, to estimate seepage losses before and after LA-PAM application. Weekly measurements were made to quantify treatment effect and duration. In each case, water turbidity and temperature were measured. Channels showed variable losses up to 13.5%. Channels showing water gains were not treated with PAM. In all cases, LA-PAM effect was positive, achieving average loss reductions of 8% to 3.1%. Water loss was confirmed and it was possible to reduce seepage through LA-PAM applications provided that losses were known and correctly determined when applying the polymer. This could allow increasing irrigation security in critical periods, especially under drought conditions.

Keywords: canal seepage, irrigation, polyacrylamide, water management

Procedia PDF Downloads 175
699 DLtrace: Toward Understanding and Testing Deep Learning Information Flow in Deep Learning-Based Android Apps

Authors: Jie Zhang, Qianyu Guo, Tieyi Zhang, Zhiyong Feng, Xiaohong Li

Abstract:

With the widespread popularity of mobile devices and the development of artificial intelligence (AI), deep learning (DL) has been extensively applied in Android apps. Compared with traditional Android apps (traditional apps), deep learning based Android apps (DL-based apps) need to use more third-party application programming interfaces (APIs) to complete complex DL inference tasks. However, existing methods (e.g., FlowDroid) for detecting sensitive information leakage in Android apps cannot be directly used to detect DL-based apps as they are difficult to detect third-party APIs. To solve this problem, we design DLtrace; a new static information flow analysis tool that can effectively recognize third-party APIs. With our proposed trace and detection algorithms, DLtrace can also efficiently detect privacy leaks caused by sensitive APIs in DL-based apps. Moreover, using DLtrace, we summarize the non-sequential characteristics of DL inference tasks in DL-based apps and the specific functionalities provided by DL models for such apps. We propose two formal definitions to deal with the common polymorphism and anonymous inner-class problems in the Android static analyzer. We conducted an empirical assessment with DLtrace on 208 popular DL-based apps in the wild and found that 26.0% of the apps suffered from sensitive information leakage. Furthermore, DLtrace has a more robust performance than FlowDroid in detecting and identifying third-party APIs. The experimental results demonstrate that DLtrace expands FlowDroid in understanding DL-based apps and detecting security issues therein.

Keywords: mobile computing, deep learning apps, sensitive information, static analysis

Procedia PDF Downloads 179
698 Predictive Analytics in Oil and Gas Industry

Authors: Suchitra Chnadrashekhar

Abstract:

Earlier looked as a support function in an organization information technology has now become a critical utility to manage their daily operations. Organizations are processing huge amount of data which was unimaginable few decades before. This has opened the opportunity for IT sector to help industries across domains to handle the data in the most intelligent manner. Presence of IT has been a leverage for the Oil & Gas industry to store, manage and process the data in most efficient way possible thus deriving the economic value in their day-to-day operations. Proper synchronization between Operational data system and Information Technology system is the need of the hour. Predictive analytics supports oil and gas companies by addressing the challenge of critical equipment performance, life cycle, integrity, security, and increase their utilization. Predictive analytics go beyond early warning by providing insights into the roots of problems. To reach their full potential, oil and gas companies need to take a holistic or systems approach towards asset optimization and thus have the functional information at all levels of the organization in order to make the right decisions. This paper discusses how the use of predictive analysis in oil and gas industry is redefining the dynamics of this sector. Also, the paper will be supported by real time data and evaluation of the data for a given oil production asset on an application tool, SAS. The reason for using SAS as an application for our analysis is that SAS provides an analytics-based framework to improve uptimes, performance and availability of crucial assets while reducing the amount of unscheduled maintenance, thus minimizing maintenance-related costs and operation disruptions. With state-of-the-art analytics and reporting, we can predict maintenance problems before they happen and determine root causes in order to update processes for future prevention.

Keywords: hydrocarbon, information technology, SAS, predictive analytics

Procedia PDF Downloads 361
697 Climate Change and Sustainable Development among Agricultural Communities in Tanzania; An Analysis of Southern Highland Rural Communities

Authors: Paschal Arsein Mugabe

Abstract:

This paper examines sustainable development planning in the context of environmental concerns in rural areas of the Tanzania. It challenges mainstream approaches to development, focusing instead upon transformative action for environmental justice. The goal is to help shape future sustainable development agendas in local government, international agencies and civil society organisations. Research methods: The approach of the study is geographical, but also involves various Trans-disciplinary elements, particularly from development studies, sociology and anthropology, management, geography, agriculture and environmental science. The research methods included thematic and questionnaire interviews, participatory tools such as focus group discussion, participatory research appraisal and expert interviews for primary data. Secondary data were gathered through the analysis of land use/cover data and official documents on climate, agriculture, marketing and health. Also several earlier studies that were made in the area provided an important reference base. Findings: The findings show that, agricultural sustainability in Tanzania appears likely to deteriorate as a consequence of climate change. Noteworthy differences in impacts across households are also present both by district and by income category. Also food security cannot be explained by climate as the only influencing factor. A combination of economic, political and socio-cultural context of the community are crucial. Conclusively, it is worthy knowing that people understand their relationship between climate change and their livelihood.

Keywords: agriculture, climate change, environment, sustainable development

Procedia PDF Downloads 325
696 Triticum Aestivum Yield Enhanced with Irrigation Scheduling Strategy under Salinity

Authors: Taramani Yadav, Gajender Kumar, R. K. Yadav, H. S. Jat

Abstract:

Soil Salinity and irrigation water salinity is critical threat to enhance agricultural food production to full fill the demand of billion plus people worldwide. Salt affected soils covers 6.73 Mha in India and ~1000 Mha area around the world. Irrigation scheduling of saline water is the way to ensure food security in salt affected areas. Research experiment was conducted at ICAR-Central Soil Salinity Research Institute, Experimental Farm, Nain, Haryana, India with 36 treatment combinations in double split plot design. Three sets of treatments consisted of (i) three regimes of irrigation viz., 60, 80 and 100% (I1, I2 and I3, respectively) of crop ETc (crop evapotranspiration at identified respective stages) in main plot; (ii) four levels of irrigation water salinity (sub plot treatments) viz., 2, 4, 8 and 12 dS m-1 (iii) applications of two PBRs along with control (without PBRs) i.e. salicylic acid (G1; 1 mM) and thiourea (G2; 500 ppm) as sub-sub plot treatments. Grain yield of wheat (Triticum aestivum) was increased with less amount of high salt loaded irrigation water at the same level of salinity (2 dS m-1), the trend was I3>I2>I1 at 2 dS m-1 with 8.10 and 17.07% increase at 80 and 100% ETc, respectively compared to 60% ETc. But contrary results were obtained by increasing amount of irrigation water at same level of highest salinity (12 dS m-1) showing following trend; I1>I2>I3 at 12 dS m-1 with 9.35 and 12.26% increase at 80 and 60% ETc compared to 100% ETc. Enhancement in grain yield of wheat (Triticum aestivum) is not need to increase amount of irrigation water under saline condition, with salty irrigation water less amount of irrigation water gave the maximum wheat (Triticum aestivum) grain yield.

Keywords: Irrigation Scheduling, Saline Environment, Triticum aestivum, Yield

Procedia PDF Downloads 145
695 Smart Campus Digital Twin: Basic Framework - Current State, Trends and Challenges

Authors: Enido Fabiano de Ramos, Ieda Kanashiro Makiya, Francisco I. Giocondo Cesar

Abstract:

This study presents an analysis of the Digital Twin concept applied to the academic environment, focusing on the development of a Digital Twin Smart Campus Framework. Using bibliometric analysis methodologies and literature review, the research investigates the evolution and applications of the Digital Twin in educational contexts, comparing these findings with the advances of Industry 4.0. It was identified gaps in the existing literature and highlighted the need to adapt Digital Twin principles to meet the specific demands of a smart campus. By integrating Industry 4.0 concepts such as automation, Internet of Things, and real-time data analytics, we propose an innovative framework for the successful implementation of the Digital Twin in academic settings. The results of this study provide valuable insights for university campus managers, allowing for a better understanding of the potential applications of the Digital Twin for operations, security, and user experience optimization. In addition, our framework offers practical guidance for transitioning from a digital campus to a digital twin smart campus, promoting innovation and efficiency in the educational environment. This work contributes to the growing literature on Digital Twins and Industry 4.0, while offering a specific and tailored approach to transforming university campuses into smart and connected spaces, high demanded by Society 5.0 trends. It is hoped that this framework will serve as a basis for future research and practical implementations in the field of higher education and educational technology.

Keywords: smart campus, digital twin, industry 4.0, education trends, society 5.0

Procedia PDF Downloads 59
694 The Exploration of Persuasive Skills and Participants Characteristics in Pyramid-Sale: A Qualitative Study

Authors: Xing Yan Fan, Xing Lin Xu, Man Yuan Chen, Pei Tzu Lee, Yu Ting Wang, Yi Xiao Cao, Rui Yao

Abstract:

Pyramid sales have been a widespread issue in China. Victims who are defrauded not only lose money but damage interpersonal relationship. A deeper understanding of pyramid-sale models can be beneficial to prevent potential victims from fraud and improve the property security. The goals of this study were to detect psychological characteristics of pyramid-sale sellers, and analyse persuasive skills in pyramid organizations. A qualitative study was conducted in this study. Participants (n=6) recruited by 'snowball' sampling from present pyramid-sale sellers (n=3) and imprisoned pyramid-sale sellers (n=3). All participants accepted semi-structured interview for collecting data. Content analysis was adopted for data coding and analysis. The results indicate that pyramid organizations are used to utilize their appearance packaging and celebrity effect to strengthen the positions in participants’ mind. The status gap between pyramid-sale sellers in same organization, as well as rewards to increase reputation, are used to motivate participants in pyramid. The most significant common characteristics among all participants are that they tend to possess a high sense of belongingness within the firm. Moreover, the expression of pyramid-sale sellers on gambling mentality is expected to growth as constantly losing money. Findings suggest that the psychological characteristics of pyramid-sale sellers in accordance with Maslow’s hierarchy of needs, persuasive skills of pyramid organization confront to 'attitude-behaviour change model'. These findings have implication on 'immune education' that providing guidance for victims out of stuck and protecting ordinary people from the jeopardizing of pyramid sales.

Keywords: pyramid sales, characteristics, persuasive skills, qualitative study

Procedia PDF Downloads 257
693 Object Recognition System Operating from Different Type Vehicles Using Raspberry and OpenCV

Authors: Maria Pavlova

Abstract:

In our days, it is possible to put the camera on different vehicles like quadcopter, train, airplane and etc. The camera also can be the input sensor in many different systems. That means the object recognition like non separate part of monitoring control can be key part of the most intelligent systems. The aim of this paper is to focus of the object recognition process during vehicles movement. During the vehicle’s movement the camera takes pictures from the environment without storage in Data Base. In case the camera detects a special object (for example human or animal), the system saves the picture and sends it to the work station in real time. This functionality will be very useful in emergency or security situations where is necessary to find a specific object. In another application, the camera can be mounted on crossroad where do not have many people and if one or more persons come on the road, the traffic lights became the green and they can cross the road. In this papers is presented the system has solved the aforementioned problems. It is presented architecture of the object recognition system includes the camera, Raspberry platform, GPS system, neural network, software and Data Base. The camera in the system takes the pictures. The object recognition is done in real time using the OpenCV library and Raspberry microcontroller. An additional feature of this library is the ability to display the GPS coordinates of the captured objects position. The results from this processes will be sent to remote station. So, in this case, we can know the location of the specific object. By neural network, we can learn the module to solve the problems using incoming data and to be part in bigger intelligent system. The present paper focuses on the design and integration of the image recognition like a part of smart systems.

Keywords: camera, object recognition, OpenCV, Raspberry

Procedia PDF Downloads 218
692 Code Embedding for Software Vulnerability Discovery Based on Semantic Information

Authors: Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaran, Zahra Jadidi, Leonie Simpson

Abstract:

Deep learning methods have been seeing an increasing application to the long-standing security research goal of automatic vulnerability detection for source code. Attention, however, must still be paid to the task of producing vector representations for source code (code embeddings) as input for these deep learning models. Graphical representations of code, most predominantly Abstract Syntax Trees and Code Property Graphs, have received some use in this task of late; however, for very large graphs representing very large code snip- pets, learning becomes prohibitively computationally expensive. This expense may be reduced by intelligently pruning this input to only vulnerability-relevant information; however, little research in this area has been performed. Additionally, most existing work comprehends code based solely on the structure of the graph at the expense of the information contained by the node in the graph. This paper proposes Semantic-enhanced Code Embedding for Vulnerability Discovery (SCEVD), a deep learning model which uses semantic-based feature selection for its vulnerability classification model. It uses information from the nodes as well as the structure of the code graph in order to select features which are most indicative of the presence or absence of vulnerabilities. This model is implemented and experimentally tested using the SARD Juliet vulnerability test suite to determine its efficacy. It is able to improve on existing code graph feature selection methods, as demonstrated by its improved ability to discover vulnerabilities.

Keywords: code representation, deep learning, source code semantics, vulnerability discovery

Procedia PDF Downloads 161
691 The Professional Rehabilitation of Workers Affected by Chronic Low Back Pain in 'Baixada Santista' Region, Brazil

Authors: Maria Do Carmo Baracho De Alencar

Abstract:

Back pain is considered a worldwide public health problem and has led to numerous work-related absence from work and public spending on rehabilitation, as well as difficulties in the process of professional rehabilitation and return to work. Also, the rehabilitation of workers is one of the great challenges today and for the field of Workers' Health in Brazil. Aim: To investigate the procedures related to the professional rehabilitation of insured workers affected by chronic low back pain, based on the perceptions of professional counselors. Methods: A list of related professional counselors was obtained from the Professional Rehabilitation Coordination of the Baixada Santista (SP) region, and from the Social Security National Institute of Brazil, and in which cities they worked. Semistructured and individual interview was scheduled, based on a pre-elaborated script, containing questions about procedures, experiences at work and feelings. The interviews were recorded and transcribed in full for content analysis. Results: Ten (10) professional counselors of both genders and from nine (9) cities from the Baixada Santista region participated in the study. Aged between 31 and 64 years, and time in service between 4 and 38 years. Only one of the professionals was graduaded in Psychology. Among the testimonies emerged the high demand of work, the lack of interest of companies, medical authority, the social helplessness after rehabilitation process, difficulty in assessing invisible pain, and suffering, anguish, and frustration at work, between others. Conclusion: The study contributes to reflections about the importance of interdisciplinary actions and the Psychology in the processes of professional rehabilitation and readaptation in the process of return to work.

Keywords: low back pain, rehabilitation, work, occupational health

Procedia PDF Downloads 135
690 AgriInnoConnect Pro System Using Iot and Firebase Console

Authors: Amit Barde, Dipali Khatave, Vaishali Savale, Atharva Chavan, Sapna Wagaj, Aditya Jilla

Abstract:

AgriInnoConnect Pro is an advanced agricultural automation system designed to enhance irrigation efficiency and overall farm management through IoT technology. Using MIT App Inventor, Telegram, Arduino IDE, and Firebase Console, it provides a user-friendly interface for farmers. Key hardware includes soil moisture sensors, DHT11 sensors, a 12V motor, a solenoid valve, a stepdown transformer, Smart Fencing, and AC switches. The system operates in automatic and manual modes. In automatic mode, the ESP32 microcontroller monitors soil moisture and autonomously controls irrigation to optimize water usage. In manual mode, users can control the irrigation motor via a mobile app. Telegram bots enable remote operation of the solenoid valve and electric fencing, enhancing farm security. Additionally, the system upgrades conventional devices to smart ones using AC switches, broadening automation capabilities. AgriInnoConnect Pro aims to improve farm productivity and resource management, addressing the critical need for sustainable water conservation and providing a comprehensive solution for modern farm management. The integration of smart technologies in AgriInnoConnect Pro ensures precision farming practices, promoting efficient resource allocation and sustainable agricultural development.

Keywords: agricultural automation, IoT, soil moisture sensor, ESP32, MIT app inventor, telegram bot, smart farming, remote control, firebase console

Procedia PDF Downloads 46
689 Major Constraints to Adoption of Improved Post-harvest Technologies among Smallholder Farmers in Developing Countries: A Systematic Review

Authors: Muganyizi Jonas Bisheko, G. Rejikumar

Abstract:

Reducing post-harvest losses could be a sustainable solution to enhance the food and income security of smallholder farmers in developing countries. While various research institutions have come up with a number of innovative post-harvest technologies for reducing post-harvest losses, most of them have not been extensively adopted by smallholder farmers. Despite this gap, the synthesized information about the major constraints of post-harvest technology is scarce. This study has been conducted to fill this gap and show the implications of the findings for future post-harvest research. The developed search strategy retrieved 2201 studies. However, after excluding duplicates, title, abstract and full article screening, a total of 41 documents were identified. The major findings are: (i) there is an outstanding deficiency of systematic evidence of the effect of climate change, off-farm income and sources of post-harvest information on the adoption of improved post-harvest technologies; (ii) there is very limited information on adoption constraints pertaining to matters of policy, rules and regulations; (iii) there is very thin literature on behavioral constraints associated with limited adoption of improved post-harvest technologies; (iv) most of the studies focused on post-harvest storage technologies (47%) followed by overall post-harvest management practices (25%), processing technologies (19%) and packaging technologies (3%). Much of the information was found on Cereals (58%), especially maize (44%); (v) geographically, Sub-Saharan Africa accounted for 79% of the reviewed interventions, while South Asia occupied only 21%. The findings of this review are intended to guide various post-harvest technologists and decision-makers in addressing the challenge of huge post-harvest losses.

Keywords: constraints, post-harvest loss, post-harvest technology , smallholder farmer

Procedia PDF Downloads 237
688 Rethink Urban Resilience: An Introductory Study Towards Resilient Spatial Structure of Refugees Neighborhoods

Authors: Salwa Mohammad Alawneh

Abstract:

The ongoing humanitarian crises spur rapid and unpredicted refugee influxes resulting in demographic changes in cities. Regarding different urban systems are vulnerable in refugee neighborhoods. With the consequent social, economic, and spatial challenges, cities must respond with a more durable and sustainable approach based on urban resilience. The paper systematically approaches urban resilience to contribute to refugee spaces by reflecting on the overall urban systems of their neighborhoods. The research will review the urban resilience literature to develop an evaluation framework. The developed framework applies urban resilience more holistically in refugee neighborhoods and expands to the urban systems of social, economic, and spatial. However, the main highlight of this paper is the resilient spatial structure in refugee neighborhoods to face the internal and complex stress of refugee waves and their demographic changes. Finding a set of resilient spatial measurements and focusing on urban forms at a neighborhood scale provide vulnerability reduction and enhance adaptation capacity. As a model example, the paper applies these measurements and facilitates geospatial technologies to one of the refugee neighborhoods in Amman, Jordan, namely Al-Jubilee. The application in Al-Jubilee helps to demonstrate a road map towards a developmental pattern in design and planning by different decision-makers of inter-governmental and humanitarian organizations. In this regard, urban resilience improves the humanitarian assistantship of refugee settings beyond providing the essential needs. In conclusion, urban resilience responds to the different challenges of refugee neighborhoods by supporting urban stability, improving livability, and maintaining both urban functions and security.

Keywords: urban resilience of refugee, resilient urban form, refugee neighborhoods, humanitarian assistantship, refugee in Jordan

Procedia PDF Downloads 160
687 Distinctive Features of Legal Relations in the Area of Subsoil Use, Renewal and Protection in Ukraine

Authors: N. Maksimentseva

Abstract:

The issue of public administration in subsoil use, renewal and protection is of high importance for Ukraine since it is strongly linked to energy security of the state as well as it shall facilitate the people of Ukraine to efficiently implement its propitiatory rights towards natural resources and redistribution of national wealth. As it is stipulated in the Article 11 of the Subsoil Code of Ukraine (the Code) the authorities that administer the industry are limited to central executive bodies and local governments. In particular, it is stipulated in the Code that the Ukraine’s Cabinet of Ministers carries out public administration in geological exploration, production and protection of subsoil. Other state bodies of public administration include central public authority responsible for state environmental protection policies; central public authority in charge of implementation of state geological exploration and efficient subsoil use policies; central authority in charge of state health and safety control policies. There are also public authorities in the Autonomous Republic of Crimea; local executive bodies and other state authorities and local self-government authorities in compliance with laws of Ukraine. This article is devoted to the analysis of the legal relations in the area of public administration of subsoil use, renewal and protection in Ukraine. The main approaches to study the essence of legal relations in the named area as well as its tasks, functions and methods are analyzed. It is concluded in this article that legal relationship in the field of public administration of subsoil use, renewal and protection is characterized by specifics of its task (development of natural resources).

Keywords: legal relations, public administration, subsoil code of Ukraine, subsoil use, renewal and protection

Procedia PDF Downloads 356
686 Implementation of a Monostatic Microwave Imaging System using a UWB Vivaldi Antenna

Authors: Babatunde Olatujoye, Binbin Yang

Abstract:

Microwave imaging is a portable, noninvasive, and non-ionizing imaging technique that employs low-power microwave signals to reveal objects in the microwave frequency range. This technique has immense potential for adoption in commercial and scientific applications such as security scanning, material characterization, and nondestructive testing. This work presents a monostatic microwave imaging setup using an Ultra-Wideband (UWB), low-cost, miniaturized Vivaldi antenna with a bandwidth of 1 – 6 GHz. The backscattered signals (S-parameters) of the Vivaldi antenna used for scanning targets were measured in the lab using a VNA. An automated two-dimensional (2-D) scanner was employed for the 2-D movement of the transceiver to collect the measured scattering data from different positions. The targets consist of four metallic objects, each with a distinct shape. Similar setup was also simulated in Ansys HFSS. A high-resolution Back Propagation Algorithm (BPA) was applied to both the simulated and experimental backscattered signals. The BPA utilizes the phase and amplitude information recorded over a two-dimensional aperture of 50 cm × 50 cm with a discreet step size of 2 cm to reconstruct a focused image of the targets. The adoption of BPA was demonstrated by coherently resolving and reconstructing reflection signals from conventional time-of-flight profiles. For both the simulation and experimental data, BPA accurately reconstructed a high resolution 2D image of the targets in terms of shape and location. An improvement of the BPA, in terms of target resolution, was achieved by applying the filtering method in frequency domain.

Keywords: back propagation, microwave imaging, monostatic, vivialdi antenna, ultra wideband

Procedia PDF Downloads 21
685 Child Feeding Practices of Mothers (Childbearing) and Exploration of Their Household Food Insecurity in a Coastal Region of Bangladesh

Authors: Md Abdullah Al Mamun

Abstract:

Background: The current situation of Ensuring WHO recommended feeding practices for infant and young children which is becoming a challenge nowadays in many developing countries, especially in areas where household food security is at risk. Because many households of the developing countries often encounter severe food insecurity hence provision of adequate child nutrition is threatened. Aim: The study aimed to assess the child feeding practices of 0-24 months childbearing mothers and explore their household food insecurity in a coastal region of Bangladesh. Methods: This study was conducted in Suborno Char (one of the coastal suburbs in Noakhali District in Bangladesh) from October 2019 to April 2020. A total of 400 mothers were selected with their children of 0-24 months following a cross sectional study sampling procedure of the population. Data were collected through a standard questionnaire and analyzed using statistical tests in SPSS version 20.0.0. Results: The frequency of exclusive breastfeeding, timely initiation of complementary feeding, and giving foods from four food groups to the children were 53.5%, 75.5%, and 22.2%, respectively. Mother's level of education showed a strong association with the child feeding practices of the mothers. Mothers of severely food insecure households showed lower odds in exclusive breastfeeding practice (COR 0.233 at 95% CI 0.083, 0.655; and AOR 0.478 at 95% CI 0.133, 1.713) than mothers of food secured households. Similar results have also been found in case of timely initiation of complementary feeding and minimum dietary diversity of the children.

Keywords: household food insecurity, exclusive breastfeeding, complementary feeding, maternal education, mothers age, household income

Procedia PDF Downloads 159
684 The Effect of Human Rights Violation in Modern Society

Authors: Hanania Nasan Shokry Abdelmasih

Abstract:

The discipline of regulation is pretty complex and has its own terminology. other than written legal guidelines, there's also dwelling regulation, which refers to prison exercise. primary legal rules purpose at the happiness of individuals in social existence and feature different characteristics in unique branches including public or non-public regulation. on the other hand, law is a countrywide phenomenon. The law of 1 state and the legal device implemented at the territory of another state can be completely exceptional. individuals who are professionals in a specific discipline of regulation in a single united states may have inadequate know-how within the regulation of every other united states. today, similarly to the neighborhood nature of regulation, worldwide and even supranational regulation rules are implemented as a way to defend basic human values and make sure the protection of human rights around the sector. systems that offer algorithmic answers to prison problems using synthetic intelligence (AI) gear will perhaps serve to produce very meaningful consequences in phrases of human rights. but, algorithms to be used need to no longer be evolved with the aid of only pc professionals, however additionally want the contribution of folks who are familiar with law, values, judicial choices, and even the social and political culture of the society to which it'll provide answers. otherwise, even supposing the set of rules works perfectly, it may not be well suited with the values of the society in which it is applied. The present day traits involving using AI techniques in legal systems suggest that artificial law will come to be a brand new subject within the area of law.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 7
683 Advanced Metallic Frameworks for Development of Robust and Efficient Water Splitting Electrodes

Authors: Tam D. Nguyen, Joe Varga, Douglas MacFarlane, Alexandr Simonov

Abstract:

Development of advanced technologies for green hydrogen generation from renewables is of key strategic importance to global future energy security and economic growth. Renewable-powered water electrolysis (WE) is considered as the most effective of the sustainable methods for hydrogen generation at scale. Currently, the greatest challenge of hydrogen production via water electrolysis is the insufficiently high efficiency. In which, the energy loss associated with the conversion of water to hydrogen is approximately 40-60%, with 30-35% associated with the electrolysis itself and 10-12% with gas compression and transportation. Hence, development of an energy-efficient water electrolyser that can generate hydrogen at high pressure will address both of these major challenges. This requires the development of advanced electrode configuration of the water electrolysis cell. Herein, we developed a highly-ordered interconnected structure of the metallic inverse-opal (IO) frameworks based on low cost materials, e.g. Cu, Ni, Fe, Co. The water electrolysis electrodes based on these frameworks can provide excellent mechanical strength required for the application under conditions of extreme pressure, as well as outstanding catalytic performance through the exceptional high surface area and high electrical conductivity. For example, NiFe layered double hydroxide (LDH) catalyst deposited on Cu IO is able to reach the oxygen evolution reaction (OER) catalytic performance up to the rates of > 100 mA cm−2 (>727A gcatalyst-1) at an overpotential of ~0.3 V. This high performance is achieved with only few micron-thick catalyst layers, in contrast to similarly performance of 103-fold thicker electrodes based on foams and other substrates.

Keywords: oxygen evolution reaction, support materials, mass transport, NiFe LDH

Procedia PDF Downloads 3